A Digital Forensics Case Study of The DJI Mini 3 Pro and DJI RC
A Digital Forensics Case Study of The DJI Mini 3 Pro and DJI RC
A Digital Forensics Case Study of The DJI Mini 3 Pro and DJI RC
Abstract— The consumer drone market is rapidly incidents and illegal use of drones has inevitably increased the
expanding with new drone models featuring unique number of Digital Forensic (DF) investigations involving
variations of hardware and software. The rapid drones [3], [9].
development of drone technology and variability in drone Drones present several challenges to the DF field. They often
systems can make it difficult for digital forensic feature a complex array of technologies, including wireless
investigators and tools to keep pace and effectively extract communication, GPS, and cameras, which can make it
and analyse digital evidence from drones. Furthermore, the challenging for investigators conducting a DF investigation [8],
growing popularity of drones and their increased use in [10]. There is also a lack of modern DF tools specifically
illegal and harmful activities, such as smuggling, espionage, developed for drones [4], [10], and this, combined with the fast-
and even terrorism, has led to an increase in the number of paced development of drone technologies, can rapidly render
drone forensic cases for authorities to manage. To assist
available tools obsolete and unfit for purpose [4], [5].
forensic investigators, a static digital forensic case study was
Additionally, Drone Forensics (DRF) is a relatively new
conducted on two drone devices recently released by Da-
discipline within the DF field. Only recently, Interpol published
Jiang Innovations (DJI): the Mini 3 Pro drone, and its
remote controller, the DJI RC. The study discovered the guidelines for DRF investigators [8], and researchers [4], [10]
presence of several digital artefacts on both devices, have proposed novel methodologies for the DRF field. Despite
including recorded media, flight logs, and other information these efforts, there still remains a lack of universally agreed
that could help investigators trace the drone’s usage and methodologies and approaches [9], [11], presenting further
identify its operator. Additionally, this paper explored challenges for DF investigators to navigate.
several methods for extracting and visualising the drone’s To ensure DF investigators are effective at conducting DRF
flight history, and highlights some of the potential methods investigations, they require specialist knowledge and skills [3],
used to limit, obscure, or remove key types of digital and should be aware of the limitations of the DF tools they use
evidence. [5]. DRF guidelines such as [8], published by government
agencies, and DRF case-studies such as [10] and [12] by
Index Terms— digital forensics, drone forensics, flight logs, academics, could assist DF investigators to address these
investigation, flight visualisation, telemetry, digital evidence. challenges [13].
Forensic case studies of older drone models, particularly DJI,
I. INTRODUCTION 1 appear widely in the literature; however, there appears to be a
.
II. BACKGROUND AND RELATED WORK is considered less significant when compared to static forms of
digital evidence.
E. Acquisition
Data acquisition guidelines outlined in [8] were adapted for
this case study. The primary preparation and acquisition
processes for the scenarios of this case study are outlined in
Figure 5.
This study was limited to manual, physical, and logical
extraction methods and where possible, in this order to conduct
the examination in a forensically sound manner as
recommended in [8].
Data integrity has also been considered. To meet the
minimum data integrity requirements, image files created by
FTK Imager were hashed, and a hash report generated for the
image.
Fig. 3. A top-down image of the DJI RC.
Specific extraction methods are detailed as follows:
The DJI RC was shipped with the DJI Fly application pre-
installed. The controller was prepared and configured for the 1) Mini 3 Pro drone: The Mini 3 Pro drone features a 1.2
experiment as follows: GB capacity internal storage device, a Micro SD card slot for
external storage, and a USB-C port for connecting to external
• It was paired with the Mini 3 Pro drone used in the devices. Figure 6 show the port placement in respect to the
study. drone.
• A DJI user account was logged in to the DJI Fly app As per the process workflow depicted in Figure 5, if the
during Scenarios A, B and C. scenario involved use of a Micro-SD card in the drone, then this
• The DJI user account in the DJI Fly app was bound to was imaged prior to attempting data extraction from the drone’s
the drone during the study. internal memory. Methods used for extracting data from the
• DJI Fly app privacy settings: drone’s internal memory included:
o “Local Data Mode” was disabled. • Connecting the drone to the forensic environment via
o “Mobile Device GPS Info” was disabled. a wired USB connection and exploring the user
o “DJI Device Hardware Info” was disabled for accessible volume presented to the forensic VM (i.e.,
some of the scenarios. a logical acquisition).
• Using the DJI Assistant 2 tool (via a wired USB
connection) to access areas of the drone’s storage not
presented to the forensic VM.
• Using the DJI Fly app, on both the DJI RC and the
Apple iPhone, to wirelessly connect to the drone and
extract multimedia files from it.
Fig. 6. A view of the USB port and Micro-SD card slot on the Mini 3 Pro.
Fig 8. Micro-SD card adapter with write block switch enabled. Fig. 9. General data analysis processes
F. Analysis
Data was analysed using the tools outlined in Table 1. The
general processes that were followed for the analysis are
depicted in Figure 9. The primary analysis tools were Autopsy,
HxD, the EXIF Tool, Notepad++, DatCon, and Flight Reader.
Specific analysis steps were undertaken for suspected flight
logs. This included submitting the files to both DatCon and
Flight Reader for initial decoding and parsing. DatCon did not
have an integrated visualisation feature; therefore, logs parsed
by DatCon were uploaded to the Airdata UAV and Google Earth
for visualisation analysis. These steps are depicted in Figure 10.
1) SD Card:
a) File System/Structure
• Filesystem type was FAT32.
• Three parent folders were present in the root Fig. 11. The magic number of DJI_0161.SCR.
volume:
o DCIM
o LOST.DIR
o MISC
b) Media
Images and videos were discovered in several locations
on the SD card image, including unallocated areas.
• High-resolution images were successfully retrieved Fig. 12. The magic number of DJI_0161.THM.
from folder “DCIM\100MEDIA”. These included
raw (.DNG) and compressed JPEG (.JPG) versions c) Flight Logs
of each image captured by the drone. No fight logs were discovered on the Micro SD card
• A high-resolution video taken for Scenario A was image.
retrieved (in full) from “DCIM\100MEDIA”. The
filename was DJI_0161.MP4. The video was able d) Other
to be replayed in full using VLC Player.
• Autopsy discovered a total of 236 deleted files on
• A pair of thumbnail images of the first frame of the
the unallocated volume of the SD card. These
recorded video was discovered in the
included images (in DNG and .JPG format), movies
“MISC\THM\100\” folder. The filetypes of these
(in .MOV format), an Adobe flash file (.SWF) and
images were .SCR and .THM. However, a hex
flight logs (in .TXT format). Of these files, the
analysis of these files revealed that they were both
movie and flash files were 0 bytes and could not be
JPEG files (see Figures 11 and 12). The image files
recovered.
ending in .THM were 160 x 90 pixels wide while
.SCR files were 960 x 540 pixels wide. The • Of the total recovered from the unallocated portion
filename of these images corresponded with the of the SD card, 131 of them were .txt type files.
filename of the related video (“DJI_0161.MP4”). These files had filenames in the format:
“fxxxxxx.txt” (“x” representing a number value).
• Previously deleted images were discovered by
Closer inspection of these files with Notepad++
Autopsy in an unallocated portion of the SD card.
revealed they contained the following flight history
These images were a mixture of JPG and DNG type
metadata:
files. The recovered JPEG images were thumbnails
of older images captured by the drone prior to the • Date/time of flight
case study. The pixel size of these recovered images • GPS coordinates (latitude, longitude, and altitude)
matched the respective pixel sizes of the .THM and • Camera parameters (such as shutter speed, iso,
.SCR files. The DNG images recovered by Autopsy zoom ratio, and sensor temperature).
were 48-mega pixel high-resolution images
captured by the drone prior to the case study. The The type of data and format of data in these files was
similar to that observed in DJI-generated subtitle telemetry
files. It is believed these text files were previously deleted
subtitle files. A snippet of this data is highlighted in Figure
14. Note that the latitude and longitude coordinate values
have been partially redacted.
Fig. 13. Screenshot of video overlay telemetry file showing camera data. Note that the GPS coordinates have been partially redacted.
Fig. 14. Snippet of the contents of a text file recovered by Autopsy from an unallocated space of the Micro-SD card. Note that the highlighted
GPS coordinates have been partially redacted.
• The images recovered from the SD card were analysed image was taken. Spot checks of the EXIF metadata
for the presence of Exchangeable image file format confirmed it was accurate.
(EXIF) metadata. It was discovered that both the
compressed JPEG (.JPG) and raw images (.DNG) 2) Internal Memory Analysis:
located in “DCIM\100MEDIA”, and the raw (.DNG)
images discovered in and recovered from the a) File System/Structure
unallocated volume contained comprehensive EXIF • Filesystem type was ExFAT.
metadata. The information stored included timestamps • 1.5 GB user-accessible volume
of when the images were created, the make and model • Mounted in Windows as a Mass Storage Device.
of the drone, camera sensor information (including its
serial number), and GPS coordinates of where the
b) Media • A cached video of a video recording taken during
Nil found. the flight for Scenario B was successfully recovered
using Autopsy. The file was called
c) Flight Logs “2023.01.28.19.09_49_Cache.mp4” and was
Nil found. located at:
“/Android/data/dji.go.v5/files/MediaCaches/”. The
d) Other video was extracted to the forensics workstation for
further analysis. The specifications of this video
• A .DAT file was retrieved using DJI Assistant 2. were:
The file was saved to the forensic VM as o MPEG-4 file type
“DJI_Mini_3_Pro_2023-01-25_21-38-00.DAT”. It o 864x480 pixels
appears that the timestamp in the filename o Length: 00:01:38 h/m/s
coincides when the file was extracted, not when it
o Creation date: 28.1.2023
was originally created in the drone. Analysis of this
o Creation time: 1911 hours
file with Notepad++ indicated that it was a binary o Size: 49.5 MB
file. DAT files contain serials. Decoding was
• While not technically part of this scenario, the
attempted with DatCon; however, the output files
related full-sized video was discovered on the
were either 0 or 1 KB in size and did not contain
drone’s internal memory. The specifications of this
any useful information.
video were:
• DJI Assistant 2 provides an option to extract o MPEG-4 file type
software system logs (called “Assistant logs”). o 1920 x 1080 pixels
Each extraction with this option generates two text o DJI_0005.MP4
files. The filename format for one of these files is o Creation Date: 28.1.2023
“YYYY_MM_DD@HH_MM_SS.log” while the o Creation Time: 1911 hours
other is titled “ui_ass2.log. The log file with time
o Size 437 MB
and date in the filename appears to be in a mix of The cached version discovered on the RC was
Korean and Chinese simplified encoded text. around 11% the size of the larger video discovered
Online translation sites Google Translate on the drone.
(translate.google.com) and DeepL (deepl.com)
were not able to decode it into anything meaningful. c) Flight Logs
The other log “ui_ass2.log” contains multiple lines
with timestamps in English, accompanied by Nil found.
encoded text. Text appears to be a Base64 or
d) Other
Base85 type encoding scheme. Attempted to further
decode with various Cyberchef modules Several interesting patterns emerged when Autopsy’s
(cyberchef.org), but the attempts were timeline feature was used on the SD card image.
unsuccessful. It is believed that both of these files • To begin with, it was discovered that several files and
were using a proprietary encoding scheme. top-level directories were generated on the SD card
around the same time (See Figure 15). The file creation
timestamps reported by Autopsy correlated with the
B. Scenario B date and time the SD card was last formatted by the
In this scenario, only the RC was retrieved. The RC contained RC.
an SD card which was imaged and analysed using Autopsy. • The timestamp for a “file accessed” event entry for
Manual and logical extraction methods using Windows “music_sound_wave” coincided with the time the RC
Explorer and DJI Assistant 2 were explored for analysis of the was booted up (see Figure 16). The associated sound
RC’s internal memory. file is played when the RC is powered on.
Fig. 15. Screenshot taken of Autopsy timeline showing several files and directories
created on the SD card at the same time.
Fig. 16. Screenshot take of Autopsy timeline showing the date and time the RC’s
power-on sound file was last accessed.
Fig. 17. Thumbnail images discovered on the RC’s internal memory via the RC files utility.
Fig 18. Screenshot taken of Flight Reader parsing the recovered flight log.
o This log displayed the error messages that drone model as a “Phantom 4”; however, the flight
were shown on the RC screen during the flight. path and time were accurate.
o The flight logs contained hundreds of • The RC-based DJI Fly app listed the email address
parameters, including flight start and finish of the logged in DJI account in “Profile” settings.
time, drone make and model, drone and battery • The email associated with the DJI user account was
serial numbers, error messages, warnings, discovered in several text files stored in the volume
GPS coordinates, and altitude. parent folder “SyncResult”. Figure 19 shows a
o The flight path was also visualised in Google snippet of this text. The timestamps in the filename
Earth Pro by selecting the KML file download and within the file indicate when the RC was last
option in Flight Reader. The flight path synced with DJI’s online servers.
presented by both applications appeared to be
accurate, however, as of the time of writing,
neither application appeared to offer start-to-
finish visual playbacks of flight paths.
d) Other
• The flight for Scenario B could be viewed directly Fig. 19. An email address belonging to the DJI user account signed into
on the RC (via the DJI Fly App) by selecting the RC was discovered in a log file on the RC’s internal memory. Note
“Profile”, then “more” and then tapping on the that the email address has been partially redacted.
flight. The application incorrectly reported the
• A partial .DAT file was extracted from the RC 3) SD Card – RC:
using DJI Assistant 2 over a USB connection.
Further analysis of this file in Notepad++ indicated a) Media
it was a proprietary encoded binary file. The RC’s Like scenario B, a cached video of the video recorded
model number and what appeared to be a serial for scenario C was found on the SD card. The related
number were identified in the beginning of the file. video of which was discovered on the SD card used in
See Figure 20. The longer string (a mix of letters the drone.
and numbers) did not match any serial number
identified during the study. b) Flight Logs
Nil found.
c) Other
A subtitle file (.SRT) of the associated video was
Fig. 20. Model number and unknown string discovered in the .DAT file in retrieved in full.
plain text. Note that the identified string has been partially redacted.
4) Internal Memory Analysis – RC:
C. Scenario C
a) Media
In this scenario, both the drone and RC were recovered. Both
devices contained an SD card, and the flight was normal. Thumbnail images of recorded video and image from
Scenario C was discovered on the RC in
1) SD Card – Drone: “DJI RC\Android\data\dji.go./v5\cache\ImageCaches”
b) Flight Logs
a) Media
Like Scenario B, flight logs were discovered in txt
• A full-sized MP4 video was retrieved from folder
filetype.
“DCIM\100MEDIA\”
• Two thumbnail images (a .THM and a .SCR file) of c) Other
the first frame of the above video were retrieved.
• Similar to Scenario B, the flight could be viewed
b) Flight Logs directly on the RC (in the DJI Fly App) by selecting
“Profile”, then “more” and then tapping on the
Nil found.
flight. The application incorrectly reported the
drone model as a “Phantom 4”; however, the flight
c) Other
path and time were accurate.
A subtitle file (.SRT) of the associated video was • Using manual extraction methods, a DJI user
retrieved in full. account and email address were discovered signed
into the DJI Fly app on the RC.
2) Internal Memory Analysis – Drone:
a) Media D. Scenario D
Nil found. For this scenario, both the drone and RC were recovered,
however neither contained an SD card. To simulate a collision,
b) Flight Logs the drone was carefully turned over by hand just prior to being
Nil found. powered down. USB connections were not available for this
scenario, only Wi-Fi and Bluetooth. Additionally, the DJI user
c) Other account was logged out of the RC during the flight for this
scenario.
A .DAT binary file containing the drone’s model
number and a possible serial number was discovered
1) Internal Memory Analysis – Drone:
using DJI Assistant 2 over USB. See Figure 21. The
longer string did not match any serial number identified
a) Media
during the study.
• A full-sized image and video taken for this scenario
was successfully retrieved from the drone using
“Quick Transfer Mode” on the iOS version of the
DJI Fly application. The file names of these files
were:
Fig. 21. Model number and possible serial number in binary file extracted • “dji_fly_YYYYMMDD_xxxxxx_XXX__x
from the drone’s internal memory. Note that the unidentified string has been xxxxxxxxxxxx_photo.jpg”
partially redacted.
• “dji_fly_YYYYMMDD_xxxxxx_XXX__x details, including the same warning message that
xxxxxxxxxxxx_video.mp4”. Flight Reader parsed.
Fig. 22. Screenshot of flight log information decrypted by the Airdata UAV website.
Fig. 23. Screenshot of flight log information decrypted by Flight Reader.
TABLE 2
A SUMMARY OF THE DIGITAL ARTEFACT TYPES DISCOVERED
A Drone Y N N N G, D D, E
B RC Y Y N Y N G, P, D
Drone Y N N N G, D D, E
C
RC Y Y N Y N G, P, D
Drone -- Y -- N -- G, D
D
RC -- Y -- Y -- D, E
Y = Artefact discovered, N = No artefacts discovered, G = Artefacts containing geolocation found, P = Artefacts containing PII found,
D = Artefacts with device identifiable information found, E = Encrypted/encoded artefacts found that could not be decrypted/decoded.
V. DISCUSSION third parties could raise privacy and legal concerns for
investigators. In contrast, this study also evaluated the
Several digital artefacts of potential interest to forensic capabilities of Flight Reader for local flight log analysis. It was
investigators and researchers were discovered on the Mini 3 Pro found that this application was capable of parsing and
and DJI RC. These artefacts included media, flight logs, and presenting DJI flight logs, however, an Internet connection was
other PII, including an email address of the associated drone required to obtain maps and other data. The application
operator. These results are similar to that of case studies of older developer confirmed that Flight Reader requires an Internet
DJI drone models by [4], [5], [10], [15] connection to obtain map data, decryption keys, and verify the
Acquisition of key digital artefacts from these devices was application licence [28]. Due to this fact, the exchange of such
straightforward, with the majority able to be acquired from data could also raise privacy concerns for investigators.
simple manual extraction methods, while other artefacts, such Previously deleted subtitle telemetry and image files were
as flight logs and previously deleted files, required more effort. recovered from unallocated portions of the SD cards. It is
The was partially attributed to the absence of password believed this was due to a limitation of the card formatting
protection on these devices and is likely to assist investigators utilities used in the study to properly sanitise data on the SD
conducting DRF examination on said devices in the future. cards. This finding was identified early, during analysis of
Flight logs located and retrieved from the internal storage of Scenario A, and steps were taken to ensure that the SD cards
the RC were successfully decrypted by DatCon and Flight were sufficiently sanitised for subsequent scenarios.
Reader. Flight logs decrypted by DatCon were submitted to the A cached video file discovered on the RC during analysis of
Airdata UAV website to present the logs in a visual form, while Scenario B was only 11% of the full-sized associated video
Flight Reader was capable of decrypting and presenting logs saved to the drone, however the resolution of the video was
directly to visual form. Both methods were able to present the sufficient enough to make out details. This finding could be
relevant flight history information in an intuitive way; however, useful to investigators in situations where videos have been
it was discovered that an error log entry relating to the simulated recorded, but the associated full-sized video from the drone is
collision in Scenario D was missing from the information unable to be recovered.
presented by Airdata UAV. This is a significant finding as the It was surprising to see DJI’s Wi-Fi-based “Quick Transfer”
absence of such information could be crucial in determining the feature functioned between the drone and RC even though Wi-
circumstances behind a drone related event. This finding Fi appeared to be turned off on the RC’s Android settings. The
highlights a potential limitation in the capabilities of Airdata reason for this is currently unknown, though it is suspected that
UAV’s flight log parsing service which investigators should be the DJI Fly app enables Wi-Fi, Ocusync, and/or Bluetooth to
aware of. facilitate this media transfer system.
The reviewed literature assessed the capabilities of online Although it appeared there was an option to disable
services such as Airdata and Google Earth for parsing flight logs “Approximate Location” in the RC DJI Fly application settings,
and presenting them in a visual form. Uploading flight logs to it did not appear that it could be disabled. This finding was an
unusual juxtaposition considering that the application physical data extraction and analysis. Despite these limitations,
developers could remove the faux option altogether. the findings in this study could still potentially assist
The nature of the strings found in the .DAT files extracted via investigators and researchers with future DRF examinations of
the DJI Assistant 2 application was unknown to the author. It is these and similar devices. In addition, this study partially
proposed that these strings may be hidden serial numbers unique addresses the previously discussed gap in literature pertaining
to the respective devices. A comparison with other DJI Mini 3 to DF of drones weighing less than 250g.
Pro’s and RC’s might support or disprove this theory.
Of the two devices, it was discovered that the RC contained
all of the PII related digital artefacts. This finding supports the APPENDIX
view by [4] that attribution is more likely to be achieved with Table 3 contains a list of abbreviations used in the paper.
data acquired from an RC rather than a drone.
As the marketed weight of the DJI Mini 3 Pro is 249 grams TABLE 3
[21], this study partially addresses claims by [10] of a gap in the ABBREVIATIONS USED IN THE ARTICLE
literature pertaining to DRF case studies of drone models ACPO Association of Chief Police Officers
weighing less than 250 grams. AF Anti-forensics
The system logs were not able to be decoded, which mirrored DF Digital Forensics
the experience of [10]. It would be useful to be able for DRF Drone Forensics
investigators to be able to decode these. DJI Da-Jiang Innovations
DNG Digital Negative
VI. FUTURE WORK FAA Federal Aviation Administration
EXIF Exchangeable Image File Format
JPEG Joint Photographic Experts Group
Several promising areas for future research were identified
NIST National Standards and Technology
out of this case study. The first is further investigation into DJI’s
OS Operating System
DroneID technology. The presence and specifics of the
technology on the devices examined in this study are unknown, RC Remote Controller
and as such, DRF case studies that focus on this technology Rf Radiofrequency
could advance the literature. Inability to decode DJI system logs SD Secure Digital
was a limitation identified during the study. Such logs could SDR Software Defined Radio
provide investigators with valuable insight into the drone’s UART Universal Asynchronous Receiver Transmitter
usage and assist with attribution. Therefore, research into UAV Unmanned Aerial Vehicles
methods for decoding these logs could be valuable to digital USB Universal Serial Bus
forensic investigators. VM Virtual machine
Other potential areas to research include submitting the DJI
Mini 3 Pro and DJI RC to vulnerability testing to get root access,
performing a chip-on assessment on the devices, assessing the REFERENCES
weight carrying capabilities of the drone and investigating the
potential presence of digital artefacts relating to a history of
[1] Civil Aviation Safety Authority. (2022). The RPAS and AAM
payload transport. Strategic Regulatory Roadmap. [Online] Available:
https://www.casa.gov.au/sites/default/files/2022-06/the-rpas-and-
aam-roadmap.pdf
VII. CONCLUSION [2] S. Frost, "Study analysing the current activities in the field of UAV.
Technical Report, ENTR/2007/065. 2007," European Commission,
2007. [Online]. Available: https://ec.europa.eu/home-
In this case study, the DJI Mini 3 Pro and DJI RC were affairs/sites/homeaffairs/files/e-
library/documents/policies/security/pdf/uav_study_element_2_en.p
examined for presence of digital artefacts that could be of key df
interest to investigators. Additionally, potential digital anti- [3] F. E. Salamh, U. Karabiyik, M. K. Rogers, and E. T. Matson, "A
forensic methods for both devices were explored. The case comparative UAV forensic analysis: Static and live digital evidence
study was divided into four potential DRF scenarios that a traceability challenges," Drones, vol. 5, no. 2, 2021, doi:
10.3390/drones5020042.
digital forensic investigator may be faced with. The study found [4] G. Thornton and P. Bagheri Zadeh, "An investigation into
digital artefacts, such as media, flight logs, and PII, on both Unmanned Aerial System (UAS) forensics: Data extraction &
devices that could potentially reveal the drone’s usage history analysis," Forensic Science International: Digital Investigation, vol.
and identify the operator/registered owner. Of these, flight logs 41, 2022, doi: 10.1016/j.fsidi.2022.301379.
[5] M. Yousef, F. Iqbal, and M. Hussain, "Drone Forensics: A detailed
and PII were discovered on the RC, while full-sized media was analysis of emerging DJI models," in 2020 11th International
discovered on the drone. Of the two devices, it is apparent that Conference on Information and Communication Systems (ICICS),
the RC is the primary device for acquiring drone usage and PII 2020.
related data. Key limitations encountered during the study [6] Federal Aviation Authority. "UAS Sightings Report."
https://www.faa.gov/uas/resources/public_records/uas_sightings_re
included not being able to be decode system logs and not having port (accessed Jan. 23, 2023).
full access to the internal memory of both devices for complete
[7] N. Schiller et al., "Drone security and the mysterious case of DJI’s
DroneID," 2023.
[8] Interpol, "Framework for responding to a drone incident - For First
Responders and Digital Forensics Practitioners," 2020. [Online].
Available:
https://www.interpol.int/content/download/16243/file/Guidelines%
20to%20Digital%20Forensics%20First%20Responders_V7.pdf
[9] E. Mantas and C. Patsakis, "Who watches the new watchmen? The
challenges for drone digital forensics investigations," Array, vol. 14,
2022, doi: 10.1016/j.array.2022.100135.
[10] M. Stanković, M. M. Mirza, and U. Karabiyik, "UAV forensics: DJI
Mini 2 case study," Drones, vol. 5, no. 2, 2021, doi:
10.3390/drones5020049.
[11] A. Al-Dhaqm, R. A. Ikuesan, V. R. Kebande, S. Razak, and F. M.
Ghabban, "Research challenges and opportunities in Drone
Forensics models," Electronics, vol. 10, no. 13, 2021, doi:
10.3390/electronics10131519.
[12] H. Studiawan, T. Ahmad, A. M. Shiddiqi, B. J. Santoso, and B. A.
Pratomo, "Forensic event reconstruction for drones," in 2021 4th
International Seminar on Research of Information Technology and
Intelligent Systems (ISRITI), 2021, pp. 41-45, doi:
10.1109/isriti54043.2021.9702864.
[13] F. E. Salamh, M. M. Mirza, and U. Karabiyik, "UAV forensic
analysis and software tools assessment: DJI Phantom 4 and Matrice
210 as case studies," Electronics, vol. 10, no. 6, 2021, doi:
10.3390/electronics10060733.
[14] R. Kumar and A. K. Agrawal, "Drone GPS data analysis for flight
path reconstruction: A study on DJI, Parrot & Yuneec make drones,"
Forensic Science International: Digital Investigation, vol. 38, 2021,
doi: 10.1016/j.fsidi.2021.301182.
[15] J. K. Lan and F. K. Lee, "Drone Forensics: A case study on DJI
Mavic Air 2," in International Conference on Advanced
Communications Technology (ICACT). 2022.
[16] G. Johansen, Digital Forensics and Incident Response : Incident
Response Tools and Techniques for Effective Cyber Threat
Response, 3rd ed. Birmingham: Packt Publishing, Limited, 2022.
[17] K. Kent, S. Chevalier, T. Grance, and H. Dang, "Guide to integrating
forensic techniques into incident response," National Institute of
Standards and Technology, Gaithersburg, MD, NIST SP 800-86,
2006.
[18] R. Tamma, O. Skulkin, H. Mahalik, S. Bommisetty, and I.
Mikhaylov, Practical Mobile Forensics - Third Edition : A Hands-
On Guide to Mastering Mobile Forensics for the IOS, Android, and
the Windows Phone Platforms. Birmingham, United Kingdom:
Packt Publishing, Limited, 2020.
[19] Guidelines on Mobile Device Forensics, NIST SP 800–101 Revision
1, 2014. [Online]. Available: http://nist.gov
[20] Association of Chief Police Officers. (2012). ACPO Good Practice
Guide.
[21] DJI. "DJI Mini 3 Pro User Manual." DJI.
https://dl.djicdn.com/downloads/DJI_Mini_3_Pro/UM/20221104/D
JI_Mini_3_Pro_User_Manual_v1.4_en.pdf (accessed Feb. 5, 2023.
[22] Federal Aviation Authority. "UAS remote identification."
https://www.faa.gov/uas/getting_started/remote_id (accessed Feb.
2, 2023).
[23] D. Slotta. "Global market share of drone manufacturers."
https://www.statista.com/statistics/1254982/global-market-share-
of-drone-manufacturers/ (accessed Jan. 20, 2023).
[24] CIA Jeep Doors [dot] py. (2022). [Online]. Available:
https://github.com/MAVProxyUser/CIAJeepDoors/blob/main/REA
DME.md
[25] "DJI Fly." https://apps.apple.com/us/app/dji-fly/id1479649251
(accessed Feb. 5, 2023).
[26] L. Stanton. "How to remove write protection from an SD card."
https://www.alphr.com/remove-write-protection-from-sd-card/
(accessed Feb. 5, 2023).
[27] DJI, "System Security: A DJI Technology White Paper V2.0," 2022.
[28] M. Singer, private communication, Jan. 2023.