Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones to partake in criminal and terrorist activities. In such cases, the relatively inexpensive drones are often sacrificed to facilitate a quick escape once the criminal act has been completed. The pioneering field of UAV/drone forensics has grown out of the challenge law enforcement faces in examining the abandoned hardware for digital traces that can be used to identify the criminals themselves.


Ames, N., & Ibrulj, S. (2014). Serbia v albania abandoned after players and fans brawl on pitch. https://www.theguardian.com/ football/2014/oct/14/serbia -albania-euro-2016-flag-halted. ([Online; accessed 25-May-2018])

Associated Press. (2013). Netanyahu’s helicopter forced to land as israeli forces shoot down drone. https://www.theguardian.com/ world/2013/apr/25/israeli -aeroplane-shoots-down-drone. ([Online; accessed 25-May-2018])

Associated Press. (2015). Drone ‘containing radiation’ lands on roof of japanese pm’s office. https:// www.theguardian.com/world/2015/ apr/22/drone-with-radiation -sign-lands-on-roof-of-japanese -prime-ministers-office. ([Online; accessed 25-May-2018])

Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., . . . others (2017). Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22 , 3–13.

bbc.com. (2018). Gatwick airport: Drones ground flights. https://www.bbc.com/news/ uk-england-sussex-46623754. ([Online; accessed 22-Dec-2018])

Cheerson. (2015). Cx-20 auto-pathfinder 6-axis system user manual. http://www.christiandve.com/ wp-content/uploads/2015/08/ Cheerson-CX-20-user-manual.pdf. ([Online; accessed 25-May-2018])

Davidoff, S., & Ham, J. (2012). Network forensics: tracking hackers through cyberspace (Vol. 2014). Prentice hall Upper Saddle River. Page 16 Forensic Analysis of a Crash-Damaged ...

developers.google.com. (2018). Kml reference. https://developers.google.com/ kml/documentation/kmlreference. ([Online; accessed 28-Nov-2018])

France24.com. (2017). Exclusive: Is group’s armoured drones attack from the skies in battle for raqqa. http:// www.france24.com/en/20170626 -syria-exclusive-raqqa-drones -islamic-state-group-battle. ([Online; accessed 25-May-2018])

General Atomics Aeronautical. (2015a). Predator b: Persistent multi-mission isr. http://www.ga-asi.com/ Websites/gaasi/images/products/ aircraft systems/pdf/ Predator B021915.pdf. ([Online; accessed 25-May-2018])

General Atomics Aeronautical. (2015b). Predator c avenger: Next-generation multi-mission isr. http://www.ga-asi.com/Websites/ gaasi/images/products/ aircraft systems/pdf/ Predator C021915.pdf. ([Online; accessed 25-May-2018])

Hannay, P. (2017). A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices.

IMG Electronics Co. Ltd. (n.d.). Item number: Cx-20. https:// p.globalsources.com/IMAGES/PDT/ SPEC/006/K1134468006.pdf. ([Online; accessed 25-May-2018])

LabSat. (2018a). Labsat / labsat 2 - legacy. https://www.labsat.co.uk/ index.php/en/products/ labsat-2-gps-simulators. ([Online; accessed 25-May-2018])

LabSat. (2018b). Satgen gps simulation software. https://www.labsat.co.uk/ c 201X ADFSLForensic Analysis of a Crash-Damaged ... index.php/en/products/ satgen-simulator-software. ([Online; accessed 25-May-2018])

Luo, A. (2016). Drones hijacking: Multi-dimensional attack vectors and countermeasures. https://media.defcon.org/ DEF\%20CON\%2024/DEF\%20CON\ %2024\%20presentations/ DEFCON-24-Aaron-Luo-Drones -Hijacking-Multi-Dimensional -Attack-Vectors-And -Countermeasures-UPDATED.pdf. Defcon. ([Online; accessed 25-May-2018])

Marks, P. (2017). How cops catch drone-flying criminals. http://www.bbc.com/future/ story/20170731-how-cops-catch -drone-flying-criminals. ([Online; accessed 25-May-2018])

Naudin, J.-L. (2014). Inside the cheerson cx 20 auto pathfinder (or called the quanum nova. https://github.com/jlnaudin/ x-VTOLdrone/wiki/Inside-the -Cheerson-CX-20-Auto-pathfinder -(or-called-the-Quanum-Nova). ([Online; accessed 25-May-2018])

Naughton, R. (2007). Remote piloted aerial vehicles: An anthology. Centre for Telecommunications and Information Engineering, Monash University, 3 .

oziexplorer3.com. (n.d.). Globalsat g-star iv gps mouse receiver (usb) model bu-353s4. http://www.oziexplorer3.com/ eng/usb gps.html. ([Online; accessed 25-May-2018])

Raymond, E. S. (n.d.). gpsmon. http:// catb.org/gpsd/gpsmon.html. ([Online; accessed 25-May-2018])

Rowley, G. D. (2017). Armed drones and targeted killing: Policy implications for their use in deterring violent c 201X ADFSL JDFSL VxNx extremism. Retrieved from http://www.dtic.mil/dtic/tr/ fulltext/u2/1032652.pdf

Stitt, N. (2017). Drone crackdown targets operators smuggling contraband into sa prisons. http://www.abc.net.au/news/2017 -08-31/prison-drone-drops-could -lead-to-jail-time/8859402. ([Online; accessed 25-May-2018])

Wagner, W. (1982). Lightning bugs and other reconnaissance drones. Armed Forces Journal International.

www.cita.asia. (n.d.). Cheerson cx 20 wiring diagram. http://www.cita.asia/cheerson -cx-20-wiring-diagram.html. ([Online; accessed 25-May-2018])



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.