Asia (Other)

Screenshot 2020-01-31 at 2.57.56 PMWith more people being confined to their homes in different parts of the globe, hobbyists will be finding new uses for their drones. This can be a nuisance for the general public, but drones can be used for much greater benefit or much greater havoc than this.

Drones can be used for security purposes and monitoring construction projects through to delivery of medical supplies or equipment to remote areas. Drones have been utilised to deliver contraband to prisons but have also been used by law enforcement to identity prisoners involved in or inciting riots. In 2018, Gatwick Airport (second busiest airport in the UK) was closed for 33 hours across a 2-day period because of a drone sighting which resulted in over 1,000 flights being cancelled or delayed. Each time the drone was out of sight and the runways were cleared for re-opening, the drone would appear again. Even an unconfirmed sighting can result in havoc.

So, what do drones have to do with Computer Forensics? Drones themselves are essentially flying computers capable of storing, creating and transmitting data. The drone itself can store data relating to the owner of the drone, flights paths and coordinates including altitude which can be utilised to determine speed, log files for each session from power on through to power off, start and end locations, and any photos of videos that were taken by the drone itself. All this information is sent back to the controller. In the case of many hobbyists, it is stored on their mobile phone, but the information often remains resident on the drone itself.

Screenshot 2020-04-03 at 10.18.23 AM

In the event of an incident, if the drone is captured, this captured data could be utilised to identify:

Who owns the drone?

  • Using serial identifiers, the drone can be linked to an account or user.

Where did they fly?

  • The GPS location can identify the start of each journey and each subsequent location between the start and destination of the drone.
  • These are timestamped and can be used to identify previously stored flight paths.

What happened on the flight?

  • Image and videos can be used to identify what the individual saw during their journey.
  • If the drone was being utilised for a parcel drop, the coordinates could be used to work out where the package was dropped, resulting in a sudden increase in altitude and change of speed. Calculations can identify the approximate size or weight of the package.

Heading into 2020, drone sales and usage continues to grow with more and more hobbyists entering the market. This is due to both lower costs as well as an increase in capabilities as a result of further hardware and software advancements.

Other predictions for the future include an increasing interest in drones for commercial uses in the mapping, agriculture, security, mining, energy, medical delivery and communications sectors among others. As demand increases, the need to prevent cybersecurity hacks, the use of Artificial Intelligence and data analysis features will become more important. Automation and unmanned systems will also be in demand. Communication technology is also important for delivering immediate project updates without reworking and can make a significant difference to commercial timeframes and budget. As the capacity and sophistication of drones increase, so does the risk for commercial operators if drones are captured and made accessible to digital forensic experts who can retrieve commercially sensitive information.

Drones are here to stay, as a result of increased interest as well as user accessibility. Aviation and privacy laws will likely continue to be a hot topic within the field. As capabilities and technology advances, drone forensics will likely remain a fluid topic with more challenges relating to these flying computers and investigations of the devices that control them.




Law In Order is a leading provider to the legal profession of eDiscovery and legal support services including forensic data collection, information governance, managed document review, and virtual arbitration or mediation services. We provide a secure, flexible and responsive outsourced service of unparalleled quality to law firms, government agencies and inhouse corporate legal teams. The Law In Order team is comprised of lawyers, paralegals, system operators, consultants and project managers, with unparalleled knowledge and experience in legal technology support services.


By David Kerstjens



Screen Shot 2019-04-12 at 3.34.17 PME:

Related Articles by Firm
Data collection and early case assessment for investigations
Data collection and analysis for investigations is very different to collection for discovery or review. This article discusses the differences; how Early Case Assessment (ECA) can assist and the benefits of using review technology ...
Spotlight on eDiscovery
Many people are still confused about what electronic discovery encompasses ...
Will we see the end of Keywords in eDiscovery?
With the advances in Technology Assisted Review (TAR), it raises questions as to whether keywords still have a place in eDiscovery ...
How to Make Data Collection More ‘Effective’
Data can be collected efficiently, but if relevant data is not collected then the case will not come together.
Information Governance: Preserving Data and Being Prepared for Investigation
Organisations need to ensure their rules around information governance are being enforced. Many US organisations have an information governance officer in their IT, legal ...
How to speak IT
Ideally, everyone should have a basic understanding of the company’s IT infrastructure, not least because as more companies digitise, the risk of cyber threats increases. A cyberattack can come from anywhere ...
Redactions? How to Ensure There are no Nasty Surprises
With recent headlines highlighting the damage and embarrassment that can be caused by poorly redacted documents, it is no wonder many firms and corporates are turning to legal document management specialists to secure their redactions ...
Self-Collection Risks
When digital evidence is required at the start of a matter, it’s easy to get swept up in the moment and start rushing to gather the evidence but this is a key time to step back, take a moment ...
What Happens After the Dawn Raid?
The dawn raid has led to the forensic collection of 100,000 documents, now safely secured on a hard drive. What is the process from here? It’s important to plan your strategy in advance to minimise downtime, extract relevant documents and ...
Bringing eDiscovery In-House? Four Tips to Get You Started
With an increase in litigation and in costs for document review, more and more companies are considering bringing parts, if not all, of the eDiscovery process in house ...
A Lawyer’s Future is Looking Sharp with Electronic Hearings
The benefits of running an efficient collection and forensic process extends all the way to the hearings room ...
Forensic investigations, the role of corporate counsel and the rise of information governance
Head of Forensics – Erick Gunawan, discusses the Role of Corporate Counsel in the context of litigation or investigation and the increasing importance of information governance ...
Forensic investigations and cross-border matters
What are the current trends in forensic investigations for cross-border matters? Head of Forensics - Erick Gunawan, looks at the constant evolution in data types and volumes, and the ever-tightening data privacy laws and regulatory intervention ...
Adopting eDiscovery for internal investigations
In-house counsel are often called on to manage an internal investigation. How can you effectively plan for and manage these investigations? We explore how electronic discovery (eDiscovery) tools help you mitigate risk and achieve your fact-finding mission.
The evidence collector that’s always with you
It is an integral part of our life these days and an item that is rarely further than arm’s reach ...
Related Articles
Related Articles by Jurisdiction
A roadmap for response and remediation
Cybersecurity professionals are no doubt familiar with the oft-repeated adage that there are only two kinds of companies — ‘those that have been breached’ and ‘those who do not know it yet’ ...
Cross-Border M&A
Last year’s strong M&A activity in Asia has continued in the first half of 2011. In our Special Report, senior lawyers practising in the field share their insights into the factors driving activity, from Asia’s thirst for ...
Crime vs. Ethics: Changing corporate culture to reduce modern slavery
The second of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues …
Latest Articles