
sUAS Forensics & Attribution
Turning Drone Wreckage into Intelligence, Evidence, and Accountability




When Detection Isn’t Enough
Drones are used for smuggling, surveillance, reconnaissance, and weapon delivery by criminals, extremists, and state actors. Yet most counter-UAS training ends at detection or defeat.
What happens next — after a drone is recovered, seized, or downed — is often where organizations lack the tools, training, and processes to extract meaningful answers.
This course fills that gap.

Client-Centric

Personalized Approach
Integrity & Trust
Experienced

Course Overview
sUAS Forensics & Attribution fills the gap.
This professional course teaches participants concepts on how to extract, analyze, and operationalize data from small, unmanned aircraft systems and their supporting infrastructure. Students learn concepts on how to exploit flight logs, onboard storage, payloads, firmware, controllers, mobile devices, RF and network artifacts, and emerging fiber-optic control systems to reconstruct activity, identify operators, and support legal, intelligence, and operational outcomes.
​
The course takes a forensics-first approach, integrating digital, physical, and network analysis with real-world investigative tradecraft. Rather than focusing on a single platform or vendor, the instruction is vendor-agnostic and platform-independent, applicable to Radio Frequency (RF), First person view (FPV), Do it Yourself (DIY), LTE-enabled, and fiber-optic-controlled systems.
​
Special emphasis is placed on attribution — connecting recovered hardware and data to people, locations, networks, and intent. Participants gain practical insight into how drone evidence supports prosecutions, intelligence assessments, and future counter-UAS planning.
​
This is the training organization's turn when detection isn’t enough — and answers are required.

WHAT MAKES THIS COURSE DIFFERENT
-
Focuses on forensics and attribution, not just detection or defeat
-
Addresses modern and emerging threats, including fiber-optic-controlled drones
-
Integrates technical, legal, and intelligence perspectives
-
Vendor-agnostic and platform-independent
-
Built from real-world operational experience, not theory

Course Details
WHO THIS COURSE IS FOR
-
Law enforcement investigators and digital forensics examiners
-
C-UAS operators and analysts
-
Military and DoD personnel
-
Intelligence and counterintelligence professionals
-
Critical infrastructure and corporate security teams
-
Prosecutors and legal professionals supporting UAS cases
-
Private-sector incident response and security units
Learning Outcomes
WHAT PARTICIPANTS WILL LEARN
Participants will be able to:
-
Identify and extract forensic artifacts from recovered sUAS platforms
-
Analyze flight logs, firmware, payload data, and controller information
-
Preserve and document physical and digital evidence
-
Investigate fiber-optic-controlled drones that defeat RF detection
-
Reconstruct flight activity and operator behavior
-
Support attribution, prosecution, intelligence reporting, and CUAS strategy
Course Format
-
90–120 minute executive or professional sessio
-
Available in person or virtually
-
Single-agency or multi-agency delivery
-
Includes case examples and structured Q&A
Pricing & Fee Recommendations
These ranges reflect specialized forensic and investigative training standards across LE, DoD, and critical-infrastructure audiences.
1. Executive / Professional Lecture or Briefing
(90–120 minutes)
$5,000

CEO and OWNER
Bill Edwards
I’ve been a professional Consultant since 2017 after a career of over 27 years in the United States Army. I believe in maintaining a positive mindset, creating partnerships with a purpose, and always striving for significant outcomes. I offer speaking engagements on topics of leadership and security/public safety. When you work with me, you should expect a collaboration with transparency and consistency. Want to learn more? Contact me today for an initial consultation.

