13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3<br />

Statement of the Problem<br />

Christian Braccini<br />

3.1 Digital Intelligence and Evidence Collection<br />

Today’s military is adapting to asymmetrical warfare and evolving real-time threat matrices that require new<br />

approaches to military operations. Digital intelligence and evidence collection (as part of site exploitation)<br />

represent the new approach in targeting mobile, social, virtual and collaborative threat models to process<br />

information.<br />

Site exploitation is composed of tactical exploitation and technical exploitation as described in ATP 3-90.15 [2].<br />

Tactical site exploitation consists of activities performed at or near a specific spot. These activities enable<br />

materiel at the site to be effectively detected, collected, and processed. The materiel exploitation that follows<br />

will likely answer information requirements and facilitate future operations.<br />

Conversely, technical exploitation is conducted off-site, in most cases. The security environment of forward<br />

operating bases (FOB) or national-level laboratories for technical exploitation allows for the later use of<br />

advanced processing techniques.<br />

ATP 3-90.15 [2] further describes the use of forensic-based procedures to ensure that identification and<br />

collection tasks support the analysis and dissemination in the targeting cycle presented in Figure 1. The<br />

targeting cycle can quickly take apart the network of an insurgency or at least damage it to such an extent as to<br />

make it a low-level threat.<br />

Figure 1. The Targeting Cycle [3].<br />

As tactical site exploitation capabilities evolve, Special Operations Forces (SOF) are challenged with more<br />

technically advanced core activities on-site, including:<br />

<br />

<br />

<br />

<br />

Search techniques;<br />

Biometrics;<br />

Forensics; and<br />

Document and media exploitation.<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!