BATTLEFIELD DIGITAL FORENSICS
BDF_Battlefield_Digital_Forensics_final
BDF_Battlefield_Digital_Forensics_final
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
3<br />
Statement of the Problem<br />
Christian Braccini<br />
3.1 Digital Intelligence and Evidence Collection<br />
Today’s military is adapting to asymmetrical warfare and evolving real-time threat matrices that require new<br />
approaches to military operations. Digital intelligence and evidence collection (as part of site exploitation)<br />
represent the new approach in targeting mobile, social, virtual and collaborative threat models to process<br />
information.<br />
Site exploitation is composed of tactical exploitation and technical exploitation as described in ATP 3-90.15 [2].<br />
Tactical site exploitation consists of activities performed at or near a specific spot. These activities enable<br />
materiel at the site to be effectively detected, collected, and processed. The materiel exploitation that follows<br />
will likely answer information requirements and facilitate future operations.<br />
Conversely, technical exploitation is conducted off-site, in most cases. The security environment of forward<br />
operating bases (FOB) or national-level laboratories for technical exploitation allows for the later use of<br />
advanced processing techniques.<br />
ATP 3-90.15 [2] further describes the use of forensic-based procedures to ensure that identification and<br />
collection tasks support the analysis and dissemination in the targeting cycle presented in Figure 1. The<br />
targeting cycle can quickly take apart the network of an insurgency or at least damage it to such an extent as to<br />
make it a low-level threat.<br />
Figure 1. The Targeting Cycle [3].<br />
As tactical site exploitation capabilities evolve, Special Operations Forces (SOF) are challenged with more<br />
technically advanced core activities on-site, including:<br />
<br />
<br />
<br />
<br />
Search techniques;<br />
Biometrics;<br />
Forensics; and<br />
Document and media exploitation.<br />
11