BATTLEFIELD DIGITAL FORENSICS
BDF_Battlefield_Digital_Forensics_final
BDF_Battlefield_Digital_Forensics_final
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Figure 4. Faraday Cage 4 .<br />
The sustain phase represents the new frontier for intelligence-gathering purposes. In planning the mission, an<br />
accurate cyber-intelligence preparation of the battlefield (C-IPB) could reveal the presence of enemy critical<br />
information that will be difficult to extract because of device portability or accessibility; as an example, this is<br />
typical of data centres. Installing surveillance software on targeted devices and operating data exfiltration<br />
through swiftly established wireless networks may represent a valuable alternative. The challenge is composed<br />
of a combination of factors, ranging from the possibility of targeting (with malicious payloads) complex server<br />
solutions to the survivability of the deployed networks that could operate even beyond the strike duration.<br />
Chapter 9 – ‘Sustaining the Data’ covers the matter in more detail.<br />
4 Figure Courtesy PARABEN.<br />
17