13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

prior to the operation, gather needed tools and a supply of packaging materials that will help to assure the<br />

safe removal of the digital devices and media;<br />

define the technical architecture supporting a data exfiltration operation;<br />

prepare any preliminary paperwork;<br />

brief personnel on any expected digital evidence or information that might be recovered;<br />

designate at least one forensics computer specialist to be in charge of prioritisation of the acquisition;<br />

identify computer and electronic devices and media;<br />

avoid interacting with the computer or executing any programs based on instinct;<br />

document computer and electronic evidence by labelling, photographing, or sketching after the action;<br />

package all electronic devices, media and other transportable evidence to be exfiltrated;<br />

remove and transport evidence and protect the physical integrity of the components.<br />

6.2 (SOF)DFA and (IT)Target Infrastructure (ITTI)<br />

The previous paragraph has introduced the basic requirements needed for the acquisition of digital forensics<br />

evidence in a hostile environment; this operation should be supported by an infrastructure designed with this<br />

scope in mind. This paragraph will describe an overall architecture that can be used to address this problem. At<br />

the moment there is no technical solution specific for this, so this document provides a possible<br />

implementation, highlighting the limitations that can be faced. First of all, the technical infrastructure<br />

supporting the SIDSS process should be defined.<br />

(SOF)DFA: (Special Operation Forces) digital forensics asset. This term includes the set of DF trained operators,<br />

the technology used and the procedures adopted to achieve the specific task of digital information collection<br />

during the strike. The analogy that comes to mind is the medical asset present in any military operation: in the<br />

same way, the forensic asset should allow operators to perform a correct triaging process based on the SIDSS<br />

model explained in the previous pages.<br />

ITTI: Information technology target infrastructure. This term describes the IT Infrastructure present in the<br />

environment to be targeted, which is heterogeneous and unpredictable in nature. The first statements of these<br />

environments will be covered in the following part of this chapter, by using real case scenarios, as detailed in<br />

Chapter 8 – ‘Exfiltration Solutions’.<br />

6.2.1 (SOF)DFA<br />

The technical architecture supporting the SOF team can be implemented in many different ways, using<br />

different types of technology. This paragraph analyses some possible implementations, classifying them based<br />

on the connectivity linking the operators.<br />

6.2.1.1 Ad-hoc Mobile File System<br />

The first method is based on a project in development at La Sapienza, University of Rome, which is a work in<br />

progress but is relevant to the object of this infrastructure.<br />

The proposed infrastructure is based on an ad-hoc mobile file system, which can be used to support the data<br />

exfiltration operation and also to guarantee the intra-team data backup that is one of the basic requirements<br />

of the DFA module of the SOF Team. More information about related file distribution research can be found<br />

from [5][6][7][20].<br />

Unlike the conventional infrastructure-based wireless network, an ad-hoc network, as a distributed wireless<br />

network, is a set of mobile wireless terminals communicating with each other without any pre-existing fixed<br />

infrastructure. The mobile wireless ad-hoc network has several unique features that challenge the network<br />

operation, such as the routing algorithm, attack vectors, quality of service (QoS), resource utilisation, etc.<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!