13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 22. Smart Dust sensor 58 .<br />

In addition to collecting information before the special operation, they could be used to transfer, at least, small<br />

amounts of captured data out from the target site. WSNs are useful in simple monitoring applications requiring<br />

low data transfer rates. They operate with low power consumption in order to prolong the monitoring function<br />

as much as possible. Although there are efforts to increase the data transfer rates, these rates do not exceed 2<br />

Mbps [49]. In the battlefield digital forensics case of this study, as the area is not very wide and the SOF<br />

operators can locate network devices with appropriate batteries during the operation, establishing IEEE 802.11<br />

WLAN with high data transfer rates is more feasible. It can be argued that WSNs can continue to operate after<br />

the completion of the mission and would be able to transfer data for a long time due to their low power<br />

consumption. However, as the area belongs to the enemy and the SOF operators only have control of the area<br />

for a limited time, it is highly probable that the enemy would find and destroy the network infrastructure<br />

within a short time after the operation. The characteristics of the operational environment thus do not allow<br />

WSNs to use their advantage of low power consumption.<br />

9.7 General Overview of Alternatives<br />

Based on the already existing communication technologies, it may be possible to setup a system (or several<br />

systems) for transferring data out from the target site during and after the operation. As discussed, establishing<br />

a temporary WLAN only enables data to be collected during the operation. The creation of a communication<br />

channel via satellite which can remain after the operation has been described as an alternative to a temporary<br />

WLAN; however, the temporary WLAN enables the collection of much more data due to the high data transfer<br />

rates provided by local area networks. Moreover, all the devices of the network infrastructure can be removed<br />

from the theatre during the operation, which may be significant for covert operations. Although both<br />

alternatives enable some amount of forensics data to be obtained from the site, even the best alternative<br />

cannot transfer all the data from an ordinary user computer. Therefore, determining specific search patterns<br />

and finding the relevant data in the digital devices is vital in this case of study.<br />

58 Photo by Daeyeon Kim: http://ns.umich.edu/new/releases/7520.<br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!