Professional Documents
Culture Documents
ABSTRACT
With current doctrines, field commanders are potentially denied real-time, actionable intelligence that is available
from digital media being seized. This is in part due to the lengthy time it takes to identify and exploit the media that
is seized.
Small teams such as the Weapons Intelligence Teams (WIT) are being employed to conduct a very unique task on
today's battlefield crime scenes. Small teams are being tasked to gather and identify digital media which may or
may not contain any actionable intelligence for the field commander. This task which in itself can be complicated is
further complicated with a time limit for scene processing of 5 to 60 minutes. In today’s modern law enforcement
world there is typically no time limit for the processing of crime scenes as there are no tactical or typical time
challenges associated with a crime scene. At the traditional digital crime scene great care can be taken to preserve
the evidence in its most pristine form allowing for itemized evidence labeling and chain of custody documents being
created. Small teams such as WIT cannot operate using the policies and procedures of a stateside law enforcement
element. The combat crime scene does not allow for this diligence due to its safety and tactical element that
complicates the processing of evidence. Evidence is routinely lumped together and maintained in a single evidence
container. The evidence is not really identified until it is returned to the Forward Operating Base (FOB) for further
processing. This is the reality of the battle field crime scene and the OPTEMPO that our small teams such as WIT
exist under.
The good news is by employing the procedures of Digital Triage Forensics on the battlefield and using Digital
Triage Tools, the small team can conduct productive exploitations of Digital Media providing field commanders
with actionable intelligence.
Stephen Frank Pearson was born in Aylesbury, England in 1963 and has been involved with Digital Media
Exploitation since the early 1990's. Stephen served in the United States Army as a Military Policeman for over 21
years. During this time, Stephen wrote and compiled numerous texts that are still used today. Stephen's last military
assignment was Non Commissioned Officer in Charge of the Advanced Technology Criminal Investigations
Division at the Military Police School, Ft Leonard Wood, Missouri. After retiring, Stephen accepted a position as
chief of detectives at the Pulaski County Sheriffs Office in Missouri. Stephen opened the first Digital Forensic Lab
at the Sheriff's Department which was responsible for numerous convictions. Stephen, during this time, also started
and ran the High Tech Crime Institute. In 2006 Stephen was contracted by the National Ground Intelligence Center
to teach and design a course in Digital Triage Forensics for the new WIT teams deploying to Iraq and Afghanistan.
To date, Stephen continues to teach and design new procedures that enable small team units to gather and exploit
Digital Media from the Battle Space. Stephen currently lives in Palm Harbor, Florida and is the CEO of the High
Tech Crime Institute.
exploited for the field commanders. evidence collection due to its safety and tactical
element. When collected from the combat crime scene
To address the concerns above, specialized teams like evidence is routinely lumped together and maintained
the Weapons Intelligence Teams (WIT) are being in a single evidence container. The itemized evidence
employed to conduct a very unique task on today's is not identified until it is returned to the Forward
battlefield crime scene. The WIT team is being tasked Operating Base (FOB) for its further processing. This
to gather and identify digital media and triage the modified collection process is a reality of the battle
media to find if the media contains any actionable field crime scene and the OPTEMPO that our
intelligence. The task of processing the battlefield specialized teams like WIT exist in.
Prosecution Prosecution
Detective or Analyst
LAB
Has to wait for results
Finishes exploiting data
From the Lab which
Found to have value by
W ill be back logged
The First Responder
LAB
Detective or Analyst This is model shows that when you make the lab responsible for a ll processing
In this model the Analyst sees the It becomes back logged very quickly by the sheer volume of data that must be
Actionable intelligence/evidence
This backlog can be completely erased by implementing the DTF pr ocedures
Immediately. Saving the lab from having
To process non yielding data
SOLUTION use the tools and training that they have, and exploit
the media that is either collected or brought to them.
We are by no means incurring new costs; we are simply
Over the past three years, the High Tech Crime using the training and equipment already provided to
Institute (HTCI) has been training WIT Teams in accomplish the recognized mission at hand. Not to use
Digital Triage Forensics. During this time HTCI has the WIT Teams in the role that they are designed for
seen a definite change in attitude towards the role of but to instead allow the passing off of work for no real
Digital Forensic Investigator. This attitude change can reason is a misuse of the funding provided for these
be attributed to several arguments. programs.
Argument #1 - An attitude exists that roughly says, Argument #2 - Has been that WIT Teams do not have
“There are other people who can do Digital Forensics the tools necessary to conduct these investigations.
so why not let them take care of it (in country labs).” That only these specialized labs with highly skilled and
This argument while partially true is the worst trained personnel are qualified to conduct the Digital
argument to have. This attitude allows the small unit Forensic missions. This is absolutely not true. In fact,
investigator to say they can pass it off to someone else the civilian world has a word for this argument. It is
and we don't have to worry about it. The problem called “Job Security.” The staff of the Joint Weapons
should be clear with this argument. If you let it Intelligence Center (JWIC) and HTCI conducts
continue, you create a procedural model that is now training at Ft. Huachuca, AZ to provide the highest
bloated in the middle because of all the work being level of professional training in the field of Battle Field
sent to them. It is an operational fact that there are Crime Scene Investigations and Digital Triage
more WIT Teams than there are Digital Forensic Labs Forensics. Both staffs have dedicated their time to
in theater. The WIT Team is poised perfectly to do the making sure that the teams in the battle space have the
initial evaluation to determine if an item has actionable tools necessary to accomplish all of the WIT assigned
intelligence or not. Unfortunately we have learned tasking which includes Digital Media Exploitation.
from the mistakes made in civilian Law Enforcement After speaking with other contractors and
that trying to use a single entity to do all digital organizations, I can without any reservation state that
forensics does not work. the staff at JWIC Ft. Huachuca has compiled, with the
Initially your results are good but soon a severe help of HTCI, the best mobile forensic lab available to
backlog is created. This was seen very clearly when any team world wide. As compared to the static labs
the FBI began the use of the Regional Computer found in Iraq and now popping up in Afghanistan, the
Forensic Labs (RCFL). The RCFL was designed to WIT Teams have identical if not better equipment in
take over all digital forensics in regions spread out most cases. Unfortunately in many circumstances the
across the country. The FBI then told Law tools sit idle and the training expertise is lost over time.
Enforcement to send all Digital Media to the RCFL
which they did. The RCFL's were overwhelmed with Argument #3 - It has been said that the WIT Team
requests and a huge backlog was created. The RCFL member is not trained for the task. I have heard this
had to begin placing pre-requirements on media being from WIT Team members both past, present, and from
sent to them to try and reduce the backlog. This helped the leadership of the WIT Team members. This is a
but did not cure the problem. Even today, the RCFL's perpetuated lie that comes from teams currently
are still backlogged. Cases wait to be examined deployed. The ones that pass on this information are
sometimes for as long as a year. The graphic above the Teams that are not conducting investigations or
illustrates what happens when one agency decides to examinations. You will find that these are the teams
try and handle all Digital Media Exploitation as is that pass off the DTF mission to in country labs. And
currently being done in Iraq. as already noted, after time, the teams skills wither and
die. What skill doesn't if it is not exercised? WIT
This attitude is the easiest of the issues to correct as Team members are told by group leadership that they
leadership can simply place the responsibility of will not have to conduct these examinations or
Digital Triage Forensics (DTF) back on the specialized exploitations in the battle space as there are other
teams like WIT. WIT Teams should not be allowed to agencies that can do it for them. This leads to a
pass off media but instead they should be required to
So why does HTCI support the DTF method of or the fibers of the material are broken, this
removing the battery from the cell phone at the crime will allow the Cell Phone to communicate
scene? The main reasons are the addition of safety, with the network rendering the isolation
time, and the ability of the cell phone to be wiped ineffective It is also possible the WIT team
remotely if connected. With these additional three investigator may employ the bag incorrectly,
concepts, the reason should be clear as to the need to not closing the Faraday bag properly, allowing
remove the battery and isolate the phone immediately. for the Cell Phone to continue its
Let’s look at these three reasons in depth. communication with the network. This does
not mean that the Faraday bags are useless in
Technical and Tactical Safety - It is suggested the DTF model. They provide a secondary
to turn the phone off by pushing the power method of isolation. In certain circumstances,
button. Unfortunately, in the technology the use of the Faraday bag may be the primary
world today the possibility of having the cell tool used by the investigator.
phones keyboard remapped is quite possible. Place of the capture and the pre-existing
For example, if an insurgent wanted they contaminations of the device by on-scene
could remap the power button to send a pre personnel -- It may not be possible to use an
formatted text message or auto dial (a quick RF Jammer in the location of collection. This
dial number) which could detonate a can be due to numerous factors including the
secondary device on a scene very easily. By lack of the equipment on the scene or the
removing the battery, the investigator also inability to deploy the device. The insurgents
provides a natural and immediate Faraday are familiar with the traditional collection
cage around the cell phone. It then has no processes used by WIT teams for collecting
ability to connect to the network; preventing Cell Phones and other devices on the scene.
the phone from gathering any further The manuals and regulations are readily
messages or data that could overwrite or available from National Institute of Science
destroy evidence that is preexisting on the and Technology or the Department of Justice
phone. The phone can also not be tampered websites. The terrorist is also very aware that
with by any outside person or network. In the Cell Phones attract attention by investigators
world of the 1900 MHz cell phone, the service and others at the battlefield crime scene by
provider has the ability to wipe the on-board there very nature. This makes them an
flash memory of the cell phone. This feature excellent triggering device especially now that
has existed for only a few years but has the networks are 1900 MHz instead of just
already been used by criminals in the United 800 MHz allowing for true digital
States to hide or destroy evidence on the cell connectivity. By removing the battery we
phone. Another threat posed by the cell phone provide instant isolation.
comes from combination of cell phone and The restriction of time to collect the evidence
GPS transceiver. With this capability the cell from the crime scene. (5 to 60 minutes) –
phone could be used as a tracking device; Depending on the Cell Phone, it might be very
providing GPS coordinates that could be easy to identify the power button. Other Cell
recovered from a website or from a Trojan Phones may take a significant amount of time
application placed on the phone that to find the power button and finally turn off
continuously forwards GPS locations to the phone; providing plenty of time for the
another digital device. Ultimately this could Cell Phone to be contaminated or evidence
provide targeting, location and/or tracking containers destroyed.
information to an insurgent cell. There is only one situation where the battery should not
An argument can be made though that the be pulled and that is when there is actionable
WIT Team is provided a Faraday bag. intelligence that cannot be gathered on the screen of the
Problems that arise from this bag are that it is device by any other means. In this situation the Cell
a passive device not an active device. Phone should be gathered and placed into a functional
Faraday bags are also susceptible to break Faraday bag. At this point the phone needs to be
down over time. If the Faraday bag has a hole transported to the FOB as quickly as possible. The
Cell Phone battery will quickly begin to dissipate as it The procedures set forth here for Digital Triage
tries to connect to the network. Forensics can be applied and instituted at any
With the arguments above, it is clear that the DTF battlefield or tactical level. As was referenced in this
model of removing the battery makes the most sense in paper, WIT teams have both the equipment and training
all situations except for the last where actionable to accomplish the task of Digital Triage Forensics.
intelligence will be lost. It is very important that the This training and procedural set should be continued
investigator should not attempt to disassemble the Cell and emulated in other environments. Currently many
Phone any further until returning to the FOB. When at other organizations are trying there own version of
the FOB the investigator must be careful to not disturb WIT. These other team types are being deployed
any other biometric evidence that is residual on the around the world with the mission of providing the
phone surface such as fingerprints. field commander actionable intelligence, which may or
Once the Cell phone is returned to the FOB the may not come, from the battlefield crime scene.
investigator can continue to process the cell phone
continuing the Digital Triage Forensic process. At this This paper covered the major components of the
point, analysis of the phone can be accomplished in a Battlefield Triage Process.
timely and safe manner. • The reality of Triage Forensics on the Modern
Using Digital Triage Tools (DTT), actionable Battlefield.
intelligence can quickly be found. If the Cell phone • The employment of the Triage Forensics.
does not reveal any immediately visible, actionable • A comparison of the Cell Phone Procedural
intelligence then the phone can be put to the end for Model using the Battlefield Triage Forensics.
deeper analysis.. • The incorporation and uses of Battle Field
If the cell phone yields visible, actionable intelligence Triage Forensics in today's modern battle
then the cell phone should be immediately forwarded space.
to the security cell to obtain the actionable intelligence
from the cell phone. This triage process will continue
for each cell phone until all Cell phones have been REFERENCES
processed. Using this process, the Cell phones
containing the most data will be identified and can be
sent directly for process front loading them. The other Bill Hess, Herald Review (2008) Air Force NCO
Cell phones can be further processed as time permits. describes forensic investigation work in
This model allows for the quick identification of battlefield. Retrieved January 19, 2009, from
actionable intelligence and the ability to undo the log
jam of media being sent to single point processing http://www.svherald.com/articles/2008/02/26/
centers. news/doc47c3bbd30f681772690068.txt