You are on page 1of 8

Special OperationsForces Industry Conference (SOFIC) 2009

Intelligence and Evidence Collection Using


Battlefield Digital Triage Forensic Processes
Stephen Frank Pearson
High Tech Crime Institute Inc
Tampa, Florida
stephen@gohtci.com

ABSTRACT
With current doctrines, field commanders are potentially denied real-time, actionable intelligence that is available
from digital media being seized. This is in part due to the lengthy time it takes to identify and exploit the media that
is seized.

Small teams such as the Weapons Intelligence Teams (WIT) are being employed to conduct a very unique task on
today's battlefield crime scenes. Small teams are being tasked to gather and identify digital media which may or
may not contain any actionable intelligence for the field commander. This task which in itself can be complicated is
further complicated with a time limit for scene processing of 5 to 60 minutes. In today’s modern law enforcement
world there is typically no time limit for the processing of crime scenes as there are no tactical or typical time
challenges associated with a crime scene. At the traditional digital crime scene great care can be taken to preserve
the evidence in its most pristine form allowing for itemized evidence labeling and chain of custody documents being
created. Small teams such as WIT cannot operate using the policies and procedures of a stateside law enforcement
element. The combat crime scene does not allow for this diligence due to its safety and tactical element that
complicates the processing of evidence. Evidence is routinely lumped together and maintained in a single evidence
container. The evidence is not really identified until it is returned to the Forward Operating Base (FOB) for further
processing. This is the reality of the battle field crime scene and the OPTEMPO that our small teams such as WIT
exist under.

The good news is by employing the procedures of Digital Triage Forensics on the battlefield and using Digital
Triage Tools, the small team can conduct productive exploitations of Digital Media providing field commanders
with actionable intelligence.

ABOUT THE AUTHOR

Stephen Frank Pearson was born in Aylesbury, England in 1963 and has been involved with Digital Media
Exploitation since the early 1990's. Stephen served in the United States Army as a Military Policeman for over 21
years. During this time, Stephen wrote and compiled numerous texts that are still used today. Stephen's last military
assignment was Non Commissioned Officer in Charge of the Advanced Technology Criminal Investigations
Division at the Military Police School, Ft Leonard Wood, Missouri. After retiring, Stephen accepted a position as
chief of detectives at the Pulaski County Sheriffs Office in Missouri. Stephen opened the first Digital Forensic Lab
at the Sheriff's Department which was responsible for numerous convictions. Stephen, during this time, also started
and ran the High Tech Crime Institute. In 2006 Stephen was contracted by the National Ground Intelligence Center
to teach and design a course in Digital Triage Forensics for the new WIT teams deploying to Iraq and Afghanistan.
To date, Stephen continues to teach and design new procedures that enable small team units to gather and exploit
Digital Media from the Battle Space. Stephen currently lives in Palm Harbor, Florida and is the CEO of the High
Tech Crime Institute.

SOFIC 2009 Paper No. 3202 Page 1 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

Intelligence and Evidence Collection using


Battlefield Digital Triage Forensic Processes
Stephen Frank Pearson
High Tech Crime Institute Inc
Tampa, Florida
stephen@gohtci.com
INTRODUCTION gatherers need to be able to collect and exploit this real
time data, providing the command with actionable
intelligence as well as evidence that will later be used
Digital media has made its way into just about every to convict suspects of their crimes.
aspect of our lives. We carry IPOD's with training pod
casts, music, and movies with storage capacities that In June 2008 the cellular networks in Iraq were
rival our desktop or laptop systems. The cell phones we upgraded to the digital standard of 1900 MHz. This
use today provide access to our email and documents. new bandwidth allows the user to take advantage of the
Ten years ago investigators would find the gold full digital capability that a cell phone has to offer.
nuggets of evidence on systems owned by corporate New threats to the evidence or intelligence gathering
entities because that is where the bandwidth and process have been identified with the use of this new
storage was located. In today's environment with the topology. New safety concerns for the on-scene
advent of thumb drives, CF cards, and reliable online investigator have also now been raised as the
storage, the nuggets have moved to those closely held insurgents target the investigators in the battle space..
containers that are easily connected, used, and
destroyed. PROBLEM STATEMENT

This new world of personal storage provides unique


opportunities to anyone seeking intelligence or With current practices and procedures, field
evidence on a suspect. Most recently we have seen the commanders are potentially denied real time actionable
use of these personal digital media devices being used intelligence that is available from the digital media
to solve crimes spanning the spectrum of criminal being seized due to the lengthy time it takes to identify
offenses; from students being bullied online to plots and exploit the media.
being arranged to destroy schools or other national
assets. Terrorist use computers and portable storage Under the current models, teams analyzing the data
containers to pass strategic documents and plans. have little time for a complete and/or thorough
These devices can pass by unnoticed by anyone. examination of the media collected from the battlefield.
During the Mumbai, India attacks in 2008 cell phones This time barrier has come to be because there is no
were seen as tools to orchestrate and collaborate during time to do it properly. This perception comes from
tactical actions. Insurgents in Iraq use cell phones to several factors.
record their criminal activities so that they can be paid • First, the imaging process can be lengthy,
for there work. Cell phones make a convenient • Second, investigators not having the available
medium to detonate IED's. media to image the data.
• Third, providing the investigator the
We know that the evidence and/or data is out there and programs, knowledge, and training in the
it is in real time. Investigators and Intelligence collection of data allowing the media to be

SOFIC 2009 Paper No. 3202 Page 2 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

exploited for the field commanders. evidence collection due to its safety and tactical
element. When collected from the combat crime scene
To address the concerns above, specialized teams like evidence is routinely lumped together and maintained
the Weapons Intelligence Teams (WIT) are being in a single evidence container. The itemized evidence
employed to conduct a very unique task on today's is not identified until it is returned to the Forward
battlefield crime scene. The WIT team is being tasked Operating Base (FOB) for its further processing. This
to gather and identify digital media and triage the modified collection process is a reality of the battle
media to find if the media contains any actionable field crime scene and the OPTEMPO that our
intelligence. The task of processing the battlefield specialized teams like WIT exist in.

Prosecution Prosecution

Detective or Analyst
LAB
Has to wait for results
Finishes exploiting data
From the Lab which
Found to have value by
W ill be back logged
The First Responder

LAB
Detective or Analyst This is model shows that when you make the lab responsible for a ll processing
In this model the Analyst sees the It becomes back logged very quickly by the sheer volume of data that must be
Actionable intelligence/evidence
This backlog can be completely erased by implementing the DTF pr ocedures
Immediately. Saving the lab from having
To process non yielding data

First Responder or Evidence Collector


First Responder or Evidence Collector
Uses the tools and training to find actionable
Forwards all media onto the Lab without any
Intelligence immediately. Getting the evidence to the
Exploitation attempts.
Analyst much quicker.

Digital Triage Forensics Current Digital Forensic Processing


Preventing Lab Backlog Causing an increasing Backlog at the Lab Level
Il
lustration 1:
crime scene in itself is complicated but will be further
complicated with safety and tactical considerations as The problem of providing actionable intelligence is
well as a time limit for scene processing of 5 to 60 further challenged by the process of analysis after the
minutes on average. media has been gathered. Currently the exploitation or
analysis of the captured media is only done at a lab
Compare that to today’s modern law enforcement level. The teams on the ground such as the WIT teams
world there is typically no time limit for the processing are not allowed to exploit media. This makes little
of a crime scene. Compare that to stateside Law sense as the teams like WIT have the equipment and
Enforcement that have no tactical implications or time training to be able to conduct exploitation at the FOB.
challenges associated with their crime scene. In some cases the WIT team equipment is better than
the labs in theater.
At the traditional digital crime scene great care can be
taken to preserve the evidence in its most pristine form,
allowing for itemized evidence collection, labeling, and
chain of custody documents to be created. The combat
crime scene does not allow for this diligence in

SOFIC 2009 Paper No. 3202 Page 3 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

SOLUTION use the tools and training that they have, and exploit
the media that is either collected or brought to them.
We are by no means incurring new costs; we are simply
Over the past three years, the High Tech Crime using the training and equipment already provided to
Institute (HTCI) has been training WIT Teams in accomplish the recognized mission at hand. Not to use
Digital Triage Forensics. During this time HTCI has the WIT Teams in the role that they are designed for
seen a definite change in attitude towards the role of but to instead allow the passing off of work for no real
Digital Forensic Investigator. This attitude change can reason is a misuse of the funding provided for these
be attributed to several arguments. programs.

Argument #1 - An attitude exists that roughly says, Argument #2 - Has been that WIT Teams do not have
“There are other people who can do Digital Forensics the tools necessary to conduct these investigations.
so why not let them take care of it (in country labs).” That only these specialized labs with highly skilled and
This argument while partially true is the worst trained personnel are qualified to conduct the Digital
argument to have. This attitude allows the small unit Forensic missions. This is absolutely not true. In fact,
investigator to say they can pass it off to someone else the civilian world has a word for this argument. It is
and we don't have to worry about it. The problem called “Job Security.” The staff of the Joint Weapons
should be clear with this argument. If you let it Intelligence Center (JWIC) and HTCI conducts
continue, you create a procedural model that is now training at Ft. Huachuca, AZ to provide the highest
bloated in the middle because of all the work being level of professional training in the field of Battle Field
sent to them. It is an operational fact that there are Crime Scene Investigations and Digital Triage
more WIT Teams than there are Digital Forensic Labs Forensics. Both staffs have dedicated their time to
in theater. The WIT Team is poised perfectly to do the making sure that the teams in the battle space have the
initial evaluation to determine if an item has actionable tools necessary to accomplish all of the WIT assigned
intelligence or not. Unfortunately we have learned tasking which includes Digital Media Exploitation.
from the mistakes made in civilian Law Enforcement After speaking with other contractors and
that trying to use a single entity to do all digital organizations, I can without any reservation state that
forensics does not work. the staff at JWIC Ft. Huachuca has compiled, with the
Initially your results are good but soon a severe help of HTCI, the best mobile forensic lab available to
backlog is created. This was seen very clearly when any team world wide. As compared to the static labs
the FBI began the use of the Regional Computer found in Iraq and now popping up in Afghanistan, the
Forensic Labs (RCFL). The RCFL was designed to WIT Teams have identical if not better equipment in
take over all digital forensics in regions spread out most cases. Unfortunately in many circumstances the
across the country. The FBI then told Law tools sit idle and the training expertise is lost over time.
Enforcement to send all Digital Media to the RCFL
which they did. The RCFL's were overwhelmed with Argument #3 - It has been said that the WIT Team
requests and a huge backlog was created. The RCFL member is not trained for the task. I have heard this
had to begin placing pre-requirements on media being from WIT Team members both past, present, and from
sent to them to try and reduce the backlog. This helped the leadership of the WIT Team members. This is a
but did not cure the problem. Even today, the RCFL's perpetuated lie that comes from teams currently
are still backlogged. Cases wait to be examined deployed. The ones that pass on this information are
sometimes for as long as a year. The graphic above the Teams that are not conducting investigations or
illustrates what happens when one agency decides to examinations. You will find that these are the teams
try and handle all Digital Media Exploitation as is that pass off the DTF mission to in country labs. And
currently being done in Iraq. as already noted, after time, the teams skills wither and
die. What skill doesn't if it is not exercised? WIT
This attitude is the easiest of the issues to correct as Team members are told by group leadership that they
leadership can simply place the responsibility of will not have to conduct these examinations or
Digital Triage Forensics (DTF) back on the specialized exploitations in the battle space as there are other
teams like WIT. WIT Teams should not be allowed to agencies that can do it for them. This leads to a
pass off media but instead they should be required to

SOFIC 2009 Paper No. 3202 Page 4 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

training attitude of complacency and not caring. When


the group leadership put an emphasis on the training No matter if you are at the traditional crime scene or at
the results are amazingly different. the battlefield crime scene, it is known and accepted
that the cell phone must be isolated from it's carrier to
The bottom line is that the WIT Team member is more prevent contamination or the implementation of tactics
than capable of retaining the lessons learned in a that could cause permanent damage to the evidence
Digital Forensics class. The amount of time that is containers that exist on the phone. The following
currently dedicated to the training should be increased would be core concepts for the collection of Cell
by one or two days to allow for more hands on Phones in either situation:
examinations, but the time allocated meets the minimal 1. Isolation of the evidence from outside sources
requirement to train someone to a skill level where they 2. Prevention of contamination by examiner
are capable of conducting Digital Triage Forensic error
Examinations. To ensure the team members are 3. Expedient processing of the evidence to gather
prepared we can use the procedural model of Digital actionable intelligence
Triage Forensics (DTF). We have referenced it as a 4. Maintaining Isolation of the evidence during
model for collecting actionable intelligence for the the entire process.
field commander. As the name implies, it is a Under the DTF methodology three new concepts are
methodology for processing digital media from a given added:
scene expeditiously ensuring the container and data is 1. Technical and Tactical Safety for personnel
maintained in as pristine a form as possible. The DTF involved
is best done by trained and equipped persons whom 2. Place of the capture and the pre-existing
have direct knowledge and input from the immediate contaminations of the device by on scene
battlefield crime scene. These trained and equipped personnel
personnel already exist in the form of the WIT Teams. 3. The restriction of time to collect the evidence
The WIT team brings knowledge and expertise from from the crime scene. (5 to 60 minutes)
the battle field crime scene that an examiner who is
afar may not recognize. Such as keywords or regional The mission of the WIT dictates a greater priority on
programs that are of importance to an intelligence processing digital evidence to gather actionable
entity. intelligence before the items become true evidence. As
was discussed earlier, a primary concept to collecting
To affect this new methodology, new rules or doctrinal the Cell Phone is to maintain absolute isolation of the
policies must be used in the collection of this digital evidence from any external source. This will prevent
media as the mainstream methods do not take into any actionable intelligence from being destroyed. Four
account the tactical and time nature of the battle field different methods for isolation at the battlefield crime
crime scene. scene include:
1. Place the device into an isolation bubble using
For the purposes of this paper we will isolate a specific some type of Radio Frequency Jammer.
media type and draw a comparison between the 2. Placing the device still turned on into a
collection of it in a traditional crime scene and that of Faraday container of some sort.
the battlefield crime scene. 3. Powering off the evidence using the power
We chose the Cell Phones as the media to compare, as switch.
this is the fastest growing media in the battle space. 4. The DTF method of removing the battery at
Even though we are showing a specific media type for the scene.
comparison, the principals applied in this model can
apply to any digital media found at the combat crime When discussing the four options, HTCI recommends
scene as well. that the DTF method be followed every time regardless
if Faraday bags are available or not.
At the traditional crime scene removing the battery is
Comparison of Doctrinal Options for Cell Phone strongly looked down upon as there is a possibility of
Collection gathering some data from the volatile memory cache.

SOFIC 2009 Paper No. 3202 Page 5 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

So why does HTCI support the DTF method of or the fibers of the material are broken, this
removing the battery from the cell phone at the crime will allow the Cell Phone to communicate
scene? The main reasons are the addition of safety, with the network rendering the isolation
time, and the ability of the cell phone to be wiped ineffective It is also possible the WIT team
remotely if connected. With these additional three investigator may employ the bag incorrectly,
concepts, the reason should be clear as to the need to not closing the Faraday bag properly, allowing
remove the battery and isolate the phone immediately. for the Cell Phone to continue its
Let’s look at these three reasons in depth. communication with the network. This does
not mean that the Faraday bags are useless in
 Technical and Tactical Safety - It is suggested the DTF model. They provide a secondary
to turn the phone off by pushing the power method of isolation. In certain circumstances,
button. Unfortunately, in the technology the use of the Faraday bag may be the primary
world today the possibility of having the cell tool used by the investigator.
phones keyboard remapped is quite possible.  Place of the capture and the pre-existing
For example, if an insurgent wanted they contaminations of the device by on-scene
could remap the power button to send a pre personnel -- It may not be possible to use an
formatted text message or auto dial (a quick RF Jammer in the location of collection. This
dial number) which could detonate a can be due to numerous factors including the
secondary device on a scene very easily. By lack of the equipment on the scene or the
removing the battery, the investigator also inability to deploy the device. The insurgents
provides a natural and immediate Faraday are familiar with the traditional collection
cage around the cell phone. It then has no processes used by WIT teams for collecting
ability to connect to the network; preventing Cell Phones and other devices on the scene.
the phone from gathering any further The manuals and regulations are readily
messages or data that could overwrite or available from National Institute of Science
destroy evidence that is preexisting on the and Technology or the Department of Justice
phone. The phone can also not be tampered websites. The terrorist is also very aware that
with by any outside person or network. In the Cell Phones attract attention by investigators
world of the 1900 MHz cell phone, the service and others at the battlefield crime scene by
provider has the ability to wipe the on-board there very nature. This makes them an
flash memory of the cell phone. This feature excellent triggering device especially now that
has existed for only a few years but has the networks are 1900 MHz instead of just
already been used by criminals in the United 800 MHz allowing for true digital
States to hide or destroy evidence on the cell connectivity. By removing the battery we
phone. Another threat posed by the cell phone provide instant isolation.
comes from combination of cell phone and  The restriction of time to collect the evidence
GPS transceiver. With this capability the cell from the crime scene. (5 to 60 minutes) –
phone could be used as a tracking device; Depending on the Cell Phone, it might be very
providing GPS coordinates that could be easy to identify the power button. Other Cell
recovered from a website or from a Trojan Phones may take a significant amount of time
application placed on the phone that to find the power button and finally turn off
continuously forwards GPS locations to the phone; providing plenty of time for the
another digital device. Ultimately this could Cell Phone to be contaminated or evidence
provide targeting, location and/or tracking containers destroyed.
information to an insurgent cell. There is only one situation where the battery should not
An argument can be made though that the be pulled and that is when there is actionable
WIT Team is provided a Faraday bag. intelligence that cannot be gathered on the screen of the
Problems that arise from this bag are that it is device by any other means. In this situation the Cell
a passive device not an active device. Phone should be gathered and placed into a functional
Faraday bags are also susceptible to break Faraday bag. At this point the phone needs to be
down over time. If the Faraday bag has a hole transported to the FOB as quickly as possible. The

SOFIC 2009 Paper No. 3202 Page 6 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

Cell Phone battery will quickly begin to dissipate as it The procedures set forth here for Digital Triage
tries to connect to the network. Forensics can be applied and instituted at any
With the arguments above, it is clear that the DTF battlefield or tactical level. As was referenced in this
model of removing the battery makes the most sense in paper, WIT teams have both the equipment and training
all situations except for the last where actionable to accomplish the task of Digital Triage Forensics.
intelligence will be lost. It is very important that the This training and procedural set should be continued
investigator should not attempt to disassemble the Cell and emulated in other environments. Currently many
Phone any further until returning to the FOB. When at other organizations are trying there own version of
the FOB the investigator must be careful to not disturb WIT. These other team types are being deployed
any other biometric evidence that is residual on the around the world with the mission of providing the
phone surface such as fingerprints. field commander actionable intelligence, which may or
Once the Cell phone is returned to the FOB the may not come, from the battlefield crime scene.
investigator can continue to process the cell phone
continuing the Digital Triage Forensic process. At this This paper covered the major components of the
point, analysis of the phone can be accomplished in a Battlefield Triage Process.
timely and safe manner. • The reality of Triage Forensics on the Modern
Using Digital Triage Tools (DTT), actionable Battlefield.
intelligence can quickly be found. If the Cell phone • The employment of the Triage Forensics.
does not reveal any immediately visible, actionable • A comparison of the Cell Phone Procedural
intelligence then the phone can be put to the end for Model using the Battlefield Triage Forensics.
deeper analysis.. • The incorporation and uses of Battle Field
If the cell phone yields visible, actionable intelligence Triage Forensics in today's modern battle
then the cell phone should be immediately forwarded space.
to the security cell to obtain the actionable intelligence
from the cell phone. This triage process will continue
for each cell phone until all Cell phones have been REFERENCES
processed. Using this process, the Cell phones
containing the most data will be identified and can be
sent directly for process front loading them. The other Bill Hess, Herald Review (2008) Air Force NCO
Cell phones can be further processed as time permits. describes forensic investigation work in
This model allows for the quick identification of battlefield. Retrieved January 19, 2009, from
actionable intelligence and the ability to undo the log
jam of media being sent to single point processing http://www.svherald.com/articles/2008/02/26/
centers. news/doc47c3bbd30f681772690068.txt

Summary and Implementation Marcus K. Rogers, James Goldman, Rick Mislan,


Timothy Wedge, Steve Debrota (2006)
Digital Triage Forensics, in my opinion, will be the Computer Forensics Field Triage Process
way digital evidence from a crime scene is processed in Model. Retrieved October 15, 2008, from
the future. The understanding that the tactical soldier http://www.digitalforensics-
can be competently trained to obtain actionable conference.org/CFFTPM/CDFSL-
intelligence is a reality with schools like JWIC at Ft. proceedings2006-CFFTPM.pdf
Huachuca. In this paper I have spoken of the
methodology of applying the Digital Triage Forensic
procedure to a specific media type. The reality is this
system or procedural model can be applied to all media
items taken from the battlefield crime scene.

SOFIC 2009 Paper No. 3202 Page 7 of 8


Special OperationsForces Industry Conference (SOFIC) 2009

SOFIC 2009 Paper No. 3202 Page 8 of 8

You might also like