| |
| |
Preface | |
| |
| |
Introduction | |
| |
| |
About the Authors | |
| |
| |
| |
New Age of Warfare: How Digital Forensics is Reshaping Today's Military | |
| |
| |
Yesterday's �Booby Trap� Is Today's IED | |
| |
| |
The Invention of WIT | |
| |
| |
�CSI� Baghdad: Today's Intelligence Is Tomorrows Evidence | |
| |
| |
Actionable Intelligence and Its Effect on the Battlefield | |
| |
| |
Soldiers to �Battlefield Cops� | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Digital Triage Forensics and Battlefield Forensics | |
| |
| |
Introduction | |
| |
| |
DTF and Battlefield Forensics | |
| |
| |
How does Evidence go from the Battlefield to the Lab? | |
| |
| |
Five Levels of Exploitation of WIT Materials | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Conducting Pre/Postblast Investigations | |
| |
| |
Introduction | |
| |
| |
WITs Role Within the EOD Team | |
| |
| |
Premission Preparations | |
| |
| |
Scene Safety | |
| |
| |
On Scene IED Analysis | |
| |
| |
Photograph! Photograph! Photograph! | |
| |
| |
Preblast Investigative Steps | |
| |
| |
Postblast Investigative Steps | |
| |
| |
Detainee Operations as it Pertains to WIT | |
| |
| |
Summary | |
| |
| |
| |
Using the DTF Model to Process Digital Media | |
| |
| |
The changing location of Digital Evidence containers | |
| |
| |
What hardware do I need to conduct a Cradle-to-Grave Battlefield investigation? | |
| |
| |
Characteristics of Digital Media | |
| |
| |
Stephen's Quick and Dirty Guide to Understanding Digital Forensics | |
| |
| |
Brief Overview of Digital Storage Concepts | |
| |
| |
Processing Digital Media using the Digital Triage Forensic Model | |
| |
| |
Summary | |
| |
| |
| |
Using the DTF Model to Collect and Process Cell Phones and SIM Cards | |
| |
| |
Cellular Devices Are Replacing the Laptop | |
| |
| |
Proprietary Cell Phone Tools versus Nonproprietary Cell Phone Tools | |
| |
| |
Freeware and Shareware as Cell Phone Forensic/Analysis Tools | |
| |
| |
Using Cross Validation with your Tools | |
| |
| |
Triage Processing of Cellular Devices | |
| |
| |
Using the MFC to identify the Cellular Device | |
| |
| |
Collection Concerns with Cellular Devices | |
| |
| |
Don't Push That Button | |
| |
| |
Isolating the Cellular Device | |
| |
| |
Using the HTCI Isolation Chamber | |
| |
| |
Processing the Cell Phone | |
| |
| |
Summary | |
| |
| |
| |
The Changing Role of a Digital Forensic Investigator | |
| |
| |
The Solution | |
| |
| |
Implementation | |
| |
| |
Glossary | |
| |
| |
Index | |