Upload
denis1971
View
217
Download
0
Embed Size (px)
Citation preview
8/6/2019 Battlefield Triage Forensics
1/8
Special OperationsForces Industry Conference (SOFIC) 2009
Intelligence and Evidence Collection Using
Battlefield Digital Triage Forensic Processes
Stephen Frank PearsonHigh Tech Crime Institute Inc
Tampa, Florida
ABSTRACT
With current doctrines, field commanders are potentially denied real-time, actionable intelligence that is available
from digital media being seized. This is in part due to the lengthy time it takes to identify and exploit the media that
is seized.
Small teams such as the Weapons Intelligence Teams (WIT) are being employed to conduct a very unique task on
today's battlefield crime scenes. Small teams are being tasked to gather and identify digital media which may ormay not contain any actionable intelligence for the field commander. This task which in itself can be complicated is
further complicated with a time limit for scene processing of 5 to 60 minutes. In todays modern law enforcement
world there is typically no time limit for the processing of crime scenes as there are no tactical or typical time
challenges associated with a crime scene. At the traditional digital crime scene great care can be taken to preserve
the evidence in its most pristine form allowing for itemized evidence labeling and chain of custody documents being
created. Small teams such as WIT cannot operate using the policies and procedures of a stateside law enforcement
element. The combat crime scene does not allow for this diligence due to its safety and tactical element that
complicates the processing of evidence. Evidence is routinely lumped together and maintained in a single evidencecontainer. The evidence is not really identified until it is returned to the Forward Operating Base (FOB) for further
processing. This is the reality of the battle field crime scene and the OPTEMPO that our small teams such as WIT
exist under.
The good news is by employing the procedures of Digital Triage Forensics on the battlefield and using DigitalTriage Tools, the small team can conduct productive exploitations of Digital Media providing field commanders
with actionable intelligence.
ABOUT THE AUTHOR
Stephen Frank Pearson was born in Aylesbury, England in 1963 and has been involved with Digital MediaExploitation since the early 1990's. Stephen served in the United States Army as a Military Policeman for over 21
years. During this time, Stephen wrote and compiled numerous texts that are still used today. Stephen's last military
assignment was Non Commissioned Officer in Charge of the Advanced Technology Criminal Investigations
Division at the Military Police School, Ft Leonard Wood, Missouri. After retiring, Stephen accepted a position as
chief of detectives at the Pulaski County Sheriffs Office in Missouri. Stephen opened the first Digital Forensic Lab
at the Sheriff's Department which was responsible for numerous convictions. Stephen, during this time, also started
and ran the High Tech Crime Institute. In 2006 Stephen was contracted by the National Ground Intelligence Center
to teach and design a course in Digital Triage Forensics for the new WIT teams deploying to Iraq and Afghanistan.To date, Stephen continues to teach and design new procedures that enable small team units to gather and exploit
Digital Media from the Battle Space. Stephen currently lives in Palm Harbor, Florida and is the CEO of the HighTech Crime Institute.
SOFIC 2009 Paper No. 3202 Page 1 of 8
mailto:[email protected]:[email protected]8/6/2019 Battlefield Triage Forensics
2/8
Special OperationsForces Industry Conference (SOFIC) 2009
Intelligence and Evidence Collection using
Battlefield Digital Triage Forensic Processes
Stephen Frank Pearson
High Tech Crime Institute Inc
Tampa, Florida
INTRODUCTION
Digital media has made its way into just about everyaspect of our lives. We carry IPOD's with training pod
casts, music, and movies with storage capacities thatrival our desktop or laptop systems. The cell phones we
use today provide access to our email and documents.
Ten years ago investigators would find the gold
nuggets of evidence on systems owned by corporate
entities because that is where the bandwidth and
storage was located. In today's environment with the
advent of thumb drives, CF cards, and reliable online
storage, the nuggets have moved to those closely heldcontainers that are easily connected, used, and
destroyed.
This new world of personal storage provides unique
opportunities to anyone seeking intelligence or
evidence on a suspect. Most recently we have seen the
use of these personal digital media devices being used
to solve crimes spanning the spectrum of criminaloffenses; from students being bullied online to plots
being arranged to destroy schools or other national
assets. Terrorist use computers and portable storage
containers to pass strategic documents and plans.
These devices can pass by unnoticed by anyone.
During the Mumbai, India attacks in 2008 cell phones
were seen as tools to orchestrate and collaborate during
tactical actions. Insurgents in Iraq use cell phones to
record their criminal activities so that they can be paid
for there work. Cell phones make a convenientmedium to detonate IED's.
We know that the evidence and/or data is out there and
it is in real time. Investigators and Intelligence
gatherers need to be able to collect and exploit this real
time data, providing the command with actionable
intelligence as well as evidence that will later be used
to convict suspects of their crimes.
In June 2008 the cellular networks in Iraq wereupgraded to the digital standard of 1900 MHz. This
new bandwidth allows the user to take advantage of the
full digital capability that a cell phone has to offer.
New threats to the evidence or intelligence gathering
process have been identified with the use of this new
topology. New safety concerns for the on-scene
investigator have also now been raised as the
insurgents target the investigators in the battle space..
PROBLEM STATEMENT
With current practices and procedures, field
commanders are potentially denied real time actionable
intelligence that is available from the digital media
being seized due to the lengthy time it takes to identifyand exploit the media.
Under the current models, teams analyzing the data
have little time for a complete and/or thorough
examination of the media collected from the battlefield.
This time barrier has come to be because there is no
time to do it properly. This perception comes from
several factors.
First, the imaging process can be lengthy,
Second, investigators not having the available
media to image the data.
Third, providing the investigator the
programs, knowledge, and training in the
collection of data allowing the media to be
SOFIC 2009 Paper No. 3202 Page 2 of 8
mailto:[email protected]:[email protected]8/6/2019 Battlefield Triage Forensics
3/8
Special OperationsForces Industry Conference (SOFIC) 2009
exploited for the field commanders.
To address the concerns above, specialized teams likethe Weapons Intelligence Teams (WIT) are being
employed to conduct a very unique task on today'sbattlefield crime scene. The WIT team is being tasked
to gather and identify digital media and triage the
media to find if the media contains any actionable
intelligence. The task of processing the battlefield
crime scene in itself is complicated but will be further
complicated with safety and tactical considerations as
well as a time limit for scene processing of 5 to 60
minutes on average.
Compare that to todays modern law enforcement
world there is typically no time limit for the processingof a crime scene. Compare that to stateside Law
Enforcement that have no tactical implications or time
challenges associated with their crime scene.
At the traditional digital crime scene great care can be
taken to preserve the evidence in its most pristine form,
allowing for itemized evidence collection, labeling, and
chain of custody documents to be created. The combatcrime scene does not allow for this diligence in
evidence collection due to its safety and tactical
element. When collected from the combat crime scene
evidence is routinely lumped together and maintainedin a single evidence container. The itemized evidence
is not identified until it is returned to the ForwardOperating Base (FOB) for its further processing. This
modified collection process is a reality of the battle
field crime scene and the OPTEMPO that our
specialized teams like WIT exist in.
The problem of providing actionable intelligence is
further challenged by the process of analysis after the
media has been gathered. Currently the exploitation or
analysis of the captured media is only done at a lab
level. The teams on the ground such as the WIT teams
are not allowed to exploit media. This makes littlesense as the teams like WIT have the equipment and
training to be able to conduct exploitation at the FOB.
In some cases the WIT team equipment is better thanthe labs in theater.
SOFIC 2009 Paper No. 3202 Page 3 of 8
Prosecution
LAB
Finishes exploiting dataFound to have value by
The First Responder
Detective or AnalystIn this model the Analyst see s theActionable intelligence/evidence
Immediately. Saving the lab from havingTo process non yielding data
First Responder or Evidence CollectorUses the tools and training to find actionable
Intelligence immediately. Getting the evidence to the
Analyst much quicker.
Prosecution
LAB
Finishes exploiting dataFound to have value by
The First Responder
Detective or AnalystIn this model the Analyst see s theActionable intelligence/evidence
Immediately. Saving the lab from havingTo process non yielding data
First Responder or Evidence CollectorUses the tools and training to find actionable
Intelligence immediately. Getting the evidence to the
Analyst much quicker.
Prosecution
Detective or AnalystHas to wait for results
From the Lab whichWill be back logged
First Responder or Evidence CollectorForwards all media onto the Lab without any
Exploitation attempts.
Prosecution
Detective or AnalystHas to wait for results
From the Lab whichWill be back logged
First Responder or Evidence CollectorForwards all media onto the Lab without any
Exploitation attempts.
LAB
This is model shows that when you make the lab responsible for a ll processing
It becomes back logged very quickly by the sheer volume of data that must be
This backlog can be completely erased by implementing the DTF pr ocedures
Digital Triage ForensicsPreventing Lab Backlog
Current Digital Forensic ProcessingCausing an increasing Backlog at the Lab Level
Il
lustration 1:
8/6/2019 Battlefield Triage Forensics
4/8
Special OperationsForces Industry Conference (SOFIC) 2009
SOLUTION
Over the past three years, the High Tech Crime
Institute (HTCI) has been training WIT Teams inDigital Triage Forensics. During this time HTCI has
seen a definite change in attitude towards the role of
Digital Forensic Investigator. This attitude change can
be attributed to several arguments.
Argument #1 - An attitude exists that roughly says,There are other people who can do Digital Forensics
so why not let them take care of it (in country labs).
This argument while partially true is the worst
argument to have. This attitude allows the small unit
investigator to say they can pass it off to someone else
and we don't have to worry about it. The problem
should be clear with this argument. If you let itcontinue, you create a procedural model that is now
bloated in the middle because of all the work being
sent to them. It is an operational fact that there aremore WIT Teams than there are Digital Forensic Labs
in theater. The WIT Team is poised perfectly to do the
initial evaluation to determine if an item has actionable
intelligence or not. Unfortunately we have learned
from the mistakes made in civilian Law Enforcement
that trying to use a single entity to do all digital
forensics does not work.
Initially your results are good but soon a severebacklog is created. This was seen very clearly when
the FBI began the use of the Regional ComputerForensic Labs (RCFL). The RCFL was designed to
take over all digital forensics in regions spread out
across the country. The FBI then told Law
Enforcement to send all Digital Media to the RCFL
which they did. The RCFL's were overwhelmed with
requests and a huge backlog was created. The RCFLhad to begin placing pre-requirements on media being
sent to them to try and reduce the backlog. This helped
but did not cure the problem. Even today, the RCFL's
are still backlogged. Cases wait to be examined
sometimes for as long as a year. The graphic above
illustrates what happens when one agency decides to
try and handle all Digital Media Exploitation as is
currently being done in Iraq.
This attitude is the easiest of the issues to correct asleadership can simply place the responsibility of
Digital Triage Forensics (DTF) back on the specialized
teams like WIT. WIT Teams should not be allowed to
pass off media but instead they should be required to
use the tools and training that they have, and exploit
the media that is either collected or brought to them.
We are by no means incurring new costs; we are simplyusing the training and equipment already provided to
accomplish the recognized mission at hand. Not to usethe WIT Teams in the role that they are designed for
but to instead allow the passing off of work for no real
reason is a misuse of the funding provided for these
programs.
Argument #2 - Has been that WIT Teams do not havethe tools necessary to conduct these investigations.
That only these specialized labs with highly skilled and
trained personnel are qualified to conduct the Digital
Forensic missions. This is absolutely not true. In fact,
the civilian world has a word for this argument. It is
called Job Security. The staff of the Joint Weapons
Intelligence Center (JWIC) and HTCI conductstraining at Ft. Huachuca, AZ to provide the highestlevel of professional training in the field of Battle Field
Crime Scene Investigations and Digital TriageForensics. Both staffs have dedicated their time to
making sure that the teams in the battle space have the
tools necessary to accomplish all of the WIT assigned
tasking which includes Digital Media Exploitation.
After speaking with other contractors and
organizations, I can without any reservation state that
the staff at JWIC Ft. Huachuca has compiled, with the
help of HTCI, the best mobile forensic lab available toany team world wide. As compared to the static labs
found in Iraq and now popping up in Afghanistan, theWIT Teams have identical if not better equipment in
most cases. Unfortunately in many circumstances the
tools sit idle and the training expertise is lost over time.
Argument #3 - It has been said that the WIT Team
member is not trained for the task. I have heard this
from WIT Team members both past, present, and from
the leadership of the WIT Team members. This is a
perpetuated lie that comes from teams currentlydeployed. The ones that pass on this information are
the Teams that are not conducting investigations orexaminations. You will find that these are the teams
that pass off the DTF mission to in country labs. Andas already noted, after time, the teams skills wither and
die. What skill doesn't if it is not exercised? WIT
Team members are told by group leadership that they
will not have to conduct these examinations or
exploitations in the battle space as there are other
agencies that can do it for them. This leads to a
SOFIC 2009 Paper No. 3202 Page 4 of 8
8/6/2019 Battlefield Triage Forensics
5/8
Special OperationsForces Industry Conference (SOFIC) 2009
training attitude of complacency and not caring. When
the group leadership put an emphasis on the training
the results are amazingly different.
The bottom line is that the WIT Team member is morethan capable of retaining the lessons learned in a
Digital Forensics class. The amount of time that is
currently dedicated to the training should be increased
by one or two days to allow for more hands on
examinations, but the time allocated meets the minimal
requirement to train someone to a skill level where theyare capable of conducting Digital Triage Forensic
Examinations. To ensure the team members are
prepared we can use the procedural model of Digital
Triage Forensics (DTF). We have referenced it as a
model for collecting actionable intelligence for the
field commander. As the name implies, it is a
methodology for processing digital media from a givenscene expeditiously ensuring the container and data ismaintained in as pristine a form as possible. The DTF
is best done by trained and equipped persons whomhave direct knowledge and input from the immediate
battlefield crime scene. These trained and equipped
personnel already exist in the form of the WIT Teams.
The WIT team brings knowledge and expertise from
the battle field crime scene that an examiner who is
afar may not recognize. Such as keywords or regional
programs that are of importance to an intelligence
entity.
To affect this new methodology, new rules or doctrinalpolicies must be used in the collection of this digital
media as the mainstream methods do not take into
account the tactical and time nature of the battle field
crime scene.
For the purposes of this paper we will isolate a specificmedia type and draw a comparison between the
collection of it in a traditional crime scene and that of
the battlefield crime scene.
We chose the Cell Phones as the media to compare, as
this is the fastest growing media in the battle space.
Even though we are showing a specific media type for
comparison, the principals applied in this model can
apply to any digital media found at the combat crime
scene as well.
Comparison of Doctrinal Options for Cell Phone
Collection
No matter if you are at the traditional crime scene or at
the battlefield crime scene, it is known and acceptedthat the cell phone must be isolated from it's carrier to
prevent contamination or the implementation of tacticsthat could cause permanent damage to the evidence
containers that exist on the phone. The following
would be core concepts for the collection of Cell
Phones in either situation:
1. Isolation of the evidence from outside sources
2. Prevention of contamination by examinererror
3. Expedient processing of the evidence to gather
actionable intelligence
4. Maintaining Isolation of the evidence during
the entire process.
Under the DTF methodology three new concepts are
added:1. Technical and Tactical Safety for personnel
involved
2. Place of the capture and the pre-existingcontaminations of the device by on scene
personnel
3. The restriction of time to collect the evidence
from the crime scene. (5 to 60 minutes)
The mission of the WIT dictates a greater priority on
processing digital evidence to gather actionable
intelligence before the items become true evidence. Aswas discussed earlier, a primary concept to collecting
the Cell Phone is to maintain absolute isolation of theevidence from any external source. This will prevent
any actionable intelligence from being destroyed. Four
different methods for isolation at the battlefield crime
scene include:
1. Place the device into an isolation bubble using
some type of Radio Frequency Jammer.2. Placing the device still turned on into a
Faraday container of some sort.
3. Powering off the evidence using the power
switch.
4. The DTF method of removing the battery at
the scene.
When discussing the four options, HTCI recommends
that the DTF method be followed every time regardless
if Faraday bags are available or not.At the traditional crime scene removing the battery is
strongly looked down upon as there is a possibility of
gathering some data from the volatile memory cache.
SOFIC 2009 Paper No. 3202 Page 5 of 8
8/6/2019 Battlefield Triage Forensics
6/8
Special OperationsForces Industry Conference (SOFIC) 2009
So why does HTCI support the DTF method of
removing the battery from the cell phone at the crime
scene? The main reasons are the addition of safety,time, and the ability of the cell phone to be wiped
remotely if connected. With these additional threeconcepts, the reason should be clear as to the need to
remove the battery and isolate the phone immediately.
Lets look at these three reasons in depth.
Technical and Tactical Safety - It is suggested
to turn the phone off by pushing the powerbutton. Unfortunately, in the technology
world today the possibility of having the cell
phones keyboard remapped is quite possible.
For example, if an insurgent wanted they
could remap the power button to send a pre
formatted text message or auto dial (a quick
dial number) which could detonate asecondary device on a scene very easily. Byremoving the battery, the investigator also
provides a natural and immediate Faradaycage around the cell phone. It then has no
ability to connect to the network; preventing
the phone from gathering any further
messages or data that could overwrite or
destroy evidence that is preexisting on the
phone. The phone can also not be tampered
with by any outside person or network. In the
world of the 1900 MHz cell phone, the serviceprovider has the ability to wipe the on-board
flash memory of the cell phone. This featurehas existed for only a few years but has
already been used by criminals in the United
States to hide or destroy evidence on the cell
phone. Another threat posed by the cell phone
comes from combination of cell phone and
GPS transceiver. With this capability the cellphone could be used as a tracking device;
providing GPS coordinates that could be
recovered from a website or from a Trojan
application placed on the phone that
continuously forwards GPS locations to
another digital device. Ultimately this could
provide targeting, location and/or tracking
information to an insurgent cell.
An argument can be made though that the
WIT Team is provided a Faraday bag.Problems that arise from this bag are that it is
a passive device not an active device.
Faraday bags are also susceptible to break
down over time. If the Faraday bag has a hole
or the fibers of the material are broken, this
will allow the Cell Phone to communicate
with the network rendering the isolationineffective It is also possible the WIT team
investigator may employ the bag incorrectly,not closing the Faraday bag properly, allowing
for the Cell Phone to continue its
communication with the network. This does
not mean that the Faraday bags are useless in
the DTF model. They provide a secondary
method of isolation. In certain circumstances,the use of the Faraday bag may be the primary
tool used by the investigator. Place of the capture and the pre-existing
contaminations of the device by on-scene
personnel -- It may not be possible to use an
RF Jammer in the location of collection. This
can be due to numerous factors including thelack of the equipment on the scene or theinability to deploy the device. The insurgents
are familiar with the traditional collectionprocesses used by WIT teams for collecting
Cell Phones and other devices on the scene.
The manuals and regulations are readily
available from National Institute of Science
and Technology or the Department of Justice
websites. The terrorist is also very aware that
Cell Phones attract attention by investigators
and others at the battlefield crime scene bythere very nature. This makes them an
excellent triggering device especially now thatthe networks are 1900 MHz instead of just
800 MHz allowing for true digital
connectivity. By removing the battery we
provide instant isolation. The restriction of time to collect the evidence
from the crime scene. (5 to 60 minutes) Depending on the Cell Phone, it might be very
easy to identify the power button. Other Cell
Phones may take a significant amount of time
to find the power button and finally turn off
the phone; providing plenty of time for the
Cell Phone to be contaminated or evidence
containers destroyed.
There is only one situation where the battery should not
be pulled and that is when there is actionable
intelligence that cannot be gathered on the screen of thedevice by any other means. In this situation the Cell
Phone should be gathered and placed into a functional
Faraday bag. At this point the phone needs to be
transported to the FOB as quickly as possible. The
SOFIC 2009 Paper No. 3202 Page 6 of 8
8/6/2019 Battlefield Triage Forensics
7/8
Special OperationsForces Industry Conference (SOFIC) 2009
Cell Phone battery will quickly begin to dissipate as it
tries to connect to the network.
With the arguments above, it is clear that the DTFmodel of removing the battery makes the most sense in
all situations except for the last where actionableintelligence will be lost. It is very important that the
investigator should not attempt to disassemble the Cell
Phone any further until returning to the FOB. When at
the FOB the investigator must be careful to not disturb
any other biometric evidence that is residual on the
phone surface such as fingerprints.Once the Cell phone is returned to the FOB the
investigator can continue to process the cell phone
continuing the Digital Triage Forensic process. At this
point, analysis of the phone can be accomplished in a
timely and safe manner.
Using Digital Triage Tools (DTT), actionable
intelligence can quickly be found. If the Cell phonedoes not reveal any immediately visible, actionableintelligence then the phone can be put to the end for
deeper analysis..If the cell phone yields visible, actionable intelligence
then the cell phone should be immediately forwarded
to the security cell to obtain the actionable intelligence
from the cell phone. This triage process will continue
for each cell phone until all Cell phones have been
processed. Using this process, the Cell phones
containing the most data will be identified and can be
sent directly for process front loading them. The otherCell phones can be further processed as time permits.
This model allows for the quick identification ofactionable intelligence and the ability to undo the log
jam of media being sent to single point processing
centers.
Summary and Implementation
Digital Triage Forensics, in my opinion, will be the
way digital evidence from a crime scene is processed in
the future. The understanding that the tactical soldier
can be competently trained to obtain actionable
intelligence is a reality with schools like JWIC at Ft.
Huachuca. In this paper I have spoken of the
methodology of applying the Digital Triage Forensic
procedure to a specific media type. The reality is this
system or procedural model can be applied to all media
items taken from the battlefield crime scene.
The procedures set forth here for Digital Triage
Forensics can be applied and instituted at any
battlefield or tactical level. As was referenced in thispaper, WIT teams have both the equipment and training
to accomplish the task of Digital Triage Forensics.This training and procedural set should be continued
and emulated in other environments. Currently many
other organizations are trying there own version of
WIT. These other team types are being deployed
around the world with the mission of providing the
field commander actionable intelligence, which may ormay not come, from the battlefield crime scene.
This paper covered the major components of the
Battlefield Triage Process.
The reality of Triage Forensics on the Modern
Battlefield.
The employment of the Triage Forensics. A comparison of the Cell Phone Procedural
Model using the Battlefield Triage Forensics.
The incorporation and uses of Battle FieldTriage Forensics in today's modern battle
space.
REFERENCES
Bill Hess, Herald Review (2008) Air Force NCO
describes forensic investigation work in
battlefield. Retrieved January 19, 2009, fromhttp://www.svherald.com/articles/2008/02/26/
news/doc47c3bbd30f681772690068.txt
Marcus K. Rogers, James Goldman, Rick Mislan,
Timothy Wedge, Steve Debrota (2006)
Computer Forensics Field Triage ProcessModel. Retrieved October 15, 2008, from
http://www.digitalforensics-
conference.org/CFFTPM/CDFSL-
proceedings2006-CFFTPM.pdf
SOFIC 2009 Paper No. 3202 Page 7 of 8
http://www.svherald.com/articles/2008/02/26/http://www.svherald.com/articles/2008/02/26/8/6/2019 Battlefield Triage Forensics
8/8
Special OperationsForces Industry Conference (SOFIC) 2009
SOFIC 2009 Paper No. 3202 Page 8 of 8