Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), which are employed in the investigation of digital crime scenes, including traditional and more-complex battlefield crime scenes. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations.
The book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The use of digital triage forensics models in collecting and processing digital media and data from cell phones and SIM cards and the changing role of the digital forensic investigator are also discussed.
The first chapter discusses how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are discussed in this book as well.
The book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.
The book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The use of digital triage forensics models in collecting and processing digital media and data from cell phones and SIM cards and the changing role of the digital forensic investigator are also discussed.
The first chapter discusses how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are discussed in this book as well.
The book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.
- Includes coverage on collecting digital media
- Outlines pre- and post-blast investigations
- Features content on collecting data from cellular devices and SIM cards