This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored.
This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.Includes coverage on collecting digital mediaOutlines pre- and post-blast investigationsFeatures content on collecting data from cellular devices and SIM cards
This book discusses the various 802.11 and VoIP protocols used in FMC networks, open and proprietary communications protocols, integration of FMC networks to wired telephone networks, mobilizing applications such as text messaging and video, security issues, mobile handset requirements for FMC networks, and the administration/management of FMC networks. Special attention is given to selecting appropriate components for FMC, and numerous case histories and examples from the author's experience are provided.
This book is an essential tutorial and reference for any RF/wireless, communications, and networking professional who will work with the next generation of wireless networks.Describes how to develop, deploy, and manage networks that seamlessly combine landline, cellular, and WiFi networks into one converged communications networkThorough coverage of various 802.11 and voice over internet protocol (VoIP) standards and how they impact integration with cellular networksDiscusses security considerations and how to successfully manage converged networksIncludes numerous case histories and examples from the author's experience---this is not a purely theoretical treatment of the subject!