research-article
Free Access

Document & Media Exploitation: The DOMEX challenge is to turn digital bits into actionable intelligence.

Abstract

A computer used by Al Qaeda ends up in the hands of a Wall Street Journal reporter. A laptop from Iran is discovered that contains details of that country’s nuclear weapons program. Photographs and videos are downloaded from terrorist Web sites. As evidenced by these and countless other cases, digital documents and storage devices hold the key to many ongoing military and criminal investigations. The most straightforward approach to using these media and documents is to explore them with ordinary tools—open the word files with Microsoft Word, view the Web pages with Internet Explorer, and so on.

References

  1. Intelligence Community Directive Number 302. 2007. Document and Media Exploitation (July 6).Google ScholarGoogle Scholar
  2. Oxford American Dictionaries. 2005.Google ScholarGoogle Scholar
  3. US v. Carey 98-3077, 172 f.3d 1268 (10th Cir. 1999).Google ScholarGoogle Scholar
  4. Cullison, A. 2004. Inside Al Qaeda's hard drive. The Atlantic Monthly (September). http://www.theatlantic.com/doc/200409/cullison.Google ScholarGoogle Scholar
  5. Broad, W. J., Sanger, D.E. 2005. Relying on computer, U.S. seeks to prove Iran's nuclear aims. New York Times (Nov. 13). http://www.nytimes.com/2005/11/13/international/middleeast/13nukes.html.Google ScholarGoogle Scholar
  6. Kahan, S. 2005. Bring 'em back intact! Accounting Today (June 6-19). http://www.webcpa.com/article.cfm?articleid=13192.Google ScholarGoogle Scholar
  7. Davis, M., Manes, G., Shenoi, S. 2005. A network-based architecture for storing digital evidence. In Advances in Digital Forensics, ed. M. Pollitt and S. Shenoi. IFIP International Conference on Digital Forensics, National Center for Forensic Sciences, Orlando, Florida (February 13-16).Google ScholarGoogle Scholar
  8. http://www.sleuthkit.org/.Google ScholarGoogle Scholar
  9. Document Exploitation (DOCEX) Transportable Support System (DTSS). 1997. Commerce Business Daily (July 31). Virginia Contracting Activity, MDA908-97-R-0040. http://www.globalsecurity.org/intell/systems/docex_dtss.htm.Google ScholarGoogle Scholar
  10. Diffie, W., Landau, S. 1998. Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Tools: Disk Imaging. http://www.forensicswiki.org/wiki/Tools:Disk_Imaging.Google ScholarGoogle Scholar
  12. Byers, S. 2003. Scalable exploitation of, and responses to, information leakage through hidden data in published documents. AT&T Research. http://www.user-agent.org/word_docs.pdf.Google ScholarGoogle Scholar
  13. Garfinkel, S., Shelat, A. 2003. Remembrance of data passed: a study of disk sanitization practices. IEEE Security and Privacy (January/February). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Garfinkel, S. 2006. Forensic feature extraction and cross-drive analysis. Digital Forensic Research Workshop, Lafayette, Indiana (August 14-16).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. http://www.usdoj.gov/ag/manualpart1_1.pdf .Google ScholarGoogle Scholar
  16. House of Lords and House of Commons Joint Committee on Human Rights. 2005. Counter-terrorism policy and human rights: terrorism bill and related matters. Third Report of Session 2005-06, HL Paper 75-I, HC 561-i. http://www.publications.parliament.uk/pa/jt200506/jtselect/jtrights/278/27802.htm.Google ScholarGoogle Scholar

Index Terms

  1. Document & Media Exploitation: The DOMEX challenge is to turn digital bits into actionable intelligence.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!