Today’s combat and terrorist environments rely on the ability to move and communicate seamlessly amongst the population that combatants wish to attack. This ability to move unseen within the community requires that combatants use tools that are common and available in most areas. Cell phones and thumb drives have become instruments that allow enemy combatants to possess a full suite of communication and planning tools readily available and transportable anywhere. The cell phone has also become so common that no one would notice its use in most situations. It also provides its users with a false sense of security and privacy. Many people do not realize the amount of data that is maintained on these devices even after a user deletes it. The ability to retrieve this information is often critical to the collection of actionable intelligence. Many times the devices become damaged or broken. The device cannot be powered in the normal way. Chip-Off techniques allow the operator to collect information directly from the chip-set of these damaged devices. This raw data is then processed to provide usable information. Although it is not guaranteed to provide information the Chip-Off technique is quite reliable, and is being used around the world by Law Enforcement agencies to extract data from evidentiary devices.
(Click the Read More Link to see the PDF document)
Leave a comment