Document and media exploitation
Loading...
Authors
Garfinkel, Simson L.
Subjects
documents
media
exploitation
media
exploitation
Advisors
Date of Issue
2007
Date
Publisher
ACM
Language
Abstract
A computer used by Al Qaeda ends up in the hands of a Wall Street Journal reporter. A laptop drom Iran is discoverd that contains details of that country's nuclear weapons program. Photographs and videos are downloaded from terrorist websites. As evidenced by these and countless other cases, digital documents and storage devices hold the key to many ongoing military and criminal investigations...This sort of advanced analysis is the stuff of DOMEX, the little known intelligence practice of document and media exploitation. The Domex challenge is to turn digital bits into actionable intelligence.
Type
Article
Description
The article of record as published may be located at http://dx.doi.org/10.1145/1331287.1331294
Series/Report No
Department
Computer Science (CS)
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
ACM Queue, November/December 2007, pp.23-30