Field level computer exploitation package
Janowiak, Vincent J.
MetadataShow full item record
On today's battlefield whether in Afghanistan or Iraq, ground combat forces are dealing with an adversary that has embraced the use of computers and electronic devices. Until now, there was no package of consolidated forensic tools available to the ground combat forces with the capability of conducting a quick interrogation of these devices. After a unit has captured a target that possesses electronic devices that require immediate exploitation, the devices are transferred to higher authority. Valuable time is lost locating and capturing associates of the target as the information is sent away to higher authority for analysis. The product of this thesis, Interrogator, was designed to prevent or reduce the time lost by allowing anyone to quickly retrieve data that is stored on a computer. This capability will positively aid a small unit commander's ability to exploit critical vulnerabilities of the enemy in a timely manner and improve the survivability of the unit and the ability to complete their mission.
Showing items related by title, author, creator and subject.
Schneidewind, Norman F.; Syms, Gordon H.; Grainger, Thomas L.; Carden, Robert J. (Monterey, California. Naval Postgraduate School, 1972-07); NPS-558S72071A survey and analysis has been made of high density mass storage systems for the Navy Fleet Material Support Office. The purpose of the project was to survey mass storage devices and systems and to select several devices ...
Dorney, Liam J.; Miller, Travis C. (Monterey, California: Naval Postgraduate School, 2016-03);The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors’ desire to be connected at all times. These devices create security ...
Chung, Wai Kong (Monterey, California. Naval Postgraduate School, 2005-03);In today's heterogeneous computing environment, a wide variety of computing devices with varying capabilities need to access information in the network. Existing network is not able to differentiate the different device ...