Description of document Military Intelligence Professional Bulletin published at Fort Huachuca US Army Intelligence Center of Military Excellence USAICoE January-March 2009 issue Requested date 09-April-2014 Released date 22-August-2016 Posted date 26-September-2016 Source of document TRADOC Office of the G-6 Freedom of Information Office ATIM-IA 661 Sheppard Place Fort Eustis VA 23604-5733 Fax 757 501-6509 E-mail usarmy jble tradoc mbx hq-tradoc-g-6-atim@mail mil The governmentattic org web site “the site” is noncommercial and free to the public The site and materials made available on the site such as this file are for reference only The governmentattic org web site and its principals have made every effort to make this information as complete and as accurate as possible however there may be mistakes and omissions both typographical and in content The governmentattic org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused or alleged to have been caused directly or indirectly by the information provided on the governmentattic org web site or in this file The public records published on the site were obtained from government agencies using proper legal channels Each document is identified as to the source Any concerns about the contents of the site should be directed to the agency originating the document in question GovernmentAttic org is not responsible for the contents of documents published on the website DEPARTMENT OF THE ARMY HEADQUARTERS UNITED STATES ARMY TRAINING AND DOCTRINE COMMAND 950 JEFFERSON AVENUE FORT EUSTIS VIRGINIA 236045700 AUG 2 2 2016 Office of the Deputy Chief of Staff G6 This is in response to your Freedom of Information Act FOIA request made on April 9 2014 to the Public Affairs Office PAO at Fort Huachuca Arizona The PAO sent the request to The Directorate of Human Resources FOIA office at Fort Huachuca Arizona Your request is for following issues of the Military Intelligence Professional Bulletin published at Fort Huachuca US Army Intelligence Center of Military Excellence January March 2009 I ask that this issue of MIPS be reviewed for release October December 2009 I ask that this issue of MIPS be reviewed for release October December 1999 July September 1998 July September 1997 July September 1995 April June 1995 January March 1995 On August 15 2015 you were sent all of the requested documents but the January March 2009 issue of the MIPS The request was processed referred to U S Army Training and Doctrine Command TRADOC TRADOC received the package on August 18 2014 and assigned activity control number FA 1400178 As requested enclosed are the responsive TRADOC records referred from the Fort Huachuca Arizona FOIA Office Portions of the records have been redacted and the FOIA exemption that prohibits the information disclosure is cited FOIA exemption b 7 protects records or information compiled for law enforcement purposes i e civil criminal or military including the implementation of Executive Orders or regulations issued pursuant to law This exemption may be invoked to prevent disclosure of documents not originally created for but later gathered for law enforcement purposes With the exception of parts c and f this exemption is discretionary If information qualifies for exemption under 7 c or 7 f there is no discretion in its release This decision is considered a partial denial of your FOIA request General David G Perkins CommandingGeneral U S Army Training and Doctrine Command is the Initial Denial Authority DA and by position I am the delegated DA You may appeal this partial denial of release to the Secretary of the Army You should address any such appeal to U S Army Training and Doctrine Command Office of the G6 ATIMIA 661 Sheppard Place Fort Eustis 2 VA 236045733 and it will be forwarded to the Army General Counsel for final disposition on behalfof the Secretary of the Army To meet the deadline for the appeal theappeal lettermustbe received by this office and forwarded to the Secretary of the Army within ninety 90 days of the date of this partial denial letter You have the right to seek dispute resolution through our FOIA Public Liaison usarmy belvoir hqda-oaa-ahs mbx rmda-foiaAlecia Bolling at 703 428-6238 public- iaison@mail mil Point of contact is the Government Information Specialist 757 5016529 usarmy jble tradoc mbx hqtradocg6atim@mail mil Sincerely £ - Richard A Davis Senior Executive Deputy Chief of Staff G6 Enclosure FOR OFFICIAL USE ONLY MIPB Military Intelligence Professional Bulletin JanuargwMarCh 2009 PB 34 094 FORMSICS 0 53 m A FROM THE EDITOR Finding the specific silver needle in a stack of silver needles This is the theme running through this issue of MIPB Just as the U S and its Coalition partners explored the applications of emerging Biometric techniques to counter the challenges in combating terrorism and extremism so does the department of Defense DOD in its expanded use of Forensics beyond the tradi tional applications Mr Dee Director Defense Biometrics OSD AT L DDR E states in his Letter to the Field that the MI community was among the first to recognize the potential value of forensic technology in identifying and accurately classifying our anonymous foes It continues to be a leader in not only advancing the tech nology but also in embracing the training and the concepts and policies that make forensic technology useful to the Warfighter In partnership with the U S Army Doctrine and Training Command Capability ManagerBiometrics and Forensics TCMBF here at the U S Army Intelligence School Fort Huachuca Arizona this issue of MIPB offers an overview of where Forensics is today in areas of interest to the Warfighter TCMBF is the Army use advocate to PM DOD Biometrics and designated Forensics PM It co ordinates closely with other Service and Branch proponents to enable facilitate and champion the de velopment of Biometrics and Forensics across the doctrine organization training materiel leadership personnel and facilities DOTMLPF spectrum throughout the DOD This issue defines the What of Forensics and explains the connection between it and Biometrics Organizations involved in the development of Forensics from theory to application are identified and dis cussed You will find practical information in the tactical operational and strategic domains along with points of contact for unit training events A CD contains valuable references resources and guidance in the Forensics arena I would like to thank Shirley Kim and David Wikoff for their superlative efforts in partnering with the MIPB staff to create this issue Sterilla A Smith Editor FOR OFFICIAL USE ONLY MILITARY INTELLIGENCE FEATURES January March 2009 Volume 35 Number 1 PB 34091 Commandin g General Major General John M Custer III 5 Deputy to the Command i ng General Mr Jerry V Proctor 7 Letter to the Field by Mr Thomas P Dee Director White Paper byTCMBF Biometri cs OSD AT L DDR E Def Biometric and Forensic Support to Irregular Warfare Deputy Commander for Train ing Colonel Dennis A Perkins 12 Directo r Directorate of Doctrine Colonel Michael J Arinello Evidence Collection in the OIF Detenf Ptl Operations Environment by Captain Kevin L Weise 14 Chief ISR Operations Analysis Division Mr Chet Brown Forensic Enabled Intelligence by Michael Shattuck 16 LEP Law Enforcement Professi by Captain Timothy It Hsia ' ∙ and the Army 20 Making Battlefield Forensics Work for US Turniq J'ore n aic Evidence Mike Holme s into Tactical Intelligence b Lieutenant CQl i 28 Associate Editors Shirley Kim David Wikoff CEXC Biometrics Identifying the Bombmaker Networks by Erik Berg 31 Desig n Dire ctor Patrick N Franklin Training the Force to Iden ti fy tile Unknown Threat NGIC's Battlefield Forensic Training by Captai n Ryaii Campbell 34 Design an d Layout Patrick N Franklin Lawrence Boyd The Biometrics Task Force in Support by Kasey Wertheim 42 Computer Forensic Support to DOMEX in the War on Terrorism by David Ferguson Cove r Design Lawrence Boyd 47 Issue Photographs Courtesy of the U S Army The Coalescence and Convergence of the Forensic Intelligence and Biometric Communities Q r KaseY Wtftheim 51 The Role of Forensics in the Iraqi Judicial System Targeting Insurgents by Erik Berg Purpose The U S Anny Intelligence 59 Biometrics and the Multiple Use Dilemma Enabling Post 9 1 1 National Security by Understanding a 1'ew Technology Tool by Hollie Rytui 67 The Forensics Exectftt e S erlng by Captain Shawn McMahon 73 USACIL RBOC Providing Support to tbe Warfighter and Expeditionary Forensics by William G poyne 77 TRADOC Capability Manager Biometrics and Forensics 78 Acronyms MIPB Staff Editor Sterilla A Smith Center and Fort Huachuca USAIC FH publishes the Military Int elligence Professional Bu lletin MIPB quarterly under the provisions of AR 253 0 MIPB presents information designed to keep in telligence professionals informed of cur rent and emerging developments within the field and provides an open forum in which ideas concepts tactics techniques and procedures historical perspectives prob lems and solutions etc can be exchanged and discussed for purposes of professional development Disclaimer Views expressed are those of the authors and not those of the Department of Defense or its elements The contents do not necessarily reftect oflkial U S Army positions and do not change or supersede information in any other U S Army publications or Forensic Gi oup Strength through Membership Departments By order of the Secretary of the Army Official t JOYCE E MORROW Administrative Assistant to the Secretary of the Army 0905801 GEORGE W CASEY JR General United States Army Chief of Staff 2 3 83 84 Always Out Front CSM Forum Contact and Article Submission Information MIPB on IKN Inside Back Cover Forensic Resource CD FOR OFFICIAL USE ONLY Science ALWAYS OlJT FRO by Major General John M Custer III Commanding General U S Army Intelligence Center and Fort Huachuca This issue of MIPB focuses on Forensics and how this capability is currently shaping the War on Terrorism and what the future of forensics is across the range of military operations Only in the past decade have the technologies emerged and matured to enable our forces to achieve this capability I am convinced that the proliferation of biometrics systems coupled with the development of forensics collection and exploi tation facilities in Iraq have made a major contribution to successes in operational theaters Biometrics and forensics are proven technologies honed during the most dangerous operations against insurgents and terrorists in Fallujah and across the battlegrounds of Operations Iraqi and Enduring Freedom OIF OEF You have heard me describe current intelligence operations as being significantly more difficult than finding a needle in a haystack But it is more like trying to find a silver needle in a stack of six million sil ver needles Expeditionary forensics in concert with identity tracking has now proven that we can put a neon flashing arrow on the specific needle we are looking for and deal with it decisively When one considers that the Department of Defense DOD has traditionally used forensics to gather ev idence facts and data to use in a court of law one sees that we have made remarkable progress In or der to combat a highly intelligent and adaptive enemy we have expanded our forensic capability to play an integral role across the spectrum of the War on Terrorism including intelligence functions operational activities force protection personnel recovery host nation legal support and identity superiority func tions The ability to rapidly exploit sensitive sites items and information has significantly aided U S and Coalition forces' intelligence operations resulting in the identification and elimination of enemy threats Using forensics on the battlefield gives warfighters the ability to identify insurgents terrorists and or enemy combatants link them directly to equipment documents or devices and provide the documented basis for force protection measures targeting support to prosecution sourcing and support to medical activities 1 Documented successes with various forensics capabilities on the battlefield have stimulated much con versation within the military community OIF and OEF have validated the importance of forensic science to the military decision process across all echelons of warfare from near realtime actionable intelligence for tactical commanders to products relevant to Combatant Commanders Services the DOD and National activities In March of 2004 a man was arrested for videotaping U S convoys The offense was not overly significant and not particularly illegal But he was detained and interrogated The interrogators declared that he was of low intelligence value and low threat to Coalition forces They released him Further intelligence later determined that he was a bomb maker cell leader who taught other insurgents how to build emplace and carry out attacks on U S forces He was a major leader who was released because traditional intelligence approaches determined that he was of low intelligence value and low threat value A target package was later constructed in his honor but it would have never been discovered if it weren't for Soldiers on the ground executing effective site exploitation Continued on page 4 2 FOR OFFICIAL USE ONLY Military Intelligence CSM FORUM by Command Sergeant Major Gerardus Wykoff Command Sergeant Major U S Army Intelligence Center and Fort Huachuca This one time in Iraq You may recognize this line as the Soldiers' version of Once upon a time What usually follows is a highly descriptive and realistic account of an event or scenario told by a more experienced Soldier as he at tempts to capture the attention of his subordinates Used as a teaching tool to reinforce the rigors of war fare war stories have always served a distinct purpose in greening the next generation of Soldiers As I progressed through the ranks I recall many stories told by my Leaders which caused in me mingled feel ings of awe fear a heavy dose of anticipation and often times skepticism Passed off as the 'real deal many were truly as beyond belief as Jack and the Beanstalk Remarkably the war stories of today's Intelligence Soldiers also sound beyond belief The incredible tasks we are asking our newest generation of Soldiers to accomplish is astounding The topic of this is sue Forensics is a great illustration of the rapidly changing powerfully effective and mutually beneficial technologies our warfighters are using to gain leverage Known by many labelssensitive site exploitation battlefield forensics expeditionary forensicsforensics exploitation when coordinated across the full spec trum of disciplines delivers ownership of the battlespace and successful operations The use of forensics in the Department of Defense has migrated from traditional to nontraditional Examples of traditional forensics use include criminal investigations casualty identification and examina tions The emerging technologies allow us the ability to use forensics in intelligence Counterintelligence battlefield forensics and document media and computer exploitation This capability has never been seen before The expertise required to coordinate actions and successfully process evidence within a cap tured sensitive site may come from many domains From exploiting personnel documents electronic data and material captured at the site to analyzing biometric or weapon data in timely fashion forensic collec tion causes our Soldiers to constantly assess the importance of speed versus the accuracy or reliability of the information In addition all this must be done while neutralizing any threat posed by the site or hos tile actions in the vicinity of the site Military Intelligence MI has never operated in a vacuum By our carefully crafted collaboration with law enforcement as well as other branches of the military two disciplines have been brought together whose aims some formerly thought to be mutually exclusive If specific criteria are met then MI and law enforce ment criminal investigation can mutually support the warfighter provided extra care is taken to ensure the integrity of both parties We are achieving success upon wild success in this area A great example of the marriage of MI and law enforcement can be found in a relatively new concept Evidencebased Targeting Since the acceptance of the new Status of Forces Agreement SOFA in Iraq Coalition forces are now working regularly with Iraqi Security Forces and the Iraqi Judicial System IJS All Soldiers' actions follow the laws of the IJS from patrolling the streets to capturing suspects and pros ecuting them The parameters of the new agreement force our Soldiers to share more intelligence and in formation with Iraqi forces in order to obtain evidencebased warrants from the IJS prior to actioning any targeted individuals Coalition forces are still allowed to defend themselves however they must be pre pared to turn over any captured individuals equipment etc to competent Iraqi authorities within a much shorter time frame than was previously required These new policies cement the need for strong accurate January March 2009 FOR OFFICIAL USE ONLY 3 Continued from page 2 ALWAYS UT FRONT t 7 E The USACIL LP and DNA examiners provided expert witness testimony via secure VTC to an Investigative Judge for the Criminal Court of Iraq The trial for the accused Iraqi terrorist is expected to begin shortly 1 ' 1 _ J-- · --- -· 1 · _ ' ∙ ' -'•_1 r - -- The U S Army Intelligence Center and Fort Huachuca is designated by the U S Army Training and Doctrine Command as the lead for Biometrics and has chartered and convened the Biometric and Forensics Integrated Capabilities Development Teams Biometric and forensics technologies have truly changed the way we fight and win on today's battlefields I am confident that we are on the cutting edge of this emerg ing capability and along with our partners from the DOD forensics applications will be developed that will continue to serve commanders protect our Soldiers and further our nation's interests • Endnote Always Out Front CSM FORUM and detailed target packages in order to obtain the proper warrant from an Iraqi Judge before any actions are taken against targeted individuals Because of the stronger target packages and increased IJS involvement detained individuals will be much more likely to be prosecuted to the full extent of the Iraqi Law Many resources will be saved be cause Coalition and Iraqi Security Forces will not have to chase down as many of the same targets over and over again This will also reduce the recidivism rate the same criminals committing multiple crimes across the country since captured individuals will stay in custody instead of being released right away to commit more crimes • NCOs Lead from the Front 4 FOR OFFICIAL USE ONLY Military Intelligence LETTER TO THE FJELD Forensic Science and Technology by Thomas P Dee Director Defense Biometrics OSD AT L DDR E Forensics is one area in which the Department of Defense DOD is applying capabilities and technol ogies typically used in law enforcement to fulfill na tional security and counterterrorism applications While forensic science is traditionally known as ap plying scientific knowledge and methodology to le gal problems and criminal investigations the War on Terrorism is fundamentally reshaping forensic science The DOD redefines forensics as The ap plication of multidisciplinary scientific processes to establish facts Forensic sciences such as latent prints DNA fire arms and tool marks forensic document examina tion digital evidence and forensic pathology and odontology have been used primarily for legal and law enforcement applications but have also signifi cantly impacted military operations particularly in telligence operations As many Americans have seen in nightly news casts brought into our living rooms the combatant commander Soldiers and Marines have learned that the same science we apply to identifying catch ing and convicting common criminals is extremely useful in identifying enemies insurgents and ter rorists and scientifically linking them to other peo ple places things organizations and events In particular the rapid forensic exploitation of sensitive sites items and information has signifi cantly aided U S and Coalition forces' operations resulting in the identification and elimination of enemy threats through disruption targeting and prosecution Challenges and Capabilities The capability to extract actionable information through forensics exploitation of recovered materi als will be critical to the nation's security in the 21 •t century New technologies will be required to enable military forces to recognize preserve collect ana January March 2009 lyze store share and process materials across the range of military operations At the request of the Under Secretary of Defense for Acquisition Technology and Logistics and as tasked by the Joint Chiefs of Staff the U S Army Training and Doctrine Command TRADOC is con ducting a Forensics Capabilities Based Assessment as a first step in defining and integrating future fo rensic capabilities Parallel development of the sci ence and technology S T that enables forensics operations will ensure that our technology base ill be poised to support our future forensic programs On 15th October 2008 the Director Defense Research and Engineering DDR E hosted a threeday Forensic S T Workshop in Arlington Virginia to develop a Strategic Plan The pur pose of this workshop was to engage S T leader ship establish an S T baseline for the Forensic Program map that baseline to our desired fu ture capabilities and enable a DOD S T roadmap that defines transition paths to formal acquisition programs The workshop was held in work group format with each group reporting back to all at tendees and DOD Interagency leadership at the end of the workshop Over eighty people were in attendance DOD attendees of the workshop included repre sentatives from the Service research laboratories DOD S Torganizations Technical Support Working Group Joint Improvised Explosive Device Defeat Organization law enforcement biometrics and intel ligence communities and the defense forensic labs Other organizations represented included the mil itary criminal investigation organizations and the Joint Expeditionary Forensic Facilities as well as TRADOC and the U S Army Military Police School Interagency attendees consisted of representatives from the National Institute of Justice Department of Energy labs National Institute of Standards and FOR OFFICIAL USE ONLY 5 Technology Department of Homeland Security and with the Joint Staff and Services we are commit other federally funded research labs ted to developing the validated requirements pol icy and programmatic and budgetary discipline At the conclusion of the workshop the way ahead will bring this important enabling technology that was discussed It included the production of a re into the mainstream of DOD capabilities port detailing the work group discussions and iden tified capability gaps a DOD S T strategic plan to map future strategies and the drafting of a char ter to be used to create the Forensic S T Working Group The outcome will be briefed at the Forensic Executive Steering Group and presented to the Services S T Executives As the Principal Staff Assistant for Defense Biometrics to the Secretary of Defense the DDR E is committed to advancing the technologies sys tems processes and organizations which bring this much needed capability to the field In conjunction The Military Intelligence MI community was among the first to recognize the potential value of forensic technology in identifying and accurately classifying our anonymous foes It continues to be a leader in not only advancing the technology but also in embracing the training and the concepts and policies that make forensic technology useful to the warfighter I am pleased that the Ml com munity has chosen to give this emerging technol ogy such a prominent place in this professional journal FORENSIC FOCUS 6 FOR OFFICIAL USE ONLY Military Intelligence White Paper Biometric and Forensic Support to Irregular Warfare 15 January 2009 the application of forensics science capabilities provides tremendous but mostly untapped potential to identify track and prosecute enemy persons John J Young Jr Director DDR E 25 July 2007 1 Executive Summary The recent DOD Directive on Irregular Warfare IW provides official recognition that IW is as strategically important as traditional warfare The Directive outlines a number of goals and responsibilities aimed to ward improving IW proficiency across all DOD Componentsto make DOD as effective in IW as it is in traditional warfare Notable among these goals are Identify and defeat irregular threats from both state and nonstate actors Support a foreign government or population threatened by irregular adversaries Create a safe and secure environment in fragile states Conduct among a host of other things support to law enforcement 2 Identity Superiority Biometric Enabled Intelligence and Forensic Enabled Intelligence strongly support these goals by allowing us to identify both state and nonstate actors through their biosignatures and the fo rensic material they leave behind Biometrics and forensics enable us to track and target these individ uals by providing actionable intelligence to maneuver commanders and by aiding situational awareness Perhaps most importantly in the longer term biometrics and forensics lay the groundwork for a success ful transition to civil authority and civil law enforcement by providing evidence to prosecute wartime com batants in criminal courts 2 15 7 EJ 3 7XEJ 4 5 6 Medical Forensics Medical Forensics provides studies of injuries to improve the development of medi cal training and first aid which leads to better annor and force protection These Biometrics and Forensics programs complement each other to establish irrefutable personal iden tity and ties individuals to places events and things with scientific facts gained through observation and analysis This serves to support the DOD IW goals by ide tifying threat individuals separating those in January ∙ March 2009 FOR OFFICIAL USE ONLY 7 dividuals from the remaining population and supporting law enforcement All of these capabilities help to create the safe and secure environment necessary to allow for the political and public infrastructure to operate effectively as well as provide the services necessary for a government to establish effective popu lar support Scoping the Problem IW IW is the violent struggle amongst state and nonstate actors for legitimacy and influence over a popula tion 3 In order for one side or faction to win they must gain the loyalty and support of the population How they gain this support is immaterialwhether through fear and intimidation or by convincing the people that they can best provide their basic needsbut once they have gained the support of the popular centers of gravity the contest has been won Irregular combatants are largely drawn from the population they are trying to influence and winIW is seldom led or instigated by outside forces Although outside forces may support and supplement the com batants or even subvert them to their own ends the actual combatants themselves are usually indistin guishable from the local population To exist irregular forces must therefore be able to blend in with that population For irregular forces to thrive and succeed the population must actively support them 4 To defeat irregular forces one must separate them from the population This should be done in two ways ideologically and physically 5 One accomplishes the first by convincing the population they are bet ter able to provide for their needs than the irregular forces The recent Awakening in Iraq's Al Anbar prov ince is an example of this dynamic As Al Qaeda and their allies inflicted casualties and violence against the local population they alienated themselves from the people The local Arabs turned to the Marines for helpthereby handing victory to the Coalition Forces 6 But seldom are irregular forces as shortsighted as Al Qaeda was in Al Anbar province Irregular forces are usually able to exploit the natural divisions present in any society to find a segment of the population willing to support them and provide cover 7 When this occurs one must then be able to physically sepa rate them from the populationlike using a finetoothed comb to rid a person of lice It is time consuming painstaking work that bears constant repetition to get rightand it can be very painful for the population you are trying so hard not to alienate because it requires a certain amount of state intrusion into their private lives to search segregate and clear through the areas where the irregular forces are known or be lieved to operate Given the nature of IW these two measures are often conducted simultaneously one isolates and sepa rates the irregular forces from their popular base of support while at the same time convincing that pop ulation that the current regime will do a much better job of leading and providing for them than will the irregular forces In order to make this balancing act work we need a mechanism that helps us to easily identify who the irregular forces are in order to avoid false arrests and detentions We also need a way to prove in court that the people we detain are guilty of violence beyond a reasonable doubt In this way we not only prove the justice of our own cause but also drive a wedge between those we detain and try and the populace Biometrics and forensics provides the evidence we need to produce that wedge Specific Programs Within DOD multidisciplinary forensic sciences contribute to sensitive site exploitation identifying track ing and targeting enemy forces examining crime scenes prosecution of offenders in court systems and the identification of human remains and manner of death Capabilities to collect process and analyze deoxy ribonucleic acid DNA firearms signatures toolmarks and trace evidence have all been employed either within the Central Command AOR or inCONUS to help identify persons of potential interest ' LTG James D Thurman US Army G3 5 7 25 April 2008 8 FOR OFFICIAL USE ONLY Military Intelligence Fingerprint collection matching and analysis is only one ex am ple of how fo r ens ic ally collecte d biometrics can contribute to the fishnet of information that leads to the capture of enemy forces Additional biometrics modalities are DNA voice patterns iris and retina patterns facial recognition and other distinct signatures of the human body Once we have an enemy biometric signature such as a fingerprint he or she can no longer afford to enter a checkpoint or be detained In recent interviews of units recently returned from the battle field biometrics is repeatedly cited as key to disrupting the enemy's freedom of movement and suppressing their communications and networking 9 -- - _-- ------------' •Among the most valuable data submitt d to our ufen se wide biometrics ent rpri M are the latan tfingerprints collected from enemy weapons and from 'Oari ous other surfaces during sen sit iw sit exploitations But latan t fingerprints are but on• product of a comprehensifle oren si capability • John J Young Jr Director DDR E 25 July 2007 JO In the proposed Forensics DOD Directive the Air Force assumes Executive Agency over digital and multimedia forensics 11 DOMEX is one of the biggest producers of battlefield collection and actionable X inte lligence in Iraq and Afgh ani s tan b FM 224 Counterinsurgency Documents and pocket litter as well as information found in comput ers and cell phones can provide critical information that analysts need to evaluate insurgent organiza tions capabilities and intentions TAREX Target Exploitation and DOCEX are also a great benefit to HUMINT collectors in substantiating what detainees know and whether they are telling the truth c Allied Joint Publication 2 S A Defines a document as any recorded information regardless of its physical form or characteristics including but not limited to all written material whether hand written printed or typed painted drawn or engraved material video sound or voice recordings im agery computers and computer storage media such a floppy compact digital versatile and hard disks fl ash drives portable memory devices magnetic tape and associated material including punched cards punched paper tape and printed output reproduction of the foregoing by whatever process January March 2009 FOR OFFICIAL USE ONLY 9 i --- r ' 1 1 ' 'I i • - --- Jt' • _ •• • • ' r • Trace evidence compares two samples to find common markings and to see if they are linked 7 E b 7 E b £7RE Phyaical Science help• answer difficult queationa Where did the bullet come from What was the range How deep was the bomb buried Was it at a checkpoint What was used as an aiming stake Some of these questions can not be de termined solely from the material examined at the lab Furthermore the physical science applied to answering these questions can help build better armor for our troops identify enemy capabilities and determine how to train our troops to search and monitor areas for enemy conduct b f7 E b 7 E 6 Medical Forenaica Medical Forensics provides studies of injuries to improve the development of medi cal training and first aid which leads to better annor and force protection Medical forensics is relevant regardless of the type of warfare but certainly in IW Medical fo rensics includes such sciences as Odontology Anthropology Pathology Toxicology Serology and more In Vietnam medical forensics revealed that 90 percent of soldier deaths that occurred prior to reaching the medical facility were related to blood loss This sparked a change in firstaid train ing and in the medical corpsman on the battlefield Medical forensics reduced that number to 60 percent Similar modern day studies led to the creation of speed tourniquets that can be applied within 30 seconds This reduces danger to the injured and reduces the amount of attention needed from the firefight to apply it 10 FOR OFFICIAL USE ONLY Military Intelligence Additional potential resides in the exploitation of trace evidence drug chemistry serology anthropology od ontology pathology and toxicology The rapid forensic exploitation of sensitive sites items and information has significantly aided U S and coalition forces' intelligence operations resulting in the identification and elimination of enemy threats through disruption targeting or detention and subsequent prosecution n12 LTG James D Thurman US Army G3 5 7 25 April 2008 Conclusion Biometrics and Forensics complement one another to help identify the key leaders and operators of in surgent movements or in IW In doing so these capabilities provide the maneuver commanders who will be decisively engaged in the IW fight with actionable and targetable intelligence that will help them to dis rupt and dismantle the networks the insurgents need to sustain their effort These capabilities also serve to provide vital information to assist with force protection b 7 EJ It also provides the key element of predictive intelligence analysis to the targeting process and disruption of enemy operations Studies of IW consistently focus on the advantages irregular fighters naturally employ to blend with the local population Biometrics and Forensics negate that advantage Dave Wikoff CTR Harding Security Forensics Subject Matter Expert TCMBF Mike Holmes CTR Oberon Stanley Forensics Operations Officer TCMBF Footnotes I 2 DOD Directive 3000 07 Irregular Warfare 1 December 2008 accessed on 8 December 2008 at http www dtic mil whs directives corres pdf 300007p pdf 13 3 Ibid 4 Bard E O'Neill Insurgency Terrorism From Revolution to Apocalypse Second Edition Washington D C Potomac Books Inc 2005 93 5 David Galula Counterinsurgency published in 1964 6163 Warfare Theory and Practice Westport Connecticut Praeger Security International 2006 first 6 Dr Stephen Biddle Stabilizing Iraq from the Bottom Up Statement before the U S Senate Committee on Foreign Relations Second Session 1 lO'h Congress 2 April 2008 Accessed from the Council of Foreign Relations Website on 10 December 2008 at http www cfr org content publications attachments Biddle%2042 08%20Testimony pdf 7 Bruce Hoffman Inside Terrorism New York Columbia University Press 2006 242243 10 DDR E Memorandum 25 July 2007 1 11 Capstone Concept of Operations for DOD Forensics OSD AT L DDR E 18 July 2008 12 Office of the Deputy Chief of Staff G3 5 7 Memorandum to Commander TRADOC 25 April 2008 23 January March 2009 FOR OFFICIAL USE ONLY 11 Introduction Although most of the detainees in the various the ater internment facilities TIFs in Iraq are already charged with the commission of crime the fact of the matter is that some of them will commit addi tional crimes while detained It is possible to have an attempted escape a detaineeondetainee as sault a conspiracy an assault on a guard or even a murder All of these are crimes punishable under Iraqi law The collector of evidence in the Operation Iraqi Freedom Detention Operations environment should focus on one thing Getting a conviction at the Central Criminal Court of Iraq CCCI The CCCI was created on 13 July 2003 by CPA Order #13 It serves as the only Iraqi court with fed eral jurisdiction over any crime committed in Iraq The Court's jurisdiction relies on the 1969 Iraqi Penal Code the 2005 AntiTerrorism Law and the 1971 Iraqi Criminal Procedures Code The Court is based on a civil law system much like what one would find in France rather than a common law system that we have here in the U S To the lay person this means that instead of a grand jury indictment and a trial by a judge and a jury of your peers the Iraqi suspect defendant goes before an Iraqi investigative law judge The judge can then either dismiss the charges or refer the case to trial in front of a panel of three Iraqi judges who hear the case without a jury and either dismiss the case or render a conviction and a sentence to assist the prosecutor in presenting a case that is compatible with what the Iraqi judges are expecting to see in order to ref er a case to trial and then for the trial court to issue a conviction In Iraq one thing is certain More evidence means a longer sentence This is very different than what we know about American jurisprudence In appli cation a simple formula has been devised to obtain referral to trial with resultant convictions and lon ger sentences In addition to physical evidence the judges expect photos video diagrams of the crime scene witness statements and more photos Regarding photographs the best ones are those that include the detainee In other words take a picture of the detainee at the scene of the crime Included in that photo should be any other relevant evidence For example in the case of a detaineeon detainee assault take a picture of the suspect de tainee next to any blood splatters or other evidence of the assault lf the detainee has blood on his per son or his clothing pictures should be taken of him wearing the bloody clothes before he has been cleaned and sanitized Video of this scenario in ad dition to the pictures is encouraged The more pictures that are taken the better In the case of an attempted escape take pictures of the detainee next to the hole in the fence or in the tunnel Get a picture of him holding the wire cut ters or the shovel Take a picture of him at his re capture covered in dirt from digging Take a picture Evidence Collection of anything that will make the scene more under The key then is to present a rocksolid case to the standable to the Iraqi judges investigative law judge who drafts the report which hopefully refers the case to trial Thus the investi Iraqi judges are also very interested in scene di gator must tailor his evidence collection procedures agrams In a detention environment I recommend 12 FOR OFFICIAL USE ONLY Military Intelligence that units preprint basic diagrams of the various compounds under their jurisdiction for handy im mediate use by investigators More detailed scene sketches and diagrams can be fashioned at the scene to drill down on specifics Include things like locations of weapons instruments of the crime victims witnesses and guards in the diagram Remember that Iraq is on the metric system so make things easy for the judges to understand use meters and centimeters on the diagram instead of feet and inches the reader the impression that physical evidence is not as important as what we have discussed so far but in a TIF many factors will conspire against the intrepid investigator to taint or destroy your phys ical evidence The previously mentioned floor plan diagram will get you a referral to trial and a convic tion The actual physical evidence will go very far to ward getting a longer sentence for the defendant The Crime Scene 2007 through April 2008 He currently resides in Michigan and is a Judge Advocate in the Michigan Army National Guard and is the JAG Regional Accessions Coordinator for the Midwest But there are a lot of ifs in a TIF By the time the investigator gets to the scene it is often more than several minutes old and any number of other detainees have contaminated it and any number of Among the most important pieces of evidence are the statements As military practitioners we are ac guards have responded to quell the situation The customed to the standard sworn statement that all well trained guards will protect the scene as best of the U S Armed Forces use in one form or another they can but they are often not the military occu pational specialty MOS qualified Military Police For the CCCI this is not good enough The state ments are good enough to refresh a witness' mem who are trained in crime scene protection They are ory but the CCCI requires live witness testimony Soldiers sailors and airmen of other MOSs and are However the statements are still part of the record trained in maintaining the good order and disci so get good ones Ideally your statements should be pline of the facility and treating detainees with dig nity and respect from Iraqi nationals Get the standard sworn state ment from the guards but get Arabic statements The investigator must also remember that the from the Iraqi correctional officers ICOs and from crime scene is usually in a section of the com the suspect's fellow detainees and the detainee vic pound that must be put back into service in rel tim if there is one Culturally these statements will atively short order By this I mean that crimes in go far with the judges the TIF will usually occur in one of the detainee liv ing spaces necessary to maintain the detainee pop Most importantly get a written statement from the ulation such as the detainee sleeping area or the detainee suspect Iraqi detention facilities are not in detainee latrine Thus evidence must be collected America and the detainees are not Americans They quickly at the scene and you will usually only get don't have a right against self incrimination If the one shot at it suspect will not write a statement write it for him based on the facts that your investigation uncov Conclusion ered and ask him to sign it If he refuses to sign the The final word in this basic primer on evidence statement write Refused to Sign on the document in the detainee environment is to think outside the and make it part of the record If he agrees to sign box Don't feel confined to thinking like an American the statement take a picture of him signing it when you are gathering evidence in a TIF in Iraq Although such statements are generally not admis Take lots of pictures draw diagrams get lots of sible in court unless taken in front of an Iraqi po statements gather and protect what physical evi lice officer or judge they can be used to impeach dence you can and your suspect will get a nice long the suspect's testimony at the investigative hear sentence at trial • ing or the trial If you have an ICO at the scene have him witness the suspect's statement and then Captain Kevin Weise is a graduate of Pennsylvania State get a statement from him too All statements at a University and the Thomas M Cooley Law School While deployed with the 1 77'h Military Police Brigade and TF 134 minimum should include the five Ws Who What he was the Staff Judge Advocate of Theater Internment Where When and Why Facility Camp Remembrance II Baghdad Iraq from July You may have noticed that I haven't spoken very much about physical evidence I don't want to give January March 2009 FOR OFFICIAL USE ONLY 13 Introduction As he departs the com pound with his appointment slip in his pocket an entire enterprise has already begun to work -- - Intelligence The Match subject's mask of anonymity has been ripped away and beneath it lies an enemy 14 FOR OFFICIAL USE ONLY Military Intelligence Building the Networks The value of forensics to intelligence is more far reaching than onetoone matches as in the exam ple of our Cropper visitor Forensics allows intelli gence analysts to link groups organizations and people together And again the links are based on forensic facts not analytical inferences b 7 f Conclusion An Iraqi bylng to gain access to a U S facility Is scanned with the PIR 2 3 Iris scanner Two incidents with one linkForensics And now one less bad guy on the streets Forensic science is making a difference not only in helping to defeat the insurgencies in Iraq and Afghanistan but in helping to secure our Homeland Starting from Fact A forensically acquired link enables intelligence professionals to drive collection based upon factual information A latent fingerprint match places the subject inextricably in contact with the matched object This forensic fact can greatly enhance the effectiveness of standard screening and interroga tion procedures When an interrogator enters the booth with our Cropper visitor he has an important edge He can quickly determine the subject's level of cooperation and indicators of deception b Confronted with the forensic facts that confirm his complicity the subject will be far more likely to cooperate Rote Forensic is generally a legal term pertaining to use in the court of law In the context of this article the term deals with the Forensic Science of matching latent fingerprints to people Michael Shattuck is a contractor for Pragm atics INC working for the National Ground Intemgen ce Team Biometrics Program providing Contract Advisory and Assistance Support CAAS Michael spent a year in Baghdad supporting IXJD Biometrics and is also a first lieutenant in the U S Army Reseroe FORENSIC FOCUS Latent Record 6 l EJ 7 January March 2009 FOR OFFICIAL USE ONLY 15 by Captain Timothy K Hsia Photogr•phs by the •uthor The current conflicts in Afghanistan and Iraq have greatly tested the Army's manpower and equipment The Army has responded to the constantly chang ing threat environment by researching new tech nologies and by better equipping soldiers with the latest gear in order to increase the survivability and lethality of deployed units ∙From ARMY Magazine July 2009 Copyright 2009 by the Association of the U S Anny Limited reprint pennis sion granted by A USA But the emphasis in adapting to new threats posed by the enemy is not strictly limited to tech nological advances or equipment The military has augmented units with additional enablers such as 16 FOR OFFICIAL USE ONLY Donnie Young lawenforcement pro easi ona l Military Intelligence specialized nonmilitary teams One example is the much publicized and controversial human terrain team Other enablers in Iraq however such as law enforcement professionals LEPs have embedded with units and are currently influencing the opera tional picture within Army units These contracted former lawenforcement individuals have assisted military units in numerous capacities from in structing soldiers to hone their tactical questioning techniques to aiding platoons with sensitive sight exploitation SSE after raids The LEP program resulted from the Army's aware ness that too much actionable and incriminating evidence was being lost because of soldiers' lack of police skills Soldiers inadvertently committed sev eral basic lawenforcement mistakes while on pa trols These mistakes ranged from failing to gather up properly all available evidence from a scene and soldiers inadvertently placing their fingertips on captured equipment to failing to follow a logical course of questioning when interrogating a suspect In essence the Army realized that in counterinsur gency soldiers on the ground needed additional as sistance with collecting refining data mining and extrapolating intelligence as the result of a raid or from a cache This collected intelligence which might have otherwise been lost because of hasti ness could then potentially lead to the capture and defeat of remaining insurgent cell leaders The so lution to the Army's predicament of how to better equip units with the skill sets necessary to cap ture insurgents and criminals was to hire former lawenforcement professionals These LEPs would assist military units in further reducing the loop between actionable intelligence and operations Lenforcernent professionals LEPs embedded with ath Brigade 2nd Infantry Division collect evidence at the scene of a houseborne Improvised explosive device in the Dlyala River Valley Iraq Contracted civilians LEPs provide soldiers expertise and training in collecting refining and extrapolating intelligence b 7 F I The LEP program is the brainchild of the Joint Improvised Explosive Device Defeat Organization JIEDDO The LEP objective is to provide ' the capa ___ bility to conduct criminalenterprise analysis in order 6 f f to facilitate methods to identify monitor penetrate 1 interdict and suppress criminal networks in support of the CIED counterimprovised explosive device The LEP program is divided into those who serve at mission According to the JIEDDO web site LEPs' the brigade level LEP 1 and those embedded to bat ' insights into the techniques and patterns of gangs talions LEP 2 LEP 1 individuals focus on criminal and organized crime have significantly improved analysis including targeting and tracking insur commanders' efforts to target IED networks gents The majority of these individuals have back LEPs are contracted civilians all of whom have at grounds in federal law enforcement and include FBI least secretlevel security clearances There are cur agents Drug Enforcement Agency agents Secret Service agents and even retired borderpatrol agents rently ar und 95 LEPs in Iraq and 30 in Afghanistan January March 2009 FOR OFFICIAL USE ONLY 17 LEP 2 individuals are seasoned lawenforcement po licemen who have worked with various urban police departments across the United States including New York City Chicago St Louis and Los Angeles Many LEP 2 individuals have worked as undercover opera tives have expertise in cases relating to street gangs and largescale criminal enterprises and have often been involved in federal task forces Before deploying to Iraq or Afghanistan LEPs train in Virginia for roughly two months focusing on IED defeat in terms of targeting and research ing common enemy tactics techniques and proce dures that deployed soldiers encounter LEPs have an initial oneyear contract but can opt to extend it A LEP and soldiers of 3rd Squadron 2nd Stryker Cavalry The LEP program initially had LEPs embedded with Regiment sift through debris to collect evidence LEPs are often a unit six months prior to deployment but this was more patient and attuned to details than the uninitiated soldier whose mission has traditionally been capturing detainees rather found to be too timeconsuming for LEPs who would than cataloguing evidence end up being separated from their families for up to from average ones is their ability to see that cap 18 months at a time tured insurgents are tracked after the point of de Some soldiers are guarded when first introduced tention A detainee released immediately after being to LEPs Soldiers occasionally incorrectly assess captured essentially nulls the unit's actions in de LEPs as possible criminalinvestigative detectives taining the individual in the first place Detainees who are sent in by superiors to analyze and ques are often released by higher headquarters several tion soldiers' actions while on patrols This wariness days after being captured because of weak detainee quickly dissolves after LEPs join the soldiers in nu packets Roughly more than one out of 10 detain merous combat patrols ees captured is eventually released In certain units When LEPs approach a site they are often more one out of five Iraqis detained is eventually released circumspect patient and attuned to the details than for multiple reasons including poor evidence han the average soldier For the soldier the capture of dling and lack of incriminating information the detainee has typically been viewed as the end of the tactical operation After a raid a soldier's adren aline subsides fatigue begins to creep in and subor dinates are anxious to head back to base for a warm meal Although tactical victory has been achieved with the capture of a detainee victory can be fleeting if soldiers on the ground do not properly catalogue evidence and ask probing tactical questions Only when a detainee and a site are properly exploited can the tactical victory translate to operations of strategic value LEPs in sharp contrast to soldiers view the capture of the detainee as the beginning of the oper ation To LEPs this is when work must be done im mediately in order to collect additional intelligence refine detainee packets or conduct link analysis be tween previous sites and current operations Compowiding the military's problem of capturing and detaining violent insurgents is the fact that many insurgents have become immunized to American mil itary police methods and interrogation techniques After five years of American presence many hard core insurgents have become schooled in the U S military's operating procedures concerning detain ees Insurgents simply clam up or worse they spread dissension and lies in order to further obfuscate our intelligence Captured Iraqis have sown further con fusion into U S military intelligence by seeding spu rious reports It is often impossible to comprehend what exactly is happening in a specific locale by sim ply reading intelligence summaries Different detain ees will spout different stories concerning who is working against Coalition forces In essence in some Military units now use the number of captured de areas of Iraq and Afghanistan the war has devolved tainees as a rubric for success What body counts into a pseudogangland setting where each sect or were to the Vietnam era detainee numbers are to cell competes against the other by seeking to portray today's soldiers What separates good military units the other sect or group as guilty 18 FOR OFFICIAL USE ONLY Miiitary Intelligence LEPs have assisted military units by cutting through this fog of insurgency They heavily scrnti nize detainee packets before packets are passed on to higher commands Military units have found LEPs to be most effective as intermediaries between their intelligence section and their staff judge advocate section LEPs are best positioned to review detainee packets because they understand exactly what in formation is needed in order to put away a detainee while also providing a link to intel sections by high lighting certain trends that could possibly be ana lyzed to facilitate operations and intelligence briefs The success of LEPs is also unit driven Certain units have had success with LEPs because they ac knowledge inherent weaknesses within their intel ligence sections and tactical human intelligence teams On the other hand some units still see LEPs as merely an encumbrance with little to contribute The skills that LEPs possess are not beyond the means of the typical infantry soldier Nonetheless these are skills that must be learned through con tinual practice SSE requires rigorous discipline and a calm analytical mental state Such attri butes are difficult to achieve immediately after a directfire engagement or while a detainee's wife or children are crying in the courtyard Still soldiers with the aid of LEPs have greatly improved their police and investigative skills Today's soldiers are versatile and understand the importance of bio metrics fingerprints tactical questioning and de tailed descriptions concerning raids and captured insurgents These skills complemented by cultural understanding are greatly contributing to the suc cess of the American military at the ground level LEP Young tHins Afgh•n police •nd soldiers In m•rkam•nship Embedded LEPs serve •s lnstructOl'9 •nd the success of the progr•m Is evident in the careful way soldiers gather available evidence h•ndle captured we•pons •nd •void mixing their finger prints with those on Insurgents' equipment order to inrorporate skills relating to lawenforcement personnel that are used on a daily basis in the Army's present conflicts The current LEP program has succeeded in ac complishing its stated mission As a result the program managers are escalating the program so that more LEPs are introduced and embedded into military units The success of the LEPs is evident E on a daily basis b Another added component LEPs have provided is the mental approach and the para Embedded LEPs have also served as instructors digm of having a longer time horizon LEPs tem in the units to which they are assigned They have per the soldierly instinct to desire instant results heightened the awareness of both leaders and sol Instead soldiers now understand that sometimes diers of the detectivelike approach the military must catching criminals and insurgents requires a lon use when approaching sensitive areas such as an ger time horizon The conflicts today in Iraq and IED blast site discovered cache or mass gravesite Afghanistan require soldiers to have a Dick Tracy Traditionally combat infantry units have developed skill set Infantry soldiers must not only close with internal standard operating procedures that have and destroy the enemythey also need to ensure em placed organic enemy prisoner of war EPW teams that evidence collection and detainee packets are within each platoon The EPW team is modeled and thorough and detailed best designed for conventional wars Infantry pla toons need to go further than having EPW teams they also need to develop organic SSE teams Units Captain Timothy K Hsia is a graduate of the United States preparing to deploy to Iraq should emphasize the Military Academy He is an Infantry officer assigned to the need to develop these teams at the platoon level in 2nd Stryker Cavalry Regiment January • March 2009 FOR OFFICIAL USE ONLY 19 by Lieutenant Colonel Mike Holmes Introduction There doesn't seem to be much crossover between tactical intelligence and the crime scene investiga tions we watch on the television show CSI The battlefield is typically not a place where labcoated technicians can leisurely examine neatly isolated crimescenes cordoned off with yellow police tape And as bright and intelligent as our young analysts are they are not trained scientists with specialized equipment cess to fuse the information we currently gain from our human and technical sources the overall con cept should not be new to us The goal of DOD fo rensics is to individualize identify associate and scientifically link people places things intentions activities organizations and events to each other 2 We analyze and incorporate forensic material into our intelligence fusion to help round out or com plete our intelligence picture This forensic process may be as simple as using photographs to help re construct the site of an attack or ambush or as complex as uncovering latent fingerprints to make a match in the biometric database with a known indi vidual In all cases it adds depth to our holistic in telligence analysis and can help to prove or disprove hypotheses on the enemy's most probable or dan gerous course of action But what we see on television is not an accu rate reflection of forensic collection investigation and analysis The dramatic emphasis on brilliant police work scientists and loads of bright shiny technical kits hides the fact that there are a num ber of simple and effective tools we might easily use on today's battlefield Incorporating some of these toolsespecially in this counterinsurgency COIN Forensics should be classed as Measurement and fightwill help us provide our maneuver command Signature Intelligence MASINT because it involves ers with more a detailed and accurate intelligence quantitative and qualitative analysis of a wide range assessment of the environment and fast accurate of data which we derive from both technical collec and targetable intelligence tion voiceprints iris scans etc and physical col Forensics Defined lection latent fingerprints DNA blood spatter tool The recently published Department of Defense marks etc to establish fact Other than the fact DOD Forensics Concept of Operation defines fo that most of the forensic material we collect is pro rensics as the use of multidisciplinary scientific duced by human beings there is no conceptual dif procedures to establish fact ' This simply means ference between the thought processes we use to examining evidence or material using the scien analyze this material and that which we collect tific method critical thinking and then analyzing from machines or technical devices We are simply it to confirm or deny what actually happened on measuring the biological signatures produced by the ground We already use this same thought pro the human body 20 FOR OFFICIAL USE ONLY Military Intelligence Forensics Application on the Battlefield would have said To get there first est with the most est Combat intelligence works on probabilitiesnot established facts For targeting purposes accuracy We can apply forensics on the battlefield with a is reduced to determining the highest probability much lower profile than most police departments and crime labs for several reasons The first is and speed may mean the difference between win that police are held to a much higher standard of ning and losing In this environment forensic anal proof in order to gain a conviction in court This is ysis need only provide a best estimate The only jury a major difference between the two functions of Law that needs convincing is the Targeting Boardthe Enforcement and Military Intelligence and it drives only judge is the maneuver commander a lot of legal discussion between what is an appro For forensics to work on the battlefield the old priate level of proof to target a person in combat and aphorism that The Best is the Enemy of the Good what is appropriate to prosecute a person for a crime Enough is valid Police work demands the best in civil society in order to protect the constitutional rights of law Police operating within a civil society and in a con stitutional framework must wait for a crime to oc cur before they can level charges against a person The basis of police work is to detect solve and pun ish crime after it has occurred and must by its very nature be reactive Police dissuade potential crimi nals by their presence and reputation for effective ness in solving crimes and prosecuting cases Once a crime is committed police restore justice by ap prehending the criminals and bringing them before the court for trial At trial they must prove guilt be yond a reasonable doubt ' Criminalists working in a crime lab spend a lot of time and energy making sure that their analy sis is based on fact and free from errors Any gaps in procedure even something as simple a break in the chain of custody or a missed testing procedure can be used by a defense attorney to cast enough doubt on the case to sway a jury For this reason criminalists and forensic scientists are well drilled in documenting everything and showing their work As a result law enforcement forensics is precise and usually slow with lots of backchecks to ensure ac curacy and to leave no loopholes a defense attor ney might exploit to cast doubt in the minds of the jury Speedwhich is not terribly important if the accused is already in custodyis sacrificed for accu racy and the sure knowledge that society is punish ing the right suspect 4 Conversely as Soldiers our task is to destroy the enemy's capacity to make war If intelligence can identify and locate the enemy's pressure pointsor high value targetsbefore he has a chance to use them then so much the better We are actually expected to be proactive Nathan Bedford Forrest January March 2009 abiding citizens Warfighting requires only the good enough answer to provide us with actionable intel ligence and targeting information A second point that differentiates us from police is that we are not responsible for enforcing narcot ics and drunkdriving laws More than 75 percent of the evidence evaluated in U S crime laboratories is drug related 5 Accordingly our domestic crime labs spend significant time and budget on toxicology equipment which is unnecessary for battlefield in telligence Police have a valid reason to analyze and detect the presence of drugs in various materials but we don't Therefore some of the more techni cally complicated and delicate pieces of equipment that are commonplace to law enforcement forensics are superfluous to us Having neither the burden of drug and alcohol testing nor the need to prove our forensic analysis in court gives us a lot of free dom It also means that we do not need the same level of education in order to do some of the basic forensics procedures and incorporate them into our intelligence collection and analysis But it will re quire some additional training and tools and per haps most importantly critical thinking to make it work and as always in this era of emerging doc trine'' a good dose of creativity The Six Forensic Functions To effectively incorporate forensics into our intel ligence cycle we must first master basics recog nize preserve collect analyze store and share 6 None of these are radically different than anything we already do We can adapt already existing pro cesses to fit the needs fairly easily and there are courses and training resources available for some of the more esoteric skills that are required FOR OFFICIAL USE ONLY 21 Battlefield Forensics Challenge 7 Law Enforcement Transition to Civil Authori Speed versus Accuracy High • Judic•I prmec ution • Mecllcal clnlnnNtlaa • Perfect ac curacy•nd speed • lntorcltangoablllryand 1ultablllty of t'lkltnct or Hems for 1n purpoaH • Obtain muimum amounr at intelliflence and evidential valuefrom eacll Item In ' 1ccordance with ib primary purpose ___ judlclal noc llcal or lntGlllgonco Accuracy is primary Speed is Accuracy secondary Judicial medical purpoeea Speed Is primary Accuracy Is secondary Intelligence Purposes Low Speed Slow Recognize The first forensic function is to recog nize which items possess potential forensic value 8 When police investigate a crime scene they have the leisure of time and security They can put up the yellow tape and poke around looking for any thing useful to help solve the case and they can keep the scene as isolated and pristine as they like for as long as they need Our lives are a little more difficult on the battlefield Assuming we are not ac tually being shot at or exposed to the threat we may have only minutes to assess the scene photograph it and scoop up what we want before the tactical commander says we must go In order to make the best of whatever limited time we have our collec tors must go into each situation with a good set of priority information requirements PIRs or Forensic Collection Requirements You can already see FCRs coming down the acronym trail can't you ∙ Warfighting Fast later to help their memories Eyewitness testimony is a notoriously fickle and fleeting thing subject to the stresses of sleep deprivation shock and Post Traumatic Stress Disorder 9 Photographs allow us to accurately record the moment and analyze it later at our leisure A series of photographs which tell a story can be taken relatively quickly by Soldiers with minimal training but they have to know what to look for and it is our responsibility to tell them Just as with any PIR we need to direct our Soldiers to look for things that will fill the gaps of our knowl edge and allow the commander to make a decision on a course of action ' 6 7 E The co l lectors need to have their collection requirements prioritized so that if the time and conditions do not Forensics collectors must at a minimum copi allow they can focus on the most important foren ously photograph the entire area that we can use sic material 22 FOR OFFICIAL USE ONLY Military lntelllgence ____ _ The more timeconstrained the environ ment is the more important it becomes for the fo rensics collectors to know what it is that you need in order to complete the intelligence picture Preserve The second forensic function is to pre serve which involves protecting materials and data from the point of collection and for as long as they potentially hold intelligence or evidentiary value The material we collect may some day wind up as evidence in a criminal court perhaps even long af ter we have gone home Therefore the materials we collect must be protected and preserved by avail able and reasonable measures to prevent contami nation loss or alteration 10 The first step in this process is to establish and maintain a chain of custody for every piece of mate rial we take from a site In concept this is not very different from that which we already do with mate rials from detainees The Provost Marshal or Judge Advocate officer can provide assistance in writing a standard operating procedure that is functional and still preserves the evidentiary value for future use We might also want to consult with the local crime lab and see what procedures it uses as a guide The lab can provide us with some ideas on how to pre serve the material from decay and decomposition as well important things to know when collecting body parts fluids and DNA Collect We will need the most help and train ing with the third forensic functioncollect Just as one might think this is the recovery of and ac counting for any materials from a site to include the documentation and the recording of contextual information as conditions allow This may even in clude some limited processing of certain items or areas of the site in an effort to detect additional rel evant or hidden material or information This may also include presumptive chemical testing such as for explosive residue or for blood and body fluids to confirm or deny the presence of relevant foren sic material 11 enough intelligence Soldiers to allow some of them to be spread around the battlefield with our maneu The only ver Soldiers looking for forensic materia realistic way to get the asset coverage we need is to let our maneuver units do it We need to train our infantry armor cavalry engineer artillery have I left anyone out Soldiers on how to correctly col lect forensic material and bring it back to us in a useful and useable condition Happily there are significant resources to help us do this The Army already has a nascent forensic training program targeted towards training maneu ver Soldiers on how to collect forensic material in a combat environment It is taught by a mobile train ing team MIT that will come to your location and there is no cost to the unit except to dedicate thirty of its Soldiers for four straight days of uninterrupted training Currently the Battlefield Forensic MIT is sponsored by the National Ground Intelligence Center NGIC but in 2009 it is transitioning to the U S Army Intelligence Center at Fort Huachuca The current program is forty hours of instruction crammed into 4 10 hour days and focused on IED defeat It covers tactical site exploitation and scene evaluation forensic material recognition photogra phy documentation proper handling of materials to preserve biometric data basic latent fingerprint collecting and tactical questioning It also includes training on the Handheld lnteragency Identity Detection Equipment HIIDE if there are local HIIDE instructors available to leverage 12 Alternatively the U S Marine Corps has an excel lent set of training support packages TSPs on site exploitation 13 Either of these options is good ob viously handson instruction can be effective but time consuming A better option might be to supple ment the MIT training with the Marine Corps pack age to allow for followon and refresher training Another place to go for additional training and for more indepth discussions on how to collect ana lyze and correctly store your forensic material is the local law enforcement agency LEA Most major po lice activities have some sort of crime lab and most of them are accredited to national standards so their Human nature may drive us to try and control fo procedures and processes will be largely uniform rensic collection ourselves and keep it internal to Establishing a good working relationship with these the S2 section but common sense and a candid ex activities would be an excellent place to start any amination of our troopstotask will show this is S2 section training or orientation on what forensics not possible We do not now nor will we ever have is and how it can help us Additionally many LEAs January March 2009 FOR OFFICIAL USE ONLY 23 employ a corps of civilian crime scene technicians who specialize in forensic material collection and can cross train with the forensic collectors Analyze The fourth forensic function is anal ysis which may range from recognizing valuable forensic material on the site to in depth exami nations in a lab or forensic facility Regardless forensic analysis attempts to scientifically link materials people places things intentions ac tivities and events It involves scientific instru mentation and equipment to compare known materials and information with unknown or un identified materials and the results may require interpretation and further analysis 14 To accomplish this task we should first ensure we have established a system within our intelli gence processes to account for the new information and data which forensics will provide and a way to incorporate that information into our Intelligence Fusion We should start with ourselves and assess our own abilities to think critically about our envi ronment our enemy and the clues he leaves be hind that give us vital insight into his composition disposition and intent This is not necessarily dif ficult but we have not been trained especially well or extensively on how to think forensically As a re sult there is no uniformity across the force Critical thinking is already a part of many of the various curricula at Fort Huachuca but there needs to be much more of it and it should be taught at lower education levels so our junior Soldiers begin their careers with some guidance and awareness for how in the ACE was dominated by a group of people sit ting around a table with various chart packs and notepads looking very much like a scene from the play Twelve Angry Men it was usually a VERY good sign Computers and mental models are great tools but they will never replace a factbased discussion be tween two sentient beings at least not in any of our lifetimes We can get data from computers and as semble them in ways that are perhaps easy to vi sualize but seldom if ever will we get a conclusive answer to anything but the simplest of logic prob lems And bearing in mind we are ultimately target ing human beings we are seldom presented with the simplest of logic problems If we are going to collect and analyze forensic material from the battlefield we will be presented with an array of information which often just won't fit with our preconceived ideas We must be nim ble enough in our thought and rigorous enough in our criticism to incorporate this information into the whole of the fusion process We then must con stantly evaluate it against all of the other informa tion we receive from our other sources Perhaps it is not too early to say that at some point we might even incorporate forensics into a MASINT cell within the ACE To use the forensic material we plan on collect ing we need to develop our own tools and think through each problem for ourselves We will need to progress past the point of deductive reasoning where all of the steps are laid out for us and we to analyze can make predictions and test our hypotheses to But until doctrine and training do catch up there abductive reasoning where some of the steps are is much that we as leaders can do to fill in some of missing and we are forced to arrive at plausible hy this gap First we should create a culture within our potheses using a fragmented mosaic of sometimes intelligence sections where we openly formulate not verywell connected facts mixed with valid as explore discuss and evaluate ideas and informa sumptions It is a bit like the difference between tion In over eighteen months as the senior Division simple mathematics and algebra where we must Analysis and Control Element ACE observer solve for the unknown trainer at the Joint IntelligenceCombat Training And as we think through the problem we should Center I was able to observe and explore a variety bear in mind that good ideas do not have any mil of styles methods and tactics techniques and pro cedures for producing intelligence One of the best itary rank attached to them If we open our pro indicators I had for whether a group was doing well cess to active discussion and debate then we must and getting it was simply to observe the activity accept that sometimes the E4 does indeed have a of the students If the ACE was quiet and orderly better grasp on the problem than the 04 the real with everyone's face buried in a computer screen test of leadership is how well we use the assets and it was seldom a good sign Conversely if the action ideas we control not in how often we are right 24 FOR OFFICIAL USE ONLY Military Intelligence Store The fifth forensic function is to store While battlefield forensics allows for a quick and dirty approach at some point our strategic and opera tional goals will force a transition back to civil au thority As we transition from military to civilian control we must expect increasing restrictions on our ability to act proactively Although our analy sis will not be held to the scrutiny of a judge and jury the forensic material we collect may some day end up as evidence in a court case Therefore we will need to ensure that we collect transport and store this inaterial in such a way that it maintains its value for future civil court cases This includes keeping an accurate chain of custody and keeping any biological material from decomposing Materials and associated information should be maintained until their disposition has been fully ad judicated or resolved The policies and procedures we develop in conjunction with the Provost Marshal or Staff Judge Advocate should dictate proper dis position The effect of this function is that we may find our storage lockers rapidly filling up with a lot of old and often not very nice material Moving this rapidly out of our custody and into the law enforce ment community's evidence lockers as soon as we are done with our analysis is the goal here The less time it spends in our control the less chance it will be called into question later in court Share The sixth forensic function may be the most importantshare Information and intelli gence that never makes it out of the S2 section is worse than worthless Our commanders and Soldiers perhaps went to great risk to bring us this material and we owe it to them to get our analysis back out to the force as rapidly as possible where it will do some good This includes not only our own commands but also any others who might have need of it This has been covered in numerous ar ticles and briefs but the point cannot be made strongly enough that once we have made our anal ysis share it with anyone else who might need to know it Forensic Material The types of forensic material we are likely to en counter varies widely with the enemy and the en vironment but there are some commonalities that we should be prepared to analyze and process January March 2009 This is neither as complicated nor as expensive as it sounds These microscopes are more complex than the ones we may have used in high school Biology but they are certainly able to be packed in a hard case and set up in austere locations Every scene is likely to have some sort of body tis sue or fluid left behind 7 DNA can positively iden tify an individual and also tell us a great deal about other things we might not otherwise be able to know without actually interrogating that individual and cross checking with known facts l i 7 E Before we knew how to use DNA for evidence Police used blood typing and often there is a pretty good amount of that lying around Blood typing does not give us the kind of conclusive evidence we can use in court to positively identify a person but it does help us narrow down the field considerably and it is something you can reasonably do yourself with proper training and minimal equipment DNA is more precise than blood typing and provides the positive identification needed to make convictions in court By sticking to the aforementioned rule that The Best is the Enemy of the Good Enough we can use blood typing to screen individuals and at least exclude them as possible targets The blood sample doesn't necessarily have to be blood from bullet or combat wounds I FOR OFFICIAL USE ONLY 25 And of course there is still perhaps the oldest and most sure way of tying a person to the scene of the crimefingerprints An LP is nothing more than a print which isn't seen It is the residue from the fric tion ridges on the finger or palm print left behind when a person touches something The good thing about fingerprints is that they are unique to an in dividual unlike DNA If you are an identical twin your sibling will have the exact same DNA as you E but different fingerprints which should go some ways towards convincing our commanders to support our efforts in this The pay off is worth it in Coalition lives saved and terrorists caught or killed Consider the following examples Having said thi s LPs can also be ext remely tricky to work with especially when all you can get are partial prints or smudges But again remembering our burden of proof is much less than our police brethren we don't need to be as pickyafter all we won't be talc ing these prints before a jury just to the Targeting Board and the commander Finding developing and lifting LPs for later use is something which is taught in the aforementioned Battlefield Forensic Course and while not terribly easy it can be taught and learned with a little patience and practice Using the emerging biometric technologies and Biometrics Automated Toolset BAT and HIIDE we should soon be able to scan in LPs we have lifted from a scene and check them for matches already in the database or enter them into the database as an un known to be matched later The thing we must keep in mind and continually remind our law enforce ment brethren is that we are not trying to build an airtight case just a target package Our analysis of the match does not have to be perfect just close enough b 7 E Getting Results We have now wandered far from what we can rea sonably expect to do for ourselves during 82 section training time To get the training proposed here we will need to convince the S3 and probably the com mander To bolster our case we might point out to them that one MTT can train up to thirty Soldiers and that if each maneuver battalion had thirty Soldiers trained to collect forensic material then there would be enough to sprinkle around each line company for the tremendous amount of work to be done Forensic evidence like any other evidence or information tends to become more accurate in vol ume the more collectors we have in the field the more bad guys we are likely to capture and kill 26 FOR OFFICIAL USE ONLY Military Intelligence 5 lbid 248 Commenting FBI Director Robert Mueller said Identifying and reconstructing timing devices explosives and producing an analytical product that is distributed throughout the military or through out law enforcement in the U S may well enable us to prevent the use of those devices in the future 15 Daily as our biometric databases grow and more evidence is collected the number of success stories showcasing forensic material providing targetable intelligence increases exponentially Given this in crease and the relative ease with which you can in corporate this capability into your current bag of S2 tricks why not explore the opportunity Conclusion Nothing here is meant to suggest that we can cre ate our own miniature crime laboratories or that intelligence Soldiers will ever magically become fo rensic scientists However some of the simpler tasks of forensic collection and analysis are well within our competency and ability to accomplish with a lit tle extra training some small amount of equipment and careful thought But we must keep in mind that unlike the police we are looking for the high est probabilities not proof beyond a reasonable doubt We should temper the expectations of our commanders accordingly The additional training which is readily available to our Soldiers is worth the effort if it results in faster mission accomplish ment As someone once described to me in a COIN fight our job is like finding the right needle in a pile of needles Forensic Science can be a very helpful tool if we are looking for that kind of a target 6 OSD AT L DDR E Capstone Concept of Operations for DOD Forensics 5 7 Figure courtesy of TRADOC Capability Manager for Biometrics and Forensics TCMBF Fort Huachuca Arizona 8 8 OSD AT L DDR E Capstone Concept of Operations for DOD Forensics 6 9 Laura Engelhart The Problem with Eyewitness Testimony A Talk by Barbara Tversky Professor of Psychology and George Fisher Professor of Law Stanford Journal of Legal Studies Accessed 15 November 2008 at http agora stanford edu sjls Issue%200ne fisher tversky htm 10 OSD AT L DDR E Capstone Concept of Operations for DOD Forensics 6 11 Ibid 6 12 More information on the Battlefield Forensic MTT is available elsewhere in this issue of MIPB or by calling the course manager at 434 9807128 or calling the TRADOC Capability Manager for Biometrics and Forensics at 520 5330303 DSN 8210303 14 OSD AT L DDR E Capstone Concept of Operations for DoD Forensics 6 7 15 CBS Evening News Forensics ID Bomb Makers in Iraq FBI Uses Breakthrough Forensics to Track Homemade Bombs 17 January 2006 Accessed on 24 November 2008 at http www cbsnews com stories 2006 01 17 eveningnews mainl 216945 shtml Endnotes 1 OSD AT L DDR E Capstone Concept of Operations for DOD Forensics 18 July 2008 Director of Defense Research and Engineering Washington D C 1 3 Julian R Hanley Wayne W Schmidt and Larry D Nichols Introduction to Criminal Evidence and Court Procedure 6th Edition Richmond California Mccutchan Publishing Corporation 2006 4 Richard Saferstein Criminalistics An Introduction to Forensic Science 9th Edition Saddle River New Jersey Pearson Prentice Hall 2007 16 January March 2009 Lieutenant Colonel Mike Holmes is S2 for the 49th Theater Information Operations Group Texas Army National Guard He has served in a variety of assignments to include brigade and battalion S2 and was an Intelligence liaison and U S Arresting Officer for the British led MNDSE in Basrah in 2005 A fulltime civilian employee of Oberon Associates he currently serves as the Operations Officer at the TRADOC Capability Manager for Biometrics and Forensics at Fort Huachuca Arizona He holds an MA in Diplomacy with a concentration in International Terrorism from Norwich University and is a graduate of U S Army Command and General Staff College He may be reached at mike holmesl@µ s army mil FOR OFFICIAL USE ONLY 27 b 7 E Introduction The Combined Explosives Exploitation Cell Iraq CEXC1 at Camp Victory is a unique collection of U S Army Navy and Air Force British and Australian Army and civilian subject matter ex perts working together to exploit and analyze impro vised explosive device IED related material in order to identify and target bomb makers The laborato ries that form the umbrella known as CEXC1 work end to end examining and exploiting different ma terial properties as it is collected throughout Iraq Entr11nce to the CEXC complex at Camp Victory Iraq b 7 28 Material flows into the CEXC1 triage 24 hours a day 7 days a week The labs process an aver age of 36 000 items a month CEXC1 is staffed by thirtyfour personnel including a Navy 05 who commands CEXC1 EOD technicians two Federal Bureau of Investigation FBI agents one Alcohol Tobacco and Firearms agent electrical engineers andin the Biometrics Lalrforensic technicians and photographers and latent print examiners FOR OFFICIAL USE ONLY Military Intelligence First Full Service Biometrics Lab The National Ground Intelligence Center NGIC first proposed a full service Biometrics Lab for Iraq in July 2004 In December 2004 a single forensic technician was allowed to deploy to Iraq as an exper iment This first effort experienced many challenges and a few failures but after ninety days the program proved to be a valuable tool which led to the recov ery of forensically valuable material including fin gerprints one of which was subsequently matched to an insurgent By June 2005 the Department of Defense DOD recognized the value of this fledgling program and provided additional funding from the Joint IED Defeat Organization JIEDDO to supple ment the NGIC initiative JIEDDO provided funding for a latent print examiner and a forensic photog rapher Demand for analysis grew quickly as word spread throughout the battle space about CEXC1 and what it was able to accomplish It wasn't long before NGIC was looking for funding to fill requests for additional personnel trained to biometrically exploit the material coming in from all over Iraq JIEDDO has funded this program over the last sev eral years and by August 2007 the Biometric Lab's staff grew to fourteen In the month of January 2008 the CEXC processed a record 48 000 items and recovered more than 600 latent prints The concept of forensically exploiting IED re lated material spread to the Afghanistan Theater of Operations in March of 2006 when a Biometrics Lab was established within the CEXC complex in Afghanistan CEXCA The lab was staffed by a fo rensic technician and photographer and a latent print examiner In September 2008 NGIC was asked to double the biometric staff in CEXCA due to increasing amounts of material being turned in for processing Exploiting EDRelated Material 7 E CEXC1 Biometric Labor tory EFP cache processed end to end In less than '8 hours January March 2009 FOR OFFICIAL USE ONLY 29 b Conclusion CEXCI in conjunction with the BOD in Clarksburg West Virginia producu an average of 34 identification every month That's 34 potential threat to the U S and it Coalition part ∙ ners that were once anonymous bomb makers and insurgents who will not be able to enter in to the U S A sustained success rate like this is bound to draw favorable attention and imitation is supposed to be the ultimate form of flattery so it's reassuring to see the CEXC concept spreading In late 2007 DOD decided to copy the methods developed by NGIC and the CEXC Biometric labs In 2008 DOD began deploying additional labs within Iraq Theater of Operations for processing nonJED related mate rial These labs called Joint Expeditionary Forensic Facilities JEFFs are being deployed in the hopes that they will realize the same success enjoyed by the CEXC Biometrics laboratories in Iraq and Afghanistan Looking foiward the DOD Forensic Intelligence Program and the CEXC con cept are likely to become permanent expeditionary capabilities that can be deployed anywhere in the world on short notice ready to strip the mask of an onymity from future adversaries W Erik Berg is currently working for Harding Security Associates as a latent print examiner and is assigned to the NGIC His work has been featured on documentary television shows such as The New Detectives 60 Minutes and Forensic Files His expertise includes photography computer based imaging latent fingerprint identification and crime scene investigation He deployed to Iraq in September 2007 after 22 years in law enforcement to work in the Biometrics Laboratory at the CEXC∙I at Task Force Troy In December 2007 Erik was promoted to the lab's Director During February and March 2008 the BiometricsLab recovered2 344 latentprints of value from ED related material and a record rwmberofthose 104 during the same period EriJc can be contacted were identified at 434 951-4730 or via email at ebe security com 30 FOR OFFICIAL USE ONLY Military Intelligence Introduction With the beginning of Operations b 7 E Enduring Freedom 2001 and Iraqi Freedom 2003 the U S military faced a new kind of war Rather than wag ing conventional battles forceonforce American Soldiers found themselves fighting an insurgency Capitalizing on their anonymity the insurgents ef fectively engaged U S forces with im provised explosive devices IEDs and rapidly disappeared back into the crowd with little chance of being iden tified tiJ17XEJ I I 1 NGIC Forensic Initiatives In early 2004 recognizing this need to precisely identify and target the individuals responsible for attacks on U S troops the National Ground Intelligence Center NGIC pioneered a solution for the Department of Defense DOD deve loping a strategy which incorporated unique collection and forensics exploitation tec hniques January March 2009 FOR OFFICIAL USE ONLY 31 b 7 E NGIC also created the first weapons intelligence teams WITs to ensure that as much material of intelligence value as possible was being collected from the battlefield so that CEXC could forensically exploit the items for quick identification and targeting of the in surgent networks In order to train the WITs NGIC deployed DOD police offi cers with experience in detective work crime scene processing and SWAT op erations In December of 2004 the first of these hires deployed to Iraq to train the initial iteration of WIT This train ing focused on how to quickly assess a scene prioritize areas of interest doc ument through photography collect material of intelligence value collect known and post mortem prints and conduct latent print processing using proven law enforcement concepts that had been adapted to the battlefield environment b 7 E Although CEXC immediately saw an increase in collection as a result of the newly trained WITs the fledgling pro gram still posed several challenges that had to be overcome These issues re lated not just to forensic collection training but also to developing the crit ical infrastructure elements needed for efficiently transferring data and man power between CONUS and OCONUS wartime efforts in order to achieve suc cessful and realtime results However NGIC consistently adapted its program to meet these challenges and the WITs it has since trained in both Iraq and Afghanistan have proven instrumental in the fight against the hidden enemy O» t 1 As the commanders on the ground began to understand the value of de 7XEJ nying anonymity to the enemy they requested that more units outside of the WITs be trained on the concepts of battlefield forensics and biometrics NGIC rapidly addressed this need establishing another training program designed for door kickers to augment the WIT capability The building blocks for the training were already estab lished but the program needed to be tailored to address the specific obstacles faced by the warfighter 32 FOR OFFICIAL USE ONLY Military Intelligence Since 2005 NGIC has provided bat tlefield forensics training to over 1 200 service members resulting in the col lection of over 800 000 items These col lections have directly led to the recovery of tens of thousands of latent prints the identification of hundreds of insurgents on the battlefield and the capability to provide targeting support force protec tion and stronger homeland security Furthermore CEXC forensic cases pre sented in the Central Criminal Courts of Iraq have a record of 100 percent conviction Conclusion The success of NGIC's endeavor in battlefield forensics is indicative of the Center's ability to adapt quickly in the m face of a complex and constantly evolv ing threat NGIC maintains this edge by conducting weekly teleconferences with the CEXC forensic lab WITs and counterinsurgency units so that it can keep abreast of all material old and new collected on the battlefield This constant dialogue with theater together with NGIC's regular rotation of training per sonnel in and out of theater provides the necessary intelligence and technology to stay ahead of the en emy and ultimately save lives As the next step in its effort NGIC will conduct training at the Army combat training centers during Fiscal Year 2009 equipping over 1 000 deploying warfighters and 30 rotational brigade combat teams with the capability to collect forensically relevant material on the battlefield material which will subsequently be used to target the individuals that pose a threat to our troops Anonymity is one of the greatest weap ons of an insurgent and in denying this anonymity battlefield forensics and biometrics have the potential to radically shift the paradigm of today's wars Through its groundbreaking initiative NGIC has supplied the critical capability that the warftghter called for and the Center will continue to refine its program in the future to ensure that the needs of the Soldier on the ground are always met • Captain Ryan Campbell has been the Deputy Chief of Forensic Operations and Training at NGIC CharlDttesville West Virginia for a year During this time he has been involved in the trainingof over 500 war fighters and over 100 leaders in battlefield forensics the successful integration of training into the National Training Center and has worked to establish an effective plan to ensure all units requesting training are supported Previously he served as a battalion intelligenceoificer within the 3IBCT 1 oth Mountain Div U where he spent an extended tour in Afghanistan and as a rompany executiveoificer at Goodfellow AFB Texas January March 2009 FOR OFFICIAL USE ONLY 33 Introduction The Biometrics Task Force BTF executes the Secretary of the Army's Department of Defense DOD Biometric Executive Agent responsibilities by leading DOD activities to program coordinate inte grate and synchronize biometric technologies and capabilities while operating and maintaining the DOD's authoritative biometric database to support the National Security Strategy The BTF supports the Services and combatant commands by providing rapid responses to biometric submissions in sup port of force protection and the War on Terrorism Part of this support involves efficiently and effec tively searching biometric signatures developed_ by DOD agencies or organizations via forensic chemi cal or physical means Biometric signatures such as latent fingerprints are generally visualized through chemical means using forensic science digitized through image capture and formatted as biomet ric files These files are transmitted and searched through biometric systems to identify previously collected samples as well as registration for search ing against biometric samples collected and submit ted in the future FBI Integrated Automated Fingerprint Identification System IAFIS the primary biometric modality for onetomany searching is fingerprints The ABIS processes Electronic Biometric Transmission Specification standard tenfingerprint tenprint and latent print LP transactions against repos itories of previous tenprint submissions and un solved LPs The Next Generation ABIS NGA 1 0 scheduled for deployment on 30 January 2009 will include the additional biometric modalities of palm face and iris for storage and matching The results of biometric searches are often vet ted through the Intelligence Community IC for ac tion as match reports Because the LP process has a forensic beginning a biometric middle and an in telligence ending it is important for all three com munities to understand each component in order to maximize this process for the greater good The focus of this article is on the biometric center that allows for the rapid identification of previously un known threats Traditional LP Examination LPE Mission In 2004 DOD developed and deployed its Forensic science has traditionally supported the Automated Biometric Identification System ABIS legal prosecution of criminals in U S or military As a mirror of the Federal Bureau of Investigation's courts of law Federal state and local crime labora 34 FOR OFFICIAL USE ONLY Military Intelligence tories processed evidence while considering the end goal of sworn testimony Because of the strict na ture of the legal environment forensic science has naturally evolved under a very controlled and strin gent framework Traditional forensic practitioners are respectful of control and chain of custody of the evidence from the first crime scene responder through the entire process Although this mindset is ideal for the U S legal system it isn't a very efficient process There are many requirements of this process that are cum bersome in all but the most thorough applications Although some aspects such as chainofcustody forms can be easily adapted to the battlefield other processes cannot For example in general crime scene processing most items of evidence collected for further exploitation are completely documented prior to handling This generally involves photogra phy or video as the scene was preserved followup with assigning each item a unique numbered ev idence marker photography of the evidence with the marker from a distance from midrange and closeup and usually obtaining a final closeup photograph with a scale next to the item Another example involves the traditional forensic process of thorough sequential multidisciplinary processing of items Within the U S legal system there is often time for an item to proceed through the trace anal ysis section the DNA section the questioned docu ment section etc abling technology to defeat the asymmetrical warfare tactics of terrorists Because of the time and effort requirements to apply forensics in the traditional manner it had never been applied on the battlefield to defeat an enemy prior to 2004 The Armed Forces Institute of Pathology has used forensic science to identify the remains of fallen soldiers but true bat tlefield forensics was introduced as a new concept in concert with a push for more intelligence The main thought in taking certain facets of fo rensic science forward was simply that some addi tional capability was better than no capability at all Previously soldiers would simply leave or destroy items in place Some items like improvised explo sive devices IEDs were collected for other types of processing Expeditionary collection techniques were introduced to U S Marines and Special Forces who regularly encountered caches of items of in terest Instead of destroying the items they were taught to collect items that if they yielded LPs or DNA would provide actionable intelligence on that individual As with any intelligence it significantly degrades with time so the emphasis was on expedi tionary exploitation even if traditional forensic ide als such as thorough sequential processing were sacrificed This new approach has worked so well that two individuals per day remain in custody or are pros ecuted based in part on biometric identification Since 2004 nearly 2 000 LP identifications have The reasons for this strict adherence to process associated nearly 1 000 separate terrorists as hav and protocol are well founded in traditional case ing touched items of interest Over a dozen death law During court the prosecuting authority has to sentences have been handed down in the Iraqi le build an airtight case that doesn't even leave a rea gal system as a direct result of LP identifications sonable doubt in the mind of a juror deciding on on items of interest Numerous highvalue individ guilt or innocence Each case fact could introduce uals whose LPs appear on multiple items of interest such doubt so every case fact must be solid There have been successfully targeted as a result of in telligence that would never have been obtained if it can be no room for example for a defense attor ney to claim that a piece of evidence was planted at weren't for this new application of forensic science the scene or that a fingerprint was lifted from some on the battlefield thing other than what it was labeled as being lifted Although the goal of beyond a reasonable doubt is Continuous ABIS Operations Even with forensic processing forward an en necessary for legal proceedings a lesser standard for certain aspects of the process may be acceptable terprise biometric system is necessary in order to search the biometric impressions developed on the for some military and intelligence applications battlefield It doesn't do much good to have a per fect human signature if you can't search it through A New LPE Mission In the U S Central Command theater of opera a file to make a positive identification In 2004 the tions it has become necessary to explore every en Biometrics Fusion Center part of what became the January March 2009 FOR OFFICIAL USE ONLY 35 BTF developed and deployed the fingerprint seg ment of the ABIS An ABIS differs from commonly recognized AFI systems in that it includes other bi ometric search algorithms such as face iris palm prints etc ABIS Operations maintains a 24 7 year round support effort for DOD operations in multiple areas of operation The branch is staffed with highly qua ified and certified tenprint and LP examiners who provide feedback to submitting partners quickly and efficiently ABIS Operations is also system and file type agnostic» Although the BTF recognizes the value of biometric standards and in fact leads the DOD community in refining them it also rec ognizes that in a time of war we cannot restrict incoming data not meeting a predetermined stan dard As an example the FBI requires its custom ers to submit a complete tenprint record that has a minimum resolution 500 pixels per inch ppi The ABIS Biometric Examination Services Branch BESB has accepted files and obtained positive re sults from submissions with as few as one finger print image and at resolutions as low as 200 ppi metric system In other words the ABIS is a tool to find a match but it still takes the forensic examiner to testify to it Biometric images are assessed by qualified LP ex aminers at the BTF formatted encoded and searched against the ABIS as well as the FBI's IAFIS A list of possible candidates is returned for the examiners to review For the ABIS system that list consists of 10 candidates For IAFIS the list could be as high as 80 but averages 68 candidates per print The rea son for this is that the ABIS database is about one thirtieth the size of the IAFIS database To improve the accuracy of searching against the larger IAFIS database the penetration of each file is limited to 30 percent of the database With some rare pattern types or known finger positions this may only re quire one search that produces 20 candidates but for some LPs without pattern information up to four searches are required with each response re turning 20 candidates LP Case Prioritization and Processing LP cases are submitted to the BTF with a prior itization This prioritization is determined by the While the ABIS is designed to be a lights out submitting labs and is based on in part the cir no human intervention system when it comes to cumstances surrounding the event from which the searching tenprint enrollments against the exist evidence was recovered For example LPs developed ing tenprint database there are many lower quality on evidence recovered from an IED event that led ten print files that can't automatically be determined to the injury or death of a Coalition Soldier would as an identification or nonidentification These are be given the highest priority while those from some knO vn as yellow resolves and require a human ex documents found at an abandoned cache would aminer to make the final determination Currently get a much lower priority The prioritization is color approximately 12 percent of all enrollments have to coded red is the highest yellow is moderately high be reviewed by a human examiner NGA will reduce and green or white are the least sensitive for time that number to about 3 percent when it is fully op liness in response When a red case comes into the erational due to muitimodal fusion logic within the BESB section all work on other cases is stopped and system which combines the scores of different mo full attention is devoted to the red case Turnaround dality searches ABIS averages about 20 000 bio time for a red case is measured in hours while yel metric enrollments per week with a high of more low cases can take a day or two and green cases can than 32 000 and roughly 2 000 images per month take up to two weeks Currently the turnaround from our continental U S CONUS and outside the time on first looks for all casework is less than continental U S OCONUS partners for formatting seven days encoding and searching in the ABIS These biomet ric images of LPs are not considered forensic evi Within each case other taskbased prioritiza dence that would be the actual developed print tion is practiced The highest priority is activity that because ABIS is considered a tool for making a pos leads up to ABIS LP candidate comparison The for itive association f the identification is to be used matting task involves opening each LP in Adobe for court purposes the examiner who developed the Photoshop and conducting a series of image pro LP 'ill prepare a courtroom package to demonstrate cessing steps to transform the camera image into the identification outside the auspices of the bio a standard resolution and standard image type re 36 FOR OFFICIAL USE ONLY Military Intelligence quired by ABIS Each LP is different and often fac tors such as background surface will cause unique distortion that must be manually corrected for ac curate searching Examiners almost always con duct image enhancement to increase the contrast between the ridges and the furrows during the for matting process The next task at the same priority is to encode the formatted LP in software that allows the exam iner to place markers over the unique ridge end ings and bifurcations minutia that the system uses to search the database The minutia template is used by search algorithms along with other in formation to sift through millions of other biomet ric templates and rank them in order of likelihood of a match Once the top ten candidate list is returned from ABIS the next priority is the first look from an examiner and verification of a match if necessary Beyond that the BTF operates under a lower prior itization of followup task work which includes the following 1 2 3 4 5 viously unidentified individuals 6 IAFIS Second Looks This task is just like ABIS second looks but applied to the IAFIS responses to achieve a 7 percent accuracy increase in this task 7 Manual Second Looks This is a second look at manual comparisons that would follow Manual First Looks to achieve higher accuracy When an LP is run against the ABIS and IAFIS da tabases without identification the image is stored in the unsolved latent file ULF As new tenprint en rollments are collected and submitted to ABIS they are automatically searched against the ULF and scores above a certain threshold are presented to examiners for review This is important because in dividuals involved in actions against Coalition forces leave LP evidence on material collected at the scene even before they have been detained or othenvise enrolled Biometrics are not always in the system for comparison when the LPs are encoded and submit ted so an initial run against a database that does IAFIS Top Checks When an LP candidate from not contain the subject's biometrics will not result a search against the IAFIS system is above acer in an identification The reverse or after the fact tain score threshold it alerts the BESB to check search can result in an identification of a newly de the results tained individual to the item from an event that oc File Reencoding A second examiner will re curred on an earlier date Unsolved latent matches encode LPs for resubmission against the sys ULMs still occur today on LPs entered in 2004 tem in order to achieve a higher accuracy These ULMs occur about 25 percent of the time that rate than just one examiner encoding the an identification occurs The subject's biometrics print Reencoding LPs has been shown to yield have already been obtained 50 percent of the time about 10 percent more identifications than single and a direct LP search produces the match The remaining 25 percent of all identifications are made encodings as a result of manual comparisons The current size ABIS Second Looks A second examiner will re ULF is approaching 50 000 images As the of the view the response lists that have already been known database and the ULF continue to grow the looked at during the first look process in or der to achieve a higher accuracy rate than just likelihood of identifications against any single file one examiner comparing the candidates Second also increases Furthermore through data sharing ABIS examinations have been shown to yield ap agreements with the Departments of Justice and proximately 7 percent more identifications than Homeland Security and in the near future with the National Counter Terrorism Center and the Terrorist single examinations of response files Screening Center this database of critical LPs will IAFIS First Looks An examiner will reviev ' the continue to be used to secure our national borders remainder of IAFIS responses by stripping away the anonymity that terrorists so Manual First Looks An examiner will compare desperately strive to maintain additional unsolved LPs in the case with all of the fingerprints of a known offender in that case ABIS Metrics In November 2004 a case with several LPs arrived This occurs when some but not all of the LPs hit in ABIS Generally making additional iden at the ABIS Operations center in Clarksburg West tifications to the same individual is considered a Virginia for searching This case resulted in the lower priority task than making new hits to pre first LP identification against the DOD ABIS in the January March 2009 FOR OFFICIAL USE ONLY 37 ment of biometric technologies to enable forensics First the BTF synchronizes biometric technologies and capabilities that interface with forensic tech nologies and capabilities across DOD Second it in terfaces with government industry and academia to develop and exploit the forensic biometric cross over technology base for future DOD capabilities Finally the BTF supports the coordination of efforts The average LP case is a project in itself Although between the biometric and forensic S T communi cases vary in the number of images recewed the ties The Futures Branch and C T Branch work to average is about 5 LPs per case Each LP search gether to assist the BTF in accomplishing the above returns 10 candidates from ABIS and an average objectives in support of forensics S T of 68 candidates from IAFIS yielding 780 separate In addition to coordinating biometrics S T efforts comparisons per case for full adjudication count ing verification by a second examiner To adhere the BTF is supporting two projects that directly im to reasonable turnaround times subtasks are pri pact the forensics mission The first project is to de oritized to obtain the highest probability of success velop a Latent Fly Kit Capability for the BTF The goal as early in the process as possible In one case an of this project is to produce a field kit that will al IED event occurred in theater items were delivered low latent print examiners to quickly respond to an to the OCONUS laboratory LPs were developed event e g natural disaster capture LPs and sub captured and transmitted to the BTF searched mit them to ABIS for matching The second project through ABIS identified to a subject who had been is to develop a rugged portable LP workstation The previously detained and a report was provided back goal of this project is to develop a prototype device to theater within just four hours in total Generally to digitally capture latent fingerprints in a tactical this process takes days or weeks due to more realis environment Together these projects demonstrate tic delays between steps in this multiorganizational how the BTF is helping to advance biometric tech process But the facts speak for themselvesthe nologies to support the forensics mission ABIS Operations center supports this joint process TNT Partnerships to meet the goal for ontime prioritized matching Since 2005 the BTF has partnered vith the Naval processes in support of force protection and na Postgraduate School and the U S Special Operations tional security Command in hosting Tactical Network Topology BTF S T Coordination and C T TNT experiments TNT provides a research venue Evaluation Integration of New to support the nearterm needs of the warfighter by Technologies evaluating and improving biometric capabilities and Within the BTF the Strategy Division is responsi communication architectures used to collect store ble for establishing the strategic direction for DOD and transmit biometric data Experiments and con Biometrics activities and enabling the employment cepts conducted in the TNT emphasize wireless net of biometric capabilities The Strategy Division in works unmanned autonomous vehicles sensor cludes two branches the Futures Branch and the networks situational awareness netcentric appli Concepts and Technology C T Branch that work cations target tracking and identification and bi together with the biometrics and forensics commu ometric identification and verification Measures nities to develop and provide future biometric ca of performance for each technology are collected by pabilities that support the forensic mission The Special Operations Forces operators and engineers Futures Branch coordinates the biometrics Science technicians Requirements gaps and technical short and Technology S T efforts across DOD while the falls are then addressed and improvements are made C T Branch facilitates the movement of those tech for the next quarterly experiment nologies into prototype or developmental efforts for The BTF uses the TNT environment to evaluate transition to the enterprise current and emerging forensic and biometric tech War on Terrorism Although only a limited number of cases would be submitted during the remainder of 2004 this small inauspicious start would soon give way to a massive influx of biometric LP im ages for searching In total there have been nearly 10 000 cases containing nearly 50 000 LP images processed by the BTF since 2004 The BTF plays an important role in forensics S T nologies in a simulated operational environment by pursuing three primary objectives in the advance The BTF's C T Branch considers validated require 38 FOR OFFICIAL USE ONLY Military Intelligence ments and biometric capability gaps gathers exper imental biometric and supporting technologies and weaves these technologies into operational events and scenarios with detailed objectives The BTF as sists experimentation partners including various branches of the military the combatant commands industry and national laboratories to conduct exper iments Actual assessments of the experiments are conducted by assessors such as the West Virginia Army National Guard's NG 19th Group Special Forces Special Operations Research and Support Element and the Joint lnteragency Training and Education Center JITEC BTF experimentation in forensics has been a part of TNT for several quarters Most of the forensic tech nologies center on alternate ways as well as more time efficient means to capture LPs Technologies have shown ways to dust lift and digitally convert LPs thus reducing time spent on a specific target Other participating technologies have shown alter nate ways to capture LPs from surfaces without us ing lift tape Although biometric experimentation in TNT is rel atively new it has grown to a point that necessitates expansion into Camp Dawson in Kingwood West Virginia and the Center for National Response CNR in southern West Virginia Camp Dawson provides a realistic training landscape that affords partici pants the opportunity to meet certain challenges of their wartime missions The facility is also used by the West Virginia Army NG the Army NGs of other states Army Reserve Reserve Officers' Training Corps and other Active and Reserve components of the Air Force Navy and Marine Corps CNR is an operational component of the JITEC which is an NG training activity operated by the Chief NG Bureau and the Adjutant General of West Virginia It is a flexible Weapons of Mass Destruction train ing complex that provides multiscenario exercises for the military or joint operations with military and first responders U S Armed Forces In that context the continued objective is to rapidly test quality biometric technol ogies that satisfy user needs with measurable im provements to mission capability In Section 112 of the Emergency Supplement Act 2000 Public Law No 106246 the Department of the Army was desig nated as DOD's Executive Agent for developing and implementing biometric technologies Accordingly on 27 December 2000 Deputy Secretary of Defense Rudy de Leon signed a memorandum ti tled Executive Agent Appointment In this mem orandum Mr de Leon directed the Secretary of the Army to establish a Biometrics Fusion Center to acquire test evaluate and integrate biometrics and to develop and implement storage methods for bio metrics templates As such the Biometrics Fusion Center's now part of the BTF testing capability was created Since 2001 the TASC Branch has em ployed rigid testing plans and principles to ensure that the collection enrollment matching storage updating and sharing of biometric technologies is accomplished in a secure timely accurate usable and reliable manner The mission of the TASC laboratory is to plan conduct and report the results of events tests simulations experiments and evaluations of biometricenabled technologies to decision makers so they can ensure that our warfighters have the right biometric capabilities for success across the entire range of military operations To accomplish this TASC engineers apply basic test principles to discover demonstrate and evaluate biometric ideas concepts technologies or products across the DOD Biometrics Enterprise DOD Directive 8521 0lE DOD Biometrics de fines the testing scope for the BTF and establishes conduct for biometric test activities Conformance to approved biometric standards is paramount to the technology acquisition process In addition to knowing the extent to which a technology is able to collect transmit store retrieve manipulate match if required and display biometric and personal data the BTF must also know that the technology BTF Test and Standards Conformance will meet critical issues of mission performance us The Test and Standards Conformance TASC ability information assurance and supportability Branch exists to plan conduct and report the re Such assurances are provided as a result of the test sults of events tests simulations experiments and evaluation functions and evaluations of the nation's investments in The TASC Branch evaluates technologies through biometricenabled information technologies pro conformance evaluations scenario evaluations grams and products necessary to support the January March 2009 FOR OFFICIAL USE ONLY 39 and informal tests evaluations or assessments Examples of biometric testing done in the past include Conducting biometric standards conformance testing for all products programs and services Providing support to DOD acquisition organi zations in developmental testing systems in tegration and or independent verification and validation of biometric systems Maintaining awareness of the biometric market place and evaluating commercial go 'ernment offtheshelf products useful to federal govern ment agencies Supporting DOD operational test agencies for the conduct of formal developmental and op erational test and evaluation activities that de termine system effectiveness survivability and suitability for maximum efficiency In 2004 Excel' spreadsheets and manual file systems were sufficient for the vol ume of casework but the BTF is in the process of planning and implementing automated case man agement systems and central server job queues for comparisons Although the transition period is on going the BTF remains able to perform the highest priority task work in support of theater operations The lower priority task work such as IAFIS ex aminations and 2°c1 level examinations continues to become backlogged New strategies are currently being explored such as standing up a remote ex amination services capability training and involv ing Wounded Warriors or their caregivers and even involving examiners from other departments in the comparison task work Although the cur rent comparison backlog is approaching 10 million separate comparisons these programs along with an aggressive staffing strategy are anticipated to Having evaluated more than 300 biometric tech bring the backlog under control within the next few nologies over the past eight years TASC engineers years have a vast understanding of the capabilities and Finally the challenge of forensic training and limitations of biometric systems and devices de ployed to support the War on Terrorism Today the awareness will be an everlooming battle in these T ASC Branch is seeing more handheld collection early years of new battlefield forensic capability devices preparing to provide a forward latent collec There seems to be constant bombardment of tradi tion and matching capability as well as more local tional forensic ideals working against the new ex biometric matching systems with latent print capa peditionary battlefield forensic model Commanders bilities These systems will soon provide warfighters at all levels need to understand what battlefield fo with a forward capability to collect store match and rensics was intended to provide and how the very share latent fingerprint images and information with process to achieve those results may require fall enterprise systems according to DOD standards ing short of some institutional laboratory forensic procedures and processes They also need to un BTF Challenges derstand how those forensically developed biomet Although the BTF is maintaining a superior posi ric signatures can be transmitted to the enterprise tion with regard to identity dominance there are still biometric capability for maximum value back to challenges to overcome Limited bandwidth from the theater Training our troops how to preserve and aters of operation to the enterprise ABIS system con collect items of interest and conduct some lim tinues to plague response times back to the soldier ited exploitation of immovable items is a relatively Forensic laboratories in remote locations have to use straightforward exercise that just requires the right satellite technology to transmit very large digital case sponsorship staffing and execution Obtaining the files for processing Generally it is more cost effec doctrine and policy to support this new type of train tive to conduct all biometric activity within CONUS ing is the current challenge For this reason most of the raw unprocessed cam BTF Future era images of the biometric are provided to the BTF There are some great future capabilities in store as for formatting Although this is necessary for accu the BTF continues to support the warfighter through rate processing these images can sometimes reach maintenance and operation of the enterprise bio 20 or 30 megabytes each and some cases literally metric capability The upgrade to the NGA will allow have hundreds of images of LP biometrics more efficient matching of forensically developed bi The vorkftow within the BTF is being reengineered ometric signatures As we continue to identify pro 40 FOR OFFICIAL USE ONLY Military Intelligence cess bottlenecks the root causes will be identified and corrective action will be undertaken to solve the actual issues In fact the BTF has formed a Tiger Team for the Enhanced Capture and Detention of Terrorists to troubleshoot some of the nonstandard forensic and biometric issues that contribute to the wrongful employment of foreign nationals or wrong ful release of detainees ometric technologies and capabilities and operate the DOD's authoritative biometric databases to support the National Security Strategy The BTF recognizes that forensic science is a major con tributor of biometric signatures and serves as an enabler to the BTF in support of our critical mis sion Through productive collaboration and coordi nation the DOD forensic community and the BTF will continue to provide a valuable service to our The BTF is forging new ground in research on placing LPs on watch lists For good quality prints men and women in uniform and to the agencies and organizations that protect our homeland from there is demonstrated value in lightsout search foreign and domestic terrorism ing as long as followup human examination is employed for potential matches Look for clearer de lineation between automated face recognition and true face identification by trained personnel for ab Kasey Wertheim is President and CEO of his own rompany solute matching There is a big difference between Complete Consultants Worldwide LLC supporting the DOD the standards for face recognition systems versus BTF by managing science and techrwlogy projects related to the image quality standards necessary for positive forensic science He provides subject matter expertise to the identification by a biometric examiner of the unique DOD and is actively involved in the biometric and forensic rommunities He spent seven years as a forensic scientist face characteristics such as moles freckles small and crime scene analyst prior to becoming heavily involved scars unique texture etc in forensic technology currently he serves as Chairperson Conclusion As the BTF looks toward the future our mission is at the forefront to lead DOD activities to pro gram coordinate integrate and synchronize bi for the Biometric Committee of the International Association for Identification IAI and is an IAl Certified Latent Print Examiner Distinguished Member and Editorial Board Member He rompleted a short tour of duty in Iraq and Afghanistan as part of an IC laboratory improvement effort and spent one year on rontract with NGIC FORENS IC FOCUS January March 2009 FOR OFFICIAL USE ONLY 41 The views expressed in this article are those of the author and do not reflect the official policy or position of the Defense Intelligence Agency the Department of Defense or the U S Government Introduction On Febrnary 6 2008 a U S Military spokesman for the MultiNational ForcesIraq revealed a series of vid eos from captured alQa'ida Network AQN media The videos depicted children training to detain kidnap and kill innocent Iraqi civilians U S officials said the video was being released to illustrate alQa'ida's in creasing willingness to use women and children to carry out its objectives ni The disclosure was covered by all of the major news outlets CNN AlJazeera the New York Times and many others News releases like these are having an effect on alQa'ida's ability to recrnit This is one of the powerful ways that captured documents and media are affecting the battlefield today Stills taken from captured al Qa'ida video Making sense of the ∙ papers and media captured in the War on Terrorism is the domain of Document and Media Exploitation DOMEX MEDEX Intelligence Community Directive 302 defines DOMEX as the processing translation analysis and dissemination of collected hard copy documents and electronic me dia which are under the U S Government's physical control and are not publicly available The implica tion of this definition is that these captured documents and media are not open source documents pulled from newspapers or the Internet 42 FOR OFFICIAL USE ONLY Military Intelligence Paper or Plastic Paper documents and electronic digital E media require different processes to extract intelligence Unlike documents electronic media isn't immediately consumable It isn't possible to pick up elec tronic or digital material and read it The extraction of documents audio video and photographs requires a methodical approach to get the most from the material with the least amount of resource expenditure The exploitation of computer based media is the purview of MEDEX a subset of DOMEX MEDEX relies heavily on the science of computer forensics to extract this information Computer Forensics To understand where and how the discipline and the science of computer forensics developed one only has to look in a dictionary There are two definitions for forensics one has to do with debating and the other describes the application of a science to a legal or law enforcement problem To put it another way computer forensics has developed into the science of collecting and analyzing digital data in order to pres ent it in court as evidence Typically computer forensics is performed by a law enforcement agency or lab such as the Defense Computer Forensics Lab to prove or disprove an allegation of a violation of the law Most of the time these violations are traditional offenses such as fraud sexual assault etc ME DEX MEDEX applies computer forensic tools to the DOMEX space at least on the electronic digital media and provides the intelligence function with information about the formation organization personnel opera tion funding logistics command structure intentions as well as other valuable information The process modifies the computer forensics model to meet the needs of the combatant commander mostly to increase the speed of obtaining of the information As speed is of the essence so some of the aspects of the rigor ous law enforcement approach are dropped or modified to increase the speed The two best examples of digital information in the public domain are hosted at the U S Military Academy Counter Terrorism Center CTC The CTC takes documents released from the War on Terrorism holdings performs unclassified analysis and releases the results to the public Two good examples are Cracks in January March 2009 FOR OFFICIAL USE ONLY 43 the Foundation Leadership Schisms in alQa'ida 19892006 First Look at the Sinjar Records 103 and •AlQa'ida's Foreign Fighters in Iraq A The former reviews a number of letters between members of the alQa'ida leadership revealing their weaknesses This includes letters like the one from Zawahiri to Zarqawi 5 telling Zarqawi to avoid using violence against the Iraqi civilian population or risk alienating it It is a more strategic set of documents whereas the latter is both strategic and tactical •Bombers Bank Accounts and Bleedout AlQa'ida's Road In and Out of Iraq• is an analysis of a collec tion of records released to the public through the CTC The records contain biographical information on around 600 foreign fighters that are believed to have entered Iraq from Syria The Sinjar Records include a biographical description of each person and in many cases photographs The tactical importance is ob vious one can look for these individuals in detention and can check any new detainees against this list An additional benefit is that every nation now has access to this information so it is unlikely that the 600 named in the records will be able to board an aircraft for the U S or Europe any time soon Some of them are from Europe if they ever get home they will not have a warm reception The CTC also had access to other bureaucratic information from this collection here is its synopsis of the Sinjar Organization •The Sinjar documents provide a striking insider's view of the management challenges facing alQa'ida in Iraq's Islamic State of Iraq SI The documents reveal leaders struggling to balance the control required to achieve their political goals against the security required to suroive The IS like any terrorist organization faces a difficult task in a hostile operational setting First it must con trol the use of violence as a means to achieve their specified political ends As the organization it self has acknowledged many times too much violence or inappropriate fundraising efforts can damage the cause as much as doing too little Second the IS must sustain itself with limited funds placing a premium on financial efficiency and oversight Third the SI must maintain this calibrated use of force in an environment where becoming known to Iraqi or American government forces leads to oper ational failure tl J tWJ I These three tasks place conflicting demands on the SI The more the organization exercises control over its operativesby using organizational tools such as tracking spreadsheets expense reports and standardized policy memorandathe less secure it becomes Exercising control in this manner requires • additional communications that can be intercepted and creates direct links between senior leaders and operators who are more likely to be identified and captured by government forces Moreover because these documents often include names and provide evidence about operational practices they make I 7 EJ ideal raw material for intelligence organizations seeking to target the SI The SI thus faces the same tradeoffs between security and control that have troubled terrorist organizations from the 1890s to the present The Sinjar documents provide further insight into how alQa'ida's SI is challenged by these tradeoffs ' 7 FOR OFFICIAL USE ONLY Military Intelligence The CTC report is an enlightening read and starts to crack open the door on what information can be gained with DOMEX What Can You Lose While the CTC report exemplifies the successful application of a computer forensic approach all too often it is not usedand at a high cost as the Colombian government experienced recently The politicallysensitive raid on a Revolutionary Armed Forces of Colombia FARC outpost in Ecuador uncovered a laptop full of documents incriminating President Chavez ofVenezuela 8 Unfamiliar with computer forensics Colombian government officials turned the laptop on and began reading files changing access times As a result the credibility of the information was significantly damaged The article Chavez Interpol Report a 'Clown Show' 9 demonstrates the damage of not following good forensic practices 6 7 E An Approach Many operators intelligence personnel want to excise the law enforcement centric requirements of computer forensic procedures The exploitation process must be fast but it can't be at the expense of the successful prosecution of the captured terrorists detainee war criminal Over the last few years almost all of the important material has ended up in a court system U S Guantanamo the World Court Iraqi court systems etc Often the important information is not identified until the media is reviewed and at times this process can take several months 6 E When fighting insurgents one approach is to work like the police The police have been fighting orga nized crime for a long time and have had to seek out the bad guys moving amongst the people as a fish swims in the sea to put it in the words of Mao TseTung Computer forensics is a crime fighting tool de veloped by the police that military commanders can use to reduce collateral damage Using computer forensics on the battlefield however presents many challenges A firm legal frame work does not exist there are no elements of proof and the MEDEX techni ian examiner generally does not speak the language of the material in question so linguists and intelligence analysts often have to inter pret the results 6 7KEJ Absent from this list above is a warrant and in all likelihood elements of proof however there may be a detainee that is suspected of some kind of insurgent activity The MEDEX team needs the context infor mation to do the same kind of focused search that is performed by a forensic examiner in the law enforce ment realm Without the context it is really difficult to identify things of interest The chain of custody information is required to return the property back to the owners if they are re leased or to present as evidence at trial In many cases insurgents captured on the battlefield will face some sort of trial A trial implies evidence which necessitates the production of a chain of custody for any January March 2009 FOR OFFICIAL USE ONLY 45 evidence presented to the court Do no harm falls right in line with returning the individual's property If an operator turns on an detainee's computer and begins to review the files the data will be poised for court It is best to work from a copy In fact having that perfect copy in more than one place allows par allel exploitation The chain of custody information can also be used to provide context it is essential to maintain the link of how something was acquired to the media images so that they maintain their intelli gence value Without context the data derived from a piece of media is of less value In a perfect world copies of all captured media would be reviewed at a tactical theater and National levels At each level one would want to sift for different kinds of information 7J E Also the span of time that a copy of the data is of interest expands as it moves up the levels At the National level all data should be available for as long as the conflict is active The importance of it changes and older information has to be revisited from time to time emphasizing the necessity of a com plete perfect copy for intelligence reasons What is insignificant now may be relevant within a month or even a year 6 7J E Conclusion Applying computer forensics to the battlefield can provide the commander with an information source that has rarely been available in the past This is particularly important in asymmetrical warfare The critical information for operators and intelligence personnel to know is that many of the law enforcement procedures that take time add value and can make a big difference in the outcome of a campaignor even a war • Endnotes 1 AlQaeda Video Shows Boys Training to Kill Kidnap USA Today 26 Feb 2008 at http www usatoday com news world iraq 2008 0205campsusat_N htm Accessed 23 October 2008 2 Chavez Interpol Report a 'Clown Show' CNN 15 May 2008 at http edition cnn com 2008 WORLD americas 05 computers index html 15 colombia 3 Cracks in the Foundation Leadership Schisms in alQa'ida 19892006 USMA CTC September 2007 at http www ctc usma edu aq aq3 asp Accessed 6 May 2008 4 AlQa'ida's Foreign Fighters in Iraq A First Look at the Sinjar Records USMA CTC at http www c tc usma edu harmony pdf CTCForeignFighter 19 Dec07 pdf Accessed 6 May 2008 5 Letter from Zawahiri to Zaraqawi Office of the Director of National Intelligence at http www dni gov press_releases 20051011_ release htm 6 Bombers Bank Accounts and Bleedout AlQa'ida's Road In and Out of Iraq USMA CTC at http www ctc usma edu harmony pdf Sinjar_2_July_23 pdf Accessed 25 Oct 2008 7 Ibid 8 Seized Laptop Shows Chavez's Rebel Ties ABC News 5 March 2008 at http www abcnews go com International wireStory id 4390879 Accessed 29 May 2008 9 Chavez Interpol Report a 'Clown Show ' CNN 15 May 2008 at http edition cnn com 2008 WORLD computers index html americas 05 15 colombia Employed by the Defense Cyber Crime Center David Ferguson is Chief Scientist at the National Media Exploitation Center where he works with the Defense Intelligence Agency and the Office of the Director of National Intelligence Assistant Deputy Director for National Intelligence for Open Source He gained his experience in DOMEX as the former Director of the Defense Computer Forensics Laboratory Mr Ferguson may be reached at David Ferguson@dia mil 46 FOR OFFICIAL USE ONLY Military Intelligence Introduction duct a nondestructive examination of a crown and thus prove that it was a counterfeit Principles from The asymmetrical nature of recent enemy terror ism related tactics has caused the Department of the modern field of medical examination were pub Defense DOD to closely examine every tool in its lished in 1248 as a Chinese judge recounted how arsenal to stay ahead in the War on Terrorism insects were used in a death investigation and how Within the DOD the intelligence forensic and bio manner of death could be determined through sys metric communities have existed in support of dif tematic examination of physiological evidence In ferent missions for quite some time Although the 1862 an Army general brought forensic science to roots of each community can be traced back over a the Army through the establishment of the Army century to very different beginnings the battlefield Medical Museum for the collection of anatomy sam of the last decade has witnessed the very real con ples just three years later hosting the autopsy of Abraham Lincoln Through many changes in name vergence of these three distinct communities scope and mission these forensic roots of the DOD Historical Aspects are known today as the Armed Forces Institute The most familiar community to this reader of Pathology DNA Identification Laboratory and ship was sparked in 1885 when an Army general Medical Examination offices was unable to answer an inquiry from President Considered the most mature of the biometrics Cleveland for a relatively routine piece of informa the use of fingerprints also has a rather hazy origin tion The Military Information Division of the Army Most texts cite the use of finger impressions as a grew exponentially throughout the remainder of the means to prevent forgery thousands of years ago by 19th century leading up to its prominent role of in the Assyrians and Babylonians but there is much telligence gathering in the SpanishAmerican War debate about whether their value for personal iden and in every war in the 20th century tification was recognized at the time By the 14th The broad scope of the forensic community makes it difficult to pin down its beginning Even as early as 287 B C legend tells of the Greek scientist Archimedes using the true density of gold to con January March 2009 century there is documented evidence that Chinese merchants were using the footprints of newborns in ink and conducting comparisons of the impressions in order to positively establish identity Systematic FOR OFFICIAL USE ONLY 47 multimodal biometric identification was pioneered by the Frenchman Alphonse Bertillon in the late 1800s as he established the uniqueness of differ ent body measurements and combined them with photographs and fingerprints in the early 1900s to establish identity portfolios Fingerprints have been used throughout the U S for criminal identification in the 20'h century Within the DOD the most prom inent use has occurred in the U S Army Criminal Investigation Laboratory established in 1943 Unique Aspects of Each Community Given their separate and distinct histories as well as the evolution of their missions over time each of these communities naturally has facets that are separate from the others The forensic science community is very concerned with traditional legal application of its products Stringent aspects of scene preservation evidence packaging and storage documentation of items and actions as well as knowledge of relevant case law are important within each forensic discipline Strict adherence to sequential discipline process ing as well as sequential chemical and physical pro cessing within each discipline are paramount to achieve the ideals of thoroughness required by the legal system Often one type of forensic examina tion may reveal the necessity for another requiring additional laboratory time to not destroy potentially useful evidence The principle in forensic science of thoroughness at all costs including time is diamet rically opposed to the principle in the Intelligence Community IC that the value of information de creases exponentially over time It is far better to have 80 percent of the intelligence now than 99 per cent of the information too late Furthermore the IC is interested only in the facts not necessarily in knowing the exact chemical processes and underly ing theories used to determine those facts There are also many of the forensic disciplines that have no bearing whatsoever on biometrics Generally identifying biological or physical signa tures of a person are considered biometric while identifying signatures of an item are considered fo rensic The biometric community is not interested in the impression evidence left by a gun barrel on a bullet a tire in mud or a prybar on metal These aspects of forensic science are important but they have no relevance to the biometric identification of an individual Even if someone is captured wear 48 ing the exact shoe that left an impression at a loca tion of interest it cannot be automatically inferred that he she was the wearer of the shoe at the time the incident occurred For these and other reasons there will always be aspects of forensic science tha are separate from the field of biometrics Likewise there will always be aspects of intelli gence that are separate from biometrics and foren sics Neither of the latter communities is concerned with techniques for eliciting information from sources or even with the use of their products for predictive analysis or calculating the probability of the occurrence of future events Intelligence an alysts are concerned with the sowhat behind a biometric match or a forensic finding but the objec tive nature of biometric matching and forensic iden tification prevents these communities from being concerned with how their products identifications are used Other facets of intelligence that are of no obvious concern to the biometric or forensic com munities include espionage reconnaissance inter rogation targeting cryptanalysis etc The biometric community is interested in the use of physical biological or behavioral characteristics of an individual to effect personal identification In many cases this interest centers on types of char acteristics or uses of those characteristics that are not relevant to the forensic community or the IC For example neither of the latter communities would be interested in volumetric measurements of the chest cavity over time or the uniqueness of human cardio electrical patterns Nor would they be interested in some of the business functions facilitated by bio metrics such as physical access control smartcard identity verification or methods to obtain biometric population statistics The IC might be interested in the information behind such endeavors such as ac cess logs that show when and where a particular in dividual attempted to gain access to a facility but the actualization of the business processes neces sary to support those functions are squarely cen tered in the biometrics arena Convergence Although there are many areas that are exclusive to each community other areas of these communi ties have begun to come together over the course of the last decade Prior to 2001 there was no large scale biometric collection within the DOD other than to conduct fingerprint checks against the FBI's FOR OFFICIAL USE ONLY Military Intelligence Criminal Master File for military applicant screen ing purposes The collection of biometrics from ad v rsaries and items of interest from sites to identify fnend from foe progressed from a very specialized and smallscale intelligence activity to a largescale joint Service function on the battlefield There are elements of all three communities present in this new model of asymmetrical warfare It was the IC that first recognized and deployed the Biometrics Automated Toolseta classified sys tem capability to obtain multimodal biometrics of face finger and iris from a red force population in order to maintain a biometric identity dossier that is searchable independently for name or context even though numerous contextual fields link back to the dossier This foray of the IC into the biometrics arena represented the first largescale convergence of these two communities within the DOD Other more recent convergence includes DNA collection matching and reporting new requirements for effi ciency of biometric collection timelines the use of biometrics for target verification biometric search ing of covert face images against largerscale repos itories and other classified tactics techniques and procedures The need for rapid intelligence has also forced to gether the communities of biometrics and forensics Traditionally forensic scientists have been the ini tiators of biometric system searches of the prod ucts of forensic analysis However as the IC has driven many of the collection capabilities in theater it has been the biometrics and IC together that have answered the call for completion of realtime bio metric system searches Unlike the slowgrinding wheels of the U S legal system the IC does not en joy a builtin window of time measured in months or years for completion of biometric examina tion services Terms such as •matchonobjective Ruggedi zed miniature DNA extraction or •tactical latent matching ' have never before been uttered in the forensic community The rapid OCONUS appli cation of chemical and physical techniques to items of interest and the rapid processing of the result ing biometric information has required transforma tion of traditional ideals Even after the convergence and coalescence of these communities it will still be recognized that the requirements of the IC have re shaped the way forensic science enables biometric searching within the DOD January March 2009 What has resulted from the convergence of these co unities is an expeditionary capability that rapidly uses forensic principles to develop and con duct biometric searches through the robust DOD biometrics infrastructure to generate realtime in telligence for the War on Terrorism Throughout the process certain principles from each community are used to achieve the end goalsupport for our warfighters force protection and in some cases na tional security TriFaceted Warfighter Support 0 T lri na' t t M•'9 ' Overlapping Aspects of the Communities The crystallization of the biometrics and foren sics communities has been occurring at high lev els within the DOD to establish a more formalized departmentwide structure leading to more coordi nated joint DOD capabilities As these communi ties coalesce and definitions and tasks within each community come into focus across the Services and combatant commands areas of overlap be come points of contention A prime example of this is the comparison of latent print and search can didates mentioned previously Traditionally these comparisons have been conducted by practitioners in the forensics community as a part of the time consuming laboratory case process Today we are seeing abbreviated expeditionary laboratory exam inations and biometric image transmissions from theater producing intelligence reports long before stateside laboratories obtain the items of interest for thorough processing In fact in some cases this entire process has taken only hours This leads to natural friction between the IC that desires to maintain the efficiency of these OCONUS FOR OFFICIAL USE ONLY 49 operations and the forensic community that desires communities achieve sharper focus additional ten to standardize them according to traditional ideals sions from different stakeholders will surely need The Soldier on the battlefield can collect items of in to be resolved At the end of the day however it is terest but the standards used for that collection are the ideals of pursuing freedom and liberty spoken so still being defined In the end there will be a bal highly of by our men and women on the battlefield ance between the principles of thorough packaging that will drive forward this convergence The greater documentation and chainofcustody of evidence good of the end result will ultimately define the spe with the more chaotic bagandtag techniques de cific processes and procedures used to obtain it fended under the banner of better than nothing Likewise there will be a similar balance between Kasey Wertheim is President and CEO of his own company Complete Consultants Worldwide LLC supporting the DOD the multidisciplinary sequential allencompassing BTF by managing science and technology projects related to approach to laboratory forensic processing with the forensic science He prouides subject matter expertise to the more expeditious approach of the 80 percent solu DOD and is actively involved in the biometric and forensic tion now It will likely be some time before stake communities He spent seven years as a forensic scientist holders from these two very different communities and crime scene analyst prior to becoming heauily involved in forensic technology Currently he serves as Chairperson for fully understand the perspectives of the other Conclusion Until that time these three communities continue to converge and coalesce as the overarching mis sion is being pursued As b oundaries between these the Biometric Committee of the International Association for Identification AI and is an IA Certified Latent Print Examiner Distinguished Member and Editorial Board Member He completed a short tour of duty in Iraq and Afghanistan as part of an IC laboratory improvement effort and spent one year on contract with NGIC f JRENS IC FOCUS The training and application of investigative skills From Investigative Interface in Naval Intelligence by Albert Deahl MIPB Winter 1976 50 FOR OFFICIAL USE ONLY Military Intelligence The U S military ended the Hussein govern ment and its corrupt legal system when it entered Baghdad on April 9 2003 On April 22 2004 the Coalition Provisional Authority rebuilt the legal sys tem and created a new adjudicating body called the Central Criminal Court of Iraq CCCI The CCC I consists of two distinct branchesan investigative court and a felony court It has national jurisdic tion over all matters related to terrorism organized crime govern mental corruption acts designed to destabilize the government or any case where a de fendant is unable to obtain a fair trial in a local court The CCCI was given authority to issue both The end result was that ordinary Iraqi citizens did arrest and search warrants regardless of whether not trust the legal system in Iraq It's not gener the case falls under the jurisdiction of the CCCI or ally known but prior to the Ba'ath takeover Iraq a lower court was actually a leader in Middle Eastern Forensic The Iraqi Constitution of 2005 created a parlia Sciences Iraqi fingexprint experts were members of mentary form of government with three separate the International Association for Identification an and independent branches Legislative Executive organization that represents the experts in finger print identification shoe print analysis crime scene and Judicial The Judicial branch falls under the reconstruction photography and other disciplines authority of the Higher Judicial Council which has designed to support criminal investigations around its own budget appoints judges investigates judi the world All this history was lost during more than cial misconduct and corruption and oversees the 30 years of Ba'ath rule but some in Iraq didn't for entire judicial system within Iraq The Iraqi judicial system is based upon the get and a few young lawyers were open to learning Egyptian system which in turn is modeled after about a science their country once embraced Sadam Hussein and the Ba'ath Party effectively eliminated Forensic Science from the Iraqi legal sys tem soon after taking power Fingexprints were used on voting records and other official government doc uments but were never accepted as evidence in a criminal proceeding Ba'athjudges instead expected to hear the testimony of two witnesses to a crime and photographs before they would find a defendant guilty of any criminal offense Ba'ath Party members were often immune from prosecution while Shiite and others were routinely imprisoned without evi dence by the politically corrupted legal system January March 2009 FOR OFFICIAL USE ONLY 51 the French judicial system Unlike Com rrwn Law upon which both the British and U S legal sys tems are based the Iraqi system does not recog nize judicial precedence Laws are not interpreted from precedent cases as with Common Law they are applied as written If the written law does not specifically prohibit the circumstances of the event it is not a crime Each judge may act independently and is not restricted by the rulings of other judges One judge might accept the fact that fingerprints are unique to one individual while another judge does not Some of the younger Investigative Judges at the CCCI with recent training in the capabili ties of Forensic Science readily accept fingerprint testimony and are willing to consider other scien tific evidence such as ballistics and DNA while the more traditional Judges are skeptical demanding the sworn testimony of two witnesses who can iden tify the suspect This inconsistency among the judges often leads to the practice of Investigative Judge shopping when cases being presented are based upon finger print identification and lack either a confession or two witnesses to the crime Truth is determined pri marily through questioning of the accused by the Investigative Judge He has sole discretion over what evidence is accepted for consideration and the rules of evidence are not strict The Investigative Judge is the finder of fact un der the Iraqi system Once all the witnesses have been heard and the evidence has been examined the judge determines if there is sufficient cause to believe the defendant is guilty and whether or not the case should be tried by the Felony Court If the Investigative Judge determines the case should go forward a recommended charge and disposition is included with the case file before it is submit ted to the Felony Court That court can then ac cept or reject the judge's recommendations or the court can ask for additional information or it can dismiss the case altogether However the Felony Court rarely goes against the Investigative Judge's recommendation Trials before the Felony Court are generally swift The average trial lasts thirty minutes The three judge panel hears testimony from the victim under oath The panel then reviews the court file If the ac cused denies the charge s defense witnesses are heard and any evidence offered by the defense is considered The victim and prosecutor then offer pe titions followed by the accused who is the last per son to speak The judges then adjourn to deliberate or they render a verdict and sentence Deliberations rarely last more than I 0 minutes The verdict is an nounced publicly Penalties under the Iraqi Penal Code include Death Penalty Life Imprisonment 20 years Imprisonment for a specific term 515 years Servitude put to work for not less than 3 months or more than 5 years Detention not less than 24 hours or more than I year Civil Courts Criminal Courts Almah kam1 Al∙Marbzia Uljinayat Fi Ahraq • Mahk1mat Allstinaf Afll llC C C dlllQ Court of Cusation Mahakim AlJinayat r c M•t kim c- f I Al-a ct i ----------∙∙ •Mahaltim - Al-Tahaqeeq- •• c a ----- The lr•ql Court System is divided into civil •nd crimln•I jurisdictions The lnvesttgMlng Courts work with police •nd citizens to deter mine If• c•se exists who the responsible party •nd which court h s jurisdiction over the matter The CCC f hn Its own Investigative Judges but will •lso •ccept cases referred by the lnvestlgMlng Courts The Court of C tlon Is the court of final appeal In lr8q 52 FOR OFFICIAL USE ONLY Military Intelligence Fine up to 500 dinars Confinement in a school for young offenders ious materials and why a fingerprint can be used to uniquely identify an individual Even though the Hussein government used fingerprints extensively to The sentences handed down by the CCCI normally sign documents and identify criminals and govern fall within the first three ment officials many in Iraq still believed it was im Appeals are heard by the Court of Cassation and possible to determine the identity of a bomb maker must be filed within 30 days of judgment Death from a fingerprint left at the scene of a bombing penalty cases are appealed automatically to the The Investigative Judges at the CCCI take wit Court of Cassation and must be forwarded to the ness statements and prosecute cases from a vari court within 10 days of judgment ety of sources but the majority are submitted by U S military lawyers working for Task Force TF Grounds for appeal include 134 Lawyers search through databases and reports Breach of the Law looking for the details of a detainee's arrest in an Mistake in the application of the Law effort to determine if an offense was committed that can be submitted to the CCCI for criminal prose Fundamental error in standard procedure Fundamental error in the assessment of the cution Much of the information found is classified and can't be used as part of an Iraqi prosecution evidence Other cases lack witnesses but despite these hur Error in sentencing dles the number of cases submitted for criminal The U S military began collecting material from prosecution continues to increase the battlefield for forensic exploitation in December 2004 in an effort to identify and track insurgents by First Fingerprint Match Accepted for using biometric signatures recovered from the col Charging at the CCCI 6 F lected material Terrorists began to 'lose their an onymity and were targeted in military operations Coalition Soldiers and Iraqi civilians were falling Lawyers from TF 134 contacted victim to improvised explosive device IED attacks CEXC for and asked their support to prosecute Affat in ever increasing numbers but by the beginning of 2007 things began to change Effective targeting of under the Iraqi Criminal Statute for Terrorism This the bomb makers reduced the number of incidents was the first time CEXC was asked to deviate from while the exploitation of Forensic Intelligence was its intelligence mission to provide expert testimony in a criminal proceeding The request highlighted reducing the overall effectiveness of the IEDs the challenge of protecting classified techniques The detention and interrogation facilities through and information but also offered a new tool for re out Iraq began filling up with terror suspects The moving insurgents from the battlefield Coalition Forces were holding more than 22 000 After much discussion CEXC agreed to provide detainees A small portion of those approximately 150 1 had been forensically connected to IED events unclassified exhibits and testimony The case was while hundreds more had been linked to events by submitted to an Investigative Judge at the CCCI other intelligence methods Many were captured During his statement to the Judge Affat admit ted that he had constructed the IED that wounded with bomb making materials in their possession seven Coalition Soldiers The Investigative Judge Iraq's government was moving quickly to establish forwarded the case to the Felony Court for trial civilian control over law enforcement functions and where Affat was sentenced to life in prison Affat to reestablish the rule oflaw within its borders The was transferred from Coalition custody to the Iraqi CCCI was taking the lead in Iraq's efforts to hold prison system insurgents accountable for their crimes Judges at the CCCI began to receive forensic training from First Conviction Based Upon a latent print examiners working at the Combined Fingerprint Match Explosives Exploitation Cell CEXC They learned about fingerprints how they are deposited on var January March 2009 FOR OFFICIAL USE ONLY 53 As in the first case CEXC provided un b 7 F classified exhibits to TF 134 attorneys and the case was submitted for charging On September 24 2007 a latent print examiner from CEXC traveled to the CCCI to provide testimony to an Investigative Judge The Judge asked specific questions about the IED where it was found where the fingerprint was found and how it was identified to Dulaimi The Judge then told his clerk how to summarize the testimony and which parts to include in the court record The witness remained seated on a black leather sofa which serves as the witness chair un til the clerk had completed the handwritten record The witness then signed the record which is written in Arabic and it was added to the court file as the witness's sworn testimony The court file contains the statement of all witnesses and the defendant as well as any photographs or diagrams The latter two items are nearl as compelling to an Investigative Judge as a signed confession or the sworn testimony of two wit nesses to the crime UNCLASSIFIED b 7 F Dulaimi's ca se was tried in November 2007 by the three Judge Felony Court Following a short deliberation he was found guilty and sentenced to death b 7 F b First Iraqi Arrest Warrant Issued by the CCCI for a Master Bomb Maker b F Muthana was convicted of the crime on Fe b rnary 25 1996 and was sentenced to one year in jail It is believed that Muthana was studying Electrical Engineering at the time of his arrest Muthana didn't turn up again for ten years when his fingerprints were matched to an IED in the Mosul area Over the next two years CEXC matched him to a total of eleven IEDs and there is reason to believe that he has constructed at least 75 others NGIC designated Muthana as a high value target Despite numerous attempts to find him Muthana evaded 54 FOR OFFICIAL USE ONLY Military Intelligence detection The only picture of him is at 12 years of age Analysts know he's from Mosul and they know Iraq is a tribalbased society where people from one area tend to be known by or related to other people in the same area Likewise the Iraqi Police tend to know the people in their towns and villages As the CEXC Biometrics Lab Director at the time I asked the counterIED Targeting Program Analyst at CEXC if an Iraqi arrest warrant would be useful in getting the Iraqi Police to take an active role in locating and or capturing Muthana The analyst excitedly aaid Yes how do we get one of those ' I aid 'I have no idea but 111 bet the Iraqis have a procedure for requesting one so all we have to do is find out what that is • I contacted one of the at torney at TF 134 that I had worked with on other cases explained the circumstances and told him I needed an arrest warrant and wondered what the procedure was His response surprised me He aid 'I have no idea but 111 find out and get back to you • Ten days later he called back and said it took some doing as even the Judges weren't sure if the Coalition could request a warrant but after some legal research it was determined that the is suance of an arrest warrant was within the discre tion of an Investigative Judge Further the basis for granting a warrant was much the same as a re ferral to the Felony Court A case would have to be prepared as if the accused were present The case is then presented to the Investigative Judge along with witnesses and any available evidence ff the Judge determines that the case is sufficient to jus tify a referral to the Felony Court an arrest war rant will be issued In other words the accused is tried in ab entia The procedure made sense in b 7 E ∙ i January March 2009 ___ _ _ an odd way ff an arrest warrant was issued and Muthana was arrested the trial was over except for Muthana's own statement A thirtytwo page exhibit was prepared along with an affidavit stating that I had examined Muthana'• 1996 fingerprint record and compared those finger print to the latent print recovered from IED ma terial which was collected at several IED events by weapons intelligence team and explosive ordnance detachment units and that it was determined the latent prints were made by Muthana The exhibit contained documentation and photographs of three events that had been matched to Muthana as well as his fingerprint record and a chart showing how his fingerprints had been matched to those found on the IED material On January 13 2008 I took a Blackhawk to the International Zone IZ and then travelled by vehi cle to a checkpoint where I accompanied the at torney through the wall and into the Red Zone We walked swiftly through some trees and then across approximately 100 meters of open ground to a basement entrance to the court house I sat in the hallway while the attorney tried to find out which Judge was going to hear our case After about 45 minutes the attorney told me the Chief Investigative Judge was going to hear the case We walked to the end of the hall and I sat down in a chair in front the Judge's desk Unlike the other court rooms I'd been in this Judge had a com puter on his desk a rack of file servers in the cor ner of his office There was a large ftat panel 1V on the wall opposite his desk which was used for video teleconferences There was a large window near the desk that looked out toward the IZ which was covered with a curtain The Judge was very receptive His interpreter lacked the English skills I had become accustomed to from other interpreters but the Judge seemed to understand English quite well I presented the case to the Judge and he co1DD1ented frequently on how well documented each incident was and shook his head affirmatively when he examined the slides showing how the fingerprints had been identified Halfway through the exhibit the Judge put the pages down on his desk and said to me in clear English 'I studied Forensics in · and then he turned in his chair and pulled out a book from a stack piled on the floor behind his deak He held the book up and aaid rhis was my FOR OFFICIAL USE ONLY 55 text book as he leafed through the pages paus ing to show me selected passages in Arabic He put the book down and continued through the rest of the exhibit When he finished he smiled at me and aaid •Good job very good job • The Judge then said to the attorney V ou have your Commander write a memo and I'll sign the warrant • The at torney asked if the Judge needed any more infor mation and the Judge said o this is enough good job • The purpose and content of the memo that was requested by the Judge was never fully explained to me A memo was prepared by the at torney and signed by the TF 134 Commander This was a long way OmMosuf Hadthere not been an Iraqi ar rest warrant issued it'a doubtful this sighting of would even have been reported It was not widely known outside intelligence and special was even a target operati ons uni and it appears ble to avoid biomet ric check point a He left the area three dayw be fore an infantry unit went out to do Biometrics Automated Toolset enrollments of everyone living in the former base is atill at large and is still active Since this warrant was issued several other re quests for arrest warrants have been submitted to the CCCI Multinational ForceWest has become very interested in obtaining arrest warrants issued for insurgents working in the Fallujah area Iraqi arrest warrants can help to strip away another layer of anonymity and encourage the assistance of the Iraqi Police and citizenry Removing an insurgent's anonymity is the first step towards removing them from the battlefield Iraqi Judges risk their lives every day just going to work Many of the Investigative Judges sleep on cots in their court room and only return to their homes at irregular times and inteIVals At the be ginning of January 2008 one of the CCCl's Felony Court Judges and his body guard were assassi nated outside the Judge's house on their way to the CCCI building In March 2008 simultaneous bomb attacks were made on five Judges All five avoided injury but the intended message is clear My ex b 7 F 56 FOR OFFICIAL USE ONLY Military Intelligence The former Sadam Hussein Gift Museum is now home to the CCCI The building is located Inside the Red Zone and Is heavily guarded by both Iraqi Security Forces and U S Military Police Criminal cases are presented by U S Military attorneys The Judges Prosecutors and Defense Attorneys are Iraqi and many are women perience with the Iraqi Investigative Judges is that they are deeply concerned about their country and are dedicated to their profession and the Rule of Law in Iraq They prove it every day by putting their lives on the line just going to work CCCI The CCCI building originally housed the Sadam Hussein Gift Museum and Clock Tower It was cho sen to house the CCCI because it was accessible to the Iraqi people living in the Red Zone yet it's also close enough to the IZ to be accessible for the at torneys and Coalition witnesses travelling from the U S Embassy and beyond Prisoners facing charges are transported to the CCCI by U S Military Police In the center of the basement floor is a large foun tain that once greeted visitors to the Gift Museum with streams of water which fell from a metal sculp ture that rose from a large pool built up from the floor The stairs wrap around the fountain rising up to the floor above Visitors to the CCCI who look down from the building's lobby now see a metal sculpture sitting alone in a dry pool Looking up the ceiling rises high into the base of a clock tower that once told foreign visitors and government offi cials the time in Baghdad from four different direc tions Only the clock faces remain they no longer tell the passing viewer the time The hands were shot away in a forgotten battle with a sniper who used the clock tower as a vantage point the court house by court employees to keep them safe Most of the U S Soldiers and attorneys work ing in the court house know these children by name and have worked out ways to communicate with them as they spend their days together A small im provised restaurant is located in the basement and serves a notoriously strong Iraqi coffee and a kind of sandwich the Iraqis call falafel A small restaurant In the basement of the CCCI building serves Iraqi coffee and falafel a kind of Iraqi sandwich Those accustomed to testifying on a regular basis in a U S or other Common Law court might find the conditions ∙ at the CCCI a bit surreal and per haps a little hard to comprehend at first but the CCCI is a functioning legal system with rules pro cedures and a staff of educated lawyers and sup There are a number of young children running port personnel who run it The Senior Investigative around the lobby and hallways of the CCCI Many Judge received Forensic training in Belgium Some of these children are orphans and are brought to of the Judges are Christian but the majority are January March 2009 FOR OFFICIAL USE ONLY 57 Muslim Many understand a surprising amount of English but all rely on a translator to avoid mis understandings However don't be surprised if a Judge suddenly makes a humorous comment or asks a clarifying question directly in English The fact that you have to wear body armor and a hel met while following variable security procedures in order to get to the building simply serves to remind that this court system is also functioning inside a war zone Conclusion Iraq continues to move toward an independent government and selfsupporting army and criminal justice system The U S Army Criminal Investigation Laboratory USACIL is sending added forensic labo ratory capacity to Iraq in order to provide more sup port for DNA ballistics chemical analysis as well as biometrics These laboratories fall under the purview of the Provost Marshal's Office in Iraq and USACIL in Georgia The Government of Iraq has a Forensic Laboratory in Baghdad and is standing up an ad ditional lab in the North All of these labs will pre sumably be producing results that could support criminal prosecutions These criminal cases would need to be submitted to the CCCI or one of the lo cal courts for prosecution Done right the Coalition can be seen as an ally and resource to the maturing criminal justice sys tem in Iraq The Coalition is also in a position to offer training and support to Iraq's Forensic Laboratories Done arrogantly and without respect to the Iraqi culture and history we risk losing an effective tool for removing terrorist from the streets and battle fields of Iraq and we create an opportunity for those terrorists to practice their tradecraft in the U S or elsewhere Iraq has a legal system and it works for them We must continue to learn about and under stand that system and support it where we can We share a common goal Identifying capturing and prosecuting terrorists Biometric Intelligence like other forms of intelligence can support many missions It's good to know who the enemy is but it's even better when you have a resource like the CCCI that is able to act on that intelligence and render the enemy safe Eaclu ote 1 The actual number is difficult to establish Records range between 142 and 158 depending upon the source Some individuals were identified but never captured Erik Berg is currently working for Harding Security Associates as a latent print examiner and is assigned to the NGIC His work has been featured on documentary television shows such as The New Detectives 60 Minutes and Forensic Files His expertisein eludes photography computer based imaging latent ji nge1print identification and crime scene investigatiort He deployed to Iraq in September 2007 after 22 years in law enforcement to work in the BiDmetricsLaboratory at the CEXC1 at TF Troy In December 2007 Erik was promoted to the lab's Director During February and March 2008 the BiDmemcs Lab recovered 2 344 latent prints of from JED related material and a record rwmber of those 104 were identified during the same period Erik can be contacted at 434 9514730 or via email at ebergeJuirdingsecurity com FORENSIC FOCUS b 7XE b '7REf b 7 E 58 FOR OFFICIAL USE ONLY Military Intelligence Introduction As it often happens with breakthrough concepts biometric technology development has been rapidly outpacing conceptual understanding and informed policy development both of which help to ensure the proper application of novel solutions that in this case stand to revolutionize how we approach crime and conflict Additionally popular media with programs like Alias and movies like Minority Report have skewed the reality of scientific lim itations and bureaucratic processes that most of ten encumber rather than enhance the efficiency of fielding such new and improved technological capa bilities Advances in biometric human identification technology nevertheless offer enormous potential for forensics and for meeting evolving national se curity objectives Technologies to collect and process biometric data have grown exponentially in the last few decades and the competitive demand to develop biometri cally enabled tools that are smaller and faster con tinues to be at the forefront of federal science and technology procurement efforts The downside is that false impressions and competing technologies hinder the effective development of operational tools that utilize biometrics because those in the position to make policy and planning decisions or who rely on those decisions for technology development i e vendors too often confuse process and application This article presents an approach to understanding January March 2009 the relationship between biometrics and forensics by distinguishing the various applications functions and missions of both among the defense law en forcement LE and intelligence communities ICs It is hoped that a clearer understanding of the pos sibilities and limitations of each and of the respec tive needs and restrictions across federal agencies and between government and industry will serve to advance and focus current efforts to make the most of these vital national security capabilities So what are or what is Biometrics A biometric is a measurable physical or biological charact ristic such a s a fr ngerprint or iris pat tern a J'ft'SOnal behauioral trait such a s handwrit ing style or on a much smaller scale DNA sequence or blood type As a diM ipline biometrics or biom etry is an established scientific field of studying methods for uniquely rwcognbing humans based on these intrinsic traits 1 The front end of biometrics in operations typically comprises manual or automated processes of col lection processing and storage In the current con text effective biometric recognition relies on rapidly evolving automated database and collection device systems that offer the promise of enabling security personnel to compare digitally translated templates to quickly identify questioned individuals if their profiles exist in the queried database The Federal Bureau of Investigation FBI has made consider FOR OFFICIAL USE ONLY 59 able use of such systems to store and search dig ital biometric profiles most notably by way of the Integrated Automated Fingerprint Identification System IAFIS The IAFIS maintains the largest bio metric database in the world containing fingerprints and corresponding criminal history information vol untarily submitted by state local and federal LE agencies A national fingerprint and criminal his tory system maintained by the FBI the Criminal Justice Information Services CJIS Division the IAFIS provides automated fingerprint and latent search capabilities electronic image storage and electronic exchange of fingerprints and continuous responses By comparison the Combined DNA Index System CODIS is used to store and sea∙rch DNA pro files obtained from a number of indices specifically convicted offender forensic arrestees missing per sons unidentified human remains and biological relatives of missing persons CO DIS operates at na tional state and local levels where the National DNA Index System enables laboratories to exchange and compare DNA profiles across the country in cluding those from all 50 states the U S Army and the FBI 2 The Department of Homeland Security OHS maintains an Automated Biometric Identification System known as IDENT consisting of biometric data and information on known criminals and sus pected terrorists from profiles contained in IAFIS on nonU S citizen persons of interest to LE subject While the concept of access control is self explanatory identity management can be defined as the registration storage protection issuance and assurance of a user's personal identifier s and privileges s in an electronic environment in a secure efficient and costeffective manner 3 Applications may use automated or manual processes indepen dently or as part of an overall information gather ing scheme A biometric device can be applied in virtually any application scenario in which one might oth erwise use nonbiometric identification such as keys identification cards security cards per sonal identification numbers PINs or passwords to gain access to a physical facility a virtual do main information system or a process or to de termine eligibility for a privilege 4 In the contexts of LE and national defense relevant subcatego ries encompass physical and logical access con trol and security and identificationapplications that help the above communities in determining who someone is who someone should be or who someone might be Many departments and agen cies at all levels of government as well as pri vate companies use a combination of biometrics based systems with various modalities primarily fingerprint face and iris for automated recogni tion and verification Biometric applications can function in either of two waysverification or identification Verification Similar to the OHS IDENT the Department is the process of comparing a presented biometric of Defense DOD maintains its own Automated template to a stored biometric reference s asso Biometric Identification System ABIS ABIS is ciated with a specific purpose Verification appli the DOD's central repository for all biometrics cation processes can be generally described as collected by DOD personnel from nonU S citizen onetoone 1 1 matching where it must be de persons of interest While numerous other federal termined that the user is in fact the person they 5 state and local government agencies also have bi claim to be During verification a user will typi ometric databases the above constitute the larg cally present their claim of identity in the form of a name unique identification number token or est national biometric databases in the U S ID card Then the user must authenticate against the claim of identity by presenting their biometric Biometric Applications As the field of biometrics continues to evolve so sample and having the resulting template matched does the precise manner of classifying biometrics against the reference s associated with that us systems Used in conjunction with automated da er's enrollment record Verification is commonly tabases biometric applications that center on the used in access control applications where an indi broader functions of access control and identity vidual has already been granted privileges or ac cess rights and the system needs to verify that the management allow expanded capabilities in foren person seeking access under the given identity is sics and military Counterintelligence to authenti 6 cate identify or facilitate attribution of a human in fact that individual 60 FOR OFFICIAL USE ONLY Military Intelligence The DOD uses biometric verification to control ac cess to U S military facilities in Iraq Specifically the Biometric Identification System for Access BISA is a verification system that results in the issue of a smart card type of identification token Its tar get population is nonU S personnel seeking em ployment at or access to U S and Coalition bases The ID card used for BISA contains key biometrics of the person to whom the card was issued allowing for fast matching between the biometric stored on the badge and the biometric provided by the badge holder each of which is read by a single integrated device which compares the two 1 1 each time a badgeholder attempts to gain access to a base 7 While such federal systems have achieved no table success the creation of more sophisticated systems like the FBI Next Generation Identification system may help to do more than simply verify an identity through direct searching and match ing Projects including the establishment of a national Biometrics Center of Excellence are un derway to expand and increase the efficacy of auto mated biometric identification systems to include other intrinsic and extrinsic biometrics such as palm prints scars marks tattoos and iris and fa cial imaging 1 t In biometric identification systems however obtaining a hit in a database is far from identification in the worlds of forensic science and military CL In identification applications the system at tempts to determine if a person is known to the Attribution system with or without a claimed identity by com Biometric systems can also be used to record and paring the presented biometric sample and resul associate facts about an individual helping to es tant template with all known references the entire tablish connections between people and places enrolled population in the database The process events or other people The development of tools associated with biometric identification involves designed to compare and analyze biometrics serve onetomany l n matching Identification appli to strengthen both capability areas Biometric al cations are typically used for LE investigations or gorithms can be designed to relate facts and char as a screening process to ensure that the person acteristics to build a profile of someone who is applying for a benefit is not already enrolled in the otherwise anonymous An example would be ob system and receiving the entitlement under another taining a onetomany match of the biometric name or identity 8 Identification is often performed profile from an unknown individual collected dur during or immediately following initial enrollment ing a crime scene investigation or during tactical of the person's biometric 9 Part of the federal crim or sensitive site exploitation with an enrolled pro inal records check process for example involves file e g a known detainee or convicted felon or an applicant's or suspect's tenprint to tenprint other unknown biometric profile associated with search verification through IAFIS which compares a prior event the complete set of fingerprints against the data Biometric systems like IAFIS assist LE in mak base of tenprints ing the critical connection between a crime and a DHS with eligibility input from the Department suspect An evidence print to tenprint search can of State DoS established the identification pro be run when crime scene technicians recover a fin gram called the United States Visitor and Immigrant gerprint from a crime scene and investigators have Status Indicator Technology Program better known not identified a suspect or find that a suspect's fin as USVISIT It is one component of a system of se gerprints do not match the evidence print If the curity measures that begins overseas and continues search does not yield a hit then the system retains through a visitor's arrival in and departure from the the evidence print as an unsolved file When new U S In many cases USVISIT begins at U S con tenprints are entered into the system they are sular offices issuing visas overseas where officials searched against unsolved files This tenprint to latent print search may reveal the involvement of collect a person's biometrics digital fingerprints and photographs and check them against IDENT a suspect with a previously unresolved crime 13 The onetomany When the visitor arrives at the U S FBI also uses the CODIS Program as a similar re port of entry their fingerprints are taken and used source to generate forensic leads when investigators to verify onetoone that the person entering the recover DNA from a crime scene 14 A match between country is the same person who received the visa 10 DNA profiles from the Forensic and Offender indi January March 2009 FOR OFFICIAL USE ONLY 61 ces provides investigators with a suspect's identity while a match between DNA profiles in the Forensic Index can link crime scenes 15 one is forensics can tell us what they did 19 These are telling statements about how biometrics and fo rensics often become confused The DOD's Biometrics Automated Toolset BAT is an identification and enrollment system that has al lowed military operators to collect biometrics from persons of interest and search that data against a repository of known and suspected terrorist data as well as profiles from unknown individuals The col lection process is essentially the same as for BlSA but BAT is used to create and maintain profile re cords in ABlS 10 BAT equipment consists of a laptop computer with identity management software and the various peripheral devices used mainly by mili tary personnel and serviced by contractors to collect specific biometric modalities fingerprints iris im ages and facial photographs Quick reaction forces equipped with BAT kits may process a scene after an improvised explosive device ED has been deto nated to include collection of biometrics from peo ple in the vicinity who may have been involved BAT is also used to process prisoners brought into var ious detention centers 17 All biometrics collected by BAT and BlSA operators are routed by various means to the ABlS for initial enrollment or verifi cation Data from each system has been used suc cessfully to identify persons known to have hostile intentions toward the U S and coalition forces en abling their apprehension and detention Alphonse Bertillon solved the problem of identi fying criminals during growing urbanization in the late 1800s by establishing a method of identifica tion called anthropometry which is based upon the measurement of various distinguishable aspects of the human body including such things as arm length and head circumference While many oth ers eventually developed more specific methods of measuring human characteristics Bertillon essen tially discovered the first application of biometrics in LE 20 Forensic science or simply forensics is any field of science dedicated to the methodical gathering and analysis of evidence to establish facts that can be presented in a legal proceeding 21 Forensics like biometrics is multidisciplinary and uses knowledge and methodologies from many sci entific disciplines including biology anthropology chemistry engineering genetics and even computer science that support both criminal and noncrimi nal investigations The greatest difference between forensics and biometrics then is that while forensics by definition examines the entire spectrnm of scien tific fields and methods and applies them to the law biometrics focuses solely on those fields related to human identificationmerely one aspect of forensics While these biometric systems can provide crucial While L TC Manson correctly implied that forensics clues to LE they are not substitutes for the human is a more involved process perhaps a more precise analytical component of investigation required to statement would be that forensics can tell us if the draw valid conclusions about motive history and individual in question did what we have reason to the relatedness of tangible and intangible evidence believe he did particular to an incident It takes the revolving and The biometric technologies and methods used combined efforts of LE and forensic science to en able and enhance the ability to establish truth in in forensics for human identification are increas terms of the law Similarly it takes the combined ingly being applied in other areas of national secu efforts of intelligence and military operations that rity most notably defense and have corresponded use biometrics to achieve identity superiority on the with efforts in finding new and nonlethal ways of fighting the nonconventional War on Terrorism battlefield Human identification may serve as an end in itself Biometrics in LE or be part of a larger process involving stakehold Anthony Fortune a consultant with the Office of ers whose operational requirements often overlap the Secretary of Defense Policy recently told an see Table 1 The various policies operating pro audience When I was a civilian police officer we cedures management and administrative work didn't call it biometricswe called it evidence 18 concerned with the institutional application of bio Lieutenant Colonel John Manson made one distinc metrics however are most effective when the pri tion by stating Biometrics can tell us who some mary biometric application is clear 62 FOR OFFICIAL USE ONLY Military Intelligence Responsible Areas Federal Department Jullce Dlfenle Homeland SeQnly State LE - Intelligence Access Control Immigration Border Management tification one of the strategic objectives of intelli gence is to defeat terrorists at home and abroad by disarming their operational capabilities and seiz ing the initiative from them 27 In meeting that ob jective biometrics provides the opportunity to deny the enemy anonymity and is a necessary function of battlefield identity management 28 Table 1 Areas of responsibility for biometric use among federal national security agencies 22 The combined capabilities of the IC and opera tional use of biometric identification systems has Identity Management on the resulted in considerable success identifying track Battlefield ing and targeting persons of interest in the War on The control and management of information is Terrorism The cooperation between intelligence critical for success on the battlefield The DOD's and combat forces is the driving force behind oper overarching goal of using biometrics as a key en ational effectiveness just as the interplay between abling capability for identity management 23 logically LE and forensics drives successful legal investiga leads to combat identification as the pivotal pur tion In either scenario however automated tools pose of biometrics in military operations which the such as biometric databases may help to develop DOD defines as leads but without the benefit of analysis have lim ited meaning the process of attaining an accurate charac terization of detected objects in the battle space Consolidating Biometrics and to the extent that a high confidence timely appli Forensics in the War on Terrorism cation of tactical options and weapons resources Attribution in antiterrorism operations relies pre can occur Depending on the situation and the tac dominantly on making the link between persons of tical decisions that must be made this character interest and information obtained during tactical ization will be at least but may not be limited to and sensitive site exploitation However there are friend enemy or neutral Combat identifica two major obstacles to this tion functions encompass cooperative and nonco 24 operative identification capabilities Inconsistency at all levels in communicating whether the goal of site exploitation is for intelli Overcoming the challenge of characterizing and gence targeting or for criminal prosecution classifying potential threats through combat ID particularly when little is known about the subject Lack of the initial establishment of Joint Forces Command doctrine to include the business of such as a person of interest relies upon a con forensics sideration of all associated facts and on recognized shapes markings signatures signals and other factors through the conduct of military operations not simply biometric confirmation 25 The coopera tion of combat forces with the IC is thus vital in un derstanding the relationship between these factors No concerted authoritative doctrine or training ve hicle currently exists to fully prepare military leaders and Soldiers marines sailors and airmen to man age forensic versus CI focused site exploitation The military application of forensic science has expanded beyond its traditional internal focus on As indicated earlier the use of biometrics in com bat operations may drive intelligence functions criminal judicial and medical investigative mat or biometricsbased CI that makes maximum use ters Part of current collection efforts in OCONUS of covert collection or future standoff recognition operations include focused counterJED CIED systems 26 which may drive combat operations teams forwardbased CIED forensic laboratories Intelligence supports and enables effective com building tactical laboratory capabilities for non bat operations involving similar processes to LE CIED support and expanding forwarddeployed investigation of information gathering and anal DNA labs Capabilities in these efforts include the ysis to draw critical connections and conclusions biometric modalitieslatent fingerprint and DNA ex about those associations Along with combat iden aminationas well as trace evidence and firearms Janu ary March 2009 FOR OFFICIAL USE ONLY 63 examination Forensics has the ability to support was recognized as being the technical experts military operations by attributing enemy activity to Perhaps it vmuld be prudent to consider Captain state or nonstate actors using nationally and inter Brian Gellman's approach to evidence versus intel nationally accepted legal standards Combat forces ligence collection in fighting an unseen enemy may utilize forensic methodologies to defeat adver saries deterring them from gaining military advan Evidence collection is more important than body tages and providing proof of adversary operations count in counterinsurgency We cannot kill insur gents when they do not fight back they know their capable of withstanding legal scrutiny Armed with chance of winning a court case is much greater attributable data supported by biometrics military than the chance of winning a firefight Instead of forces can begin to influence the enemy's decision relying on other government agencies or untrained making process by affecting the enemy's operational combat arms soldiers each unit needs an organic environment 29 CSI team that can conduct onsite evidence collec Cl versus Prosecution The beyond a reasonable doubt standard of proof to which forensic scientists are held along with strict standards for scientific and technical evidence 30 requires that conclusions offered by fo rensic scientists be supported by more than what is available through automated biometric sys tems 31 The LE community requires strict chain of custody protocols in the collection of evidence in this case associated biometric and nonbiometric data and allows substantially more time on scene than is permitted combat forces These operating procedures may consequentially restrict crucial ac cess to biometric data and are unrealistic in com bat operations The burden of proof' for military commanders is substantially lower than that for LE for a number of reasons not the least of which is the requirement for rapid decision making and re sponse on site Further the austere conditions of combat do not guarantee that biometric samples are either collected or maintained in a manner that is acceptable to the legal system As one Army offi cer opined in April 2005 We have to document and catalog evidence to make a case against people that we capture The process is painstaking and often frustrating to soldiers who have up until recently been trained for maneuver warfare 32 The military may only require a minimum level of acceptability in order to carry out its mission Despite that in some cases the results of a mission may also have LE implications In its strategic efforts to make biometrics fully op erational in support of DOD objectives and to enable DODwide identity superiority biometrics doctrine development has been toward a distinct military capability and primarily considered as a targeting tool with LE implications where the LE community 64 tion techniques to increase the successful prosecu tion of captured insurgents •'3 4 Imposing forensic standards on the use of biomet rics in military operations may prove to be a major limiting factor in broadening biometric applications in meeting overarching national security objectives but ignoring their importance may prove just as detrimental The Challenge The same functions that allow the DOD to be self sufficient and selfsustaining namely internal LE and intelligence capabilities make operational de cision making and policy development challenging when it comes to managing biometrics Recently the Government Accountability Office released a re port acknowledging the complicating factor of man aging biometrics in a unique organization like the DOD The report highlighted Biometrics activities are dispersed throughout DOD at many organizational levels and DOD has not established implementing guidance clarifying decision making procedures to minimize duplica tions of effort and ensure interoperability across these levels W ith many different organizations using biometrics for their own requirements and missions coordination has been difficult to achieve across DOD ms Both the competing and overlapping needs and objectives of the various DOD organizations makes streamlining an approach to biometrics difficult not only within DOD but among the var ious members of the user community who want to take advantage of the capabilities that biomet rics offers The National Science and Technology Council Subcommittee on Biometrics and Identity Management IdM has adequately summarized FOR OFFICIAL USE ONLY Military Intelligence the need to lift limitations imposed by the inde pendent development and application of biomet ric technologies At the Federal level needs and uses vary signif icantly and a onesizefitsall technical ldM ar chitecture cannot satisfy all agency constraints and requirements However there are clear com monalities that would benefit from a coordinat ed Federal effort enhance agencies' abilities to meet mission needs ensure privacy protection and enable individuals to exercise their identi ties securely 36 The FBI CJIS is endeavoring to establish interop erability between the IAFIS and other biometric sys tems with primary emphasis currently on DHS's DENT DoS and the DOD's ABIS 37 Additionally the FBI and DOD have been engaged in a mutually beneficial information sharing relationship since 20032004 Since then the FBI has allowed DOD to install and maintain its central database at the CJIS facility in West Virginia This arrangement has allowed it to take advantage of existing FBI ex pertise shared security and logistics Last spring senior FBI and DOD officials agreed that the col location and convergence of the DOD biometric fa cility with CJIS would be mutually advantageous In particular maturation of the Next Generation ABIS ensures that the DOD will be poised to share this innovation more readily with FBI as the Next Generation IAFIS and CODIS programs concur rently grow 38 The Biometrics Task Force BTF who has been given the daunting responsibility of tackling this multilayered obstacle has a mission to lead DoD activities to program integrate and syn chronize biometrics technologies and capabili ties to support the National Security Strategy 39 Bill Vickers Special Advisor to the Director at the BTF stressed that Given the crucial role bio metrics is playing in the War on Terrorism DOD must plan to provide secure facilities and a reli able platform for the central databases providing interaction with other biometric databases and responses to the field 40 A consistent theme re garding many aspects of U S national security greater cooperation in strategic planning as well as implementation between primary stakeholders must take place if the U S is to have a united front against its enemies foreign or domestic January March 2009 Conclusion The U S has the opportunity to take maximum advantage of biometric technologies and their po tential to effectively meet our national security ob jectives by developing a better understanding of its various functions and distinguishing between the needs and requirements of the user community particularly LE forensics The challenge remains in determining how best to achieve operational effi ciency by using one tool to accomplish many ends Whether the OHS requires biometric technology for airport screening the DOD for access control at a temporary checkpoint in a theater of operations or the FBI to monitor the transfer of DNA data pro cessed from a crime scene the key to understand ing biometrics across a growing community of users lies in setting clear goals and expectations for its application in each user community Concerns about chain of custody the protection of sensitive information associated with a biomet ric profile and the need for access to those profiles to enable rapid decision making must guide rather than stifle the effective management of biometrics and the important processes they stimulate The unprecedented opportunity to make the most of this increasingly important nonlethal application of sci ence and technology to fight crime and defeat our foreign adversaries depends on it Endnotes 1 Biometric Technology Services at http www defenselink mil DBT products 2008_BEA_ETP bt'a iwp definitions2_ technicalservict'_621936 htm acct'SSt'd 30 October 2008 2 James Jasinski in Philip Jones Using Biometric Technology to Advance Law Enforcement Fort'nsic Magazine at http www fort'nsicmag com Article_Print asp pid 104 accessed 30 October 2008 3 International Biometric Group Best Practices for Privacy Sympathetic Biometric Deployment IBG BioPrivacy Initiative at www biometricgroup com 4 James Jasinski in Philip Jones Using Biometric Technology to Advance Law Enforcement 5 U S Department of the Army Biometric Identification Systernfor Access BISA PEO Entt'rprise Information Systems September 2008 6 Marc Watkins Biometrics University of Ottawa Canadian Internet Policy and Public Intert'st Clinic CIPPIC at http www cippic ca indt'x php page biomt'trics #faq_forwhatpurposes acct'sst'd 31 Octobt'r 2008 7 Peter Langworthy Biometric Identification System for Access BISA Northrop Grumman Corporation 12 October 2006 FOR OFFICIAL USE ONLY 65 8 t_ S federal Bureau of Investigation Integrated Automated ldentificat1011 System Criminal Justice Information Services at http www tbi gov hq cjisd iafis htm accessed 29 October 2008 9 International Biometric Group Be st Practices jar Priuacy Sympathetic Biometric Deployment BG BioPrivacy Initiative at wv v biometricgroup com 10 FBI Science Technology Branch FBI Biometric Center of Excellence Presentation at the International Association for Identification 94th Annual Education Conference Louisville Kentucky August 2008 Slide 4 11 Ibid 12 Marc Watkins 13 James Jasinski 29 Joint Forcible Entry Joint Integrating Concept Version 92A3 Washington D C GPO September 2004 various paging 30 In Daubert vs Merrell Dow Pharmaceuticals 509 U S 579 1993 the Supreme Court established legal precedent regarding the admissibility of expert witnesses' testimony during federal legai proce 'dings by holding that federal trial judges are the gatekeepers of scientific evidence Cnder the Daubert standard trial judges musl evaluate proffered expert witnesses to determine whether their testimony is both relevant anci reliable a twopronged test of admissibility 31 Richard W Vorder Bruegge Biometrics and Forensics Similarities and Differences Presentation to the Biometric Consortium Conference 2004 Arlington Virginia available at http www biometrics org bc2004 Bios vorderbruegge_bio_ OK pdf 15 James Jasinski 32 Major K CSI Baghdad online blog 11 April 2005 at http strengtbandhonor typepad com captaink 2005 O∙l csi_baghdad html 16 The Privacy Act establishes strict regulations that govern what and how personally identifying information can be collected by the C S Government on its citizens 33 Vickers DOD Biometncs Briefing Presentation at the FBI Criminal Justice Information Services Diviswn Advisory Policy Board BTF 5 December 2007 17 C S Department of the Army Biometrics Automated Too set BAT PEO Enterprise Information Systems DOD Biometrics Project M lnagement Office Flyer September 2008 34 Captain Brian Gellman Improving Relevance ofTactical Intelligence in the COE Vlilitary Intelligence Professional Bulletin 33 2 April June 2007 Avail 'lble at http www universityofmilit 'lryintelligence us mipb artide asp' articleID 570 issuelD 45 accessed 1 November 20081 14 Ibid 18 Anthony Fortune Department of Defense Session∙ Policy Discussion Office of the Secretary or Defens Policy l'resentation at the Biometrics Consortium Conference 2008 Tampa Florida 19 Lieutenant Colonel John Manson C S Ma1ine Corps Presentation at the Biometrics Consortium Con 'ersnce 2008 Tampa Florida 20 Simon Cole Suspect Identities A History of Fingerprinting and Criminal Identification Cambridge Massachuset s Harvard Cniversity Press 2001 various paging 21 Elizabeth Morgan Definition of Forensic Science ' at http ezinearticles com DefinitionofForensicScience d 4 l 0618 accessed 22 October 2008 22 NSTC Subcommittee Biometrics in Govemmenl Post9 1 J • Aduancing Science Enhancing Operations Washmgton D C GPO August 2008 various paging 23 Shawn Elliott DOD Biometrics Identity 1'Yfanagernent Bldtvlj Futures B ∙anch Presentation BTF Advance Planning Brief to Industry 28 February 2008 24 Countering Air and Missile Threats JP 30 I 5 Febrnary 2007 25 Biometrics Oueruiew by Tom Dee Office of the Secretarv of Defense Presentation to the Information Technology Association of Amenrn ilTAA 22 April 2008 26 Lisa Swan Future Biometric Technology Capabilities presentation by the DOD BTF 23 September 2008 27 Office of the Director of Nat10nal Intelligenre The National Intelligence Strategy of the United States of America Transformation through integration and Inrwualion October 2005 I 28 Elliott slide 4 66 35 C S Government Accountability Office Defense Management DOD Needs to Establish Clear Goals and Objectiues Guidance and a Designated Budget to Manage its Biometrics Activities Report to Congressional Requesters GA0081065 Septt mber 2008 13 36 NSTC Subcommittee on Biometrics and Identity i fanagement Room at http www biometrics gov I nstc Defauit aspx accessed 30 October 2008 37 Thomas E Bush State ofC'JIS Connecting the World with Bigger BetterFaster Criminal Justice Infonnation Seruices Presentation the Biometrics Consortium Conference 2008 Tampa Florida 38 Vickers 39 Department of the Army Biometrics Task Force Mission http www biometrics dad mil About Mission VisionGoals aspx accessed 30 October 2008 40 Vickers Hollie Ryan currently works as a strategic planner for Ideal Innovations Inc Programs and Operations Division with whom she was previously tasked as a policy analyst for the BTF Ms Ryan holds an 1 f A in War Studies from the Royal Military College of Canada a Bachelor of Social Science in Political Science and is currently working on a 1 faster's degree in Chemistry with a focus on forensics She is also a retired Army Captain having completed tours of duty between 1994 and 2006 in Bosnia the Republic of Georgia and Western Europe Readers may contact Ms Ryan via email at hollie a ryan aus army mil FOR OFFICIAL USE ONLY Military Intelligence by Captain Shawn McMahon Introduction The application of science and technology to achieve military objectives dates as far back as the history of human conflict Since the age of Archimedes and the ancient Greeks and even before mankind has sought to employ science and technology to gain an advantage over its enemies Oftentimes the com batant that can effectively manage and focus the power of science and technology at the decisive mo ment emerges as the victor Today the organization responsible for coordinating forensic efforts within the Department of Defense DOD is facing such a management challenge The Forensics Executive Steering Group FESG is the organization assigned the task of coordinating all DOD expeditionary efforts and establishing forensics as an enduring global and deployable capability 1 These tasks while straightforward are made more complex by several factors First throughout DOD and beyond there are differing views as to just what 'forensics' is Across law enforcement medical and January March 2009 intelligence communities the definition of forensics can vary widely Secondly there are organizations within DOD with overlapping responsibilities across the broad range of disciplines and modalities within forensic science Lastly the sheer number of orga nizations that produce consume or train forensic analysis makes coordination difficult The FESG has made progress despite these challenges but there is much more to be done New forensic requirements continue to emerge and the foundation for an enduring forensics ca pability has yet to be agreed upon By examining the conditions which spawned the creation of the FESG the evolution of its creation and the over arching challenges it faces it is possible to identify the core challenges which the FESG must over come to achieve success Because the DOD foren sic community lacks a completed capabilities based assessment CBA which would inform changes to doctrine and organization and a DOD Directive which would assign responsibility for coordinating FOR OFFICIAL USE ONLY 67 forensics within DOD the FESG must rely upon The growing number of forensic laboratories in the experience and expertise residing within its Iraq spawned the need for the training of coalition membership to guide the FESG towards achieving ground forces in the identification collection and its objectives In other words the success of the handling of materials for forensic exploitation With FESG hinges upon the participation and coopera no established forensics collection training plan tion of the entire forensics community deploying units turned to multiple sources for help In recognition of the immediate training require Origins of the DOD Forensics ment organizations conducting forensic analysis Governance Structure responded by establishing mobile training teams to Operations Iraqi Freedom Enduring Freedom provide the necessary training The dramatic impact OIF OEF generated a large mobilization of tech of forensics to the success of these diverse missions nology and ideas in support of mission accomplish led to an increase in the demand for forensic capa ment The enemy's ability to employ anonymity bilities The demand for forensic training and ana within the population presented a unique challenge lytical assets was beginning to exceed the supply to the military a challenge which was ideally suited If the demand for forensic capabilities equated to its to be met through the application of forensic sci value the value of forensic science to the warfighter ence As the enemy applied new techniques tactics had become unquestionable 3 and weapons technological solutions were rushed to the battlefield in support of the warfighter The By 2007 the success of the multiple individual immediate success enjoyed by the several forensic forensic efforts and the potential shortfall in re solutions that were implemented in OIF and OEF sources brought attention to the lack of an au gave rise to an even greater demand for forensic ca thority responsible for coordinating the ongoing pability and illustrated the need for the capability to efforts and ensuring that forensics was a capa be established as one that would be available into bility that continued to be available in the long term In a July 2007 memorandum Mr John the indefinite future Young then Director of Defense Research and Forensics was applied through multiple efforts Engineering DDR E recommended that the and programs to support intelligence operations Joint Requirements Oversight Council initiate a and targeting law enforcement and medical sup CBA to assess forensics as an enduring capability port missions The forensic exploitation of weapons and to support a strategy to identify and manage and materials for intelligence purposes expanded the desired capabilities develop supporting sci greatly in response to the improvised explosive de ence and technology investments information man vice IED and sniper threats in Iraq Beginning with agement requirements and supporting manpower the efforts of a handful of latent print examiners to and technical skill levels Once initiated the CBA identify IED cell members and snipers other foren would become an 18 month effort that would pro sic capabilities were incrementally deployed on the vide for the establishment of forensics as an endur initiative of many individual organizations and com ing capability 4 munities 2 Forensic laboratories with firearms sig nature toolmark and DNA analysis capabilities In recognition of the more immediate need to co were soon deployed to Iraq while digital forensics ordinate ongoing efforts Mr Young in cooperation examiners exploited captured computers and cell with the Army Provost Marshal General PMG also phones for intelligence value As the multidisci convened a three day Defense Forensics Workshop pline forensic laboratories were established in Iraq to address the coordination and resourcing of ex they were leveraged not only against enemy target peditionary forensic capabilities Among the work shop's 55 findings and recommendations was the ing but against the coalition mission of establish ing the rule of law in Iraq With little capability of overarching recommendation to establish a joint management structure to oversee and guide the its own to exploit potential evidence for prosecut ing criminals the Iraqi government relied upon the development of a defense forensics capability The deployed DOD forensic labs to supply evidence and recommendations developed by the workshop at testimony in the prosecution of criminals within the tendees provided the groundwork for the establish ment of the FESG ln a January 2008 memorandum Iraqi judicial system 68 FOR OFFICIAL USE ONLY Military Intelligence the Under Secretary of Defense for Acquisition Technology and Logistics formally established the FESG to coordinate the development and manage ment of defense forensics capabilities The FESG Charter was signed in April 2008 and established the scope objectives membership and responsibil ities of the FESG Agency's Directorate for Measurement and Signals Intelligence and Technical Collection DIAOT the Biometrics Task Force BTF and the Army's senior law enforcement officer the PMG The three chairs are responsible for providing oversight and under taking resolution of issues across DOD forensics initiatives and programs The chairs are supported in this effort by the Chairman of the DOD Forensic Science Committee who is responsible for advising the FESG on matters pertaining to the technical as pect of forensics see Figure 1 The concurrent establishment of the FESG with the initiation of the Forensics CBA serves as a re minder of the separate solutions that have been implemented to resolve the two sides of the same capability gap While the CBA is expected to provide While the FESG cochairs provide the necessary solutions across the doctrine organization train guidance and direction to the FESG the continuing ing materiel leadership personnel and facilities progress of the FESG will occur as a result of the DOTMLPF spectrum to establish an enduring fo work of its membership One strength of the FESG rensics capability the FESG was established as an is that it exists as the single forum and structure for interim solution to rectify the immediate manage the DOD forensic community to communicate its re quirements and coordinate its efforts with other or ment gap The FESG need only exist until a foren sics Executive Agent and Principal Staff Assistant ganizations Originally chartered to include only the are designated and the CBA has informed the cre Services combatant commanders and a handful ation of an enduring capability This fact presents of other DOD activities as its members the FESG the FESG th its most fundamental challenge How membership has grown to over 30 Service staff and can an interim organization maintain its relevance joint organizations These organizations have come to realize that it is in their best interests to be in and authority The answer lies in the organization volved as the FESG has begun to address resourc and membership of the FESG ing immediate expeditionary forensic requirements FESG Structure and Organization and is taking the steps to establish the foundation The structure and organization of the FESG was for an enduring forensic capability The FESG mem developed in recognition of the several organizations bership is comprised of all DOD forensic stakehold which have a significant investment in the future ers or organizations that have an interest due to of forensics as an enduring capability The leader either direct or indirect participation in one or all ship of the FESG is composed of the principals of of the forensic functions It includes organizations three DOD organizations the Defense Intelligence across operational medical intelligence and law en - -- forcementfields across the Services the Joint Staff combatant commands and other DOD activities See the partial list of FESG members and their contribu tions to the forensics community at the end of this article DOD for me l XKUIM SIMftng Group A1m1 P' unv• Manlwl ll PUG Olr•dQ• at cth • f '0 ct ITFI L- Oepu11y Oir•c•Of o fenM 11'11 ltJllft'• ft# llASlllT TCll C il DIA01' - - ' - ' 1 · 'f r ' ' • c∙∙ - ----·--··-·· ∙∙ ∙1 'l C DeOF i -l ct • ·v - ∙∙∙∙ - it ·-··-· -·- • ∙ _ - F· The body of the FESG structure is di vided among three working groups which are structured along three distinct topics related to forensics governance ∙ J I _ 1 ∙ _j _____ PolkyWG L- Figure 1 FESG Structure January March 2009 Transformation and policy Capabilities and requirements Training and certification Each FESG member has a voice in the recommendations forwarded to the co chairs from each working group More FOR OFFICIAL USE ONLY 69 place As the enemy transitions from an infrastruc turebased hierarchy to one based on a social net work of individuals it is essential that the DOD develop and maintain the means to detect and iden tify the unique signature of individuals Tasked with the responsibility to both maintain the expedition ary forensic capability and to establish an enduring capability the FESG will rely upon its membership to provide the solutions which will accomplish those tasks The FESG will succeed or fail based on the The Capability and Requirements Working Group's dedication of its membership to the accomplish CRWG newly developed requirements process is a prime example of how membership participation in a ment of those tasks working group task can directly impact DOD foren Membership of the FESG sic governance decisions As proposed the process This partial membership listing is not intended to allows for the CRWG to examine all emerging capa be all inclusive roster of the FESG but rather a sam bility requirements and using the expertise resident ple which illustrates the diverse organizations which in the CRWG membership provide resourcing rec have come together to support both an expeditional ' ommendations that will best satisfy those emerging and enduring forensic capability within DOD This requirements The recommendation will then go for list is not intended to provide a description of the full ward with the weight of the entire forensic commu scope of the organizations activities For more infor nity behind it mation on any of the organizations listed here refer to importantly the solutions and recommendations developed in each working group are the result of the direct participation of the FESG membership The full participation in ongoing and future FESG working group efforts are critical because the FESG relies upon the expertise that resides in the de centralized forensic environment to develop realis tic and prudent solutions to immediate capability needs The FESG members through the working groups have also taken the first steps toward establish ing the foundation for an enduring forensics capa bility The development of the Capstone Concept of Operations CONOPS for DOD Forensics was made possible through the participation of the FESG membership The CONOPS provides the ba sis for the assessment and analysis of capabil ity gaps and redundancies done using the CBA process The Training and Certification Working Group's examination of Battlefield Collection Training and forensic examiner and technician training standards will also directly feed the CBA demand for information and analysis It is critical to the timeliness of the CBA that all the efforts of the FESG membership continue to directly feed into the CBA process It is through this relation ship with the CBA that the FESG members will have a direct impact on the establishment of an enduring forensic capability Conclusion the sources listed in each organization's description U S Air Force Office of Special Investigations AFOSI AFOSI provides professional investigative service to commanders of all Air Force activities Its mission is to identify exploit and neutralize crimi nal terrorist and intelligence threats to the U S Air Force DOD and the U S The agency reports to the Inspector General IG Office of the Secretary of the Air Force AFOSI is headquartered at Andrews Air Force Base Maryland and has units in 221 places globally both on Air Force bases and in strategi cally important locations around the globe http WW v osi andrews af mil Armed Forces DNA Identification Laboratory AFDIL AFDIL provides human remains identifica tion forensic DNA analytical services bioinformatic analysis and management services mass fatality specimen collection and management services hu man reference specimen collection cataloging archi val and retrieval repository services It supports the Armed Forces Medical Examiner System AFMES and Armed Forces Institute of Pathology AFIP through consultation education and research AFDIL is lo cated in Rockville Maryland http vvw afip org consultation AFMES AFDIL index html Interim or not the FESG is moving forward with decisions which impact both the forensic commu nity and the warfighter As the DOD biometrics ca pability has grown more robust forensic collection and analysis capabilities have become a vitally im portant link between an anonymous enemy and Biometrics Task Force BTF The BTF leads DOD the evidence which links him to a specific event or activities to program integrate and synchronize bi 70 FOR OFFICIAL USE ONLY Military Intelligence ometric technologies and capabilities and to operate Defense Computer Forensics Laboratory and maintain DOD's authoritative biometric data DCFL The DCFL mission is to provide timely base to support the National Security Strategy The and innovative digital evidence processing analy BTF acts as the DOD proponent for biometrics lead sis and diagnostics for any DOD investigation that ing the development and implementation of biomet requires computer forensic support to detect en ric technologies for combatant commands Services hance or recover digital media to include audio and agencies delivers capabilities in order to con and video This includes onsite assistance includ tribute to the enhancement of the biometric com ing search and seizure and expert testimony The munity and empowers the warfighter by improving DCFL supports criminal CI counterterrorism and operational effectiveness on the battlefield fraud investigations of DCIOs and DOD CI activi http www biometrics dod mil ties but also safety investigations IG directed in quiries and commander inquiries DC3 also sets DOD Cyber Crime Center DC3 DC3 sets stan DOD guidelines for digital forensic analysis dards for digital evidence processing analysis and diagnostics for any DOD investigation that requires http www dc3 mil home php computer forensic support to detect enhance or recover digital media including audio and video The center assists in criminal counterintelligence CI counterterrorism and fraud investigations of the Defense Criminal Investigative Organizations DCIOs and DOD CI activities It also supports safety investigations and IG and commanderdi rected inquiries DC3 aids in meeting intelligence community IC document exploitation objectives from a criminal law enforcement forensics and CI perspective DC3 provides computer investigation training to forensic examiners investigators sys tem administrators and any other DOD members who must ensure Defense information systems are secure from unauthorized use criminal and fraud ulent activities and foreign intelligence service ex ploitation DC3 is located in Linthicum Maryland http www dc3 mil home php Defense Cyber Crime Institute DCCI DCCI provides legally and scientifically accepted stan dards techniques methodologies research and tools on digital forensics to meet the_ current and fu ture needs of the DOD CI and law enforcement com munities http www dc3 mil home php Defense Intelligence Agency DIA DIA plays a central role in gathering processing and produc ing intelligence used to inform policymakers and warfighters alike DIA has been a major part of the unification of effort among the IC as a whole It is increasing its investment in the development of Human Intelligence and technical collection capa bilities to further improve its surveillance and warn ing capabilities http www dia mil Joint IED Defeat Organization JIEDDO JIEDDO leads advocates and coordinates all DOD actions in support of combatant commanders and their respective Joint Task Forces' efforts to defeat IEDs as weapons of strategic influence JIEDDO works aggressively to find develop test and rap idly deliver emerging counterIED CIED capa bilities to the warfighter Split along three lines of operation Attack the Network Defeat the Device and Train the Force JIEDDO's initiatives to help maximize warfighter capabilities include technical and forensic exploitation of devices explosives de tection and EDspecific predeployment training for Soldiers Sailors Airmen and Marines JIEDDO tailors these initiatives to the urgent needs of com batant commanders bringing them to the field quickly using its rapid acquisition capabilities https www jieddo dod mil Defense Cyber Crime Investigation Training Academy DCITA DCITA develops and delivers computer investigation training courses for DOD organizations DCIOs military CI agencies and Joint POW MIA Accounting CommandCentral law enforcement organizations The Academy is Identification Laboratory JPACCIL The mis the only government organization solely dedicated sion of JPACCIL is to achieve the fullest possible accounting of U S service personnel missing form to computer investigations training development and delivery Students are trained in the latest past conflicts through the direct recovery and lab oratory analyses of human remains Located in digital forensic techniques using stateoftheart Hawaii it is the largest Forensic Anthropology labo equipment classrooms and technologies ratory in the world http www jpac pacom mil http www dc3 mil home php January March 2009 FOR OFFICIAL USE ONLY 71 National Ground Intelligence Center NGIC NGIC produces and disseminates allsource integrated intelligence on foreign ground forces and related mili tary technologies to ensure that U S forces have a deci sive edge in current and future military operations It is DOD's primary producer of ground forces intelli gence NGIC produces scientific and technical in telligence and military capabilities analysis on foreign ground forces required by warfighting com manders the force modernization and research development communities DOD and national poli cymakers NGIC is leading the way in the U S Army Intelligence and Security Command's CIED target ing program by providing technical intelligence and all source fusion capabilities to assist Multi National ForcesIraq in identifying bombmaking networks in Iraq NGIC is located in Charlottesville Virginia http www inscom army mil MSC DefaultNGIC aspx text off size 8em military operations The PMG supports the Army for management and execution of the Army Force Protection mission including antiterrorism oper ations and intelligence functions and serves as the commanding general of U S Army Criminal Investigation Command https www us army mil suite page 409448 U S Army Criminal Investigation Laboratory USACIL USACIL provides vorldwide forensic lab oratory service training and R D to all DOD inves tigative agencies in trace evidence DNA Serology latent prints firearms and toolmarks digital evi dence drug chemistry and forensic documents It provides the widest range of services of all the DOD accredited forensic laboratories USACIL also oper ates an Army school to train forensic laboratory ex aminers and manages the U S Army CID Command criminalistics and visual information programs Of the federal laboratories accredited by the American National Media Exploitation Center NMEC Society of Crime Laboratory DirectorsLaboratory NMEC is a Director of National Intelligence Center Accreditation Board only the Federal Bureau of composed of DIA CIA FBI NSA and DC3 as part Investigation Laboratory offers as many supporting ner organizations NMEC is responsible for inte forensic disciplines as USACIL USACIL located at grating Intelligence Community DOMEX policies Fort Gillem Georgia provides forensic laboratory standards and procedures with tactical and opera services to DOD investigative agencies and other tional level DOD procedures and ensures responsive federal law enforcement agencies http www cid DOMEX support to meet the needs of intelligence army mil usacil html W defense homeland security law enforcement and other U S Government consumers Naval Criminal Investigative Service NCIS NCIS is the primary law enforcement and CI arm of the U S Department of the Navy It works closely Endnotes with other local state federal and foreign agencies I FESG Charter April 2008 to counter and investigate the most serious crimes terrorism espionage computer intrusion homi 2 John J Young Jr Defense Forensics Workshop Invitation July 25 2007 cide rape child abuse arson procurement fraud 3 For more detail on the early forensics efforts in Iraq read the and more Examiners in NCIS' forensic laboratories play an important part in supporting agency inves article by Tom Cantwell and Sean Falconi in this issue tigations by examining evidence and providing testi 4 John J Young Jr Defense Forensics Workshop Invitation July mony in court The examiners apply their expertise 25 2007 in analyzing arson accelerants trace evidence la tent fingerprints questioned documents and drug chemistry and related chemicals http ww ncis navy mil ncis index asp Provost Marshal General PMG The PMG leads and directs policy for Army law enforcement po lice intelligence physical security corrections and internment criminal investigations and mil itary police support throughout the full range of 72 Captain Shawn Mclv ahon is currently assigned to the Office of the PMG seruing on the Professional Staff the FESG He holds an MA in Strategic Intelligence from the National Defense Intelligence College and is a graduate of the Ml Captains Career Course FOR OFFICIAL USE ONLY Military Intelligence USACIL RBOC Providing Support en to the Warfighter and ' Expeditionary Forensics by William G Doyne Introduction Given the demonstrated successes of Weapons Technical Intelligence Biometrics and the forensic func tions performed at the Combined Explosive Exploitation Cell CEXC Labs it is clear that forensics not only has a role on the current battlefield but also is a force multiplier The need for a nonimprovised explosive device IED material which is not associated directly with the device exploitation forensic capability to augment the CEXC labs JED oriented forensics has generated a requirement for expeditionary forensics Forensics is the application of multidisciplinary scientific processes to establish facts Expeditionary forensics is currently provided by the Joint Expeditionary Forensic Facilities JEFFs and can be used to Establish facts that can be used by commanders to shape force protection measures Drive intelligence analysis and subsequent targeting for combat operations Prosecute detainees in a court of law Determine sources of insurgent arms ammunition and explosives Expeditionary Forensics and In tellige n ce Operations combine to d egra d e the ene my's ability to capital ize on anonymity The resu lt is often u sable int elligence as well as th e moral and legal justification needed to target apprehend and prosecute terrorists or enemy combatants -- -- The downside of this success is that it has generated an increase in the amount of potential foren sic material collected resulting in an increased workload at both the CEXC and JEFF labs the Terrorist Explosive Device Analytical Center lab providing CONUS support to the CEXC labs and the Biometric Fusion Center BFC As Site Exploitation and Forensic Collection training programs and accompanying tactics techniques and procedures are developed and promulgated there will be more units collecting material further exacerbating the severity of the situation Reach Back Operations Center It is largely unrecognized that the Department of Defense DOD possesses one of the most powerful foren sics toolsets in the U S because the forensics capability is dispersed throughout DOD and is uncoordinated Forensics has historically been used mainly to support criminal investigations and human remains identifica January March 2009 FOR OFFICIAL USE ONLY 73 tion for judicial and medical reasons In order to leverage these capabilities in the LP DNA and fireanns tool marks FA TM areas to support the warfighter intheater the U S Army Criminal Investigation Laboratory USACIL has established the Reach Back Operations Center RBOC The RBOC mission is to provide support to the warfighter and to expand JEFF forensic capabilities by leveraging DOD's institutional forensic laboratories accessing national and international forensic data bases and utilizing CONUS expertise without increasing the intheater footprint or sustainment costs RBOC will support the warfighter by Providing assistance to DOD and Allied force commanders when triaging specific forensic LP DNA and FA TM potentialities Serving as the authoritative resource for advice on the development purchase and deployment of technical and scientific LP DNA and FA TM equipment or techniques in forensics Providing forensic analysis interpretation of exploited materials to supported commanders investiga tors and intelligence agents when needed at all stages of examinations Conducting and or coordinating appropriate forensic research developing new forensic applications testing and evaluating emerging technologies RBOC will support the JEFFs as well as CEXC labs and others upon request by Providing LP and FA TM identification verification Assisting in monitoring complex LP case interpretation in collaboration with deployed lab personnel Conducting Integrated Automated Fingerprint Identification Automated Biometric Identification System IAFIS ABIS database searches and providing reports Receiving material from JEFFs and assisting in the processing of highly difficult sensitive and tech nical cases Conducting Questioned to Known comparisons of latent impressions Providing footwear and tire track analysis examinations comparisons and verifications Providing technical advice on DNA data basing capabilities and search results Providing guidance on DNA technical review Providing DNA data interpretation and technical review Providing performance checks on new DNA equipment b 7XEJ 1 --- ------------ --- J E Assisting in working all firearm caserelated evidence including comparison examinations and conclusions Assisting in working TM cases including comparison examinations and conclusions Providing distance determination evaluation and bullet trajectory analysis Providing and supporting Integrated Ballistic Identification Systems operations RBOC Composition 6J 7 All personnel will be members of the DOD 74 FOR OFFICIAL USE ONLY Military Intelligence U S Army Criminal Investigation Laboratory USACIL The RBOC is a winwin proposition for all individ uals and organizations concerned Initially concern was expressed that this was an effort to take from another rice bowl fix a system that isn't broken or just become a bump' in the road Currently most forensic faculties are working at or near max imum capacity and have some degree of a case backlog As indicated earlier forensic processing and analysis capability is directly proportional to the collection capability Since forensic examiners particularly the certified variety are a limited asset there is a significant lag time where the time the need for additional capacity i e more examiners is identified and when it becomes available nus is true whether the more expensive route of contractors is taken or the cheaper but longer route of train ing DOD personnel is selected Therefore it makes a great deal of sense to maximize current capabili ties with the minimum resources USACIL Reach Back Operations Center Chief Lead Forensic Scientist Operations Officer RBOC's Benefits to Expeditionary Forensics It is important to recognize that in expeditionary forensics there are certain tasks that can be com pleted intheater or in the rear and some tasks that can only be accomplished intheater For example transporting material out of theater for LP processing can be done however it is generally not practical because of the transportation time involved So it makes sense that LP processing should be done intheater LPs present or developed on forensic material are nor mally captured digitally and transmitted to either the BFC for search in the ABIS or the Federal Bureau of J Investigation's Criminal Justice Information Services for search in IAFIS dl l- Thrhie -t tunG· e required for these actions is time taken away from processing material which is best done intheater This method is invisible to the in theater examiner and assists the BFC by reducing its workload January March 2009 FOR OFFICIAL USE ONLY 75 t 7XE RBOC DNA examiners can assist with data interpretation particularly with DNA mixture interpretation profiles with multiple contributors and technical reviews In those circumstances where material can be sent to CONUS for processing i e large back log low priority not time sensitive with appropriate coor dination with the RBOC chief USACIL RBOC examiners can receive process and render reports to sup port intheater labs RBOC on AKO and AKO$ USACIL RBOC has established a page on both AKO and AKOS so that users can submit RFI RFA and upload images both LP and FA TM for search or verification You can request access to the RBOC page by emailing the following information to bill doyne@ us army mil or kevin kahley@us army mil RBOC Community Membership Request Name - __ Date _______________________________________ Organization Position __________ _ NIPR Email Address ______ _ SIPR Email Address ______ _ DSN Phone Numbe r ______ _ Commercial Phone Number ________ _ VOiP Numbe r ________ _ FAX Number Secure Telephone _______ _ Reason for Submitting Request Conclusion As DOD builds on the hard work and vision of those individuals who saw the potential of forensics on the current battlefield to transition to a costeffective enduring forensic capability the introduction of the USACIL RBOC will serve as the genesis for that effort As the JEFF Concept Plan works its way through the system to become a program of record the RBOC will provide the tools necessary for commanders and current expeditionary forensic facilities to maximize capability and capacity at minimum cost • William Doyne is currently employed as a DA Civilian at the USACIL and serving as the chief of the RBOC Prior to becoming the RBOC chief he was assigned as an LP examiner in the LP Branch Mr Doyne is certified as an W Latent Fingerprint Examiner and Footwear Examiner He has a BS in engineering from the U S Military Academy an MA in Chemistry from Villanova University and a Public Education Certification from Wilson College Mr Doyne is a retired U S Army Colonel with over 30 years service as an Infantry officer 76 FOR OFFICIAL USE ONLY Military Intelligence TRADOC Capability ManagerBiometrics and Forensics TCMBF Fort Huachuca Arizona TRADOC Capability ManagerBiometrics and Forensics Office and the Department of Defense DOD define forensics as the application of multi-disciplinary scientific processes to establish facts n TCMBF serves as the Army use advocate to Program Manager PM DOD Biometrics and designated Forensics PMs and coordinates closely with other service and branch proponent user representatives to enable facilitate and champion the development of biometrics and forensics across the Doctrine Organization Training Materiel Leadership Personnel and Facilities DOTMLPF spectrum with Army Joint interagency allies Coalition and National organizations Traditionally the DOD has employed forensics to establish facts for use in investigations a court of law Uniform Code of Military Justice proceedings or to determine the identification of human remains as well as cause and manner of death The War on Terrorism has produced emerging needs and capabilities for forensics across the range of military operations Forensics has an integral role in intelligence functions operational activities force protection host nation legal support personnel recovery and identity superiority functions Recently operations in Afghanistan and Iraq Theatres have validated the importance of forensics in providing intelligence and battlefield awareness for military decisionmaking and operations at all levels TCMBF Contacts 0Qerltlon1 Officer COL Mark R Wallace 520 5334432 DSN 821 NIPR martl wallace@us arrny mil SIPR martl wallace@us arrnysmil mil Deputy Djrector Senior Enlisted Adylsor Kathy Debolt 520 5334657 I DSN 821 NIPR kathy debolt@us arrny mil SIPR kathy debolt@us arrny smil mil Forensics Division Lnd MSG Nestor Rodriguez 520 5330303 DSN 821 NIPR nestonodriguezjr@us arrny mil SIPR nestor rodrlguezjr@us arrny smil mil ICM BF Wlb Portal L TC Malcolm McMullen VOiP 520 5151797 NIPR malcolm mcmullen@us arrny mill SIPR malcolm mcmullen@us army smll mil January March 2009 MAJ Clea McCaa 520 5330304 DSN 821 NIPR clea mccaa@us arrny mil SIPR clea mccaa@us arrny smil mil https 167 128 198 116 sites TPO BF default aspx FOR OFFICIAL USE ONLY 77 A AAIDB AATF ABIS ACE ADC ON AFDIL AFI AF MES AFOSI AFRSSIR AIMS A LARA CT AM SAA AO AOR ARL AT L ATF AntiArmor Incident Database AntiArmor Task Force Automated Biometric Identification System Analysis Control Element administrative control Armed Forces DNA Identification Laboratory automated fingerprint identification Armed Forces Medical Examiner System U S Air Force Office of Special Investigations Armed Forces Repository of Specimen Samples for the Identification of Remains Automated Identity Management System all Army activities Army Materiel Systems Analysis Agency area of operation area of responsibility Army Research Laboratory Acquisition Technology and Logistics Bureau of Alcohol Tobacco Firearms and Explosives 8 BAT BCT BESB BEWL BIAR BISA BOD BTF BUSK Biometric Automated Toolset brigade combat team ABIS Biometric Examination Services Branch BiometricEnabled Watch List Biometrics Intelligence Analysis Report Biometric Identification System for Access DOD Biometric Operations Directorate Biometrics Task Force Bradley Urban Survivability Kit CALL CBA CCCI CED CENTCOM CEXC CEXCA CEXC1 CID CIONE CIED CIL CITP CJCSI CJIS CNR COCOM CODIS CON OP CON US CPA Center for Lessons Learned capabilities based assessment Central Criminal Court of Iraq Iraqi Criminal Evidence Division U S Central Command Combined Explosives Exploitation Cell Combined Explosives Exploitation CellAfghanistan Combined Explosives Exploitation CellIraq U S Army Criminal Investigation Command Combined Information Data Network Exchange counter improvised explosive device JPAC Central Identification Laboratory CounterIED Targeting Program Chairman of the Joint Chiefs of Staff Instruction Criminal Justice Information Services Center for National Response combatant command Combined DNA Index System concept of operation continental United States Coalition Provisional Authority c 78 FOR OFFICIAL USE ONLY Military Intelligence CRWG CTC CTC Capabilities and Requirements Working Group combat training center U S Military Academy Counter Terrorism Center D DC3 DCCI DCFL DC GSA DCITA DDR E DFES DFL DFN DFTRA OHS DIA DNA DOD DO MEX DOTMLPF DT DOD Cyber Crime Center Defense Cyber Crime Institute Defense Computer Forensics Lab Distributed Common Ground SystemArmy Defense Cyber Crime Investigation Training Academy Director of Defense Research and Engineering Defense Forensics Enterprise System Defense Forensic Laboratories Defense Forensic Network Defense Forensics Training Research Academy U S Department of Homeland Security Defense Intelligence Agency deoxyribonucleic acid Department of Defense document and media exploitation doctrine organization training material leadership personnel and facilitie Directorate for MASINT and Technical Collection DIA E EA EBTS EFL EFP EJKTF EOD ES2 executive agent Electronic Biometric Transmission Specification expeditionary forensic laboratories explosively formed projectile ExtraJudicial Killing Task Force explosive ordnance disposal explosive ordnance detachment Every Soldier is a Sensor F FA FBI FEB FEI FESG FOB FOC FOR INT FP FRT firearm Federal Bureau of Investigation Forensic Exploitation Battalion For everyone's information Forensics Executive Steering Group forward operating base full operational capability Forensics Intelligence Forensic Photographer Firearms Reference Table G G2 G3 GRC Army or Marine Corps component intelligence staff officer Army or Marine Corps component operations staff officer general rifling characteristics H HARMONY HBCT January March 2009 National DOMEX database heavy brigade combat team FOR OFFICIAL USE ONLY 79 HllDE HJC HMMWV HUMINT HVAC Handheld lnteragency Identity Detection Equipment Higher Judicial Council Iraq highmobility multipurpose wheeled vehicle Human Intelligence highvoltage air conditioning IAFIS IAI IBIS IC ICO IDENT ldM IED llR 10 IOC IPB ISAF ITF ITO IZ IZ Integrated Automated Fingerprint Identification System International Association for Identification Integrated Ballistic Identification Systems ATF Intelligence Community Iraqi correctional officers OHS Automated Biometric Identification System Identity Management improvised explosive device intelligence information report information operations initial operational capability Intelligence Preparation of the Battlespace Intelligence Preparation International Security Assistance Force Investigative Task Force Iraqi Theatre of Operations Iraq International Zone of the Battlespace J J2 JATAC JCIDS JDEC JEFF JFC JI ED DO JITEC JPAC JPEC JROC JTAPIC Intelligence Staff Officer Joint command Joint Asymmetric Threat Awareness Counter Joint Capabilities Integration Development System Joint Document Exploitation Center Joint Expeditionary Force Forensics Joint Expeditionary Forensic Facility Joint force commander Joint IED Defeat Organization Joint lnteragency Training and Education Center Joint POW MIAAccounting Command Joint Prosecution and Exploitation Cell Joint Requirements Oversight Council Joint Trauma Analysis and Prevention of Injury in Combat L LE LEP LIMS LP LPE law enforcement Law Enforcement Professional Laboratory Information Management Systems latent print latent print examination MASI NT MEDEX METTT MiTT MNC1 MND Measurement and Signature Intelligence media exploitation mission enemy terrain troops available and time available military transition team MultiNational CorpsIraq MultiNational Division M 80 FOR OFFICIAL USE ONLY Military Intelligence MNDNorth MNFW MOS MRAP mtDNA MTT MultiNational DivisionNorth Iraq Multi National ForceWest Iraq military occupational specialties mine resistant ambush protected mitochondrial DNA mobile training team N NAVEODTECHDIV NCIS NCTC NGA NGA NGI NGIC NMEC NSTC NTC Naval Explosive Ordnance Disposal Technology Division Naval Criminal Investigative Service National Counter Terrorism Center Next Generation ABIS National Geospatiallntelligence Agency Next Generation Identification National Ground Intelligence Center National Media Exploitation Center National Science Technology Council National Training Center 0 O C OCON US OEF OIF observer controller outside continental United States Operation Enduring Freedom Operation Iraqi Freedom p PIER 2 3 PIR PJCC PM PMG PPE ppi PSA PTSD Portable Iris Enrollment and Recognition System priority intelligence requirement Provincial Joint Coordination Center program manager Provost Marshal General personal protective equipment pixels per inch principal staff assistant Post Traumatic Stress Disorder R RBOC RFA RFI ROMO Reach Back Operations Center requests for action request for information range of military operations s S T S2 S3 SIGACT SIPRNET SME SOC OM SOP SSE SUV January March 2009 science and technology intelligence staff officer brigade battalion and Armored Cavalry operations staff officer significant activity Secret Internet Protocol Router Network subject matter expert U S Special Operations Command standard operating procedures sensitive site exploitation sport utility vehicles FOR OFFICIAL USE ONLY 81 T TUSK TRADOC Capability ManagerBiometrics and Forensics Training and Certification Working Group Technical Intelligence Terrorist Explosive Device Analytical Center theatre internment facilities tool mark Tactical Network Topology U S Army Training and Doctrine Command terrorist screening center tactical site exploitation tactic technique and procedure Abrams Tank Urban Survivability Kit ULF ULM ULW USACIL USAIC FH USD USVISIT unsolved latent file unsolved latent match universal latent workstation U S Army Criminal Investigation Laboratory U S Army Intelligence Center and Fort Huachuca Under Secretary of Defense U S Visitor and Immigrant Status Indicator Technology Program TCMBF TCWG TECH INT TEDAC TIF TM TNT TRADOC TSC TSE TTP u v V5 VBIED Military Police Investigator ASI identifier vehicleborne IED w WIT WL weapons intelligence team watch list y YSTR 82 YchromosomeShort Tandem Repeat STR FOR OFFICIAL USE ONLY Military Intelligence CONTACT AND ARTICLE Submission Information This is your magazine We need your support by writing and submitting articles for publication When writing an article select a topic relevant to the Military Intelligence Ml and Intelligence Communities IC Articles about current operations and exercises ITPs and equipment and training are always wel come as are lessons learned historical perspectives problems and solutions and short quick tips on better employment or equipment and personnel Our goals are to spark discussion and add to the profes sional knowledge of the MI Corps and the IC at large Propose changes describe a new theory or dispute an existing one Explain how your unit has broken new ground give helpful advice on a specific topic or discuss how new technology will change the way we operate When submitting articles to MIPB please take the following into consideration Feature articles in most cases should be under 3 000 words doublespaced with normal margins without embedded graphics Maximum length is 5 000 words Be concise and maintain the active voice as much as possible We cannot guarantee we will publish all submit ted articles and it may take up to a year to publish some articles Although MIPB targets themes you do not need to write to a theme Please note that submissions become property of MIPB and may be released to other government agencies or nonprofit organizations for republica tion upon request What we need from you A release signed by your unit or organization's information and operations security officer I SSO stating that your article and any accom panying graphics and photos are unclassified nonsensitive and releasable in the public do main OR that the article and any accompanying graphics and photos are unclassified FOUO IAW AR 3805 DA Information Security Program A sample security release format can be accessed at our website at https icon army mil January March 2009 A cover letter either hard copy or electronic with your work or home email addresses telephone number and a comment stating your desire to have your article published Your article in Word Do not use special document templates A Public Affairs or any other release your instal lation or unit agency may require Please include that release s with your submission Any pictures graphics crests or logos which are relevant to your topic We need complete captions the Who What Where When Why and How photographer credits and the author's name on photos Do not embed graphics or photos within the article Send them as separate files such as tif or jpg and note where they should appear in the article PowerPoint not in tif or jpg format is acceptable for graphs etc Photos should be at 300 dpi The full name of each author in the byline and a short biography for each The biography should include the author's current duty assignment re lated assignments relevant civilian education and degrees and any other special qualifications Please indicate whether we can print your contact information email address and phone numbers with the biography We will edit the articles and put them in a style and format appropriate for MIPB From time to time we will contact you during the editing process to help us ensure a quality product Please inform us of any changes in contact information Submit articles graphics or questions to the Editor at MIPB@conus army mil Our fax number is 520 533 9971 Submit articles by mail on disk to MIPB AITN ATZSCDIDM Smith U S Army Intelligence Center and Fort Huachuca Box 200 1 Bldg 51005 Fort Huachuca AZ 85613 7002 Contact phone numbers Commercial 520 538 0956 DSN 879 0956 FOR OFFICIAL USE ONLY 83 P∙ The U S knty bltlllOtllClt Centltt IN II ltillioence Prol9n1on i IMAltln li41Pll pnrnsiOns al NI 25JO Ml pt tlWltllr1al dtsioned to keep •ltltllQellCt ll'Qf9sSIONll infonMd al currwnt cl MMf'QlnQ wetwi ttw i'l9ld c1 pn 'rldn an°' ronn probMlfts and whd TTPs his10l'QI IOUICIM ttt c i be and cho dl8d lot purposet al _ a ll'Qf9s fa de• _ s Ed b Stertlle ChBck Out MIPB DnlinB 00 O https icon army mil apps mipb_mag tJ ∙ FOR OFFICIAL USE ONLY The purpoae of the Forensic Resource CD is to provide uaefal relevant and enabling information The CD ofl'en aeveral resources covering all applications to give the the Warftghter a holistic view of the forensic community provide points of contact for training and resources and other guid ance related to DOD Forenaica Forensic Kita Avail able mission equipment and essential items Guidance Army and The ter Regulation specific guidance in managing site exploitation and task organization Know the supporting parameters SOP TTPa and Reference• 8ee how units execute their Forensic missions Considerations for tactical site exploitation missions lessons learned Observations on Forensic measures and effectiveness Trainin1 Training support packages view available training Undentanding Biometrics Forensics How Forensics supports irregular warfare the responsibilities and effects Who'• Who in Forensics Diagram of the community understand the process and know members in the Forensic community S 0 I'm nt CD •or bCiMllllD ta R11clathw S D D TIPs •W••w C tw•llllr»W••w T1PI • lta•w 8Q fr 'O St - Ii II Adhere D Here ll E eo -··-lSP Part llC'lm 1' SE TSP Ftllal LEMC4 15111 T l 1 st1 I n1' tb rlf u 1cs ra a o -· BO PcnNlcs walo t 0 9ut utllo t Q OvrA wlltlfs s ea i a FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY ATTN MIPB 12 Boxzmm BLDG sum FORT AZ 85313-7002 1- t0 1 291' 1' IA FOR OFFICIAL USE ONLY Headquarters Department of the Anny- This publlcu on IH approved for public release unllmited Plhl'
OCR of the Document
View the Document >>