UID:
edoccha_9959733903802883
Umfang:
1 online resource (xxii, 267 pages) :
,
illustrations
Ausgabe:
1st edition
ISBN:
9786611020262
,
1-281-02026-5
,
1-59749-984-6
Serie:
Gale eBooks
Inhalt:
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin
Anmerkung:
Description based upon print version of record.
,
Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question
,
Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations
,
IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction
,
Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling
,
Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography
,
7 Case Presentation
Weitere Ausg.:
ISBN 1-59749-985-4
Sprache:
Englisch
Bookmarklink