Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Shavers, Brett.

Title Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects / Brett Shavers ; Harlan Carvey, technical editor. [O'Reilly electronic resource]

Imprint Waltham, Mass. : Syngress, 2013.
QR Code
Description 1 online resource (xxii, 267 pages) : illustrations
Bibliography Includes bibliographical references and index.
Contents Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question.; Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations.; IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction.; Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling.; Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography.; 7 Case Presentation.
Summary Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin.
Subject Forensic sciences -- Data processing.
Electronics in criminal investigation.
Computer crimes -- Investigation.
Electronic discovery (Law)
Evidence, Criminal.
Crime.
Crime
Criminalistique -- Informatique.
Électronique dans les enquêtes criminelles.
Criminalité informatique -- Enquêtes.
Communication électronique des pièces.
Preuve (Droit pénal)
Criminalité.
crimes (events)
crime (social issue)
Crime
Computer crimes -- Investigation
Electronic discovery (Law)
Electronics in criminal investigation
Evidence, Criminal
Forensic sciences -- Data processing
Added Author Carvey, Harlan A.
Other Form: Print version: Shavers, Brett. Placing the suspect behind the keyboard. Waltham, Mass. : Syngress, 2013 9781597499859
ISBN 9781597499842 (electronic bk.)
1597499846 (electronic bk.)
9786611020262
6611020268
1281020265
9781281020260
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information