Description |
1 online resource (xxii, 267 pages) : illustrations |
Bibliography |
Includes bibliographical references and index. |
Contents |
Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question.; Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations.; IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction.; Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling.; Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography.; 7 Case Presentation. |
Summary |
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin. |
Subject |
Forensic sciences -- Data processing.
|
|
Electronics in criminal investigation.
|
|
Computer crimes -- Investigation.
|
|
Electronic discovery (Law)
|
|
Evidence, Criminal.
|
|
Crime.
|
|
Crime |
|
Criminalistique -- Informatique. |
|
Électronique dans les enquêtes criminelles. |
|
Criminalité informatique -- Enquêtes. |
|
Communication électronique des pièces. |
|
Preuve (Droit pénal) |
|
Criminalité. |
|
crimes (events) |
|
crime (social issue) |
|
Crime |
|
Computer crimes -- Investigation |
|
Electronic discovery (Law) |
|
Electronics in criminal investigation |
|
Evidence, Criminal |
|
Forensic sciences -- Data processing |
Added Author |
Carvey, Harlan A.
|
Other Form: |
Print version: Shavers, Brett. Placing the suspect behind the keyboard. Waltham, Mass. : Syngress, 2013 9781597499859 |
ISBN |
9781597499842 (electronic bk.) |
|
1597499846 (electronic bk.) |
|
9786611020262 |
|
6611020268 |
|
1281020265 |
|
9781281020260 |
|