Hiding Behind the Keyboard - 1st Edition - ISBN: 9780128033401, 9780128033524

Hiding Behind the Keyboard

1st Edition

Uncovering Covert Communication Methods with Forensic Analysis

eBook ISBN: 9780128033524
Paperback ISBN: 9780128033401
Imprint: Syngress
Published Date: 11th March 2016
Page Count: 254
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

Key Features

  • Covers high-level strategies, what they can achieve, and how to implement them
  • Shows discovery and mitigation methods using examples, court cases, and more
  • Explores how social media sites and gaming technologies can be used for illicit communications activities
  • Explores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online


Information Security practitioners and consultants, public and private sector cybercrime investigators, IT managers, attorneys, law enforcement officers, InfoSec students

Table of Contents

  • Foreword
  • Introduction
  • About the Authors
  • Acknowledgments
  • Chapter 1. Laying the Foundation of Covert Communications
    • Introduction
    • A Brief History of Covert Communication
    • Covert Communication Overload
    • Covert Communication Goals
    • Summary
  • Chapter 2. The Tor Browser
    • Introduction
    • History and Intended Use of The Onion Router
    • How The Onion Router Works
    • Forensic Analysis of The Onion Router
    • Tracking Criminals Using Tor
    • Used in Combination of Other Tools and Methods
    • Tails
    • Related Tor Tools and Applications
    • Summary
  • Chapter 3. Triaging Mobile Evidence
    • Logical Data
    • Physical Data
    • Examples of Logical and Physical Data
    • Wireless Carriers
    • Mobile Network Operators
    • Mobile Virtual Network Operator
    • Determining Target Number
    • Fonefinder.net
    • Number Portability Administration Center
    • Search.org
    • Subscriber Identity Module
    • Internal Hardware of a SIM
    • The SIM File System
    • SIM Sizes and Evolution
    • Typical Evidence
    • SIM Security—PIN and PUK
    • Triaging Devices
    • Devices Powered “On”
    • Devices Located “Off”
    • Manual Exams
    • Tools Available
    • Software Solutions
    • Chapter Summary Points
    • References for Manual Tools
  • Chapter 4. Mobile Extraction Issues
    • Flash Memory
    • Embedded Multimedia Card, Embedded Multichip Package, and Multichip Package
    • The Function of NAND
    • Encoding
    • Epochs
    • Cellebrite Physical Analyzer
    • User-Installed Applications
    • User-Enabled Security
    • Advanced Validation
    • References for Listed Tools
  • Chapter 5. Data Hiding
    • Introduction
    • What is Steganography
    • Hiding Data Behind Data
    • Steganalysis
    • Steganography Methods
    • Relevant Cases
    • Summary
  • Chapter 6. Cryptography and Encryption
    • Introduction
    • Brief History of Encryption and Cryptography
    • Basic Working Knowledge
    • Hardware
    • Public and Private Keys
    • The Key is the Key
    • So Tell Me Something I Can Do About This!
    • Back to Steganography
    • Summary
  • Chapter 7. Antiforensics
    • Introduction
    • The Easy and Very Effective Methods
    • The Best Methods Aren’t the Most Commonly Used Methods
    • Another Simple Method
    • File Signature Manipulation
    • Time Stamp Modifications
    • Decoy Storage Devices
    • Portable Apps
    • Hidden Operating Systems
    • Virtual Machines
    • Planning Against Antiforensics
    • Finding Communication Records on Hard Drives
    • When All Else Fails or Is Likely to Fail
    • Summary
  • Chapter 8. Electronic Intercepts
    • Introduction
    • Value of Electronically Intercepted Communications
    • Authority and Necessity
    • Technology
    • Technical Barriers
    • Finding Cell Phone Numbers
    • Summary
  • Chapter 9. Digital Identity
    • Introduction
    • Identity
    • Finding the Digital Identity
    • Summary
  • Chapter 10. Putting It All Together
    • Introduction
    • Collecting Real-Time Communications
    • Collecting Historical Communications
    • Turning Information Into Intelligence
    • The (Virtually) Impossible
    • Non-tech Communications
    • Putting the Case Together
    • Summary
  • Chapter 11. Closing Thoughts
    • Introduction
    • Privacy Expectations
    • Legal and Technical Considerations
    • Summary
  • Index


No. of pages:
© Syngress 2016
eBook ISBN:
Paperback ISBN:

Ratings and Reviews