Description

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Key Features

  • Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case
  • Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard"
  • The only book to combine physical and digital investigative techniques

Readership

Information Security professionals of all levels, digital forensic examiners and investigators, IT managers, InfoSec consultants, criminologists, sociologists, attorneys, law enforcement officers, Also can sell to forensic training vendors, government training courses, and high-tech crime associations

Table of Contents

Acknowledgments

About the Author

About the Technical Editor

Foreword

Preface

Chapter 1. Introduction

Digital Evidence Collection

Simple File Copying

“Dead Box” Approaches

“Live Box” Approaches

Decision-Making FlowChart

Preview/Triage

SmartPhones and Cellular Devices

Summary

Bibliography

Chapter 2. High Tech Interview

Introduction

The Main Goal of Questioning a Suspect

The Line of Questions for Suspects

Questions for Victims

Questions for Network Administrators

Summary

Bibliography

Chapter 3. Physical Investigations

Introduction

Hazards of Acting Upon Minimal Information

Physical Surveillance

Electronic Surveillance

Obtaining Personal Information

Undercover and Informant Operations

Witnesses

Deconfliction

Summary

Bibliography

Chapter 4. Technical Investigations

Introduction

Digital Investigative Techniques

Who? What? When? Why? Where? and How?

“Other” Device Forensics

Online Social Networking

User Activity

Digital Authorship

Profiling

Biological Forensic Evidence

Triage and Previews

Summary

Bibliography

Chapter 5. Putting It All Together

“2+2=Putting it all together”

Timelines

Follow the Evidence

Rabbit Holes

Summary

Bibliography

Chapter 6. Investigative Case Management

Introduction

Bibliography

Chapter 7. Case Presentation

Introduction

It’s Not Whether You Win or Lose

Investigative Mindset

Your Audience

Preparation

Organizing Case Information

Value of Visuals

The Suspect’s Machine

Analo

Details

No. of pages:
320
Language:
English
Copyright:
© 2013
Published:
Imprint:
Syngress
eBook ISBN:
9781597499842
Print ISBN:
9781597499859

About the author

Brett Shavers

Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department’s first digital forensics lab in a small, cluttered storage closet.

Affiliations and Expertise

Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital Forensics program

Reviews

"The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest...the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes..." --Computing Reviews, October 2014