* The companion DVD for the book contains custom materials (movies, spreadsheet, code, utilities, etc.), that can be used in a real, digital forensic investigation.
* This book contains information about OS X, iPod, iMac, and iPhone forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work.
* The authors have the combined experience of Law Enforcement, Military, and Corporate forensics, and have conducted pioneering research in the field of Macintosh-related forensics. This unique perspective makes this book attractive to ALL forensic investigators.
"Technophiles may love the iPhone, but you criminals? Watch out. The iPhone may reveal more about your misdeeds than you realize."
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks.
Including coverage of these MP3 players and cell phones dramatically increases the potential audience for the book as these devices are frequently involved with crimes other than just "computer" crimes. The iPod has become the most popular MP3 player on the market. Because iPods can also be used as a mass storage device (with the exception of the iPod shuffle), digital evidence may be stored on these devices. The iPod is a computer in its own right and because of this; it will mount and write to its internal hard drive when connected to an investigation workstation thus destroying the forensic integrity of the device. By putting the iPod into Diagnostic Mode, an investigator can prevent it from automatically mounting and writing to itself. A forensically sound image of the device can then be made. This book walks readers through this intricate process. Similarly, the iPhone presents a wealth of data for digital forensics experts, yet these cyber sleuths attempting to harvest the data must know their stuff. Some industry insiders, such as Derrick Donnelly of Blagbag Technologies, a company specializing in Apple forensic solutions, find the iPhone tempting for the amount of potential data it could contain. "There is more information in there than your average cell phone," said Donnelly. "The ease of use lends itself to more use, and more use creates more artifacts."
The companion DVD provides a wealth of resources for the reader. The disc contains custom tools developed by the authors, which can be used in real-life digital forensic investigations. In addition to just the tools, the authors provide several video "walkthroughs" demonstrating use of the tools in various situations.
Digital forensic investigators and security professionals.