»
Placing the Suspect Behind the Keyboard
 
 

Placing the Suspect Behind the Keyboard, 1st Edition

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

 
Placing the Suspect Behind the Keyboard, 1st Edition,Brett Shavers,ISBN9781597499859
 
 
 

  

Syngress

9781597499859

9781597499842

320

235 X 191

Get the tools and investigative techniques you need to effectively manage a complete cybercrime case from inception to prosecution

Print Book + eBook

USD 71.34
USD 118.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 59.95

eBook
eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

USD 58.95
Add to Cart
 
 

Key Features

  • Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case
  • Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard"
  • The only book to combine physical and digital investigative techniques

Description

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Readership

Information Security professionals of all levels, digital forensic examiners and investigators, IT managers, InfoSec consultants, criminologists, sociologists, attorneys, law enforcement officers, Also can sell to forensic training vendors, government training courses, and high-tech crime associations

Brett Shavers

Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department’s first digital forensics lab in a small, cluttered storage closet.

Affiliations and Expertise

Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital Forensics program

View additional works by Brett Shavers

Placing the Suspect Behind the Keyboard, 1st Edition

Acknowledgments

About the Author

About the Technical Editor

Foreword

Preface

Chapter 1. Introduction

Digital Evidence Collection

Simple File Copying

“Dead Box” Approaches

“Live Box” Approaches

Decision-Making FlowChart

Preview/Triage

SmartPhones and Cellular Devices

Summary

Bibliography

Chapter 2. High Tech Interview

Introduction

The Main Goal of Questioning a Suspect

The Line of Questions for Suspects

Questions for Victims

Questions for Network Administrators

Summary

Bibliography

Chapter 3. Physical Investigations

Introduction

Hazards of Acting Upon Minimal Information

Physical Surveillance

Electronic Surveillance

Obtaining Personal Information

Undercover and Informant Operations

Witnesses

Deconfliction

Summary

Bibliography

Chapter 4. Technical Investigations

Introduction

Digital Investigative Techniques

Who? What? When? Why? Where? and How?

“Other” Device Forensics

Online Social Networking

User Activity

Digital Authorship

Profiling

Biological Forensic Evidence

Triage and Previews

Summary

Bibliography

Chapter 5. Putting It All Together

“2+2=Putting it all together”

Timelines

Follow the Evidence

Rabbit Holes

Summary

Bibliography

Chapter 6. Investigative Case Management

Introduction

Bibliography

Chapter 7. Case Presentation

Introduction

It’s Not Whether You Win or Lose

Investigative Mindset

Your Audience

Preparation

Organizing Case Information

Value of Visuals

The Suspect’s Machine

Analogies

Avoid TMI (Too Much Information)

Your Presentation

Summary

Bibliography

Chapter 8. Cheat Sheets and Quickstart Guides

Introduction

Cheat Sheets and Quickstart Guides

Checklists

Summary

Bibliography

Chapter 9. Some Things Will Become Easier, Others Not So Much

Introduction

It Will Become Easier to Place a Suspect Behind the Keyboard

It Will Become More Difficult to Place a Suspect Behind the Keyboard

Summary

Bibliography

Chapter 10. Online Investigations

Introduction

Online Investigations

Capturing Webpages as Evidence

Summary

Bibliography

Chapter 11. Case Studies

Introduction

A Day in the Life of a Cybercriminal

The Life and Casework of a Cyber Investigator

Testifying to Your Work

Summary

Bibliography

Index

Quotes and reviews

"The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest...the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes..." --Computing Reviews, October 2014

 
 
Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ

Contact Us