• Complain

Brett Shavers - Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Here you can read online Brett Shavers - Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: Syngress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2012
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cybercrime Investigation Case Studies is a first look excerpt from Brett Shavers new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This first look teaches you how to place the suspect behind the keyboard using case studies.

Brett Shavers: author's other books


Who wrote Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cybercrime Investigation Case Studies An Excerpt from Placing the Suspect - photo 1
Cybercrime Investigation Case Studies
An Excerpt from Placing the Suspect Behind the Keyboard

Brett Shavers

Table of Contents Front Matter The material in this book is excerpted from - photo 2

Table of Contents
Front Matter

The material in this book is excerpted from Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.

For more First Look titles and Syngress offers, go to store.elsevier.com/SyngressFirstLook.

Copyright

Syngress is an imprint of Elsevier

The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

225 Wyman Street, Waltham, MA 02451, USA

First published 2013

Copyright 2013 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangement with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Trademarks/Registered Trademarks: Brand names mentioned in this book are protected by their respective trademarks and are acknowledged.

British Library Cataloguing in Publication Data

A catalogue record for this book is available from the British Library

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

ISBN: 978-0-12-409505-2

For information on all Syngress publications visit our website at store.elsevier.com

This book has been manufactured using Print On Demand technology. Each copy is produced to order and is limited to black ink. The online version of this book will show color figures where appropriate.

Chapter 1 Case Studies Introduction A Day in the Life of a Cybercriminal - photo 3

Chapter 1
Case Studies

Introduction

A Day in the Life of a Cybercriminal

Backdating Documents

False Names and Disposable E-mail Accounts

Evidence Leads to More Evidence

Searching for All the Bad Things

ScenarioThreatening Blog Posts

Making the Wrong Kind of Friends Online

A Break in the Case, Otherwise Known as a Suspects Mistake

Altered Evidence and Spoliation

Spoofed Call Harassment

Disgruntled Employee Steals and Deletes Employers Data

Missing Evidence

Bomb Threats by E-mail

ID the Suspect

Online Extortion

Placing Suspect at a Location

Placing the Suspect in the Office at a Specific Location

Stolen Property

IP Addresses Arent Enough

Planted Evidence

The Life and Casework of a Cyber Investigator

Technical Knowledge and Skills

This Case is Different from That Case

Testifying to Your Work

Summary

Bibliography

In theory, investigations should succeed as planned and expected. However, in practice, theory is only the starting point for real-life situations requiring creative solutions to obstacles. A review of case studies provides a means to show theory and practical applications in real-life case scenarios, with both positive and negative results. A thorough examination of one case for a targeted study goes well beyond this book due to the amount of information any single case possesses, but we can use many examples to reinforce investigative concepts.

recovered. So, a statement that electronic evidence may be recovered in a specific situation literally means maybe, because it depends on other factors. Usually, the answer as to whether a forensic artifact of evidence can be recovered is simply, it depends.

Case in Point

This case hinged on the authenticity of a contract between Ceglia and Zuckerberg as it related to the development of Facebook. A forensic analysis was conducted resulting in conclusions that electronic documents and e-mails were manipulated and backdated.

Investigative tips: Antedating is creating files with intentionally inaccurate time stamps. A common antedating action is backdating of electronic documents. Backdating documents is changing the date of a document, such as a business contract creation date changed to an earlier date to gain a benefit. The benefit could be to cover knowledge of a crime or to benefit financially in a business dispute. Another example of backdating could be to create a suicide message after the fact, using a computer in an attempt to cover a murder. The printed date on a document is easy to manipulate and difficult to validate. The electronic time stamp is a different story.

Firstly, examining the metadata of an electronic file gives a baseline of information, whether or not the dates and times are authentic. Each copy or version of the documents under investigation will need the metadata extracted for comparison to create a historical timeline for each document.

In any document backdating investigation, being able to examine the machine on which the document was created may be the most beneficial source of information. Secondary items of evidence that the document may have been copied onto or e-mailed are also important as comparisons.

Documents which have been e-mailed as attachments create a credible source of information in the e-mail headers. A document showing a creation date after an e-mail date would be suspected of being modified. This example would be easy of course, but more important is building the timeline of historical relevance for the documents using all available information, including e-mail header time stamps.

One method of manipulating document time stamps is through the use of software intended for altering metadata. Whether used for legitimate file management or nefarious purposes, these applications enable computer users with average skills to manipulate the time stamps on electronic files. One such example is seen in and easily installed. Once installed, computer users can change the metadata time stamps on any file by right clicking the file, choosing properties, and selecting the TimeStamps tab to alter the metadata.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard»

Look at similar books to Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard»

Discussion, reviews of the book Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.