• Complain

Brett Shavers - Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

Here you can read online Brett Shavers - Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Syngress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2013
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cybercrime Case Presentation is a first look excerpt from Brett Shavers new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they observed the case as it happened.

Brett Shavers: author's other books


Who wrote Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cybercrime Case Presentation Using Digital Forensics and Investigative - photo 1
Cybercrime Case Presentation
Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Brett Shavers

Table of Contents Copyright Syngress is an imprint of Elsevier The Boulevard - photo 2

Table of Contents
Copyright

Syngress is an imprint of Elsevier

The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

225 Wyman Street, Waltham, MA 02451, USA

First published 2013

Copyright 2013 Elsevier Inc. All rights reserved.

The material in this book is excerpted from Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangement with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Trademarks/Registered Trademarks: Brand names mentioned in this book are protected by their respective trademarks and are acknowledged.

British Library Cataloguing in Publication Data

A catalogue record for this book is available from the British Library

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

ISBN: 978-0-12-409504-5

For information on all Syngress publications visit our website at store.elsevier.com

This book has been manufactured using Print On Demand technology. Each copy is produced to order and is limited to black ink. The online version of this book will show color figures where appropriate.

Chapter 1 Case Presentation Introduction Its Not Whether You Win or Lose - photo 3

Chapter 1
Case Presentation

Introduction

Its Not Whether You Win or Lose

Investigative Mindset

Your Audience

Preparation

Organizing Case Information

Value of Visuals

Presentation Media

Slideshows and Animations

Charts and Diagrams

The Suspects Machine

Analogies

Avoid Too Much Information

Your Presentation

Summary

Bibliography

This chapter will discuss methods of presenting electronic evidence for a variety of audiences. The admissibility, authentication, chain of custody, and other aspects of what is evidence are extremely important to every case; however, this chapter will only minimally discuss the actual evidence and focus more on methods of presenting your case. After all, the objective of any investigation is to convey to an audience the facts of the case in a manner that they understand it.

Articulating your case in a manner in which your audience creates a picture in their mind will also have your audience place the suspect behind the keyboard. This can be accomplished without you having to say it directly as the audience will say it for you.

hearings. Why did you suspect this person and not that person? Did you focus your entire investigation on one person? These types of questions are intended to discover your mindset and to find out what you were thinking. The investigative mindset not only helps you to be a great examiner or investigator but it also helps you to prepare your case for presentation by being able to articulate your thought processes.

, is dtSearch, an indexing application typically used as a forensic tool but also excels at indexing your case information to be searched on the fly.

Fig 11 dtSearch indexing application httpwwwdtsearchcom Complex cases - photo 4

Fig. 1.1 dtSearch indexing application: http://www.dtsearch.com.

Complex cases that contain hundreds of thousands of electronic files are better served being indexed, that is, a database of words and numbers of the files created for ease of searching. dtSearch not only indexes large datasets but it can also create reports of the searches, export the files found, and even highlight the key words found. A utility such as dtSearch enables you to find information quickly that might have been easily be overlooked when manually searching files on a hard drive. Being asked a question on the spot by your boss, client, or judge for whom you dont have answer is stressful enough, but not being able to find the answer makes it that much worse.

1.7 Value of Visuals

The clich that a picture is worth a thousand words does not accurately describe a visual used in your presentation. In a case presentation, one visual can be worth the entire case. As most people grow up learning visually, whether in math class using charts and graphs to see numbers or through art, understanding by seeing is an effective method of learning.

In the tale of three blind men attempting to describe an elephant with words, each basing their description on the part of the elephant each person touched, such as the tusk or the tail, they could not agree on the totality of the elephants description. Presentations require the spoken word for descriptions, but visuals can make sure that each person in your audience understands and sees the same thing.

Compare the following examples. shows a paragraph describing an average evidence scene with multiple evidence items.

Fig 12 Written description of an evidence scene with multiple items The - photo 5

Fig. 1.2 Written description of an evidence scene with multiple items.

The accompanying figure to the written description is seen in , the photo clarifies the scene in the mind of your audience without misunderstanding.

Fig 13 A sample photo of the evidence scene described in Although the - photo 6

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard»

Look at similar books to Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard»

Discussion, reviews of the book Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.