Table of Contents

Cover

Title page

Copyright

Dedication

List of Contributors

Editor Biography

Biographies

Acknowledgments

Chapter 1: The cryptocurrency enigma

Abstract

Purpose

Introduction

What makes a currency?

Cryptocurrency

Public key encryption basics

Forensic relevance

Bitcoin

Bitcoin protocol

Forensic artifacts

Multibit HD

The bitcoin protocol in action

Summary

Chapter 2: The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics

Abstract

Introduction

The four phases of digital forensics

It is a matter of questions

Investigative questions

Legal questions

Forensic questions

Identification

Classification/individualization

Association

Reconstruction

Forensic questions as a bridge

Developing forensic hypotheses

Knowing how far to go

Starting the plan

How do you know when you are done?

Examination phase – data extraction

The forensic analysis

The examination planning process

Conclusion

Chapter 3: Psychological profiling as an investigative tool for digital forensics

Abstract

Current model

Issues

New model

Phases

Limitations

Case studies

Conclusions

Chapter 4: The intersection between social media, crime, and digital forensics: #WhoDunIt?

Abstract

Introduction

Social media and crime

Social media and digital forensics

Social media evidence on the network

Social media evidence on the physical device

Summary

Chapter 5: Mobile device forensics: threats, challenges, and future trends

Abstract

Introduction

The hardware versus software complexity trend

Cloud services and mobile platforms – inherent vulnerabilities

There is an app for that – forensic challenges and threats within apps

Persistent threats and challenges – what lies ahead for mobile device forensics

Conclusion

Chapter 6: Digital forensics in an eDiscovery world

Abstract

Introduction

eDiscovery processes and EDRM

Digital investigations workflows

Chapter 7: OS X El Capitan forensics

Abstract

Introduction

Default directory structure

User

{User name}/library

New features in OS X 10.11 El Capitan

Conclusion

Quick reference table

Chapter 8: Cybercrimes: an overview of contemporary challenges and impending threats

Abstract

Combating cybercrimes

Current cybercrimes and evolving threats

Hacking

Future issues for law enforcement and digital forensic analysts

Chapter 9: Legal

Abstract

Introduction

The fourth amendment

Search warrants

Federal privacy legislation

Drones

Tracking vehicles

Tracking cell phones

Automated license plate readers

Cell phones

Encryption

Encryption and cell phones

The internet of things

The dark web

Malware

Looking ahead

Author Index

Subject Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.14.196