Table of Contents

Cover image

Title page

Copyright

Acknowledgments

About the Author

About the Technical Editor

Foreword

Preface

Chapter 1. Introduction

Digital Evidence Collection

Simple File Copying

“Dead Box” Approaches

“Live Box” Approaches

Decision-Making FlowChart

Preview/Triage

SmartPhones and Cellular Devices

Summary

Bibliography

Chapter 2. High Tech Interview

Introduction

The Main Goal of Questioning a Suspect

The Line of Questions for Suspects

Questions for Victims

Questions for Network Administrators

Summary

Bibliography

Chapter 3. Physical Investigations

Introduction

Hazards of Acting Upon Minimal Information

Physical Surveillance

Electronic Surveillance

Obtaining Personal Information

Undercover and Informant Operations

Witnesses

Deconfliction

Summary

Bibliography

Chapter 4. Technical Investigations

Introduction

Digital Investigative Techniques

Who? What? When? Why? Where? and How?

“Other” Device Forensics

Online Social Networking

User Activity

Digital Authorship

Profiling

Biological Forensic Evidence

Triage and Previews

Summary

Bibliography

Chapter 5. Putting It All Together

“2+2=Putting it all together”

Timelines

Follow the Evidence

Rabbit Holes

Summary

Bibliography

Chapter 6. Investigative Case Management

Introduction

Bibliography

Chapter 7. Case Presentation

Introduction

It’s Not Whether You Win or Lose

Investigative Mindset

Your Audience

Preparation

Organizing Case Information

Value of Visuals

The Suspect’s Machine

Analogies

Avoid TMI (Too Much Information)

Your Presentation

Summary

Bibliography

Chapter 8. Cheat Sheets and Quickstart Guides

Introduction

Cheat Sheets and Quickstart Guides

Checklists

Summary

Bibliography

Chapter 9. Some Things Will Become Easier, Others Not So Much

Introduction

It Will Become Easier to Place a Suspect Behind the Keyboard

It Will Become More Difficult to Place a Suspect Behind the Keyboard

Summary

Bibliography

Chapter 10. Online Investigations

Introduction

Online Investigations

Capturing Webpages as Evidence

Summary

Bibliography

Chapter 11. Case Studies

Introduction

A Day in the Life of a Cybercriminal

The Life and Casework of a Cyber Investigator

Testifying to Your Work

Summary

Bibliography

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.108.119