Hiding behind the keyboard uncovering covert communication methods with forensic analysis 1st Edition by John Bair, Brett Shavers – Ebook PDF Instant Download/Delivery: 0128033525, 9780128033524
Full download Hiding behind the keyboard uncovering covert communication methods with forensic analysis 1st Edition after payment
Product details:
ISBN 10: 0128033525
ISBN 13: 9780128033524
Author: John Bair, Brett Shavers
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Hiding behind the keyboard uncovering covert communication methods with forensic analysis 1st Table of contents:
Chapter 1. Laying the Foundation of Covert Communications
Introduction
A Brief History of Covert Communication
Covert Communication Overload
Covert Communication Goals
Summary
Chapter 2. The Tor Browser
Introduction
History and Intended Use of The Onion Router
How The Onion Router Works
Forensic Analysis of The Onion Router
Tracking Criminals Using Tor
Used in Combination of Other Tools and Methods
Tails
Related Tor Tools and Applications
Summary
Chapter 3. Triaging Mobile Evidence
Logical Data
Physical Data
Examples of Logical and Physical Data
Wireless Carriers
Mobile Network Operators
Mobile Virtual Network Operator
Determining Target Number
Fonefinder.net
Number Portability Administration Center
Search.org
Subscriber Identity Module
Internal Hardware of a SIM
The SIM File System
SIM Sizes and Evolution
Typical Evidence
SIM Security—PIN and PUK
Triaging Devices
Devices Powered “On”
Devices Located “Off”
Manual Exams
Tools Available
Software Solutions
Chapter Summary Points
References for Manual Tools
Chapter 4. Mobile Extraction Issues
Flash Memory
Embedded Multimedia Card, Embedded Multichip Package, and Multichip Package
The Function of NAND
Encoding
Epochs
Cellebrite Physical Analyzer
User-Installed Applications
User-Enabled Security
Advanced Validation
References for Listed Tools
Chapter 5. Data Hiding
Introduction
What is Steganography
Hiding Data Behind Data
Steganalysis
Steganography Methods
Relevant Cases
Summary
Chapter 6. Cryptography and Encryption
Introduction
Brief History of Encryption and Cryptography
Basic Working Knowledge
Hardware
Public and Private Keys
The Key is the Key
So Tell Me Something I Can Do About This!
Back to Steganography
Summary
Chapter 7. Antiforensics
Introduction
The Easy and Very Effective Methods
The Best Methods Aren’t the Most Commonly Used Methods
Another Simple Method
File Signature Manipulation
Time Stamp Modifications
Decoy Storage Devices
Portable Apps
Hidden Operating Systems
Virtual Machines
Planning Against Antiforensics
Finding Communication Records on Hard Drives
When All Else Fails or Is Likely to Fail
Summary
Chapter 8. Electronic Intercepts
Introduction
Value of Electronically Intercepted Communications
Authority and Necessity
Technology
Technical Barriers
Finding Cell Phone Numbers
Summary
Chapter 9. Digital Identity
Introduction
Identity
Finding the Digital Identity
Summary
Chapter 10. Putting It All Together
Introduction
Collecting Real-Time Communications
Collecting Historical Communications
Turning Information Into Intelligence
The (Virtually) Impossible
Non-tech Communications
Putting the Case Together
Summary
Chapter 11. Closing Thoughts
Introduction
Privacy Expectations
Legal and Technical Considerations
People also search for Hiding behind the keyboard uncovering covert communication methods with forensic analysis 1st:
hiding behind the keyboard uncovering covert
hiding behind the keyboard
hiding behind the keyboard meaning
hiding keyboard on iphone
hiding behind keyboard meme
Tags: John Bair, Brett Shavers, keyboard uncovering, communication methods