Cybercrime Investigation Case Studies is a qfirst lookq excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This qfirst lookq teaches you how to place the suspect behind the keyboard using case studies.landline or cell phone, calls the target and the spoofing service changes the number seen on the targeta#39;s Caller ID. The evidence trail includes the calling logs maintained by the spoofing service, the credit card information used to purchase the service, the IP ... to create an account with a spoofing service, public Internet terminals could be used to avoid the suspect disclosing his home or work IP address.
|Title||:||Cybercrime Investigation Case Studies|
|Publisher||:||Newnes - 2012-12-17|