Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations. ac Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case. ac Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the qsuspect behind the keyboard.q ac The only book to combine physical and digital investigative techniques.The legitimate phone number, whether it is a landline or cell phone, calls the target and the spoofing service changes the number seen on the targeta#39;s Caller ID. The evidence trail includes the calling logs maintained by the spoofing service, the credit card information used to ... with a spoofing service, public Internet terminals could be used to avoid the suspect disclosing his home or work IP address.
|Title||:||Placing the Suspect Behind the Keyboard|
|Publisher||:||Newnes - 2013-02-01|