Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
- 4h 6m
- Brett Shavers, John Bair
- Elsevier Science and Technology Books, Inc.
- 2016
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
- Covers high-level strategies, what they can achieve, and how to implement them
- Shows discovery and mitigation methods using examples, court cases, and more
- Explores how social media sites and gaming technologies can be used for illicit communications activities
- Explores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online
About the Author
Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department's first digital forensics lab in a small, cluttered storage closet.
John Bair is currently employed as a detective with the Tacoma Police Department. He has been commissioned as a law enforcement officer since May 1989. During his assignment in the homicide unit he began specializing in Cell Phone Forensics.
In 2006 John created the current forensic lab that focuses on mobile evidence related to violent crimes. His case experience shortly thereafter gained the attention of Mobile Forensics Incorporated (MFI) where he was hired and spent several years serving as a contract instructor. MFI soon merged with AccessData to become the only training vendor for their mobile forensics core. This relationship fostered direct contact with engineers who assist in criminal cases which need anomalies and exploits addressed within their forensics products.
John has 26 certifications related to digital evidence. The following reflect the most significant related to mobile forensics: Mobile Forensics Certified Examiner (MFCE), Cellebrite Certified Physical Analyst (CCPA), AccessData Certified Examiner (ACE), Cellebrite Mobile Forensics Fundamentals (CMFF), AccessData Mobile Examiner (AME), and Cellebrite Certified Instructor (CCI).
In this Book
-
Laying the Foundation of Covert Communications
-
The Tor Browser
-
Triaging Mobile Evidence
-
Mobile Extraction Issues
-
Data Hiding
-
Cryptography and Encryption
-
Antiforensics
-
Electronic Intercepts
-
Digital Identity
-
Putting It All Together
-
Closing Thoughts