×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
     

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

4.3 3
by Brett Shavers
 

See All Formats & Editions

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Overview

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

  • Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case
  • Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard"
  • The only book to combine physical and digital investigative techniques

Editorial Reviews

From the Publisher
"The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest...the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes..." —Computing Reviews, October 2014

Product Details

ISBN-13:
9781597499859
Publisher:
Elsevier Science
Publication date:
03/15/2013
Pages:
320
Sales rank:
1,311,729
Product dimensions:
7.40(w) x 9.10(h) x 0.90(d)

Related Subjects

Meet the Author

Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department’s first digital forensics lab in a small, cluttered storage closet.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects 4.3 out of 5 based on 0 ratings. 3 reviews.
Anonymous More than 1 year ago
FantasyRider More than 1 year ago
I wanted to take a look at a computer-based topic not normally in my programming domain and chose Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects by Brett Shavers (O’Reilly Media). As a former police officer, I found some of the discussions around generic evidence preservation to be slightly difficult to stay engaged with. However, as a whole, Placing the Suspect Behind the Keyboard did not disappoint my desire to see what digital forensics was all about. After reading this book, the reader should have a solid foundation to start delving into both the investigative and technical areas of a digital forensic investigator. Placing the Suspect Behind the Keyboard takes the reader though a step-by-step process to ensure that digital investigations and interviews are carried out in a manner that will preserve the integrity of both your evidence and your suspects involvement. Shavers reminds us throughout the book that it is not just about finding critical evidence on the digital device - but also ensuring that you can place the suspect “behind the keyboard” while those actions were occurring With excellent references back to sources to keep you on track, Placing the Suspect Behind the Keyboard keeps the reader in line with well-established investigative procedures. In addition, the Shavers also covers how to appropriately present your evidence to different types of audiences - something that is more challenging than most assume. I highly recommend this book to a person just getting into digital forensics or that is looking for taking their technical knowledge to the next level. While not a highly technical book, it is a great introduction into the digital forensics field. Disclaimer: I received a free electronic copy of this book as part of the O’Reilly Blogger Program
FRINGEINDEPENEDENTREVIEW More than 1 year ago
Are you an investigator in law enforcement? If you are, then this book is for you! Author Brett Shavers, has done an outstanding job of writing a book that places the suspect behind the keyboard through a combination of digital forensics techniques and more traditional, non-technical investigative methods. Author Shavers, begins by reminding you that depending upon the type of digital evidence, the type of investigation, and whether the suspect has been already identified, the manner of collection of the data will differ. In addition, the author discusses the questions that are needed for interrogations that are related to computer-related investigations. He then focuses on physical investigations, detailing only those points that are useful in supporting currently available electronic evidence, or finding additional sources of electronic evidence. The author then, covers the principles of extracting and interpreting digital evidence that can help place the suspect behind the keyboard. Next, he shows you how to identify the suspect; as well as, eliminating possible suspects by helping to develop your investigative mindset. In addition, the author introduces several methods, which may allow you to see inferences as you manage the information in your case. He continues by discussing methods of presenting electronic evidence for a variety of audiences. Then, the author shows you how to use reference materials as a constant reminder of staying the course in a case of placing the suspect behind the keyboard. Next, he discusses how technological changes make it easier for digital forensics and the investigator’s ability to place a suspect behind a keyboard; and, how other times, these changes can make it difficult or impossible. In addition, the author shows you advanced techniques to search for information beyond simply using a search engine. Finally, he shows you a collection of briefed examples across a wide range of case studies.  Although the theme of this most excellent book primarily supports criminal investigations, many of the same methods and processes can be used in civil litigation and internal corporate matters. Perhaps more importantly, the principles presented in this great book are meant to be principles, not an absolute checklist, but a guide.