Foreword | p. xvii |
Introduction | p. xix |
Overview of Computer Forensics Technology | p. 1 |
Computer Forensics Fundamentals | p. 4 |
What is Computer Forensics? | p. 4 |
Use of Computer Forensics in Law Enforcement | p. 5 |
Computer Forensics Assistance to Human Resources/Employment Proceedings | p. 5 |
Computer Forensics Services | p. 6 |
Benefits of Professional Forensics Methodology | p. 13 |
Steps Taken by Computer Forensics Specialists | p. 14 |
Who Can Use Computer Forensic Evidence? | p. 15 |
Case Histories | p. 21 |
Case Studies | p. 24 |
Summary | p. 25 |
Endnotes | p. 30 |
Types of Computer Forensics Technology | p. 31 |
Types of Military Computer Forensic Technology | p. 32 |
Types of Law Enforcement Computer Forensic Technology | p. 34 |
Types of Business Computer Forensic Technology | p. 45 |
Summary | p. 48 |
Endnotes | p. 54 |
Types of Vendor and Computer Forensics Services | p. 55 |
Occurrence of Cyber Crime | p. 56 |
Cyber Detectives | p. 57 |
Fighting Cyber Crime with Risk-Management Techniques | p. 58 |
Computer Forensics Investigative Services | p. 64 |
Forensic Process Improvement | p. 71 |
Course Content | p. 80 |
Case Histories | p. 85 |
Summary | p. 87 |
Endnotes | p. 91 |
Computer Forensics Evidence and Capture | p. 93 |
Data Recovery | p. 95 |
Data Recovery Defined | p. 95 |
Data Back-Up and Recovery | p. 96 |
The Role of Back-Up in Data Recovery | p. 105 |
The Data-Recovery Solution | p. 108 |
Case Histories | p. 114 |
Summary | p. 117 |
Endnotes | p. 120 |
Evidence Collection and Data Seizure | p. 121 |
Why Collect Evidence? | p. 121 |
Collection Options | p. 122 |
Obstacles | p. 122 |
Types of Evidence | p. 123 |
The Rules of Evidence | p. 124 |
Volatile Evidence | p. 127 |
General Procedure | p. 128 |
Collection and Archiving | p. 129 |
Methods of Collection | p. 130 |
Artifacts | p. 130 |
Collection Steps | p. 131 |
Controlling Contamination: The Chain of Custody | p. 132 |
Summary | p. 139 |
Endnotes | p. 142 |
Duplication and Preservation of Digital Evidence | p. 143 |
Preserving the Digital Crime Scene | p. 143 |
Computer Evidence Processing Steps | p. 146 |
Legal Aspects of Collecting and Preserving Computer Forensic Evidence | p. 154 |
Summary | p. 159 |
Endnotes | p. 162 |
Computer Image Verification and Authentication | p. 163 |
Special Needs of Evidential Authentication | p. 164 |
Practical Consideration | p. 171 |
Practical Implementation | p. 172 |
Summary | p. 176 |
Endnotes | p. 180 |
Computer Forensics Analysis | p. 181 |
Discovery of Electronic Evidence | p. 183 |
Electronic Document Discovery: A Powerful New Litigation Tool | p. 184 |
Summary | p. 187 |
Endnotes | p. 190 |
Identification of Data | p. 191 |
Time Travel | p. 192 |
Forensic Identification and Analysis of Technical Surveillance Devices | p. 195 |
Summary | p. 204 |
Endnotes | p. 207 |
Reconstructing Past Events | p. 209 |
How to Become a Digital Detective | p. 210 |
Useable File Formats | p. 211 |
Unusable File Formats | p. 212 |
Converting Files | p. 212 |
Summary | p. 216 |
Endnotes | p. 218 |
Networks | p. 219 |
Network Forensics Scenario | p. 220 |
A Technical Approach | p. 220 |
Destruction of E-Mail | p. 223 |
Damaging Computer Evidence | p. 225 |
Documenting the Intrusion on Destruction of Data | p. 228 |
System Testing | p. 229 |
Summary | p. 231 |
Endnotes | p. 236 |
Countermeasures: Information Warfare | p. 237 |
Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups | p. 239 |
Is the United States Government Prepared for Information Warfare? | p. 239 |
Are Other Governments Prepared for Information Warfare? | p. 243 |
What Industry Groups Have Done to Prepare for Information Warfare? | p. 246 |
Strategic Diplomacy and Information Warfare | p. 248 |
The Role of International Organizations | p. 259 |
The Role of the Global Military Alliances | p. 266 |
Marshall Law and Cyberspace | p. 268 |
The Super Cyber Protection Agencies | p. 270 |
Summary | p. 273 |
Endnotes | p. 278 |
The Information Warfare Arsenal and Tactics of the Military | p. 279 |
Overview of Military Tactics | p. 285 |
Offensive Ruinous Information Warfare Tools and Tactics | p. 287 |
Offensive Containment Information Warfare Tools and Tactics | p. 289 |
Defensive Preventive Information Warfare Tools and Tactics | p. 293 |
Defensive Ruinous Information Warfare Tools and Tactics | p. 295 |
Defensive Responsive Containment Information Warfare Tools and Tactics | p. 296 |
Countering Sustained Terrorist Information Warfare Tactics | p. 300 |
Dealing with Random Terrorist Information Warfare | p. 305 |
Summary | p. 319 |
Endnotes | p. 323 |
The Information Warfare Arsenal and Tactics of Terrorist and Rogues | p. 325 |
The Terrorist Profile | p. 331 |
From Vietnam Marches to Cyberdisobedience | p. 332 |
Grow Up | p. 333 |
Why Terrorist and Rogues Have an Advantage in Iw | p. 334 |
The Criminal Cafe in Cyberspace | p. 344 |
The Super Computer Literate Terrorist | p. 349 |
The Brilliant and Nasty Rogue | p. 351 |
How They Watch and What They Know | p. 352 |
How and Where They Get Their Tools | p. 355 |
Why Tools are Easy to Get and Use | p. 363 |
Why Nasty People are So Hard to Track Down and Capture | p. 365 |
What They will do Next--the Information Warfare Games | p. 371 |
Summary | p. 374 |
Endnotes | p. 379 |
The Information Warfare Arsenal and Tactics of Private Companies | p. 381 |
Overview of Defensive Tactics Private Companies Can Take | p. 385 |
Surviving Offensive Ruinous Information Warfare | p. 389 |
Surviving Offensive Containment Information Warfare | p. 391 |
Participating in Defensive Preventive Information Warfare Planning | p. 392 |
Benefiting from and Surviving Defensive Ruinous Information Warfare | p. 396 |
Benefiting from and Surviving Defensive Responsive Containment Information Warfare | p. 398 |
Protection Against Random Terrorist Information Warfare Tactics | p. 402 |
What to do When Terrorists Keep Attacking | p. 405 |
Countering Sustained Rogue Information Warfare | p. 408 |
Protection Against Random Rogue Information Warfare | p. 410 |
Keeping the Amateur Rogue Out of the Cyber House | p. 418 |
Summary | p. 419 |
Endnotes | p. 423 |
Information Warfare Arsenal of the Future | p. 425 |
You Haven't Seen Anything Like What is Coming | p. 427 |
New Toys for Big Brother and the Boys | p. 442 |
Snoop, Sniff, and Snuff Tools | p. 447 |
Beware: E-Mail Wiretaps Like Carnivore Can Steal Sensitive Correspondence | p. 451 |
Spy Dust Balls and Mechanical Dragonflies | p. 454 |
Nanotechnology | p. 459 |
Summary | p. 463 |
Endnotes | p. 468 |
Surveillance Tools for Information Warfare of the Future | p. 469 |
Monitoring Everything | p. 469 |
Cyber Surveillance | p. 472 |
The Cyber Footprint and Criminal Tracking | p. 474 |
The Implications of Cookies and Integrated Platforms | p. 486 |
Wintel Inside, or How Your Computer is Watching You | p. 488 |
Data Mining for What? | p. 492 |
The Internet is Big Brother | p. 500 |
The Wireless Internet--Friend or Foe? | p. 502 |
Summary | p. 503 |
Endnotes | p. 506 |
Civilian Casualties--The Victims and Refugees of Information Warfare | p. 507 |
What the Cyber Masses Have to Lose | p. 509 |
The Destruction of Personal Assets in Information Wars | p. 520 |
The Violation of Privacy During Information Wars | p. 526 |
The Individual Exposed | p. 529 |
Uncovering Secret Identities | p. 532 |
The Monitoring of Private Affairs in Cyber Space | p. 535 |
The New Order and State Medical Id Cards | p. 542 |
Big Brother is Here and is Staying | p. 546 |
Summary | p. 549 |
Endnotes | p. 552 |
Results and Future Directions | p. 553 |
Advanced Computer Forensics | p. 555 |
Advanced Encryption: The Need to Conceal | p. 556 |
Advanced Hacking | p. 568 |
Advanced Tracker Hackers | p. 576 |
Source Addresses | p. 580 |
The Problems of the Present | p. 594 |
The Outlook for the Future | p. 597 |
Summary | p. 598 |
Endnotes | p. 603 |
Summary, Conclusions, and Recommendations | p. 605 |
Summary | p. 606 |
Conclusions | p. 615 |
Recommendations | p. 618 |
Final Word: Computer Forensic Needs and Challenges | p. 636 |
Endnotes | p. 638 |
Appendixes | p. 639 |
Frequently Asked Questions | p. 641 |
Computer Forensics Resources | p. 647 |
Links to Computer Forensics and Related Law Enforcement Web Pages | p. 651 |
More Computer Forensics Cases | p. 657 |
On the CD-ROM | p. 665 |
Glossary | p. 669 |
Index | p. 703 |
Table of Contents provided by Syndetics. All Rights Reserved. |