Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Ebook75 pages59 minutes

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.

LanguageEnglish
Release dateDec 17, 2012
ISBN9780124095359
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Author

Brett Shavers

Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department’s first digital forensics lab in a small, cluttered storage closet.

Read more from Brett Shavers

Related to Cybercrime Investigation Case Studies

Related ebooks

Security For You

View More

Related articles

Reviews for Cybercrime Investigation Case Studies

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Cybercrime Investigation Case Studies - Brett Shavers

    Table of Contents

    Cover image

    Title page

    Front Matter

    Copyright

    Chapter 1. Case Studies

    1.1 Introduction

    1.2 A Day in the Life of a Cybercriminal

    1.3 The Life and Casework of a Cyber Investigator

    1.4 Testifying to Your Work

    1.5 Summary

    Bibliography

    Front Matter

    The material in this book is excerpted from Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.

    For more First Look titles and Syngress offers, go to store.elsevier.com/SyngressFirstLook.

    Copyright

    Syngress is an imprint of Elsevier

    The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

    225 Wyman Street, Waltham, MA 02451, USA

    First published 2013

    Copyright © 2013 Elsevier Inc. All rights reserved.

    No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangement with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

    This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

    Notices

    Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

    Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

    To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

    Trademarks/Registered Trademarks: Brand names mentioned in this book are protected by their respective trademarks and are acknowledged.

    British Library Cataloguing in Publication Data

    A catalogue record for this book is available from the British Library

    Library of Congress Cataloging-in-Publication Data

    A catalog record for this book is available from the Library of Congress

    ISBN: 978-0-12-409505-2

    For information on all Syngress publications visit our website at store.elsevier.com

    This book has been manufactured using Print On Demand technology. Each copy is produced to order and is limited to black ink. The online version of this book will show color figures where appropriate.

    Chapter 1

    Case Studies

    1.1 Introduction 

    1.2 A Day in the Life of a Cybercriminal 

    1.2.1 Backdating Documents 

    1.2.2 False Names and Disposable E-mail Accounts 

    1.2.3 Evidence Leads to More Evidence 

    1.2.4 Searching for All the Bad Things 

    1.2.5 Scenario—Threatening Blog Posts 

    1.2.6 Making the Wrong Kind of Friends Online 

    1.2.7 A Break in the Case, Otherwise Known as a Suspect’s Mistake 

    1.2.8 Altered Evidence and Spoliation 

    1.2.9 Spoofed Call Harassment 

    1.2.10 Disgruntled Employee Steals and Deletes Employer’s Data 

    1.2.11 Missing Evidence 

    1.2.12 Bomb Threats by E-mail 

    1.2.13 ID the Suspect 

    1.2.14 Online Extortion 

    1.2.15 Placing Suspect at a Location 

    1.2.16 Placing the Suspect in the Office at a Specific Location 

    1.2.17 Stolen Property 

    1.2.18 IP Addresses Aren’t Enough 

    1.2.19 Planted Evidence 

    1.3 The Life and Casework of a Cyber Investigator 

    1.3.1 Technical Knowledge and Skills 

    1.3.2 This Case is Different from That Case 

    1.4 Testifying to Your Work 

    1.5 Summary 

    Bibliography 

    1.1 Introduction

    In theory, investigations should succeed as planned and expected. However, in practice, theory is only the starting point for real-life situations requiring creative solutions to obstacles. A review of case studies provides a means to show theory and practical applications in real-life case scenarios, with both positive and negative results. A thorough examination of one case for a targeted study goes well beyond this book due to the amount of information any single case possesses, but we can use many examples to reinforce investigative concepts.

    In order to give examples showing how successful concepts in this book have been applied in real life, this chapter will show a collection of briefed examples across a wide range of case studies. Keep in mind that there is more than one solution to any single problem you will encounter and

    Enjoying the preview?
    Page 1 of 1