Eforensics and Signal Intelligence for Everyone
4/5
()
About this ebook
This book discusses the process of investigating and analyzing electronic equipment, detecting devices, wireless signals, and the prosecution and prevention of high tech crime. The coauthors are from private industry and academia and really provide a wide variety of perspectives on the detection of electronic eavesdropping devices, wiretaps, various electronic signals, and the collection and examination of information from laptops, desktop computers, and PDAs. Kenneth Bruno does an excellent job teaching the reader about all the equipment used in electronic eavesdropping detection. We also introduce the reader to various pieces of electronic equipment used to detect and identify explosives, biochemical weapons, as well as historic unexploded ordinance. The reader is also introduced to the legal system by Mr. Joel Liebesfeld who does corporate investigations and is often employed by clients who are in the legal profession or insurance industry. Mr. Joel Liebesfeld and Dr. Doherty discuss the process of becoming an expert witness who may testify to what was found using scientific methods in combination with electronic signal detection or computer forensic equipment. We hope that the readership of the book will include high school students considering a career in private industry, law enforcement, intelligence agencies, or the military. A background in electronics, math, and computer science is helpful but not necessary in reading this book. Lockards Principle of Exchange specifies that two objects or people that come in contact with each other will change. We hope that this book changes you by increasing your understanding of electronic devices, investigation, and the justice system.
Eamon P. Doherty
The author Dr. Eamon P. Doherty has created a variety of Robotic Arm Interfaces and telephone dialers that were featured in a variety of academic and popular media including a half page of the New York Times on April 24, 2003 on page G5. Kenneth Bruno, BS, MS, is president of KAB Computer Services, LLC, a full service technology company. He is a nationally recognized leader in technology, specifically in the areas of computer science, electronic eavesdropping & detection, and audio/video. Clientele include government agencies, private and public schools, as well as private industry. Gary Stephenson is a health informatics consultant who has worked on a variety Connecting for Health projects for the NHS in England. He has also volunteered his time and efforts on technology to help the disabled throughout the world. Joel Liebesfeld, AAS, BS, MA, has for the past six years used his diverse 30+ years of electrical industry experience for the investigation of engineering loss, particularly focusing on loss related to fire, arson, product defect and/or electrical anomalies, resulting in property damage, personal injury or death. These losses mainly stemmed from electrical accidents, defects, deficiencies or were related to arson.
Related to Eforensics and Signal Intelligence for Everyone
Related ebooks
Unified Communications Forensics: Anatomy of Common UC Attacks Rating: 4 out of 5 stars4/5Wireless Reconnaissance in Penetration Testing Rating: 0 out of 5 stars0 ratingsDigital Triage Forensics: Processing the Digital Crime Scene Rating: 2 out of 5 stars2/5Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage Rating: 5 out of 5 stars5/5Electronic Surveillance Devices Rating: 4 out of 5 stars4/5Intelligence dictionary Rating: 1 out of 5 stars1/5Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 Rating: 4 out of 5 stars4/5Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments Rating: 4 out of 5 stars4/5A Patrol Officer's Field Manual: Ethics to Crowd Control Rating: 0 out of 5 stars0 ratingsInside Radio: An Attack and Defense Guide Rating: 0 out of 5 stars0 ratingsSoftware Defined Radio: Without software defined radio, the promises of 5G might not be achievable at all Rating: 0 out of 5 stars0 ratingsCertified Forensic Computer Examiner A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsKUBARK Counterintelligence Interrogation: A Manual Rating: 0 out of 5 stars0 ratingsOverview of Some Windows and Linux Intrusion Detection Tools Rating: 0 out of 5 stars0 ratingsDigital Forensics: Threatscape and Best Practices Rating: 0 out of 5 stars0 ratingsDigital Forensics A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Dissecting the Hack: The F0rb1dd3n Network, Revised Edition Rating: 5 out of 5 stars5/5@War: The Rise of the Military-Internet Complex Rating: 4 out of 5 stars4/5Seven Deadliest Wireless Technologies Attacks Rating: 0 out of 5 stars0 ratingsHandbook on Securing Cyber-Physical Critical Infrastructure Rating: 0 out of 5 stars0 ratingsDigital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingsCybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Rating: 3 out of 5 stars3/5Counter Intelligence A Complete Guide - 2020 Edition Rating: 1 out of 5 stars1/5Police Visibility: Privacy, Surveillance, and the False Promise of Body-Worn Cameras Rating: 0 out of 5 stars0 ratingsScience-Based Interviewing Rating: 0 out of 5 stars0 ratingsPractical Instruction for Detectives: A Complete Course in Secret Service Study Rating: 0 out of 5 stars0 ratingsA Guide to Kernel Exploitation: Attacking the Core Rating: 0 out of 5 stars0 ratingsThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Rating: 4 out of 5 stars4/5
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsAP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsChildhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5
Reviews for Eforensics and Signal Intelligence for Everyone
1 rating0 reviews
Book preview
Eforensics and Signal Intelligence for Everyone - Eamon P. Doherty
This Book is dedicated to Walter Engel
Part 1 of this book has material that was made for continuing education classes at Fairleigh Dickinson University and includes materials that were created by Dr. Doherty while receiving a grant for a project to teach students about Computer Forensics. This project was supported by Award No. 2005-DD-BX-1151 awarded by the Department of Justice, Office of Justice Programs. The opinions, findings, and conclusions or recommendations expressed in this publication are those of Dr. Doherty and in some cases Kenny Bruno and do not necessarily reflect the views of the Department of Justice.
Contents
0.0 - Disclaimers, Acknowledgements, and Introduction
0.001 – Introduction
0.1– Disclaimer
0.2 – Introduction to Some of the Author / Coauthors’ Previous Works
0.21 – The Authors of Computer Recreation for Everyone
0.22 – Purchasing Computer Recreation for Everyone
0.3 – Book 2 – Computer Security and Telerobotics for Everyone
0.31 – About the Authors of Book 2
0.32 – Where to Purchase Book 2?
0.4 – Book 3 - Emergency Management and Telemedicine for Everyone
0.41 – The Authors of Book 3
0.42 – Where to Purchase the Emergency Mgmt / Telemedicine Book
0.5 – The Everyone Concept
Chapter 1 – The Basic of Computer Forensics - PART 1
1.0 – What is Computer Forensics
1.1 - One Type of Investigative Triangle
1.2 – An Incident is the Result of an Opportunity to a Vulnerability in Policy
1.3 - Incident Response
1.4 - The Silver Platter Doctrine
1.45 – Being an Agent of Law Enforcement
1.5 - Resources for the Computer Investigator
1.6 - Corporate Investigations in General (Laptop, Desktop, Handheld Computers)
1.65 – PDA Connectivity and the Evidence Process
1.7 - Criminal Investigation
1.8 - Legal Considerations with Regard to Hand Held Computers and Cameras
1.9 – The Maintaining of Professional Conduct
1.91 – Recovering Old Websites
1.92 – Effectively Deleting Information from Hard Drives
1.93 – Items Left on Copiers, Fax Machines, Phone Answering Machines, Cameras
1.94 – Volatility and Storage
1.95 - The Device may be more than Meets the Eye
1.96 – Categories of Cybercrime
References
Chapter 2 – Introduction to Information from Paper, Laptops, and the PDA –PART 1
2.1 - Introduction to Securing Paper Documents
2.11 - The Consequences of Losing Paper Documents
2.12 - Modern Destruction of Institutional Paper Documents
2.13 - Historical Blunders in Destroying Paper
2.14 - Paper Types
2.15 - Strip Shredders
2.16 - Cross Cut Shredders
2.17 - Labor
2.18 - Questioned Document Examiner
2.19 – Conclusion about Information Security and Paper Documents
2.20 Introduction to Extracting Laptop Hard Disk Drive Data
2.21 – COPA Children’s Online Privacy Act and Discarding Laptop Computers
2.22 – Acquiring a Laptop with a 1.8" Damaged Hard Drive for a Criminal Investigation
2.23 – Looking at Two Distinct Types of Blackberry Devices
2.24 – Easily Monitoring All Activities of All Employees Using Laptops or Desktops
2.3 – An Example of a PDA, the HP iPAQ
2.31 – iPAQ Wireless Connectivity and Operating System
2.4 – Owner Identification of the iPAQ
2.41 – Policy Violation and Video Games
2.42 – Notes and Policy Violation / Criminal Investigation
2.45 – Pictures and Videos
2.46 – The Calendar
2.47 – Screen Orientation
2.5 – Video Streaming
2.6 – Wireless Connectivity and Range Extension
References
Chapter 3 – Investigating Electronic Eavesdropping – PART 1 of Book
3.00 Introduction to Electronic Eavesdropping in the Home
3.01 – Introduction to the Electronic Eavesdropping Problem at Work
3.011 – Accidental Leaking and Eavesdropping from Such a Meeting
3.02 – Getting Caught Profiting from Eavesdropping
3.03 – The Insider Trader and the Company Sound System
3.04 – The Modified Telephone and Eavesdropping
3.05 – The Power Line and Microphone
3.1 – The Big Hidden Wireless Transmitter
3.2 – The Technical Surveillance Counter Measure (TSCM) Sweep
3.21 – Listening Devices
3.25 - Counter Surveillance Devices
3.3 – Electronic Eavesdropping Devices and Counter Measures
3.32 - Counter Surveillance Professionals
3.33 – Built in Microphones
3.34 – Board Room Placement and having a Safe Secure Conversation
3.4 – Academic Research on Eavesdropping Detection Equip.
3.41 – Preparations, Stealth, and Getting Started
3.45 – The Course Probe
3.5 – The Covert Video camera and Webcam
3.55 – Infrared Microphones
3.6 – The Tool Kit
3.65 – The High Sensitivity Sweeper
3.7 – Goggles and Safety Equipment
3.75 - Infrared and Lights
3.8 – Places to Hide Video Cameras
3.9 – The Phones
References
3.91 – The Report
3.95 – Report Writing
3.97 – Devices that Could Help the Disabled or What a Bad Guy Might Use
3.98 – Learning to Use the Equipment Effectively with Real Items
3.981 – The Telephone Tap
Chapter 4 – Making a Forensic Image and Presenting to the Jury – PART 1
4.0 - Introduction
4.1 – Altering Bootup Sequence via Basic Input Output System (BIOS)
4.2 – Creating an Image with the Unix dd Command
4.21 – A Forensic Term Mirror Image
4.22 Creating the Forensic Image
4.3 – Chain of Evidence or Chain of Custody
4.4 – Objectionable Material and Jurors
4.41 – Talking to the Judge, Prosecution, and Jurors
4.42 – The Power of Public Opinion
4.5 – Introduction to the Logic Cube and Hard Drive Forensics
4.51 – Wiping a Drive, Removing All Previous Data
4.52 – The Computer Cases
4.53 – Opening Up the Machine is Necessary
4.54 – Practicing First with Portable External Power
4.55 – Practicing with Scratch Drives
4.56 – Accessories for the Logic Cube
4.57 - CD Drive
4.58 – Cloning / Imaging
a Drive
4.6 – Imaging a Laptop or Older Machine Via the USB Port while it is Running
4.7 – Reading the Manual and Apprenticing
Chapter 5 – Convergence of Technology and Fundable Project Ideas – PART 2
5.0 Introduction
5.1 - Sensor Networks
5.2 Getting Started in Monitoring Weather or other Conditions
5.3 – Combining Efforts
5.4 – Writing a Proposal
References
Chapter 6 - eForensics and Anti-Counterfeiting
6.0 - Introduction to Anti-Counterfeiting Measures and Some eForensics
6.1 - The Secret Service
6.2 - Super Hundred Dollar Bills
6.3 - Low Quality Fakes
6.4 - Creating Fakes
6.5 - Detecting Fakes can be done with eForensics
6.6 - Federal Law Enforcement and Industry Stopping Counterfeiting
6.7 – A Lesson to All
References
Chapter 7 – Surveillance, Tracking and eForensics
7.0 - Introduction to Tracking, Surveillance, and eForensics
7.05 – The Toll Paying Device (RFID) in England and eForensics
7.06 - The Toll Paying Device EZPass in New Jersey and eForensics
7.07 - Bad Guy Countermeasures on eForensics
7.1 – The Parabolic Microphone
7.2 – The Bracelet in Corrections
7.25 – The GPS and Fish Finder
7.3 – Travel Cards
7.4 – Tracking Security at Home – eForensics (video)
7.5 – eForensics and Truck Hijackings
7.6 – Tracking Cell phones
7.7 – Nanny Cams
References
Chapter 8 – Power line and Phone Line eForensics by Dr. Doherty
8.0 - Introduction to Broad Band Power Lines and eForensics
8.1 – The History of Wiretapping in the United States and India
8.2 – Power Line Signals and Radio Interference
References
Chapter 9 – Investigating the Source of Wires and Live Wires
9.0 – Knowing When to Help, and When to Get Help
9.1 – Electrical Accident Investigation
9.2 – Investigating Electrical Accident and Asphyxiation
9.3 - Improving Credentials with Classes that Teach how to Use Test Equipment
9.4 – A Simple Case of Identifying the Wires with a Continuity Tester
9.5 – Conclusion
References
Chapter 10 – Designing a Possible eForensics (Blackberry) / HAZMAT Exercise
10.0 - Introduction
10.01 – Legal Considerations
10.02 – American Society for Industrial Security (ASIS) International
10.03 – Advice on the Glovebox
10.04 – Seeking Some Advice from Business Executives for National Security BENS
10.1 – HAZMAT Involvement
10.2 – The Procedure for the Equipment for Analyzing the Powder and Blackberry
10.25 – Analyzing Powder with Handheld Electronic Equipment (Implementation)
10.3 – Dangerous Vapors
10.4 – Analyzing the Blackberry with Paraben Seizure Software
References
Chapter 11.0 - Mental Challenges to the eForensic and Other Investigators
11.0 - Introduction to the Potential Harm to Investigators
11.1 – Privacy and the eForensic / Private Investigator / Law Enforcement Officer
11.2 –The Stress of Arresting Trusted Members of the Community
11.3 –The Value of the Support of the Investigator’s Family
11.4 - Mentally Tough in Court and Dealing with Defense Attorneys
11.5 - Mentally Tough in Dealing with the Media and the Public
11.6 - The Desire to Be Liked and Be Part of Society
11.7 – The eForensic Investigator Must Deal with the CSI Factor in Court
11.8 – Inter Agency Rivalry
References
Chapter 12 - The Forensic Expert A Practical Perspective by Joel Liebesfeld
12.0 – Introduction
12.1 – Landmark Cases
12.2 – Preparing a Report
12.3 – Stress, Fatigue, and Trial
12.4 – Personal Experience as an Expert Witness
12.5 – Documentation and Choice of Words
12.6 – Fact Witnesses
12.7 – The Scientific Method
12.8 – Project Management
12.9 – Other Sources of Stress
References
Chapter 13 – Considerations for New eForensic Examiners and Intelligence Personnel
13.0 – The Need for eForensic Investigators / Genealogists to have Valid Credentials
13.01 – Ergonomic Considerations Concerning Eyesight for the eForensic Investigator
13.02 – Ergonomic Considerations Concerning the Health for the eForensic Investigator
13.03 – Mental Health Issues for the eForensic Examiner
13.1 Finding Online Sources of Information Seriously
13.2 – Taking Physical Security where you Work Seriously
13.25 – How Electronic Devices Can Fall into Criminal Hands and easily be Examined
13.3 - The Importance of the Frye Test on Evidence Collection and Expert Testimony
13.4 – Information that Distracts the Reader from the Report
13.4 - Conclusion
References
Chapter 14 – Helping the Military Computer Investigator Return to Civilian Life
14.0 – Computers and Rehabilitation in General
14.01 – Physical Rehabilitation for the eForensic Investigator who is injured on the Job
14.1 – Post Traumatic Stress and the Military Computer Investigator
14.2 – Helping the American / Coalition Force Soldier Transition to Civilian Life
14.21 – Desensitization Therapy and Virtual Reality
14.23 – Reducing the eForensic Investigator’s Phobias
14.3 – Stress Inoculation Training (SIT)
14.4 – Augmented Reality and the Wartime Computer Investigator
14.5– Why We Need to Include Rehabilitation Material with eForensics
14.6 – Relating This Material to Your Needs
14.7 – Modern Cities Still Have Old Buildings without Elevators
14.71 – Potentially Hurting a Limb Carrying Equipment Down Stairs
14.72 – Investigators who Experience Limb Damage from Pinched Nerves
14.73 – Telerehabilitation and Robot Mediated Therapy
14.74 – Dr. Doherty’s Thoughts about Computerized Rehabilitation for Everyone
References
Chapter 15 – eForensics and Investigating Atrocities (High Stress)
15.1 – Introduction
15.1 – The Concentration Camp in Pilsen
15.2 – Scanning Pictures and Making Backups
15.3 – Interviewing the Person
15.35 - Using the Web to Verify Stories
15.4 – Examining the Pictures
15.5 – Documenting and Investigating Information Through Network
15.6 – Hope for the Future
References
Chapter 16 – Using the Internet to Research Family Relationships for Locating Heirs
16.1 – Using the Internet to Find Lost Relatives When a Will is Lost
16.1 – Locating Houses of Worship, Obtaining Records, Online or In Person
16.15 – Locating Relevant Social Organizations Online
16.2 – Using the Information Online to Obtain More Information
16.1 – Locating Descendents from Online Sources of Employment
16.2 – Contacting the Descendents
16.3 – eForensics and Working for Lawyers
16.4 - Locating Lost People –eForensics and Private Investigation (Simulated Case)
16.41 – eForensic Investigator Locates the Moldavian Bride Website (Simulated Case)
16.5 – Internet Dating and Potential Problems
References
Chapter 17 – Using Pre-Installed Forensic Technology for eSecurity / eForensics
17.0 – Introduction to Sporting Event Security and Forensics
17.01 – Car Security for the Checkpoint
17.1 – Installing Forensics at the Checkpoint – Fast Flow Inspection System
17.2 – The Fast Battery Charger and Video Conference System
17.3 – The Enter Trac
17.4 – Conclusion
Chapter 18 – Examples of Human Computer Interaction and Behavior
18.0 Introduction
18.01 – The Quadriplegic Man, Bruce Davis using his Computer and Phone
18.02 – Bruce Davis using his Computer to Investigate and Rent Movies
18.03 – The Quadriplegic Man Investigates Junk Email Reduction
18.04 – The Quadriplegic Man and his Opinion on Ecommerce
18.05 – Bruce Investigates a New Prototype to Automate Calling
18.06 – Brain Injured Man and the Computer Investigates a Prototype of a Menu System
18.1 – Young Educated Professional Male and the Computer Uses a Computer
18.2 – Discussion Uncovers How a Man Uses a Computer to Investigate Dates
18.3 – The Private Investigator uses Online Databases to Prepare and Send Testimony
18.4 – Isolation, Imposed
18.5 – Conclusion
Reference
Chapter 19 – Accountability, Crime Prevention, and Digital Video Forensics
19.0 – Introduction to Accountability
19.1 – Circulated Stories to Regional Consciousness to Think Tanks to Regulations
19.2 – When Accountability is not Enough Considering the Harm Done
19.3 – The Cost of Crime on Retailers
19.4 – Computer Forensics and the Response to Retail Crime
19.5 – Reporting Crimes
References
Chapter 20 – Historic Document Management and Its Importance in Modern Society
20.1 – Standards Concerning Document Retrieval, Storage, and Destruction
20.2 – Cemeteries and the Need for Document Management in the USA
20.3 – Document Management and Historic Graveyards in England
20.4 – Conclusion Regarding eForensics and Documents
References
Chapter 21–Investigating the Past through E-Documents & Verification with Ariel Photos
21.0– Introduction to Satellite Photos, Documents, and Evidence on the Ground
21.1 – Locating the Name of the Castle using eForensics – Enlarging a Picture
21.2 – Locating a Similar Picture – Verifying Key Landmarks and Building Details
21.21 – Researching the History of a Landmark using the Internet
21.3 – The Role of Document Management as a Tool to Fund Government
21.31 – The Doomsday Book – Historic Land Survey / Online Access to Book
21.4 – Signal Intelligence and Treasure in Sunderland, England
21.5 – Augmenting Signal Intelligence with Historic Documents
27.51 – Signal Intelligence and Unexploded Underwater Ordinance
21.6 – DIDSON Imaging Sonar – Locating Objects to Depths of 8000 Feet
21.61 – Using Books for Specialized Topics not Found on the Internet
21.62 – Historic Hazards on Land World Wide (Including USA) – Landmines
21.7 – Interviewing Someone with Relevant Experience (Historic)
21.71 - Nick Abatto and the Armored Personnel Carrier APC-59
21.8 – College Students at John Hopkins Create a Mine Detection System
21.81 – College Student at Fairleigh Dickinson University Attempts Mine Detection System
21.9 – Inspiring the Future
References
Chapter 22 – A Security Man & eForensic Specialist Develop a Train Security System
22.0 – Introduction to System Development
22.0.1 – The Role of the Person who Understands Signal Intelligence
22.1 – eForensic Specialists and Security People Team Up
22.2 – Potential Jobs for eForensic Specialists
References
Chapter 23 – eForensics and Automated Railroads
23.0 - Introduction
23.1 – England’s Contribution to Automating Railroading (1900 – 1930)
23.2 – Trains and Trucks as Competitors
23.21 - Trucks and Trains have Tracking and eForensics
23.3 – Long Trains and Sensors
23.4 – The Evolution of Trains from People to Electronic Controlled
23.5 – Robotic Trains
23.6 – Robotic Investigator?
References
Chapter 24 - Using RFID Tags and eForensics to Prove Worker Innocence
24.0 - The Need to Prove Innocence
24.1 - Stereotypes
24.2 - Affordable Available Office Space Can Cause Disparate Groups to be Neighbors
24.3 - Radio Frequency Identification (RFID) and Universal Product Codes
24.3 - Bill sets up an Technology incase of an eForensic Investigation is Needed
24.4 - Offsetting Costs of Equipment
24.5 - Other Benefits of Surveillance Equipment
24.6 - Surveillance / Counter Surveillance Equipment and Workers
24.7 – Discussion of Research to Possibly Identify Sex Offenders
24.8 - Conclusion
References
Chapter 25 – A Discussion of Investigation as a Lifestyle
25.0 – Introduction
25.1 – Applicable Laws
25.2 – Keeping up with the Latest Consumer Technologies
25.3 – Late Nights and Cramming for Court
25.4 – A Wide Network of Academics, Technical Types, Suppliers, and Other Investigators
25.5 – Learning About Court Protocol
25.6 – Mental Health Concerns and Recreation
25.7 – Professional Organizations
25.8 – Conferences, Writing for Publications, Keeping Current in your Field
15.95 – Choosing Certifications and Seeing Future Market Niches
References
Chapter 26 – Using Investigative Skills to Examine a Donated Printer
26.1 – Introduction
26.2 – Investigating the Donated Printer
26.3 – Obtaining the Drivers and Manual
26.4 - Testing the Printer
26.41 – Examining why the Printer Did Not Work
26.5 – Cost Benefit Analysis
26.6 – Retesting the Printer
26.61 – Various Levers and Buttons and the Lesson Learned
26.7 – Conclusion
Chapter 27 – eForensics and Applying Signal Intelligence to Daily Living
27.0 – Introduction
27.1 – Identifying the Problem
27.2 – GIS and Locating Possible Sources of Ultrasound
27.3 – Betty Narrows Down the Problem Using Analytical Skills
27.4 – Implementing a Solution
27.5 – Finding the Source of the Ultrasonic Waves
27.5 Conclusion
References
Chapter 28 – eForensics & Proactively Detecting Explosives and Weapons
28.0 – Introduction
28.01 – The Need for Proactive eForensic Countermeasures
28.1 -Scan 6046si Heimann X-Ray System & Optional Radiation Sensor for Private Airport
28.2 – The Smiths Detection IonScan Sentinel 2
28.3 – The HazMatID Portable Chemical Identifier and Identifying Powders
28.4 Conclusion
References
Chapter 29 - E Forensics – Selected Aspects of Hardware Elements and Applications (Written by Investigator Joel Liebesfeld)
29.0 - Bits and Bytes
29.01 - Semiconductors and Computer Components
29.02- Circuits and Chips
29.03 - Speed and Chip Operation
29.1 - Logical Operations and Binary Decisions
29.2 - Instructional Programs and Logical Operations (Example of National Security)
29.3 - Electronic Security Companies and Custom Designed Chips/Hardware
29.4 - Hardware and Cybercrime
General References
Chapter 30 – Trade Shows for Computing and a Special Interest like Computer Forensics
30.0 – Introduction
30.01 – Registering for a Trade Show and Checking In
30.02 – Learning About New Publications in Your Field at a Trade Show
30.03 – Setting Up a Bilingual Call Center for Customer Support and Incident Response
30.04 – Perks, Free Subscriptions, Etc..
30.05 – Other People Attending a Trade Show Often Have Other Interests Like You
30.06 – Understanding Customer Needs – First Responders, eForensic Investigators
30.07 – Common Security Interests – Ethernet Powerline Adapters
30.1 – Sharing New Stories of Cybercrime and Countermeasures
30.2 – Innovative Low Cost New Tools at Trade Shows
30.3 – Environmental Protection Agency (EPA) Fines and Computers
30.4 – Logic Cube
30.5 – Societies for Information Governance, Security, and Audit / Forensic Accounting
30.6 – Academics and Trade Shows
30.7 – Conclusion
References
Chapter 31 – eForensics, Surveillance, and High Altitude Airships
31.0 – Introduction
31.1 – The Return of Airships at Lakewood New Jersey for Possible Surveillance
31.12 – Aerostats and Surveillance (eForensics) in Iraq
31.2 – Same Idea Different Scenario
References
Chapter 32 – Examining Physical Damage and Damage from e-gossip and gossip
32.0 – Introduction
32.1 – Improper Operation, Maintenance, of Computer and Lack of Supervision
32.11 – Rumor Mongering and e-Gossip
32.2 – Young People Allegedly Misusing MySpace.com
32.3 One Last Thought
References
Table of Figures
Figure 0.1 – Computer Recreation for Everyone
Figure 0.2 - Computer Security and Telerobotics for Everyone
Figure 0.3 – Emergency Management and Telemedicine for Everyone
Figure 1.1. The One Type of Investigative Triangle
Figure 1.2 – Telnetting from a Computer in NJ to England
Figure 1.3 – Faraday Bag Created by Dr. Doherty
Figure 1.4 – Results of the Waybackmachine
Figure 2.1 – The Hard Drive Enclosure
Figure 2.2 – Logic Cube (Insert)
Figure 2.3 – The HP iPAQ, My Favorite PDA
Figure 3.1 – Left to Right, FM Wireless Microphone and Radio, Walkie Talkie
Figure 3.2 – Kenny Operating a Listening Device Detection Probe of 5 MHz to 2.5 GHz
Figure 3.3 – Dr. Doherty Checking for the Presence of a Possible Covert Wall Cam
Figure 3.4 – Kenny Detecting Infrared from the TV Remote of Dr. Doherty
Figure 3.5 – The Electronic Eavesdropping Detection Tools in a Pelican Case
Figure 3.6 – Walter Engel and the High Sensitivity 1 MHz to 6 GHz Sweeper
Figure 3.7 – Kenny Determining the Source of Infrared
Figure 3.8 – Checking for the Presence of a Covert Camera
Figure 3.9 – The Wireless Camera and Blackberry
Figure 3.10 – The Plant Cam
Figure 3.11 – The Phone / Fax Bug Deactivator
Figure 3.12 – Is it an AZ-110 or a look alike?
Figure 3.13 – The TT-07 Phone Testing Device
Figure 3.14 – The Network Interface Device also known as the NID
Figure 4.1 – The Logic Cube and Hard Drive Ready for Wiping
Figure 4.2 – Drives on a Swivel Mount.
Figure 4.3 – Pentax PocketJet 200
Figure 4.4 – A Suspect Drive Being Imaged
Figure 4.5 – Imaging a Laptop Via USB 1.1 Port
Figure 5.1 – Gary Stephenson (left) and Dr. Doherty Videoconferencing with Netmeeting
Figure 6.1 – An Indian Head Penny 1877 (Convincing?)
Figure 8.0 – An American Tension Tower in New Jersey
Figure 8.1 – The Three Wires and Transformer on an American Electric Utility Pole
Figure 9.1 – The 200 Volt Difference in Potential Shock (Step Voltage)
Figure 9.2 – Using the Separate Continuity Tester or the one on the VTVM
Figure 10.1 – The Blackberry and the Seizure Cable From Paraben
Figure 14.1 – Dr. Doherty in a type of Virtual Iraq
Figure 14.2 – Dr. Doherty in a Virtual World with Open Elevators and High Open Stairs
Figure 15.1 – Removing the Dead for Burial
Figure 15.2 – A Pilsen Crematorium
Figure 16.1 – Edward Thomas Donnelly and his Wife Honora
Figure 17.1 – The PFI – 1000 Biometric Reader
Figure 17.2 – Prof. Doherty and the Lightweight Fast Flow Inspection System
Figure 17.3 – The Fast Charger and Video Conference System
Figure 17.4 – The Enter Trac
Figure 20.1 – Jeff Marsh and His Computer
Figure 21.1 – Dr. Eamon Doherty at Belsay Castle in Northumberland England
Figure 21.2 – German Underwater Mine From North Sea
Figure 21.3 – Nick in front of the APC-59
Figure 21.4 – eForensic Mine Detection System
Figure 22.1 – The Magnascan
Figure 23.1 – Gary Stephenson and (Replica of) the Stephenson Rocket
Figure 26.1 – Jeff and His Working Printer, Persistence, Diligence, and Safety Pay Off
Figure 27.1 – A Pest Repellent Installed in the Open Area of an Unfinished Ceiling
Figure 28.1 – The HiScan 6046si Heimann X-Ray Inspection System
Figure 28.2 – Ionscan Sentinel II by Smiths Detection Corporation
Figure 28.3- The HazMatID Potable Chemical Identifier
Figure 29.1 - The AND Truth Table
Figure 29.2 - The NOT Truth Table
Figure 29.3 - The Two Input NOR Truth Table
Figure 31.1 – 1919 Military Blimp (Courtesy of the National Archives Record Admin.)
0.0 - Disclaimers, Acknowledgements, and Introduction
0.001 – Introduction
There is a saying that a large computer development corporation often quoted: We always count starting with zero unless we start counting with one.
Since this is a computer / electronic forensic book, we will start counting chapters from zero. There is also the term, ground zero
, it basically means the epicenter where everything starts; therefore starting with zero is appropriate.
0.1– Disclaimer
This book has a main author, mainly Dr. Doherty, and many coauthors including Gary Stephenson who also does editing. There are several other authors such as Joel Liebesfeld, who is a Senior Engineering Investigator who often handles various cases. Kenneth Bruno, is the president of a small computer company that occasionally does scanning for electronic surveillance devices. Joel Fernandes, does some C++ programming and has an interest in voice over Internet Protocol (VOIP) telephones.
Each author has given a chapter or written part of a chapter with me, Dr. Doherty. Each chapter author is clearly marked at the end of that chapter. As an academic, Dr. Doherty is allowed to discuss various aspects of investigation, bring up anecdotes to help the reader learn, and discuss various aspects of investigation which could even include something a little controversial such as remote viewing that was reported to be done by the CIA. Materials in a chapter should only be attributed to that author. For example, something on remote viewing should not be attributed to Joel Liebesfeld, Joel Fernandes, Kenny Bruno, or anyone else not specifically mentioned at the end of that chapter. A person reading this book should not conduct an investigation unless they are both qualified and authorized to conduct such an investigation. It is also the reader’s responsibility to learn about the laws for operating electronic equipment in their state or country and what requirements are needed for private investigation. Investigations involving civil or criminal matters should be left to law enforcement professionals in that jurisdiction who are authorized to operate equipment and conduct investigations. This is an academic book discussing some stories of signal intelligence and eForensics. It is not a complete discussion of the topic and is not a manual. It is only an academic discussion to teach principles to develop an interest in the subject and then seek professional training and licensing in.
Each coauthor has something to give to an academic discussion of topics relating to investigation, electronic systems, power line, tension towers and high voltage lines, and various aspects of network or eForensics. However; various authors / coauthors may hold conflicting opinions on various topics so it is completely unfair to attribute opinions or experiences of one person’s chapter to another author or coauthor.
This book does not represent the opinions of Fairleigh Dickinson University. It is an academic work that examines eForensics a term I use to mean a broad spectrum of electronic signaling, their detection, and their remnants on various media and equipment. This book was written to take an average reader and get him or her thinking about various aspects of investigation, signal intelligence, and electronic communication. The opinions expressed here do not officially represent any opinions or beliefs held by any organization, committee, or employer of any of the authors or coauthors.
This book will often display various types of investigative or forensic equipment. No author or coauthor received compensation for the pictures or use of that equipment. The book is not in any way, shape or form an official endorsement of those products or services but an example of equipment or service that was available to us at no additional cost to the author or coauthor at the time of writing the book. The services or equipment depicted does not mean it is the best after a survey of all related services or equipment. It was simply available at no additional cost to the author / coauthors at the time of writing the book.
Each author and coauthor is required to take continuing education in their line of work and therefore each author and coauthor has taken 1 day or a semester long class. Some of the authors and coauthors plan to have a second career in teaching to share their practical knowledge with students in various disciplines. This book is a way that they are discussing academic topics with regard to investigation, computers, networks, and signal intelligence. This publication will hopefully count as a publication to help them enter the world of academic publishing, teaching, and higher learning. This is not meant to be a manual or how to book but a book to give general knowledge.
One should never install a monitoring device or conduct any investigation without proper authorization from the official and lawful jurisdiction in the context of that situation. If a listening device is detected, don’t touch it and call your local law enforcement agency. Good luck in your studies and we hope this book further enlightens your interest in investigation and eForensics.
0.2 – Introduction to Some of the Author / Coauthors’ Previous Works
There is a book called