Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Eforensics and Signal Intelligence for Everyone
Eforensics and Signal Intelligence for Everyone
Eforensics and Signal Intelligence for Everyone
Ebook585 pages5 hours

Eforensics and Signal Intelligence for Everyone

Rating: 4 out of 5 stars

4/5

()

Read preview

About this ebook

This book discusses the process of investigating and analyzing electronic equipment, detecting devices, wireless signals, and the prosecution and prevention of high tech crime. The coauthors are from private industry and academia and really provide a wide variety of perspectives on the detection of electronic eavesdropping devices, wiretaps, various electronic signals, and the collection and examination of information from laptops, desktop computers, and PDAs. Kenneth Bruno does an excellent job teaching the reader about all the equipment used in electronic eavesdropping detection. We also introduce the reader to various pieces of electronic equipment used to detect and identify explosives, biochemical weapons, as well as historic unexploded ordinance. The reader is also introduced to the legal system by Mr. Joel Liebesfeld who does corporate investigations and is often employed by clients who are in the legal profession or insurance industry. Mr. Joel Liebesfeld and Dr. Doherty discuss the process of becoming an expert witness who may testify to what was found using scientific methods in combination with electronic signal detection or computer forensic equipment. We hope that the readership of the book will include high school students considering a career in private industry, law enforcement, intelligence agencies, or the military. A background in electronics, math, and computer science is helpful but not necessary in reading this book. Lockards Principle of Exchange specifies that two objects or people that come in contact with each other will change. We hope that this book changes you by increasing your understanding of electronic devices, investigation, and the justice system.

LanguageEnglish
PublisherAuthorHouse
Release dateDec 12, 2006
ISBN9781496949943
Eforensics and Signal Intelligence for Everyone
Author

Eamon P. Doherty

The author Dr. Eamon P. Doherty has created a variety of Robotic Arm Interfaces and telephone dialers that were featured in a variety of academic and popular media including a half page of the New York Times on April 24, 2003 on page G5. Kenneth Bruno, BS, MS, is president of KAB Computer Services, LLC, a full service technology company.  He is a nationally recognized leader in technology, specifically in the areas of computer science, electronic eavesdropping & detection, and audio/video. Clientele include government agencies, private and public schools, as well as private industry. Gary Stephenson is a health informatics consultant who has worked on a variety Connecting for Health projects for the NHS in England. He has also volunteered his time and efforts on technology to help the disabled throughout the world. Joel Liebesfeld, AAS, BS, MA, has for the past six years used his diverse 30+ years of electrical industry experience for the investigation of engineering loss, particularly focusing on loss related to fire, arson, product defect and/or electrical anomalies, resulting in property damage, personal injury or death.  These losses mainly stemmed from electrical accidents, defects, deficiencies or were related to arson. 

Related to Eforensics and Signal Intelligence for Everyone

Related ebooks

Computers For You

View More

Related articles

Reviews for Eforensics and Signal Intelligence for Everyone

Rating: 4 out of 5 stars
4/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Eforensics and Signal Intelligence for Everyone - Eamon P. Doherty

    This Book is dedicated to Walter Engel

    Part 1 of this book has material that was made for continuing education classes at Fairleigh Dickinson University and includes materials that were created by Dr. Doherty while receiving a grant for a project to teach students about Computer Forensics. This project was supported by Award No. 2005-DD-BX-1151 awarded by the Department of Justice, Office of Justice Programs. The opinions, findings, and conclusions or recommendations expressed in this publication are those of Dr. Doherty and in some cases Kenny Bruno and do not necessarily reflect the views of the Department of Justice.

    Contents

    0.0 - Disclaimers, Acknowledgements, and Introduction

    0.001 – Introduction

    0.1– Disclaimer

    0.2 – Introduction to Some of the Author / Coauthors’ Previous Works

    0.21 – The Authors of Computer Recreation for Everyone

    0.22 – Purchasing Computer Recreation for Everyone

    0.3 – Book 2 – Computer Security and Telerobotics for Everyone

    0.31 – About the Authors of Book 2

    0.32 – Where to Purchase Book 2?

    0.4 – Book 3 - Emergency Management and Telemedicine for Everyone

    0.41 – The Authors of Book 3

    0.42 – Where to Purchase the Emergency Mgmt / Telemedicine Book

    0.5 – The Everyone Concept

    Chapter 1 – The Basic of Computer Forensics - PART 1

    1.0 – What is Computer Forensics

    1.1 - One Type of Investigative Triangle

    1.2 – An Incident is the Result of an Opportunity to a Vulnerability in Policy

    1.3 - Incident Response

    1.4 - The Silver Platter Doctrine

    1.45 – Being an Agent of Law Enforcement

    1.5 - Resources for the Computer Investigator

    1.6 - Corporate Investigations in General (Laptop, Desktop, Handheld Computers)

    1.65 – PDA Connectivity and the Evidence Process

    1.7 - Criminal Investigation

    1.8 - Legal Considerations with Regard to Hand Held Computers and Cameras

    1.9 – The Maintaining of Professional Conduct

    1.91 – Recovering Old Websites

    1.92 – Effectively Deleting Information from Hard Drives

    1.93 – Items Left on Copiers, Fax Machines, Phone Answering Machines, Cameras

    1.94 – Volatility and Storage

    1.95 - The Device may be more than Meets the Eye

    1.96 – Categories of Cybercrime

    References

    Chapter 2 – Introduction to Information from Paper, Laptops, and the PDA –PART 1

    2.1 - Introduction to Securing Paper Documents

    2.11 - The Consequences of Losing Paper Documents

    2.12 - Modern Destruction of Institutional Paper Documents

    2.13 - Historical Blunders in Destroying Paper

    2.14 - Paper Types

    2.15 - Strip Shredders

    2.16 - Cross Cut Shredders

    2.17 - Labor

    2.18 - Questioned Document Examiner

    2.19 – Conclusion about Information Security and Paper Documents

    2.20 Introduction to Extracting Laptop Hard Disk Drive Data

    2.21 – COPA Children’s Online Privacy Act and Discarding Laptop Computers

    2.22 – Acquiring a Laptop with a 1.8" Damaged Hard Drive for a Criminal Investigation

    2.23 – Looking at Two Distinct Types of Blackberry Devices

    2.24 – Easily Monitoring All Activities of All Employees Using Laptops or Desktops

    2.3 – An Example of a PDA, the HP iPAQ

    2.31 – iPAQ Wireless Connectivity and Operating System

    2.4 – Owner Identification of the iPAQ

    2.41 – Policy Violation and Video Games

    2.42 – Notes and Policy Violation / Criminal Investigation

    2.45 – Pictures and Videos

    2.46 – The Calendar

    2.47 – Screen Orientation

    2.5 – Video Streaming

    2.6 – Wireless Connectivity and Range Extension

    References

    Chapter 3 – Investigating Electronic Eavesdropping – PART 1 of Book

    3.00 Introduction to Electronic Eavesdropping in the Home

    3.01 – Introduction to the Electronic Eavesdropping Problem at Work

    3.011 – Accidental Leaking and Eavesdropping from Such a Meeting

    3.02 – Getting Caught Profiting from Eavesdropping

    3.03 – The Insider Trader and the Company Sound System

    3.04 – The Modified Telephone and Eavesdropping

    3.05 – The Power Line and Microphone

    3.1 – The Big Hidden Wireless Transmitter

    3.2 – The Technical Surveillance Counter Measure (TSCM) Sweep

    3.21 – Listening Devices

    3.25 - Counter Surveillance Devices

    3.3 – Electronic Eavesdropping Devices and Counter Measures

    3.32 - Counter Surveillance Professionals

    3.33 – Built in Microphones

    3.34 – Board Room Placement and having a Safe Secure Conversation

    3.4 – Academic Research on Eavesdropping Detection Equip.

    3.41 – Preparations, Stealth, and Getting Started

    3.45 – The Course Probe

    3.5 – The Covert Video camera and Webcam

    3.55 – Infrared Microphones

    3.6 – The Tool Kit

    3.65 – The High Sensitivity Sweeper

    3.7 – Goggles and Safety Equipment

    3.75 - Infrared and Lights

    3.8 – Places to Hide Video Cameras

    3.9 – The Phones

    References

    3.91 – The Report

    3.95 – Report Writing

    3.97 – Devices that Could Help the Disabled or What a Bad Guy Might Use

    3.98 – Learning to Use the Equipment Effectively with Real Items

    3.981 – The Telephone Tap

    Chapter 4 – Making a Forensic Image and Presenting to the Jury – PART 1

    4.0 - Introduction

    4.1 – Altering Bootup Sequence via Basic Input Output System (BIOS)

    4.2 – Creating an Image with the Unix dd Command

    4.21 – A Forensic Term Mirror Image

    4.22 Creating the Forensic Image

    4.3 – Chain of Evidence or Chain of Custody

    4.4 – Objectionable Material and Jurors

    4.41 – Talking to the Judge, Prosecution, and Jurors

    4.42 – The Power of Public Opinion

    4.5 – Introduction to the Logic Cube and Hard Drive Forensics

    4.51 – Wiping a Drive, Removing All Previous Data

    4.52 – The Computer Cases

    4.53 – Opening Up the Machine is Necessary

    4.54 – Practicing First with Portable External Power

    4.55 – Practicing with Scratch Drives

    4.56 – Accessories for the Logic Cube

    4.57 - CD Drive

    4.58 – Cloning / Imaging a Drive

    4.6 – Imaging a Laptop or Older Machine Via the USB Port while it is Running

    4.7 – Reading the Manual and Apprenticing

    Chapter 5 – Convergence of Technology and Fundable Project Ideas – PART 2

    5.0 Introduction

    5.1 - Sensor Networks

    5.2 Getting Started in Monitoring Weather or other Conditions

    5.3 – Combining Efforts

    5.4 – Writing a Proposal

    References

    Chapter 6 - eForensics and Anti-Counterfeiting

    6.0 - Introduction to Anti-Counterfeiting Measures and Some eForensics

    6.1 - The Secret Service

    6.2 - Super Hundred Dollar Bills

    6.3 - Low Quality Fakes

    6.4 - Creating Fakes

    6.5 - Detecting Fakes can be done with eForensics

    6.6 - Federal Law Enforcement and Industry Stopping Counterfeiting

    6.7 – A Lesson to All

    References

    Chapter 7 – Surveillance, Tracking and eForensics

    7.0 - Introduction to Tracking, Surveillance, and eForensics

    7.05 – The Toll Paying Device (RFID) in England and eForensics

    7.06 - The Toll Paying Device EZPass in New Jersey and eForensics

    7.07 - Bad Guy Countermeasures on eForensics

    7.1 – The Parabolic Microphone

    7.2 – The Bracelet in Corrections

    7.25 – The GPS and Fish Finder

    7.3 – Travel Cards

    7.4 – Tracking Security at Home – eForensics (video)

    7.5 – eForensics and Truck Hijackings

    7.6 – Tracking Cell phones

    7.7 – Nanny Cams

    References

    Chapter 8 – Power line and Phone Line eForensics by Dr. Doherty

    8.0 - Introduction to Broad Band Power Lines and eForensics

    8.1 – The History of Wiretapping in the United States and India

    8.2 – Power Line Signals and Radio Interference

    References

    Chapter 9 – Investigating the Source of Wires and Live Wires

    9.0 – Knowing When to Help, and When to Get Help

    9.1 – Electrical Accident Investigation

    9.2 – Investigating Electrical Accident and Asphyxiation

    9.3 - Improving Credentials with Classes that Teach how to Use Test Equipment

    9.4 – A Simple Case of Identifying the Wires with a Continuity Tester

    9.5 – Conclusion

    References

    Chapter 10 – Designing a Possible eForensics (Blackberry) / HAZMAT Exercise

    10.0 - Introduction

    10.01 – Legal Considerations

    10.02 – American Society for Industrial Security (ASIS) International

    10.03 – Advice on the Glovebox

    10.04 – Seeking Some Advice from Business Executives for National Security BENS

    10.1 – HAZMAT Involvement

    10.2 – The Procedure for the Equipment for Analyzing the Powder and Blackberry

    10.25 – Analyzing Powder with Handheld Electronic Equipment (Implementation)

    10.3 – Dangerous Vapors

    10.4 – Analyzing the Blackberry with Paraben Seizure Software

    References

    Chapter 11.0 - Mental Challenges to the eForensic and Other Investigators

    11.0 - Introduction to the Potential Harm to Investigators

    11.1 – Privacy and the eForensic / Private Investigator / Law Enforcement Officer

    11.2 –The Stress of Arresting Trusted Members of the Community

    11.3 –The Value of the Support of the Investigator’s Family

    11.4 - Mentally Tough in Court and Dealing with Defense Attorneys

    11.5 - Mentally Tough in Dealing with the Media and the Public

    11.6 - The Desire to Be Liked and Be Part of Society

    11.7 – The eForensic Investigator Must Deal with the CSI Factor in Court

    11.8 – Inter Agency Rivalry

    References

    Chapter 12 - The Forensic Expert A Practical Perspective by Joel Liebesfeld

    12.0 – Introduction

    12.1 – Landmark Cases

    12.2 – Preparing a Report

    12.3 – Stress, Fatigue, and Trial

    12.4 – Personal Experience as an Expert Witness

    12.5 – Documentation and Choice of Words

    12.6 – Fact Witnesses

    12.7 – The Scientific Method

    12.8 – Project Management

    12.9 – Other Sources of Stress

    References

    Chapter 13 – Considerations for New eForensic Examiners and Intelligence Personnel

    13.0 – The Need for eForensic Investigators / Genealogists to have Valid Credentials

    13.01 – Ergonomic Considerations Concerning Eyesight for the eForensic Investigator

    13.02 – Ergonomic Considerations Concerning the Health for the eForensic Investigator

    13.03 – Mental Health Issues for the eForensic Examiner

    13.1 Finding Online Sources of Information Seriously

    13.2 – Taking Physical Security where you Work Seriously

    13.25 – How Electronic Devices Can Fall into Criminal Hands and easily be Examined

    13.3 - The Importance of the Frye Test on Evidence Collection and Expert Testimony

    13.4 – Information that Distracts the Reader from the Report

    13.4 - Conclusion

    References

    Chapter 14 – Helping the Military Computer Investigator Return to Civilian Life

    14.0 – Computers and Rehabilitation in General

    14.01 – Physical Rehabilitation for the eForensic Investigator who is injured on the Job

    14.1 – Post Traumatic Stress and the Military Computer Investigator

    14.2 – Helping the American / Coalition Force Soldier Transition to Civilian Life

    14.21 – Desensitization Therapy and Virtual Reality

    14.23 – Reducing the eForensic Investigator’s Phobias

    14.3 – Stress Inoculation Training (SIT)

    14.4 – Augmented Reality and the Wartime Computer Investigator

    14.5– Why We Need to Include Rehabilitation Material with eForensics

    14.6 – Relating This Material to Your Needs

    14.7 – Modern Cities Still Have Old Buildings without Elevators

    14.71 – Potentially Hurting a Limb Carrying Equipment Down Stairs

    14.72 – Investigators who Experience Limb Damage from Pinched Nerves

    14.73 – Telerehabilitation and Robot Mediated Therapy

    14.74 – Dr. Doherty’s Thoughts about Computerized Rehabilitation for Everyone

    References

    Chapter 15 – eForensics and Investigating Atrocities (High Stress)

    15.1 – Introduction

    15.1 – The Concentration Camp in Pilsen

    15.2 – Scanning Pictures and Making Backups

    15.3 – Interviewing the Person

    15.35 - Using the Web to Verify Stories

    15.4 – Examining the Pictures

    15.5 – Documenting and Investigating Information Through Network

    15.6 – Hope for the Future

    References

    Chapter 16 – Using the Internet to Research Family Relationships for Locating Heirs

    16.1 – Using the Internet to Find Lost Relatives When a Will is Lost

    16.1 – Locating Houses of Worship, Obtaining Records, Online or In Person

    16.15 – Locating Relevant Social Organizations Online

    16.2 – Using the Information Online to Obtain More Information

    16.1 – Locating Descendents from Online Sources of Employment

    16.2 – Contacting the Descendents

    16.3 – eForensics and Working for Lawyers

    16.4 - Locating Lost People –eForensics and Private Investigation (Simulated Case)

    16.41 – eForensic Investigator Locates the Moldavian Bride Website (Simulated Case)

    16.5 – Internet Dating and Potential Problems

    References

    Chapter 17 – Using Pre-Installed Forensic Technology for eSecurity / eForensics

    17.0 – Introduction to Sporting Event Security and Forensics

    17.01 – Car Security for the Checkpoint

    17.1 – Installing Forensics at the Checkpoint – Fast Flow Inspection System

    17.2 – The Fast Battery Charger and Video Conference System

    17.3 – The Enter Trac

    17.4 – Conclusion

    Chapter 18 – Examples of Human Computer Interaction and Behavior

    18.0 Introduction

    18.01 – The Quadriplegic Man, Bruce Davis using his Computer and Phone

    18.02 – Bruce Davis using his Computer to Investigate and Rent Movies

    18.03 – The Quadriplegic Man Investigates Junk Email Reduction

    18.04 – The Quadriplegic Man and his Opinion on Ecommerce

    18.05 – Bruce Investigates a New Prototype to Automate Calling

    18.06 – Brain Injured Man and the Computer Investigates a Prototype of a Menu System

    18.1 – Young Educated Professional Male and the Computer Uses a Computer

    18.2 – Discussion Uncovers How a Man Uses a Computer to Investigate Dates

    18.3 – The Private Investigator uses Online Databases to Prepare and Send Testimony

    18.4 – Isolation, Imposed

    18.5 – Conclusion

    Reference

    Chapter 19 – Accountability, Crime Prevention, and Digital Video Forensics

    19.0 – Introduction to Accountability

    19.1 – Circulated Stories to Regional Consciousness to Think Tanks to Regulations

    19.2 – When Accountability is not Enough Considering the Harm Done

    19.3 – The Cost of Crime on Retailers

    19.4 – Computer Forensics and the Response to Retail Crime

    19.5 – Reporting Crimes

    References

    Chapter 20 – Historic Document Management and Its Importance in Modern Society

    20.1 – Standards Concerning Document Retrieval, Storage, and Destruction

    20.2 – Cemeteries and the Need for Document Management in the USA

    20.3 – Document Management and Historic Graveyards in England

    20.4 – Conclusion Regarding eForensics and Documents

    References

    Chapter 21–Investigating the Past through E-Documents & Verification with Ariel Photos

    21.0– Introduction to Satellite Photos, Documents, and Evidence on the Ground

    21.1 – Locating the Name of the Castle using eForensics – Enlarging a Picture

    21.2 – Locating a Similar Picture – Verifying Key Landmarks and Building Details

    21.21 – Researching the History of a Landmark using the Internet

    21.3 – The Role of Document Management as a Tool to Fund Government

    21.31 – The Doomsday Book – Historic Land Survey / Online Access to Book

    21.4 – Signal Intelligence and Treasure in Sunderland, England

    21.5 – Augmenting Signal Intelligence with Historic Documents

    27.51 – Signal Intelligence and Unexploded Underwater Ordinance

    21.6 – DIDSON Imaging Sonar – Locating Objects to Depths of 8000 Feet

    21.61 – Using Books for Specialized Topics not Found on the Internet

    21.62 – Historic Hazards on Land World Wide (Including USA) – Landmines

    21.7 – Interviewing Someone with Relevant Experience (Historic)

    21.71 - Nick Abatto and the Armored Personnel Carrier APC-59

    21.8 – College Students at John Hopkins Create a Mine Detection System

    21.81 – College Student at Fairleigh Dickinson University Attempts Mine Detection System

    21.9 – Inspiring the Future

    References

    Chapter 22 – A Security Man & eForensic Specialist Develop a Train Security System

    22.0 – Introduction to System Development

    22.0.1 – The Role of the Person who Understands Signal Intelligence

    22.1 – eForensic Specialists and Security People Team Up

    22.2 – Potential Jobs for eForensic Specialists

    References

    Chapter 23 – eForensics and Automated Railroads

    23.0 - Introduction

    23.1 – England’s Contribution to Automating Railroading (1900 – 1930)

    23.2 – Trains and Trucks as Competitors

    23.21 - Trucks and Trains have Tracking and eForensics

    23.3 – Long Trains and Sensors

    23.4 – The Evolution of Trains from People to Electronic Controlled

    23.5 – Robotic Trains

    23.6 – Robotic Investigator?

    References

    Chapter 24 - Using RFID Tags and eForensics to Prove Worker Innocence

    24.0 - The Need to Prove Innocence

    24.1 - Stereotypes

    24.2 - Affordable Available Office Space Can Cause Disparate Groups to be Neighbors

    24.3 - Radio Frequency Identification (RFID) and Universal Product Codes

    24.3 - Bill sets up an Technology incase of an eForensic Investigation is Needed

    24.4 - Offsetting Costs of Equipment

    24.5 - Other Benefits of Surveillance Equipment

    24.6 - Surveillance / Counter Surveillance Equipment and Workers

    24.7 – Discussion of Research to Possibly Identify Sex Offenders

    24.8 - Conclusion

    References

    Chapter 25 – A Discussion of Investigation as a Lifestyle

    25.0 – Introduction

    25.1 – Applicable Laws

    25.2 – Keeping up with the Latest Consumer Technologies

    25.3 – Late Nights and Cramming for Court

    25.4 – A Wide Network of Academics, Technical Types, Suppliers, and Other Investigators

    25.5 – Learning About Court Protocol

    25.6 – Mental Health Concerns and Recreation

    25.7 – Professional Organizations

    25.8 – Conferences, Writing for Publications, Keeping Current in your Field

    15.95 – Choosing Certifications and Seeing Future Market Niches

    References

    Chapter 26 – Using Investigative Skills to Examine a Donated Printer

    26.1 – Introduction

    26.2 – Investigating the Donated Printer

    26.3 – Obtaining the Drivers and Manual

    26.4 - Testing the Printer

    26.41 – Examining why the Printer Did Not Work

    26.5 – Cost Benefit Analysis

    26.6 – Retesting the Printer

    26.61 – Various Levers and Buttons and the Lesson Learned

    26.7 – Conclusion

    Chapter 27 – eForensics and Applying Signal Intelligence to Daily Living

    27.0 – Introduction

    27.1 – Identifying the Problem

    27.2 – GIS and Locating Possible Sources of Ultrasound

    27.3 – Betty Narrows Down the Problem Using Analytical Skills

    27.4 – Implementing a Solution

    27.5 – Finding the Source of the Ultrasonic Waves

    27.5 Conclusion

    References

    Chapter 28 – eForensics & Proactively Detecting Explosives and Weapons

    28.0 – Introduction

    28.01 – The Need for Proactive eForensic Countermeasures

    28.1 -Scan 6046si Heimann X-Ray System & Optional Radiation Sensor for Private Airport

    28.2 – The Smiths Detection IonScan Sentinel 2

    28.3 – The HazMatID Portable Chemical Identifier and Identifying Powders

    28.4 Conclusion

    References

    Chapter 29 - E Forensics – Selected Aspects of Hardware Elements and Applications (Written by Investigator Joel Liebesfeld)

    29.0 - Bits and Bytes

    29.01 - Semiconductors and Computer Components

    29.02- Circuits and Chips

    29.03 - Speed and Chip Operation

    29.1 - Logical Operations and Binary Decisions

    29.2 - Instructional Programs and Logical Operations (Example of National Security)

    29.3 - Electronic Security Companies and Custom Designed Chips/Hardware

    29.4 - Hardware and Cybercrime

    General References

    Chapter 30 – Trade Shows for Computing and a Special Interest like Computer Forensics

    30.0 – Introduction

    30.01 – Registering for a Trade Show and Checking In

    30.02 – Learning About New Publications in Your Field at a Trade Show

    30.03 – Setting Up a Bilingual Call Center for Customer Support and Incident Response

    30.04 – Perks, Free Subscriptions, Etc..

    30.05 – Other People Attending a Trade Show Often Have Other Interests Like You

    30.06 – Understanding Customer Needs – First Responders, eForensic Investigators

    30.07 – Common Security Interests – Ethernet Powerline Adapters

    30.1 – Sharing New Stories of Cybercrime and Countermeasures

    30.2 – Innovative Low Cost New Tools at Trade Shows

    30.3 – Environmental Protection Agency (EPA) Fines and Computers

    30.4 – Logic Cube

    30.5 – Societies for Information Governance, Security, and Audit / Forensic Accounting

    30.6 – Academics and Trade Shows

    30.7 – Conclusion

    References

    Chapter 31 – eForensics, Surveillance, and High Altitude Airships

    31.0 – Introduction

    31.1 – The Return of Airships at Lakewood New Jersey for Possible Surveillance

    31.12 – Aerostats and Surveillance (eForensics) in Iraq

    31.2 – Same Idea Different Scenario

    References

    Chapter 32 – Examining Physical Damage and Damage from e-gossip and gossip

    32.0 – Introduction

    32.1 – Improper Operation, Maintenance, of Computer and Lack of Supervision

    32.11 – Rumor Mongering and e-Gossip

    32.2 – Young People Allegedly Misusing MySpace.com

    32.3 One Last Thought

    References

    Table of Figures

    Figure 0.1 – Computer Recreation for Everyone

    Figure 0.2 - Computer Security and Telerobotics for Everyone

    Figure 0.3 – Emergency Management and Telemedicine for Everyone

    Figure 1.1. The One Type of Investigative Triangle

    Figure 1.2 – Telnetting from a Computer in NJ to England

    Figure 1.3 – Faraday Bag Created by Dr. Doherty

    Figure 1.4 – Results of the Waybackmachine

    Figure 2.1 – The Hard Drive Enclosure

    Figure 2.2 – Logic Cube (Insert)

    Figure 2.3 – The HP iPAQ, My Favorite PDA

    Figure 3.1 – Left to Right, FM Wireless Microphone and Radio, Walkie Talkie

    Figure 3.2 – Kenny Operating a Listening Device Detection Probe of 5 MHz to 2.5 GHz

    Figure 3.3 – Dr. Doherty Checking for the Presence of a Possible Covert Wall Cam

    Figure 3.4 – Kenny Detecting Infrared from the TV Remote of Dr. Doherty

    Figure 3.5 – The Electronic Eavesdropping Detection Tools in a Pelican Case

    Figure 3.6 – Walter Engel and the High Sensitivity 1 MHz to 6 GHz Sweeper

    Figure 3.7 – Kenny Determining the Source of Infrared

    Figure 3.8 – Checking for the Presence of a Covert Camera

    Figure 3.9 – The Wireless Camera and Blackberry

    Figure 3.10 – The Plant Cam

    Figure 3.11 – The Phone / Fax Bug Deactivator

    Figure 3.12 – Is it an AZ-110 or a look alike?

    Figure 3.13 – The TT-07 Phone Testing Device

    Figure 3.14 – The Network Interface Device also known as the NID

    Figure 4.1 – The Logic Cube and Hard Drive Ready for Wiping

    Figure 4.2 – Drives on a Swivel Mount.

    Figure 4.3 – Pentax PocketJet 200

    Figure 4.4 – A Suspect Drive Being Imaged

    Figure 4.5 – Imaging a Laptop Via USB 1.1 Port

    Figure 5.1 – Gary Stephenson (left) and Dr. Doherty Videoconferencing with Netmeeting

    Figure 6.1 – An Indian Head Penny 1877 (Convincing?)

    Figure 8.0 – An American Tension Tower in New Jersey

    Figure 8.1 – The Three Wires and Transformer on an American Electric Utility Pole

    Figure 9.1 – The 200 Volt Difference in Potential Shock (Step Voltage)

    Figure 9.2 – Using the Separate Continuity Tester or the one on the VTVM

    Figure 10.1 – The Blackberry and the Seizure Cable From Paraben

    Figure 14.1 – Dr. Doherty in a type of Virtual Iraq

    Figure 14.2 – Dr. Doherty in a Virtual World with Open Elevators and High Open Stairs

    Figure 15.1 – Removing the Dead for Burial

    Figure 15.2 – A Pilsen Crematorium

    Figure 16.1 – Edward Thomas Donnelly and his Wife Honora

    Figure 17.1 – The PFI – 1000 Biometric Reader

    Figure 17.2 – Prof. Doherty and the Lightweight Fast Flow Inspection System

    Figure 17.3 – The Fast Charger and Video Conference System

    Figure 17.4 – The Enter Trac

    Figure 20.1 – Jeff Marsh and His Computer

    Figure 21.1 – Dr. Eamon Doherty at Belsay Castle in Northumberland England

    Figure 21.2 – German Underwater Mine From North Sea

    Figure 21.3 – Nick in front of the APC-59

    Figure 21.4 – eForensic Mine Detection System

    Figure 22.1 – The Magnascan

    Figure 23.1 – Gary Stephenson and (Replica of) the Stephenson Rocket

    Figure 26.1 – Jeff and His Working Printer, Persistence, Diligence, and Safety Pay Off

    Figure 27.1 – A Pest Repellent Installed in the Open Area of an Unfinished Ceiling

    Figure 28.1 – The HiScan 6046si Heimann X-Ray Inspection System

    Figure 28.2 – Ionscan Sentinel II by Smiths Detection Corporation

    Figure 28.3- The HazMatID Potable Chemical Identifier

    Figure 29.1 - The AND Truth Table

    Figure 29.2 - The NOT Truth Table

    Figure 29.3 - The Two Input NOR Truth Table

    Figure 31.1 – 1919 Military Blimp (Courtesy of the National Archives Record Admin.)

    0.0 - Disclaimers, Acknowledgements, and Introduction

    0.001 – Introduction

    There is a saying that a large computer development corporation often quoted: We always count starting with zero unless we start counting with one. Since this is a computer / electronic forensic book, we will start counting chapters from zero. There is also the term, ground zero, it basically means the epicenter where everything starts; therefore starting with zero is appropriate.

    0.1– Disclaimer

    This book has a main author, mainly Dr. Doherty, and many coauthors including Gary Stephenson who also does editing. There are several other authors such as Joel Liebesfeld, who is a Senior Engineering Investigator who often handles various cases. Kenneth Bruno, is the president of a small computer company that occasionally does scanning for electronic surveillance devices. Joel Fernandes, does some C++ programming and has an interest in voice over Internet Protocol (VOIP) telephones.

    Each author has given a chapter or written part of a chapter with me, Dr. Doherty. Each chapter author is clearly marked at the end of that chapter. As an academic, Dr. Doherty is allowed to discuss various aspects of investigation, bring up anecdotes to help the reader learn, and discuss various aspects of investigation which could even include something a little controversial such as remote viewing that was reported to be done by the CIA. Materials in a chapter should only be attributed to that author. For example, something on remote viewing should not be attributed to Joel Liebesfeld, Joel Fernandes, Kenny Bruno, or anyone else not specifically mentioned at the end of that chapter. A person reading this book should not conduct an investigation unless they are both qualified and authorized to conduct such an investigation. It is also the reader’s responsibility to learn about the laws for operating electronic equipment in their state or country and what requirements are needed for private investigation. Investigations involving civil or criminal matters should be left to law enforcement professionals in that jurisdiction who are authorized to operate equipment and conduct investigations. This is an academic book discussing some stories of signal intelligence and eForensics. It is not a complete discussion of the topic and is not a manual. It is only an academic discussion to teach principles to develop an interest in the subject and then seek professional training and licensing in.

    Each coauthor has something to give to an academic discussion of topics relating to investigation, electronic systems, power line, tension towers and high voltage lines, and various aspects of network or eForensics. However; various authors / coauthors may hold conflicting opinions on various topics so it is completely unfair to attribute opinions or experiences of one person’s chapter to another author or coauthor.

    This book does not represent the opinions of Fairleigh Dickinson University. It is an academic work that examines eForensics a term I use to mean a broad spectrum of electronic signaling, their detection, and their remnants on various media and equipment. This book was written to take an average reader and get him or her thinking about various aspects of investigation, signal intelligence, and electronic communication. The opinions expressed here do not officially represent any opinions or beliefs held by any organization, committee, or employer of any of the authors or coauthors.

    This book will often display various types of investigative or forensic equipment. No author or coauthor received compensation for the pictures or use of that equipment. The book is not in any way, shape or form an official endorsement of those products or services but an example of equipment or service that was available to us at no additional cost to the author or coauthor at the time of writing the book. The services or equipment depicted does not mean it is the best after a survey of all related services or equipment. It was simply available at no additional cost to the author / coauthors at the time of writing the book.

    Each author and coauthor is required to take continuing education in their line of work and therefore each author and coauthor has taken 1 day or a semester long class. Some of the authors and coauthors plan to have a second career in teaching to share their practical knowledge with students in various disciplines. This book is a way that they are discussing academic topics with regard to investigation, computers, networks, and signal intelligence. This publication will hopefully count as a publication to help them enter the world of academic publishing, teaching, and higher learning. This is not meant to be a manual or how to book but a book to give general knowledge.

    One should never install a monitoring device or conduct any investigation without proper authorization from the official and lawful jurisdiction in the context of that situation. If a listening device is detected, don’t touch it and call your local law enforcement agency. Good luck in your studies and we hope this book further enlightens your interest in investigation and eForensics.

    0.2 – Introduction to Some of the Author / Coauthors’ Previous Works

    There is a book called

    Enjoying the preview?
    Page 1 of 1