Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Foreword Introduction About the Authors Acknowledgments Chapter 1. Laying the Foundation of Covert Communications
Introduction A Brief History of Covert Communication Covert Communication Overload Covert Communication Goals Summary
Chapter 2. The Tor Browser
Introduction History and Intended Use of The Onion Router How The Onion Router Works Forensic Analysis of The Onion Router Tracking Criminals Using Tor Used in Combination of Other Tools and Methods Tails Related Tor Tools and Applications Summary
Chapter 3. Triaging Mobile Evidence
Logical Data Physical Data Examples of Logical and Physical Data Wireless Carriers Mobile Network Operators Mobile Virtual Network Operator Determining Target Number Fonefinder.net Number Portability Administration Center Search.org Subscriber Identity Module Internal Hardware of a SIM The SIM File System SIM Sizes and Evolution Typical Evidence SIM Security—PIN and PUK Triaging Devices Devices Powered “On” Devices Located “Off” Manual Exams Tools Available Software Solutions Chapter Summary Points References for Manual Tools
Chapter 4. Mobile Extraction Issues
Flash Memory Embedded Multimedia Card, Embedded Multichip Package, and Multichip Package The Function of NAND Encoding Epochs Cellebrite Physical Analyzer User-Installed Applications User-Enabled Security Advanced Validation References for Listed Tools
Chapter 5. Data Hiding
Introduction What is Steganography Hiding Data Behind Data Steganalysis Steganography Methods Relevant Cases Summary
Chapter 6. Cryptography and Encryption
Introduction Brief History of Encryption and Cryptography Basic Working Knowledge Hardware Public and Private Keys The Key is the Key So Tell Me Something I Can Do About This! Back to Steganography Summary
Chapter 7. Antiforensics
Introduction The Easy and Very Effective Methods The Best Methods Aren’t the Most Commonly Used Methods Another Simple Method File Signature Manipulation Time Stamp Modifications Decoy Storage Devices Portable Apps Hidden Operating Systems Virtual Machines Planning Against Antiforensics Finding Communication Records on Hard Drives When All Else Fails or Is Likely to Fail Summary
Chapter 8. Electronic Intercepts
Introduction Value of Electronically Intercepted Communications Authority and Necessity Technology Technical Barriers Finding Cell Phone Numbers Summary
Chapter 9. Digital Identity
Introduction Identity Finding the Digital Identity Summary
Chapter 10. Putting It All Together
Introduction Collecting Real-Time Communications Collecting Historical Communications Turning Information Into Intelligence The (Virtually) Impossible Non-tech Communications Putting the Case Together Summary
Chapter 11. Closing Thoughts
Introduction Privacy Expectations Legal and Technical Considerations Summary
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion