Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Foreword
Introduction
About the Authors
Acknowledgments
Chapter 1. Laying the Foundation of Covert Communications
Introduction
A Brief History of Covert Communication
Covert Communication Overload
Covert Communication Goals
Summary
Chapter 2. The Tor Browser
Introduction
History and Intended Use of The Onion Router
How The Onion Router Works
Forensic Analysis of The Onion Router
Tracking Criminals Using Tor
Used in Combination of Other Tools and Methods
Tails
Related Tor Tools and Applications
Summary
Chapter 3. Triaging Mobile Evidence
Logical Data
Physical Data
Examples of Logical and Physical Data
Wireless Carriers
Mobile Network Operators
Mobile Virtual Network Operator
Determining Target Number
Fonefinder.net
Number Portability Administration Center
Search.org
Subscriber Identity Module
Internal Hardware of a SIM
The SIM File System
SIM Sizes and Evolution
Typical Evidence
SIM Security—PIN and PUK
Triaging Devices
Devices Powered “On”
Devices Located “Off”
Manual Exams
Tools Available
Software Solutions
Chapter Summary Points
References for Manual Tools
Chapter 4. Mobile Extraction Issues
Flash Memory
Embedded Multimedia Card, Embedded Multichip Package, and Multichip Package
The Function of NAND
Encoding
Epochs
Cellebrite Physical Analyzer
User-Installed Applications
User-Enabled Security
Advanced Validation
References for Listed Tools
Chapter 5. Data Hiding
Introduction
What is Steganography
Hiding Data Behind Data
Steganalysis
Steganography Methods
Relevant Cases
Summary
Chapter 6. Cryptography and Encryption
Introduction
Brief History of Encryption and Cryptography
Basic Working Knowledge
Hardware
Public and Private Keys
The Key is the Key
So Tell Me Something I Can Do About This!
Back to Steganography
Summary
Chapter 7. Antiforensics
Introduction
The Easy and Very Effective Methods
The Best Methods Aren’t the Most Commonly Used Methods
Another Simple Method
File Signature Manipulation
Time Stamp Modifications
Decoy Storage Devices
Portable Apps
Hidden Operating Systems
Virtual Machines
Planning Against Antiforensics
Finding Communication Records on Hard Drives
When All Else Fails or Is Likely to Fail
Summary
Chapter 8. Electronic Intercepts
Introduction
Value of Electronically Intercepted Communications
Authority and Necessity
Technology
Technical Barriers
Finding Cell Phone Numbers
Summary
Chapter 9. Digital Identity
Introduction
Identity
Finding the Digital Identity
Summary
Chapter 10. Putting It All Together
Introduction
Collecting Real-Time Communications
Collecting Historical Communications
Turning Information Into Intelligence
The (Virtually) Impossible
Non-tech Communications
Putting the Case Together
Summary
Chapter 11. Closing Thoughts
Introduction
Privacy Expectations
Legal and Technical Considerations
Summary
Index
← Prev
Back
Next →
← Prev
Back
Next →