Preface |
|
xi | |
|
|
xiii | |
|
|
xvii | |
|
|
xix | |
|
|
xxi | |
|
|
xxiii | |
|
|
xxv | |
|
|
xxvii | |
|
|
xxix | |
|
|
1 | (12) |
|
|
|
1 | (1) |
|
1.2 Cybercrime and Cybersecurity |
|
|
2 | (3) |
|
|
2 | (1) |
|
1.2.2 Cybercriminals and Threat Actors |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.2.4 Threat Modeling - Cyber Kill Chain and MITRE ATT&CK |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
1.3.4 Cyber Threat Intelligence |
|
|
6 | (1) |
|
1.3.5 Open-Source Intelligence (OSINT) |
|
|
7 | (1) |
|
1.3.6 Operational Avalanche - A Real-World Example |
|
|
7 | (1) |
|
1.4 Challenges in Cyber Investigations |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
1.7 Comments on Citation and Notation |
|
|
11 | (1) |
|
|
11 | (2) |
|
2 Cyber Investigation Process |
|
|
13 | (38) |
|
|
|
13 | (2) |
|
2.2 Investigation as Information Work |
|
|
15 | (1) |
|
2.3 Developing an Integrated Framework for Cyber Investigations |
|
|
15 | (3) |
|
2.4 Principles for the Integrated Cyber Investigation Process (ICIP) |
|
|
18 | (4) |
|
2.4.1 Procedure and Policy |
|
|
18 | (1) |
|
2.4.2 Planning and Documentation |
|
|
18 | (1) |
|
2.4.3 Forming and Testing of Hypotheses |
|
|
19 | (1) |
|
2.4.4 The Dynamics of ICIP |
|
|
20 | (1) |
|
2.4.5 Principles for Handling Digital Evidence |
|
|
20 | (2) |
|
|
22 | (1) |
|
2.5 ICIP's Procedural Stages |
|
|
22 | (22) |
|
2.5.1 Investigation Initiation |
|
|
22 | (3) |
|
|
25 | (2) |
|
2.5.3 Planning and Prioritization |
|
|
27 | (3) |
|
2.5.4 Impact and Risk Assessment |
|
|
30 | (2) |
|
2.5.5 Action and Collection |
|
|
32 | (2) |
|
2.5.6 Analysis and Integration |
|
|
34 | (3) |
|
2.5.7 Documentation and Presentation |
|
|
37 | (6) |
|
|
43 | (1) |
|
2.6 Cognitive and Human Error in Cyber Investigations |
|
|
44 | (5) |
|
|
45 | (1) |
|
|
45 | (2) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
49 | (2) |
|
3 Cyber Investigation Law |
|
|
51 | (24) |
|
|
3.1 Cyber Investigation in Context |
|
|
51 | (1) |
|
3.2 The Missions and Some Implications to Privacy Rights |
|
|
52 | (5) |
|
3.2.1 The Police, Law Enforcement Agencies, and National Security Service |
|
|
52 | (1) |
|
3.2.2 Reasonable Ground to Open a Criminal (Cyber) Investigation |
|
|
53 | (1) |
|
3.2.3 The Legal Framework(s) |
|
|
53 | (1) |
|
3.2.4 General Conditions for Privacy-Invasive Cyber Investigation Methods |
|
|
54 | (2) |
|
3.2.5 The Private Sector Cyber Investigator |
|
|
56 | (1) |
|
3.3 The Different Mandates of the LEA, NIS, and the Police |
|
|
57 | (2) |
|
3.3.1 Law Enforcing Agencies and the Police |
|
|
57 | (1) |
|
3.3.2 The National Intelligence Service (NIS) |
|
|
58 | (1) |
|
3.4 Jurisdiction and International Cooperation |
|
|
59 | (3) |
|
3.4.1 The eNIS and the Principle of Sovereignty |
|
|
60 | (1) |
|
3.4.2 The iNIS and the LEA - International Cooperation |
|
|
61 | (1) |
|
3.5 Human Rights in the Context of Cyber Investigations |
|
|
62 | (8) |
|
3.5.1 The Right to Fair Trial |
|
|
62 | (1) |
|
3.5.2 Covert Cyber Investigation |
|
|
63 | (1) |
|
3.5.3 Technical Investigation Methods (Technical Hacking) |
|
|
64 | (3) |
|
3.5.4 Methods Based on Social Skills (Social Hacking) |
|
|
67 | (2) |
|
3.5.5 Open-Source Intelligence/Investigation |
|
|
69 | (1) |
|
3.6 The Private Cyber Investigator |
|
|
70 | (1) |
|
3.6.1 Cyber Reconnaissance Targeting a Third Party |
|
|
70 | (1) |
|
3.6.2 Data Protection and Privacy Rights |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (3) |
|
4 Perspectives of Internet and Cryptocurrency Investigations |
|
|
75 | (28) |
|
Petter Christian Bjelland |
|
|
|
75 | (1) |
|
|
76 | (6) |
|
|
76 | (3) |
|
|
79 | (2) |
|
4.2.3 The Disgruntled Employee |
|
|
81 | (1) |
|
4.3 Networking Essentials |
|
|
82 | (1) |
|
4.4 Networks and Applications |
|
|
83 | (3) |
|
4.4.1 Operational Security |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
4.5 Open-Source Intelligence (OSINT) |
|
|
86 | (3) |
|
|
86 | (1) |
|
4.5.2 Types of Open-Source Data |
|
|
87 | (1) |
|
4.5.3 Techniques for Gathering Open-Source Data |
|
|
87 | (2) |
|
|
89 | (2) |
|
4.6.1 HTTP, HTML, JavaScript, and Cache |
|
|
89 | (1) |
|
4.6.2 Uniform Resource Locators (URLs) |
|
|
90 | (1) |
|
4.6.3 Cookies and Local Storage |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (3) |
|
4.7.1 Addresses and Transactions |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
4.7.4 Exploring Transactions |
|
|
94 | (1) |
|
4.8 Preparation for Analysis |
|
|
94 | (6) |
|
|
94 | (1) |
|
4.8.2 Machine Translation and Transliteration |
|
|
95 | (1) |
|
4.8.3 Metadata Extraction |
|
|
96 | (1) |
|
4.8.4 Visualization and Analysis |
|
|
97 | (3) |
|
|
100 | (1) |
|
|
100 | (3) |
|
5 Anonymity and Forensics |
|
|
103 | (26) |
|
|
|
104 | (4) |
|
|
104 | (2) |
|
5.1.2 Degree of Anonymity |
|
|
106 | (2) |
|
5.2 Anonymous Communication Technologies |
|
|
108 | (15) |
|
5.2.1 High-Latency Anonymity |
|
|
109 | (1) |
|
5.2.2 Low-Latency Anonymity |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
113 | (10) |
|
5.2.6 Recent Live Messaging and Voice Communication |
|
|
123 | (1) |
|
5.3 Anonymity Investigations |
|
|
123 | (3) |
|
5.3.1 Digital Forensics and Anonymous Communication |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
5.3.4 Live Forensics and Investigations |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
6 Internet of Things Investigations |
|
|
129 | (38) |
|
|
|
129 | (1) |
|
|
130 | (17) |
|
6.2.1 A (Very) Short and Incomplete History |
|
|
130 | (2) |
|
|
132 | (4) |
|
6.2.3 Models and Concepts |
|
|
136 | (3) |
|
|
139 | (8) |
|
|
147 | (4) |
|
6.3.1 Types of Events Leading to Investigations |
|
|
148 | (2) |
|
6.3.2 Identifying an IoT Investigation |
|
|
150 | (1) |
|
|
151 | (14) |
|
6.4.1 IoT and Existing Forensic Areas |
|
|
152 | (2) |
|
|
154 | (4) |
|
6.4.3 New Forensic Challenges |
|
|
158 | (7) |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
167 | (38) |
|
|
|
|
168 | (1) |
|
|
168 | (22) |
|
7.2.1 Image Trustworthiness |
|
|
170 | (1) |
|
7.2.2 Types of Examinations |
|
|
170 | (2) |
|
7.2.3 Photography Process Flow |
|
|
172 | (2) |
|
7.2.4 Acquisition Fingerprints |
|
|
174 | (4) |
|
7.2.5 Image Coding Fingerprints |
|
|
178 | (2) |
|
7.2.6 Editing Fingerprints |
|
|
180 | (4) |
|
7.2.7 Deepfake Creation and Detection |
|
|
184 | (6) |
|
|
190 | (5) |
|
|
190 | (1) |
|
7.3.2 Reproduction Detection |
|
|
190 | (1) |
|
7.3.3 Source Device Identification |
|
|
191 | (4) |
|
|
195 | (4) |
|
|
196 | (2) |
|
7.4.2 Digital Audio Recording Process |
|
|
198 | (1) |
|
7.4.3 Authenticity Analysis |
|
|
199 | (4) |
|
|
199 | (1) |
|
7.4.5 Content-Based Analysis |
|
|
199 | (1) |
|
7.4.6 Electric Network Frequency |
|
|
200 | (1) |
|
|
201 | (1) |
|
7.4.8 Other Audio Forensic Methods |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
205 | (8) |
|
|
|
205 | (2) |
|
8.2 Professional and Training Organizations |
|
|
207 | (1) |
|
8.3 Nonacademic Online Resources |
|
|
208 | (1) |
|
|
208 | (3) |
|
8.4.1 Disk Analysis Tools |
|
|
208 | (1) |
|
8.4.2 Memory Analysis Tools |
|
|
209 | (1) |
|
8.4.3 Network Analysis Tools |
|
|
209 | (1) |
|
8.4.4 Open-Source Intelligence Tools |
|
|
210 | (1) |
|
|
210 | (1) |
|
8.5 Corpora and Data Sets |
|
|
211 | (1) |
|
|
212 | (1) |
References |
|
213 | (18) |
Index |
|
231 | |