Preface |
|
xiii | |
About the Author |
|
xxi | |
1 The Anatomy of a Digital Investigation |
|
1 | (22) |
|
A Basic Model for Investigators |
|
|
2 | (6) |
|
Understanding the Scope of the Investigation |
|
|
8 | (4) |
|
Identifying the Stakeholders |
|
|
12 | (1) |
|
|
13 | (8) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
2 Laws Affecting Forensic Investigations |
|
23 | (12) |
|
Constitutional Implications of Forensic Investigation |
|
|
24 | (5) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (2) |
3 Search Warrants and Subpoenas |
|
35 | (20) |
|
Distinguishing between Warrants and Subpoenas |
|
|
36 | (1) |
|
What Is a Search and When Is It Legal? |
|
|
37 | (3) |
|
Basic Elements of Obtaining a Warrant |
|
|
40 | (3) |
|
|
43 | (1) |
|
|
44 | (6) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (3) |
4 Legislated Privacy Concerns |
|
55 | (16) |
|
|
56 | (3) |
|
|
59 | (3) |
|
Privacy in Health Care and Education |
|
|
62 | (2) |
|
|
64 | (3) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (3) |
5 The Admissibility of Evidence |
|
71 | (20) |
|
What Makes Evidence Admissible? |
|
|
71 | (5) |
|
Keeping Evidence Authentic |
|
|
76 | (8) |
|
Defining the Scope of the Search |
|
|
84 | (1) |
|
When the Constitution Doesn't Apply |
|
|
84 | (5) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (2) |
6 First Response and the Digital Investigator |
|
91 | (20) |
|
Forensics and Computer Science |
|
|
91 | (5) |
|
Controlling the Scene of the Crime |
|
|
96 | (4) |
|
|
100 | (9) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
7 Data Acquisition |
|
111 | (20) |
|
|
112 | (1) |
|
Memory and Running Processes |
|
|
112 | (9) |
|
|
121 | (7) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (2) |
8 Finding Lost Files |
|
131 | (20) |
|
|
131 | (10) |
|
|
141 | (4) |
|
|
145 | (4) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
9 Document Analysis |
|
151 | (34) |
|
|
151 | (6) |
|
|
157 | (15) |
|
Mining the Temporary Files |
|
|
172 | (4) |
|
Identifying Alternate Hiding Places of Data |
|
|
176 | (7) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (2) |
10 E-mail Forensics |
|
185 | (28) |
|
|
185 | (6) |
|
|
191 | (5) |
|
|
196 | (7) |
|
An Approach to E-mail Analysis |
|
|
203 | (7) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (2) |
11 Web Forensics |
|
213 | (34) |
|
|
213 | (2) |
|
|
215 | (18) |
|
|
233 | (5) |
|
|
238 | (6) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
12 Searching the Network |
|
247 | (30) |
|
|
247 | (1) |
|
|
248 | (2) |
|
Proactive Collection of Evidence |
|
|
250 | (12) |
|
Post-Incident Collection of Evidence |
|
|
262 | (6) |
|
Router and Switch Forensics |
|
|
268 | (7) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
13 Excavating a Cloud |
|
277 | (30) |
|
|
277 | (2) |
|
|
279 | (5) |
|
The Implications of Cloud Forensics |
|
|
284 | (7) |
|
|
291 | (9) |
|
|
300 | (3) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (3) |
14 Mobile Device Forensics |
|
307 | (20) |
|
Challenges of Mobile Device Forensics |
|
|
307 | (1) |
|
|
308 | (5) |
|
Data Storage on Cell Phones |
|
|
313 | (4) |
|
|
317 | (5) |
|
Legal Aspects of Mobile Device Forensics |
|
|
322 | (2) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (2) |
15 Fighting Antiforensics |
|
327 | (30) |
|
|
328 | (8) |
|
Hiding Data on the System |
|
|
336 | (11) |
|
|
347 | (7) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (2) |
16 Litigation and Electronic Discovery |
|
357 | (22) |
|
|
358 | (1) |
|
|
358 | (19) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
17 Case Management and Report Writing |
|
379 | (16) |
|
|
379 | (10) |
|
|
389 | (4) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
18 Tools of the Digital Investigator |
|
395 | (28) |
|
|
395 | (15) |
|
Working with "Court-Approved" Tools |
|
|
410 | (3) |
|
|
413 | (5) |
|
|
418 | (3) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
19 Building a Forensic Workstation |
|
423 | (18) |
|
What Is a Forensic Workstation? |
|
|
424 | (1) |
|
Commercially Available Forensic Workstations |
|
|
425 | (4) |
|
Building a Forensic Workstation From Scratch |
|
|
429 | (11) |
|
|
440 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
20 Licensing and Certification |
|
441 | (16) |
|
Digital Forensic Certification |
|
|
441 | (1) |
|
Vendor-Neutral Certification Programs |
|
|
442 | (7) |
|
Vendor-Specific Certification Programs |
|
|
449 | (3) |
|
Digital Forensic Licensing Requirements |
|
|
452 | (2) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
454 | (3) |
21 The Business of Digital Forensics |
|
457 | (28) |
|
Starting a New Forensics Organization |
|
|
458 | (8) |
|
Maintaining the Organization |
|
|
466 | (12) |
|
|
478 | (3) |
|
Organizational Certification |
|
|
481 | (2) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
483 | (2) |
A Chapter Review Answers |
|
485 | (20) |
B Sample Forms |
|
505 | (6) |
Glossary |
|
511 | (10) |
Index |
|
521 | |