Alternate Data Storage Forensics
Learn to pull “digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 Seizure of Digital Information
Chapter 3 Introduction to Handheld Forensics
Chapter 4 PDA Blackberry and iPod Forensic Analysis
Chapter 5 Email Forensics
Chapter 6 Router Forensics
Chapter 7 Legal Issues of Intercepting WiFi Transmissions
Chapter 8 CD and DVD Forensics
Chapter 9 MP3 Forensics
Other editions - View all
acquisition analysis attack authentication Blackberry Blackberry RIM bytes CD and DVD CD-R CD-ROM CD-RW child pornography communication Compact Disc computer forensic connected contain copy created crime scene cyber crime data objects deleted digital evidence digital evidence seizure digital forensics disk documentation DVD media e-mail archive electronic encryption Figure file names file system FireWire forensic examiner forensic tools format handheld device hard drive hardware hash header HFS+ Intentionally Left Blank interface Internet investigation iPod iPodlinux iTunes laser law enforcement Linux machine Microsoft Microsoft Windows on-scene responders operating system options packet password PDA devices physical polycarbonate preview preview software puter recordable reflector rewritable media Routers sector seized seizure methodology server standard storage device stored suspect technique tion track WiFi Windows wireless writing