Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects
Shavers B., Syngress Publishing, Waltham, MA, 2013. 320 pp. Type: Book (978-1-597499-85-9)
Date Reviewed: Oct 29 2014

As its title states and its text frequently repeats, this book’s concern is to help an investigator link the suspect(s) in a computer crime or civil violation to the machine(s) believed to have been used in committing it well enough to make a case. The author readily acknowledges the difficulties in identifying each side of the link. Machine identities can be spoofed, their records of the offending acts buried in copious data or altered, and their systems and storage obliterated, encrypted, or virtualized out of reach. On the other side, without a suspect’s confession, a witness, or a video that places her behind the keyboard at the time of the offense, denials can be plausible; for example, perhaps a remote or unauthorized user did it. While each case may have its own set of challenges, the book reviews techniques and tools for meeting those likely to arise at each procedural step and guides the investigator in choosing among them.

It begins on the digital forensics side by discussing how to capture a suspected machine’s image, in its current state, with minimum risk of losing such evidence due to data volatility. The investigative side opens with a sample interview that addresses the suspect’s and others’ access to the machine, her technical capabilities, and her activities that might strengthen suspicions, for example, “Have you ever made ID cards?” It then includes capsule descriptions of procedures in technical and physical investigations, advice on combining evidence, and tips on managing cases and making effective presentations at hearings and trials. A later chapter discusses trends that will make implicating the suspect easier, for example, ubiquitous surveillance systems, and harder, for example, encryption, mobile computing, and hot spots. Another chapter praises the Internet as a search tool for many purposes: it might help, for example, to find the real name and address of an otherwise anonymous suspect by matching user names across sites. The final chapter presents short descriptions of investigations of different types of cybercrimes and the apprehensions of their perpetrators.

The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest: not every case will or can be solved, and the investigator would do well to focus on the more promising ones. Consequently, the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes, particularly small to mid-scale ones, that is, those with a single victim or a few victims and a few suspects.

Even after the Snowden revelations, a more general reader leaves the book impressed by the array of tools it presents that can support the investigations, some available only to the forensic community. These include meta-crawlers able to simultaneously search scores of social networking sites for user names of suspects (with the aim of gaining more information on them) and Google’s “bedspread detector,” which can link a photo with a particular element, like a bedspread, to other photos with the same element, but with possibly additional content indicating location, time, and people. This detector was used to identify victims and offenders in a child pornography ring.

Nevertheless, there are some caveats regarding the book’s picture of digital forensics and investigations. While it does not claim that authorities can legally deploy all of the search and surveillance procedures it describes, it does not discuss the rights of suspects in the criminal justice system. Recent US court rulings, however, provide a more balanced approach: the Supreme Court unanimously ruled that a search of an arrestee’s cellphone required a warrant, and an appeals court ruled that the government could not indefinitely retain and use as evidence for another crime computer files not covered by the scope of the warrant [1]. Second, with its focus on small-scale cyber crime, the digital forensics discussion elides the very labor-consuming, team-dependent network tracings and machine monitoring, which are involved in efforts to find perpetrators of large-scale or long-term cyber crimes, for example, credit card thefts at Target and Home Depot, and industrial espionage. Such labors are apparent in a 2013 report on a team of hackers associated with China’s military (the People’s Liberation Army, PLA) [2], and are discussed in several textbooks [3], but the procedures described in the present text do not scale to them. Third, although it is noted that multiple authorities might have claims on an investigation, there are no suggestions of how investigators might approach an international cyber crime, particularly when victims and suspected perpetrators are in different countries that do not share a framework for the needed cooperation [4].

More reviews about this item: Amazon, B&N

Reviewer:  Roger Hurwitz Review #: CR142872 (1502-0144)
1) Reporter of Decisions of the Supreme Court of the United States. http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf.
2) Mandiant. APT1: exposing one of China’s cyber espionage units (Feb. 2013), http://intelreport.mandiant.com.
3) Davidoff, S.; Ham, J. Network forensics: tracking hackers through cyberspace. Prentice Hall, Upper Saddle River, NJ, 2012.
4) Data Protection and Cybercrime Division, Council of Europe. Strategic priorities for the cooperation against cybercrime in the Eastern Partnership region (Oct. 31, 2013), http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/CyberCrime@EAP/2523_EAP_Strat_Priorities_V7%20ENG.pdf.
Bookmark and Share
  Reviewer Selected
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy