Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. vii |
Introduction | p. ix |
About the Authors | p. xiii |
New Age of Warfare: How Digital Forensics is Reshaping Today's Military | p. 1 |
Yesterday's ôBooby Trapö Is Today's IED | p. 1 |
The Invention of WIT | p. 4 |
ôCSIö Baghdad: Today's Intelligence Is Tomorrows Evidence | p. 8 |
Actionable Intelligence and Its Effect on the Battlefield | p. 9 |
Soldiers to ôBattlefield Copsö | p. 9 |
Summary | p. 11 |
References | p. 11 |
Digital Triage Forensics and Battlefield Forensics | p. 13 |
Introduction | p. 13 |
DTF and Battlefield Forensics | p. 13 |
How does Evidence go from the Battlefield to the Lab? | p. 21 |
Five Levels of Exploitation of WIT Materials | p. 22 |
Summary | p. 23 |
References | p. 24 |
Conducting Pre/Postblast Investigations | p. 25 |
Introduction | p. 25 |
WITs Role Within the EOD Team | p. 25 |
Premission Preparations | p. 26 |
Scene Safety | p. 28 |
On Scene IED Analysis | p. 30 |
Photograph! Photograph! Photograph! | p. 36 |
Preblast Investigative Steps | p. 40 |
Postblast Investigative Steps | p. 48 |
Detainee Operations as it Pertains to WIT | p. 53 |
Summary | p. 56 |
Using the DTF Model to Process Digital Media | p. 57 |
The changing location of Digital Evidence containers | p. 57 |
What hardware do I need to conduct a Cradle-to-Grave Battlefield investigation? | p. 58 |
Characteristics of Digital Media | p. 64 |
Stephen's Quick and Dirty Guide to Understanding Digital Forensics | p. 65 |
Brief Overview of Digital Storage Concepts | p. 72 |
Processing Digital Media using the Digital Triage Forensic Model | p. 92 |
Summary | p. 142 |
Using the DTF Model to Collect and Process Cell Phones and SIM Cards | p. 145 |
Cellular Devices Are Replacing the Laptop | p. 145 |
Proprietary Cell Phone Tools versus Nonproprietary Cell Phone Tools | p. 148 |
Freeware and Shareware as Cell Phone Forensic/Analysis Tools | p. 152 |
Using Cross Validation with your Tools | p. 154 |
Triage Processing of Cellular Devices | p. 155 |
Using the MFC to identify the Cellular Device | p. 157 |
Collection Concerns with Cellular Devices | p. 163 |
Don't Push That Button | p. 166 |
Isolating the Cellular Device | p. 167 |
Using the HTCI Isolation Chamber | p. 168 |
Processing the Cell Phone | p. 180 |
Summary | p. 249 |
The Changing Role of a Digital Forensic Investigator | p. 251 |
The Solution | p. 251 |
Implementation | p. 254 |
Glossary | p. 257 |
Index | p. 259 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.