Chapter 6

High-tech investigations of cyber crime

Emlyn Butterfield

Abstract

Digital devices and information are now ingrained in today’s society, from computers used to perform everyday tasks to mobile phones used to send and receive calls and messages. The proliferation of these devices not only aids an individual’s productivity and communication channels it can now be used to perpetrate crimes and criminal activity. Digital devices can be used as part of, or be the “victim” of, a criminal act. This has led to the requirement of high-tech investigations to analyze digital information to identify what has happened and who it was. This chapter introduces some of the key steps and fundamental concepts required to successfully perform a high-tech ...

Get Cyber Crime and Cyber Terrorism Investigator's Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.