Chapter 6

High-tech investigations of cyber crime

Emlyn Butterfield


Digital devices and information are now ingrained in today’s society, from computers used to perform everyday tasks to mobile phones used to send and receive calls and messages. The proliferation of these devices not only aids an individual’s productivity and communication channels it can now be used to perpetrate crimes and criminal activity. Digital devices can be used as part of, or be the “victim” of, a criminal act. This has led to the requirement of high-tech investigations to analyze digital information to identify what has happened and who it was. This chapter introduces some of the key steps and fundamental concepts required to successfully perform a high-tech ...

Get Cyber Crime and Cyber Terrorism Investigator's Handbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.