O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Hiding Behind the Keyboard

Book Description

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

  • Covers high-level strategies, what they can achieve, and how to implement them
  • Shows discovery and mitigation methods using examples, court cases, and more
  • Explores how social media sites and gaming technologies can be used for illicit communications activities
  • Explores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Foreword
  6. Introduction
  7. About the Authors
  8. Acknowledgments
  9. Chapter 1. Laying the Foundation of Covert Communications
    1. Introduction
    2. A Brief History of Covert Communication
    3. Covert Communication Overload
    4. Covert Communication Goals
    5. Summary
  10. Chapter 2. The Tor Browser
    1. Introduction
    2. History and Intended Use of The Onion Router
    3. How The Onion Router Works
    4. Forensic Analysis of The Onion Router
    5. Tracking Criminals Using Tor
    6. Used in Combination of Other Tools and Methods
    7. Tails
    8. Related Tor Tools and Applications
    9. Summary
  11. Chapter 3. Triaging Mobile Evidence
    1. Logical Data
    2. Physical Data
    3. Examples of Logical and Physical Data
    4. Wireless Carriers
    5. Mobile Network Operators
    6. Mobile Virtual Network Operator
    7. Determining Target Number
    8. Fonefinder.net
    9. Number Portability Administration Center
    10. Search.org
    11. Subscriber Identity Module
    12. Internal Hardware of a SIM
    13. The SIM File System
    14. SIM Sizes and Evolution
    15. Typical Evidence
    16. SIM Security—PIN and PUK
    17. Triaging Devices
    18. Devices Powered “On”
    19. Devices Located “Off”
    20. Manual Exams
    21. Tools Available
    22. Software Solutions
    23. Chapter Summary Points
    24. References for Manual Tools
  12. Chapter 4. Mobile Extraction Issues
    1. Flash Memory
    2. Embedded Multimedia Card, Embedded Multichip Package, and Multichip Package
    3. The Function of NAND
    4. Encoding
    5. Epochs
    6. Cellebrite Physical Analyzer
    7. User-Installed Applications
    8. User-Enabled Security
    9. Advanced Validation
    10. References for Listed Tools
  13. Chapter 5. Data Hiding
    1. Introduction
    2. What is Steganography
    3. Hiding Data Behind Data
    4. Steganalysis
    5. Steganography Methods
    6. Relevant Cases
    7. Summary
  14. Chapter 6. Cryptography and Encryption
    1. Introduction
    2. Brief History of Encryption and Cryptography
    3. Basic Working Knowledge
    4. Hardware
    5. Public and Private Keys
    6. The Key is the Key
    7. So Tell Me Something I Can Do About This!
    8. Back to Steganography
    9. Summary
  15. Chapter 7. Antiforensics
    1. Introduction
    2. The Easy and Very Effective Methods
    3. The Best Methods Aren’t the Most Commonly Used Methods
    4. Another Simple Method
    5. File Signature Manipulation
    6. Time Stamp Modifications
    7. Decoy Storage Devices
    8. Portable Apps
    9. Hidden Operating Systems
    10. Virtual Machines
    11. Planning Against Antiforensics
    12. Finding Communication Records on Hard Drives
    13. When All Else Fails or Is Likely to Fail
    14. Summary
  16. Chapter 8. Electronic Intercepts
    1. Introduction
    2. Value of Electronically Intercepted Communications
    3. Authority and Necessity
    4. Technology
    5. Technical Barriers
    6. Finding Cell Phone Numbers
    7. Summary
  17. Chapter 9. Digital Identity
    1. Introduction
    2. Identity
    3. Finding the Digital Identity
    4. Summary
  18. Chapter 10. Putting It All Together
    1. Introduction
    2. Collecting Real-Time Communications
    3. Collecting Historical Communications
    4. Turning Information Into Intelligence
    5. The (Virtually) Impossible
    6. Non-tech Communications
    7. Putting the Case Together
    8. Summary
  19. Chapter 11. Closing Thoughts
    1. Introduction
    2. Privacy Expectations
    3. Legal and Technical Considerations
    4. Summary
  20. Index