O'Reilly logo

HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT by Steven Branigan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Actively Investigating the Case

Now this is where the work begins! There is very little in investigating a case that is high-tech specific. The most important thing is to follow a process where facts are collected and hypotheses about potential crimes and suspects are formulated. Facts are usually established through eyewitness accounts and raw evidence collection. The process of computer forensics details how to collect evidence from computers, networks, and devices such as Palm Pilots, cell phones, and pagers. While the techniques are beyond the scope of this text, know that computer forensics is a part of the total investigation.

It is important, however, to be aware of some facts. One is that high technology evidence is perishable and should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required