- Paperback: 254 pages
- Publisher: Syngress; 1 edition (March 25, 2016)
- Language: English
- ISBN-10: 0128033401
- ISBN-13: 978-0128033401
- Product Dimensions: 7.5 x 0.6 x 9.2 inches
- Shipping Weight: 1.2 pounds (View shipping rates and policies)
- Average Customer Review: 9 customer reviews
- Amazon Best Sellers Rank: #1,276,282 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
What other items do customers buy after viewing this item?
About the Author
Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department's first digital forensics lab in a small, cluttered storage closet.
John Bair is currently employed as a detective with the Tacoma Police Department. He has been commissioned as a law enforcement officer since May 1989. During his assignment in the homicide unit he began specializing in Cell Phone Forensics.
In 2006 John created the current forensic lab that focuses on mobile evidence related to violent crimes. His case experience shortly thereafter gained the attention of Mobile
Forensics Incorporated (MFI) where he was hired and spent several years serving as a contract instructor. MFI soon merged with AccessData to become the only training vendor for their mobile forensics core. This relationship fostered direct contact with engineers who assist in criminal cases which need anomalies and exploits addressed within their forensics products.
John has 26 certifications related to digital evidence. The following reflect the most significant related to mobile forensics: Mobile Forensics Certified Examiner (MFCE), Cellebrite Certified Physical Analyst (CCPA), AccessData Certified Examiner (ACE), Cellebrite Mobile Forensics Fundamentals (CMFF), AccessData Mobile Examiner (AME), and Cellebrite Certified Instructor (CCI).
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
A perfect example is from 2013 where a Harvard student used Tor and other privacy tools to send in a false bomb threat. Investigators noted that while the student used Tor, it was his other sloppy security measures that led to his arrest. In the book, the authors show how an investigator can capitalize on such mistakes to find a perpetrator.
A persistent theme thoughtful the book is that while the tools criminals use get better and more sophisticated over time, the mistakes criminals make are constant. The odds of discovery increase the longer they use any system of communications. The authors show the reader how they can make the most of those mistakes to find a perpetrator.
Shavers is a former law enforcement officer while Bair currently works in law enforcement and the book take a very hands-on, real-world approach to using these tools and techniques in the field. The book is light on theory, and heavy on actionable forensic analysis.
At 225 pages, the 11 chapters cover a broad range of topics from evidence and extraction, cryptography and encryption, anti-forensics and more. It’s far from a comprehensive guide to the topic, and there topics the authors don’t cover. Other areas need a more detailed approach for mastering of the topic.
For those looking for an introductory text on various investigative tools and techniques, Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis is an excellent resource.
Although this book does not address this specific case, the information contained gives the reader an insight into what it takes to perform expert forensics on mobile devices.
Both Brett and John go into great detail and present to reader with techniques written in meticulous details on how to triage and examine mobile phones for data examination and extraction.
As a novice I can appreciate the details presented along with the many pictures and screenshots that made understanding some of technical jargon palpable.
Heck after reading this book you will learn ways to protect yourself from snooping eyes, think you deleted that naughty selfie? You didn’t – read “Hiding Behind the Keyboard “ to see why.
Kudos to John and Brett for giving the rest of us insights into the tools and techniques once only know to professional “hackers”.
Colin Fagan, CFCE
Investigator / Forensic Examiner
High-Tech / Cyber Crimes Task Force
If you liked the author's other books (Placing the Suspect Behind the Keyboard and X-Ways Forensics Practitioners Guide), you will not only enjoy this book but learn how cyber crooks try to stay anonymous online along with the methods to track them. I would recommend this book to everyone who investigates anything having to do with anonymous criminals.