SCCS3 Temp
SCCS3 Temp
Forensic Science
Computer Science
Law
Behavioral Evidence Analysis
xxvi Introduction
Law provides the framework within which all of the concepts of this book fit.
Computer Science provides the technical details that are necessary to under-
stand specific aspects of digital evidence. Forensic Science provides a general
approach to analyzing any form of digital evidence. Behavioral Evidence
Analysis provides a systematized method of synthesizing the specific technical
knowledge and general scientific methods to gain a better understanding of
criminal behavior and motivation.
This book is divided into five parts, beginning with the fundamental concepts
and legal issues relating to digital evidence and computer crime in Part 1
(Digital Forensics: Chapters 1–5). Chapter 2 (Language of Computer Crime
Investigation) explains how terminology of computer crime developed and
provides the language needed to understand the different aspects of computer
crime investigation. Chapter 3 (Digital Evidence in the Courtroom) provides
an overview of issues that arise in court relating to digital evidence. Chapters
4 and 5 (Cybercrime Law: A United States Perspective and Cybercrime Law:
A European Perspective) discuss legal issues that arise in computer-related
investigations, presenting U.S. and European law side-by-side.
Part 2 (Digital Investigations: Chapters 6–9) discusses a systematic approach
to investigating a crime based on the scientific method, providing a context
for the remainder of this book. Chapter 7 (Handling a Digital Crime Scene)
provides guidance on how to approach and process computer systems and
their contents as a crime scene. Chapter 8 (Investigative Reconstruction with
Digital Evidence) describes how to use digital evidence to reconstruct events
and learn more about the victim and offender in a crime. Chapter 9 (Modus
Operandi, Motive, and Technology) is a discussion of the relationship between
technology and the people who use it to commit crime. Understanding the
human elements of a crime and the underlying motivations can help answer
crucial questions in an investigation, helping assess risks (will criminal activity
escalate?), develop and interview suspects (who to look for and what to say to
them), and focus inquiries (where to look and what to look for).
Part 3 (Apprehending Offenders: Chapters 10–14) focuses on specific types
of investigations with a focus on apprehending offenders, starting with vio-
lent crime in Chapter 10. Chapter 11 discusses computers as alibi. Chapter 12
details sex offenders on the Internet. Investigating computer intrusions is cov-
ered in Chapter 13. Chapter 14 covers investigations of cyberstalking.
Part 4 (Computers: Chapters 15–20) begins by introducing basic forensic sci-
ence concepts in the context of a single computer. Learning how to deal with
individual computers is crucial because even when networks are involved, it is
usually necessary to collect digital evidence stored on computers. Case exam-
ples and guidelines are provided to help apply the knowledge in this text to
investigations. The remainder of Part 4 deals with specific kinds of computers
Introduction xxvii
DISCLAIMER
Tools are mentioned in this book to illustrate concepts and techniques, not
to indicate that a particular tool is best suited to a particular purpose. Digital
investigators must take responsibility to select and evaluate their tools.
Any legal issues covered in this text are provided to improve understanding
only and are not intended as legal advice. Seek competent legal advice to
address specifics of a case and to ensure that nuances of the law are considered.
Academic Press is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
525 B Street, Suite 1800, San Diego, California 92101-4495, USA
84 Theobald’s Road, London WC1X 8RR, UK
ACKNOWLEDGMENTS........................................................................... xiii
AUTHOR BIOGRAPHIES .......................................................................... xv
INTRODUCTION ...................................................................................... xxi
PART 4 Computers
CHAPTER 15 Computer Basics for Digital Investigators ................... 437
Eoghan Casey
15.1 A Brief History of Computers ........................................437
15.2 Basic Operation of Computers ......................................439
15.3 Representation of Data ..................................................442
15.4 Storage Media and Data Hiding ....................................447
15.5 File Systems and Location of Data ................................450
Contents ix