Wireless crime and forensic investigation
- نوع فایل : کتاب
- زبان : انگلیسی
- مؤلف : Gregory Kipper
- ناشر : Boca Raton, FL : Auerbach Publications
- چاپ و سال / کشور: 2007
- شابک / ISBN : 9780849331886
Description
1. Overview of wireless technologies and security -- A brief history of wireless -- The benefits of modern wireless technology -- The new risks created by wireless technology -- Overview of modern wireless technology -- Personal area networks -- Bluetooth -- InfraRed -- Ultrawideband -- ZigBee -- Wireless USB -- Wireless local area networks -- 802.11 -- 900 MHz packet radio -- Metropolitan area networks -- Microwave -- Free space optics -- Ricochet -- WiMAX -- Wide area networks -- Satellite -- Cellular -- BlackBerry -- Paging -- Other technologies of note -- iMode -- Short message service (SMS) -- VoWiFi -- Intel Centrino -- Bibliography -- 2. Wireless threats, vulnerabilities, and security -- Introduction -- Wireless LANs -- Wireless network security threats -- Eavesdropping -- Traffic analysis -- Data tampering -- Masquerading -- Denial-of-service (DoS) -- Wireless client attacks -- Other issues -- War-driving -- The basic war-driving kit -- Why are people war-driving? -- War-chalking -- War flying -- War-driving and war-chalking ethics -- Is it theft? -- Is it harmful? -- Is it stoppable? -- Proactive measures -- Common Wi-Fi security recommendations : actions versus reality -- Personal digital assistants -- PDA threats and vulnerabilities -- Mobile device attacks -- How a PDA connects to other computers -- Viruses, Trojans, and worms -- Theft of the PDA device -- Data theft -- Mobile code exploits -- Authentication theft -- DoS attacks -- Session hijacking -- PDA security -- Anti-virus software -- Other PDA security measures -- Combating handheld attacks -- Cell phones -- Cell phone threats and vulnerabilities -- SMS spoofing -- Camera phones -- Signal interception and interference -- Viruses -- Handset theft -- Exploiting cellular technology : cell phone fraud -- Viewing or changing phone settings -- Phone network sniffing/scanning -- SIM cloning -- Phone tumbling -- Subscription fraud -- How does cellular fraud occur? -- Detecting fraud -- What is being done? -- What can the user do? -- New security -- Cell phone hacking and phreaking -- Phreaking -- Disassemblers -- Hackers tracking people -- Vampire phones -- Who's tracking you and your cell phone? -- Enhanced-911 -- "Find friends" -- PCP framework -- Cell phone security -- Combatting sniffing and cloning phones -- PhonePrint -- Cell phone jamming/silencing -- Precautions for cellular phones -- Other threats and vulnerabilities -- Wireless denial-of-service attacks -- Attach significance -- Attack mitigation -- GPS jamming -- Identity theft -- History and overview of identity theft -- "Virtual" identity theft -- Wireless identity theft -- New technologies to help prevent identity theft -- Identity theft and terrorism -- Breeder documents -- Corporate America and identity theft -- Bibliography -- 3. Wireless crime fighting -- Wireless crime prevention techniques -- Introduction -- E911 -- Police use of wireless devices -- PacketCluster -- TotalRoam -- Hi-Tech patrol cars -- Personal security and RFID -- How does RFID work? -- Personal security -- Virtual prisons -- Tagging stalkers and sex offenders -- Wireless honeypots -- Honeyd -- FakeAP -- How and where it's used -- Bibliography -- 4. Digital forensic principles and wireless forensics -- CyberCrime and forensic principles -- What is cybercrime? -- Types of cybercrime -- Cracking -- Harassment or cyberstalking -- Corporate/economic espionage -- Child pornography -- Fraud and spam -- Identity theft -- Copyright piracy -- Extortion -- Investigating cybercrime -- Principles of computer-based electronic evidence -- Roles and responsibilities -- Network forensics in a wireless environment -- Points of evidence : where forensic fingerprints can be gathered -- 802.11 forensics -- Introduction -- Looking into a WLAN for forensic evidence -- Where to find the hardware? -- Identifying digital artifacts -- Capturing wireless traffic -- PDA forensics -- The term "PDA" in forensics -- Standard features of a PDA -- Physical device structure -- PDA operating systems -- PDA memory and storage -- Read-only memory (ROM) -- Random-access memory (RAM) -- PDA power sources -- Summary of available software and tools -- Palm pdd -- Paraben's PDA Seizure -- Pilot-Link -- Guidance software's EnCase -- POSE, palm operating system emulator -- Conducting PDA forensics -- Forensic rules for PDAs -- Palm OS modes of operation -- Palm OS reset options -- Structure of the Palm OS -- Cards -- ROM -- RAM -- The HotSync process -- The HotSync process : the steps -- Palm communication methods -- Bluetooth -- Web clipping -- Telephony -- IrDA -- Examination essentials : Palm OS -- Security issues with PALM OS version 5.0 -- The cryptographic provider manager -- The authorization manager -- Protection inherent in the Palm OS -- Frequently used encryption standards -- Password protection options -- PDA forensics on a Palm -- Treatment of PDAs -- The Palm OS flowchart processes using Paraben's PDA Seizure -- Step 1 : close the HotSync program on the target machine -- Step 2 : open PDA Seizure and run the acquisition wizard -- Step 3 : examine the evidence -- PDA forensics on a Windows CE/Pocket PC -- Devices that use Windows CE/Pocket PC -- What is Windows CE? -- The difference between Pocket PC and Mobile PC -- Pocket PC -- Mobile PC -- Windows CE desktop software -- Reset options with Windows CE devices -- Windows CE structure : ROM -- Windows CE structure : RAM -- Program memory -- Storage memory : object store -- What is the Windows CE registry? -- The Windows CE acquisition process using Paraben's PDA Seizure -- BlackBerry forensics -- What is RIM BlackBerry? -- Enterprise edition -- Internet edition -- Devices that use RIM BlackBerry -- Fundamental differences between PDA OS and BlackBerry -- Standard wireless connect -- How does a BlackBerry connect? -- Forensic rules for RIM BlackBerry operating system -- Rule 1 : radio control/Faraday control -- Rule 2 : power control -- Rule 3 : cables and accessories -- Rule 4 : data always changing -- Rule 5 : understand fundamentals -- How BlackBerry uses RAM -- BlackBerry security -- BlackBerry examination essentials -- BlackBerry flowchart processes using Paraben's PDA Seizure -- Cell phone forensics -- Summary of available software and tools -- BitPIM -- GSM. XRY -- Oxygen phone manager -- MOBILedit! -- Cell Seizure -- TULP -- SIMIS -- ForensicSIM -- Forensic card reader -- SIMCon -- Forensic rules for cellular phones -- Rule 1 : stop wireless receiving -- Rule 2 : charge device -- Rule 3 : cabling and accessories -- Rule 4 : acquire in laboratory -- Cell phone flowchart processes using Paraben's Cell Seizure -- Cell phone data storage -- Device storage areas -- SMS -- The future : multimedia message service (MMS) -- Cell phone acquisition process using Paraben's Cell Seizure -- SIM card forensics -- Sim card seizure rules -- Forensic data associated with SIM cards -- SIM data acquired -- Data acquisition options -- What data is available from mobile phones? -- What do the providers keep? -- How to analyze cell phone data -- SIM card security -- PIN versus PUK -- Handling instructions for mobile phones -- Recovery and packaging -- Legal issues -- Title III and the Electronic Communications Privacy Act (ECPA) -- Issue 1 : Federal Wire Tapping Act -- Issue 2 : stored data -- Law enforcement questions -- Private sector questions -- Bibliography -- 5. The wireless future -- Introduction -- New twists -- Wearable computers -- Radio frequency identification (RFID) -- Grocery shopping -- Nightclubs -- ShotCode -- Grafedia -- Pervasive computing and cultural shifts -- Wireless shifts and trends -- Social connectivity and entertainment -- Young people will build relationships via wireless devices -- Multitasking capabilities will flourish -- Personal security and convenience -- Personalization -- Gap fillers -- Convergence -- Text will rival voice communications -- New functionalities for wireless devices -- The home element -- Relationships, virtual communities, and beyond -- Dating : how things are changing -- Text messages and social familiarity -- Mobile phones and friendships -- Positive effects -- Negative effects -- Virtual communities -- Characteristics of mobile communications -- Characteristics of virtual communities -- Characteristics of mobile virtual communities -- Hints of tomorrow -- Vivienne : the virtual girlfriend -- City-sized HotSpots -- Sports -- Music -- Dining -- Commerce -- RFID -- New types of wireless information and trade -- The universal wireless payment standard -- Security and privacy : RFID passports -- The concept -- The concerns and consequences -- Latest developments -- Entertainment and travel -- Television -- 24 conspiracy -- The adult market -- Music -- Sports -- Gambling -- Travel -- Agriculture -- HealthCare -- Noppa -- VeriChip -- Camera phones -- Disaster recovery -- Education -- Military -- Conclusion -- Bibliography -- Glossary.
1. Overview of wireless technologies and security -- A brief history of wireless -- The benefits of modern wireless technology -- The new risks created by wireless technology -- Overview of modern wireless technology -- Personal area networks -- Bluetooth -- InfraRed -- Ultrawideband -- ZigBee -- Wireless USB -- Wireless local area networks -- 802.11 -- 900 MHz packet radio -- Metropolitan area networks -- Microwave -- Free space optics -- Ricochet -- WiMAX -- Wide area networks -- Satellite -- Cellular -- BlackBerry -- Paging -- Other technologies of note -- iMode -- Short message service (SMS) -- VoWiFi -- Intel Centrino -- Bibliography -- 2. Wireless threats, vulnerabilities, and security -- Introduction -- Wireless LANs -- Wireless network security threats -- Eavesdropping -- Traffic analysis -- Data tampering -- Masquerading -- Denial-of-service (DoS) -- Wireless client attacks -- Other issues -- War-driving -- The basic war-driving kit -- Why are people war-driving? -- War-chalking -- War flying -- War-driving and war-chalking ethics -- Is it theft? -- Is it harmful? -- Is it stoppable? -- Proactive measures -- Common Wi-Fi security recommendations : actions versus reality -- Personal digital assistants -- PDA threats and vulnerabilities -- Mobile device attacks -- How a PDA connects to other computers -- Viruses, Trojans, and worms -- Theft of the PDA device -- Data theft -- Mobile code exploits -- Authentication theft -- DoS attacks -- Session hijacking -- PDA security -- Anti-virus software -- Other PDA security measures -- Combating handheld attacks -- Cell phones -- Cell phone threats and vulnerabilities -- SMS spoofing -- Camera phones -- Signal interception and interference -- Viruses -- Handset theft -- Exploiting cellular technology : cell phone fraud -- Viewing or changing phone settings -- Phone network sniffing/scanning -- SIM cloning -- Phone tumbling -- Subscription fraud -- How does cellular fraud occur? -- Detecting fraud -- What is being done? -- What can the user do? -- New security -- Cell phone hacking and phreaking -- Phreaking -- Disassemblers -- Hackers tracking people -- Vampire phones -- Who's tracking you and your cell phone? -- Enhanced-911 -- "Find friends" -- PCP framework -- Cell phone security -- Combatting sniffing and cloning phones -- PhonePrint -- Cell phone jamming/silencing -- Precautions for cellular phones -- Other threats and vulnerabilities -- Wireless denial-of-service attacks -- Attach significance -- Attack mitigation -- GPS jamming -- Identity theft -- History and overview of identity theft -- "Virtual" identity theft -- Wireless identity theft -- New technologies to help prevent identity theft -- Identity theft and terrorism -- Breeder documents -- Corporate America and identity theft -- Bibliography -- 3. Wireless crime fighting -- Wireless crime prevention techniques -- Introduction -- E911 -- Police use of wireless devices -- PacketCluster -- TotalRoam -- Hi-Tech patrol cars -- Personal security and RFID -- How does RFID work? -- Personal security -- Virtual prisons -- Tagging stalkers and sex offenders -- Wireless honeypots -- Honeyd -- FakeAP -- How and where it's used -- Bibliography -- 4. Digital forensic principles and wireless forensics -- CyberCrime and forensic principles -- What is cybercrime? -- Types of cybercrime -- Cracking -- Harassment or cyberstalking -- Corporate/economic espionage -- Child pornography -- Fraud and spam -- Identity theft -- Copyright piracy -- Extortion -- Investigating cybercrime -- Principles of computer-based electronic evidence -- Roles and responsibilities -- Network forensics in a wireless environment -- Points of evidence : where forensic fingerprints can be gathered -- 802.11 forensics -- Introduction -- Looking into a WLAN for forensic evidence -- Where to find the hardware? -- Identifying digital artifacts -- Capturing wireless traffic -- PDA forensics -- The term "PDA" in forensics -- Standard features of a PDA -- Physical device structure -- PDA operating systems -- PDA memory and storage -- Read-only memory (ROM) -- Random-access memory (RAM) -- PDA power sources -- Summary of available software and tools -- Palm pdd -- Paraben's PDA Seizure -- Pilot-Link -- Guidance software's EnCase -- POSE, palm operating system emulator -- Conducting PDA forensics -- Forensic rules for PDAs -- Palm OS modes of operation -- Palm OS reset options -- Structure of the Palm OS -- Cards -- ROM -- RAM -- The HotSync process -- The HotSync process : the steps -- Palm communication methods -- Bluetooth -- Web clipping -- Telephony -- IrDA -- Examination essentials : Palm OS -- Security issues with PALM OS version 5.0 -- The cryptographic provider manager -- The authorization manager -- Protection inherent in the Palm OS -- Frequently used encryption standards -- Password protection options -- PDA forensics on a Palm -- Treatment of PDAs -- The Palm OS flowchart processes using Paraben's PDA Seizure -- Step 1 : close the HotSync program on the target machine -- Step 2 : open PDA Seizure and run the acquisition wizard -- Step 3 : examine the evidence -- PDA forensics on a Windows CE/Pocket PC -- Devices that use Windows CE/Pocket PC -- What is Windows CE? -- The difference between Pocket PC and Mobile PC -- Pocket PC -- Mobile PC -- Windows CE desktop software -- Reset options with Windows CE devices -- Windows CE structure : ROM -- Windows CE structure : RAM -- Program memory -- Storage memory : object store -- What is the Windows CE registry? -- The Windows CE acquisition process using Paraben's PDA Seizure -- BlackBerry forensics -- What is RIM BlackBerry? -- Enterprise edition -- Internet edition -- Devices that use RIM BlackBerry -- Fundamental differences between PDA OS and BlackBerry -- Standard wireless connect -- How does a BlackBerry connect? -- Forensic rules for RIM BlackBerry operating system -- Rule 1 : radio control/Faraday control -- Rule 2 : power control -- Rule 3 : cables and accessories -- Rule 4 : data always changing -- Rule 5 : understand fundamentals -- How BlackBerry uses RAM -- BlackBerry security -- BlackBerry examination essentials -- BlackBerry flowchart processes using Paraben's PDA Seizure -- Cell phone forensics -- Summary of available software and tools -- BitPIM -- GSM. XRY -- Oxygen phone manager -- MOBILedit! -- Cell Seizure -- TULP -- SIMIS -- ForensicSIM -- Forensic card reader -- SIMCon -- Forensic rules for cellular phones -- Rule 1 : stop wireless receiving -- Rule 2 : charge device -- Rule 3 : cabling and accessories -- Rule 4 : acquire in laboratory -- Cell phone flowchart processes using Paraben's Cell Seizure -- Cell phone data storage -- Device storage areas -- SMS -- The future : multimedia message service (MMS) -- Cell phone acquisition process using Paraben's Cell Seizure -- SIM card forensics -- Sim card seizure rules -- Forensic data associated with SIM cards -- SIM data acquired -- Data acquisition options -- What data is available from mobile phones? -- What do the providers keep? -- How to analyze cell phone data -- SIM card security -- PIN versus PUK -- Handling instructions for mobile phones -- Recovery and packaging -- Legal issues -- Title III and the Electronic Communications Privacy Act (ECPA) -- Issue 1 : Federal Wire Tapping Act -- Issue 2 : stored data -- Law enforcement questions -- Private sector questions -- Bibliography -- 5. The wireless future -- Introduction -- New twists -- Wearable computers -- Radio frequency identification (RFID) -- Grocery shopping -- Nightclubs -- ShotCode -- Grafedia -- Pervasive computing and cultural shifts -- Wireless shifts and trends -- Social connectivity and entertainment -- Young people will build relationships via wireless devices -- Multitasking capabilities will flourish -- Personal security and convenience -- Personalization -- Gap fillers -- Convergence -- Text will rival voice communications -- New functionalities for wireless devices -- The home element -- Relationships, virtual communities, and beyond -- Dating : how things are changing -- Text messages and social familiarity -- Mobile phones and friendships -- Positive effects -- Negative effects -- Virtual communities -- Characteristics of mobile communications -- Characteristics of virtual communities -- Characteristics of mobile virtual communities -- Hints of tomorrow -- Vivienne : the virtual girlfriend -- City-sized HotSpots -- Sports -- Music -- Dining -- Commerce -- RFID -- New types of wireless information and trade -- The universal wireless payment standard -- Security and privacy : RFID passports -- The concept -- The concerns and consequences -- Latest developments -- Entertainment and travel -- Television -- 24 conspiracy -- The adult market -- Music -- Sports -- Gambling -- Travel -- Agriculture -- HealthCare -- Noppa -- VeriChip -- Camera phones -- Disaster recovery -- Education -- Military -- Conclusion -- Bibliography -- Glossary.