" Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis" exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement themShows discovery and mitigation methods using examples, court cases, and moreExplores how social media sites and gaming technologies can be used for illicit communications activitiesExplores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online
I've had a fantastic career in law enforcement, starting in a municipal police agency (Renton WA PD) where I took on various roles. I was selected for detectives, later assigned to a state (VNET) task force, and then recruited to a federal (DHS) task force. Along the way, I was appointed as a bicycle patrol officer, SWAT officer, use-of-force instructor, undercover officer, and computer forensics examiner.
My cases spanned coast-to-coast in the USA. I even ventured outside the USA, working undercover and infiltrating international organized crime rings for various alphabet agencies in foreign countries. I’ve bought, sold, and seized tons of drugs, along with seizing hundreds of illegal firearms. I smuggled bulk currency across borders and assumed undercover roles as a drug trafficker, drug manufacturer, arms trafficker, human trafficker, and hit man. But rescuing children from trafficking after witnessing their tragedies made me cry. That changed me more than anything else I’ve ever done.
I’ve also been an adjunct instructor at the University of Washington’s Digital Forensics Program, qualified in courts as an expert witness, appointed as a Special Master, and consulted on digital forensic at every court level. I speak at lots of conferences, write blogs on digital forensics (www.brettshavers.com and www.dfir.training), am an honorary life member and former President of the Computer Technology Investigators Network (https://ctin.org/), and am a founding member of DFIR Review (https://dfrws.org/dfir-review/). I have worked on all kinds of criminal and civil cases, from harassment to national security matters. Of all my training and experiences, my most effective “teachers” have been those I wined and dined with while undercover.
And long, long ago, I served as an active-duty Corporal of Marines (I was in 2/3, for you Devil Dogs out there wondering). Now, I am but a humble member of the Marine Corps League and the Marine Corps Cyber Auxiliary. You can find me rambling away at www.brettshavers.com.
I received this book through the Goodreads Giveaway program. It is very thorough and written in a clear, concise and easy to follow manner. His wealth of knowledge about this subject is exceptional.