Advances in Digital Forensics III


Book Description

Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.




FORENSICS III


Book Description

In Forensics III: They Got Fifteen Minutes of Fame from the Way They Died, I reviewed twenty-eight ordinary people who were thrust into the spotlight, gaining fame not for their talents or accomplishments while living, but for the way they died. Newspaper and magazine articles ensured that stories of the circumstances surrounding their deaths remained in the public eye, so that, as Andy Warhol had predicted, their fame would last at least fifteen minutes. In some cases, it lasted much longer. While these individuals may have been “ordinary” before they died, they became extraordinary after death. Some of the people I reviewed in Forensics III: They Got Fifteen Minutes of Fame from the Way They Died include the “Boy in the Box,” later identified as Joseph Zarelli, who died from blunt force trauma; Azaria Chamberlain, a nine-week old infant who was killed by a dingo at Ayers Rock in Australia; George Floyd, whose death resulted from police brutality; Ron Goldman and Nicole Brown Simpson, who were stabbed to death; Elisa Lam, who drowned in a water tank on the roof of her hotel; Michael Faherty, whose death in Ireland was attributed to spontaneous human combustion; Katherine Morris, who died from carbon monoxide poisoning due to charcoal grilling in an automobile; Carlos Sousa, who was mauled to death by a tiger; Sahel Kazemi and Steve McNair, who committed murder-suicide; and Jayne and Corinne Peters, whose death was due to filicide-suicide, among many others. Forensics III: They Got Fifteen Minutes of Fame from the Way They Died reads like a mystery novel, presenting biographical and scientific information that helps readers understand how medical examiners and coroners utilized forensic analysis to determine the causes and manners of death of twenty-eight “not-so-famous” people.




Microbial Forensics


Book Description

Microbial Forensics is a rapidly evolving scientific discipline. In the last decade, and particularly due to the anthrax letter attacks in the United States, microbial forensics has become more formalized and has played an increasingly greater role in crime investigations. This has brought renewed interest, development and application of new technologies, and new rules of forensic and policy engagement. It has many applications ranging from biodefense, criminal investigations, providing intelligence information, making society more secure, and helping protect precious resources, particularly human life. A combination of diverse areas is investigated, including the major disciplines of biology, microbiology, medicine, chemistry, physics, statistics, population genetics, and computer science. Microbial Forensics, Second Edition is fully revised and updated and serves as a complete reference of the discipline. It describes the advances, as well as the challenges and opportunities ahead, and will be integral in applying science to help solve future biocrimes. - A collection of microbiology, virology, toxicology and mycology as it relates to forensics, in one reference - New and expanded content to include statistical analysis of forensic data and legal admissibility and the standards of evidence, to name a few - Includes research information and application of that research to crime scene analysis, which will allow practitioners to understand and apply the knowledge to their practice with ease




Introduction to Environmental Forensics


Book Description

The third edition of Introduction to Environmental Forensics is a state-of-the-art reference for the practicing environmental forensics consultant, regulator, student, academic, and scientist, with topics including compound-specific isotope analysis (CSIA), advanced multivariate statistical techniques, surrogate approaches for contaminant source identification and age dating, dendroecology, hydrofracking, releases from underground storage tanks and piping, and contaminant-transport modeling for forensic applications. Recognized international forensic scientists were selected to author chapters in their specific areas of expertise and case studies are included to illustrate the application of these methods in actual environmental forensic investigations. This edition provides updates on advances in various techniques and introduces several new topics. - Provides a comprehensive review of all aspects of environmental forensics - Coverage ranges from emerging statistical methods to state-of-the-art analytical techniques, such as gas chromatography-combustion-isotope ratio mass spectrometry and polytopic vector analysis - Numerous examples and case studies are provided to illustrate the application of these forensic techniques in environmental investigations




Stable Isotope Forensics


Book Description

The number-one guide, internationally, to all aspects of forensic isotope analysis, thoroughly updated and revised and featuring many new case studies This edition of the internationally acclaimed guide to forensic stable isotope analysis uses real-world examples to bridge discussions of the basic science, instrumentation and analytical techniques underlying forensic isotope profiling and its various technical applications. Case studies describe an array of applications, many of which were developed by the author himself. They include cases in which isotope profiling was used in murder, and drugs-related crime investigations, as well as for pharmaceutical and food authenticity control studies. Updated with coverage of exciting advances occurring in the field since the publication of the 1st edition, this 2nd edition explores innovative new techniques and applications in forensic isotope profiling, as well as key findings from original research. More than a simple update, though, this edition has been significantly revised in order to address serious problems that can arise from non-comparable and unfit-for-purpose stable isotope data. To that end, Part II has been virtually rewritten with greater emphasis now being placed on important quality control issues in stable isotope analysis in general and forensic stable isotope analysis in particular. Written in a highly accessible style that will appeal to practitioners, researchers and students alike Illustrates the many strengths and potential pitfalls of forensic stable isotope analysis Uses recent case examples to bridge underlying principles with technical applications Presents hands-on applications that let experienced researchers and forensic practitioners match problems with success stories Includes new chapters devoted to aspects of quality control and quality assurance, including scale normalisation, the identical treatment principle, hydrogen exchange and accreditation Stable Isotope Forensics, 2nd Edition is an important professional resource for forensic scientists, law enforcement officials, public prosecutors, defence attorneys, forensic anthropologists and others for whom isotope profiling has become an indispensable tool of the trade. It is also an excellent introduction to the field for senior undergraduate and graduate forensic science students. "All students of forensic criminology, and all law enforcement officers responsible for the investigation of serious crime , will want to study this book. Wolfram highlights the value, and future potential, of Stable Isotope Forensics as an emerging powerful tool in the investigation of crime." —Roy McComb, Deputy Director, Specialist Investigations, National Crime Agency (NCA), UK “A single author text in these days is rare and the value of this book lies in the dedication and experience of the author which is evident in the clarity of prose, the honest illustration of evidence and the realistic practical application of the subject - it makes this a text of genuine scientific value.” — Prof Dame Sue Black, PhD, DBE, OBE, FRSE, Leverhulme Research Centre for Forensic Science, University of Dundee, UK The book provides an excellent, vivid and comprehensible introduction into the world of stable isotope science and analytics. Compared to the first edition, the aspects of quality control and assurance in the analysis of stable isotopes in general, and forensic application in particular, are now taking much more room. This allows the book to serve the target groups: students, academic professionals and practitioners, and serves as a solid resource of basic and applicable information about the strengths and potential pitfalls of the application of stable isotope signatures. The present high-quality book shows the great potential of stable isotopes and is a must for everyone interested in isotope forensics. M.E. Böttcher & U. Flenker, Isotopes in Environmental and Health Studies, January 2018. A list of errata is available at http://booksupport.wiley.com




Introduction to Forensic Psychology


Book Description

This edition of Introduction to Forensic Psychology has been completely restructured to map to how courses on forensic psychology are taught, and features more figures, tables, and text boxes, textbook pedagogy. Uniquely. this book offers equal representation of criminal behavior, the court systems, and law enforcement/prisons. It also has equal representation of criminal and civic forensics and of issues pertaining to adults and children. new coverage of emerging issues in forensic psychology expanded case illustrations and vignettes, practice and ethics updates, and international trends new "key issue" overviews, boldface terms and concepts, and chapter reviews expanded coverage of corrections for juveniles.




Computer Incident Response and Forensics Team Management


Book Description

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components. - Provides readers with a complete handbook on computer incident response from the perspective of forensics team management - Identify the key steps to completing a successful computer incident response investigation - Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams




Advances in Digital Forensics II


Book Description

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Practically every crime now involves some digital evidence; digital forensics provides the techniques and tools to articulate this evidence. This book describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.




Incident Response & Computer Forensics, Third Edition


Book Description

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans




File System Forensic Analysis


Book Description

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.