Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010133980 | TK5103.2 K56 2007 | Open Access Book | Book | Searching... |
Searching... | 30000010134849 | TK5103.2 K56 2007 | Open Access Book | Book | Searching... |
Searching... | 3000001026544 | TK5103.2 K56 2007 | Open Access Book | Book | Searching... |
Searching... | 30000003495045 | TK5103.2 K56 2007 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.
From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy.
With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.
Table of Contents
1 Overview of Wireless Technologies and Security | p. 1 |
A Brief History of Wireless | p. 1 |
The Benefits of Modern Wireless Technology | p. 2 |
The New Risks Created by Wireless Technology | p. 3 |
Overview of Modern Wireless Technology | p. 4 |
Personal Area Networks | p. 4 |
Bluetooth | p. 4 |
InfraRed | p. 5 |
Ultrawideband | p. 5 |
ZigBee | p. 5 |
Wireless USB | p. 6 |
Wireless Local Area Networks | p. 6 |
802.11 | p. 6 |
900 MHz Packet Radio | p. 7 |
Metropolitan Area Networks | p. 7 |
Microwave | p. 7 |
Free Space Optics | p. 7 |
Ricochet | p. 7 |
WiMAX | p. 8 |
Wide Area Networks | p. 8 |
Satellite | p. 8 |
Cellular | p. 8 |
BlackBerry | p. 9 |
Paging | p. 9 |
Other Technologies of Note | p. 10 |
iMode | p. 10 |
Short Message Service (SMS) | p. 10 |
VoWiFi | p. 10 |
Intel Centrino | p. 10 |
Bibliography | p. 10 |
2 Wireless Threats, Vulnerabilities, and Security | p. 13 |
Introduction | p. 13 |
Wireless LANs | p. 14 |
Wireless Network Security Threats | p. 14 |
Eavesdropping | p. 14 |
Traffic Analysis | p. 14 |
Data Tampering | p. 14 |
Masquerading | p. 14 |
Denial-of-Service (DoS) | p. 15 |
Wireless Client Attacks | p. 15 |
Other Issues | p. 15 |
War-Driving | p. 17 |
The Basic War Driving Kit | p. 17 |
Why Are People War-Driving? | p. 18 |
War-Chalking | p. 19 |
War Flying | p. 19 |
War-Driving and War-Chalking Ethics | p. 20 |
Is It Theft? | p. 20 |
Is It Harmful? | p. 21 |
Is It Stoppable? | p. 21 |
Proactive Measures | p. 21 |
Common Wi-Fi Security Recommendations: Actions versus Reality | p. 22 |
Personal Digital Assistants | p. 23 |
PDA Threats and Vulnerabilities | p. 23 |
Mobile Device Attacks | p. 23 |
How a PDA Connects to Other Computers | p. 23 |
Viruses, Trojans, and Worms | p. 23 |
Theft of the PDA Device | p. 24 |
Data Theft | p. 24 |
Mobile Code Exploits | p. 24 |
Authentication Theft | p. 24 |
DoS Attacks | p. 25 |
Session Hijacking | p. 25 |
PDA Security | p. 25 |
Anti-Virus Software | p. 25 |
Other PDA Security Measures | p. 25 |
Combating Handheld Attacks | p. 25 |
Cell Phones | p. 26 |
Cell Phone Threats and Vulnerabilities | p. 26 |
SMS Spoofing | p. 26 |
Camera Phones | p. 26 |
Signal Interception and Interference | p. 26 |
Viruses | p. 27 |
Handset Theft | p. 27 |
Exploiting Cellular Technology: Cell Phone Fraud | p. 27 |
Viewing or Changing Phone Settings | p. 27 |
Phone Network Sniffing/Scanning | p. 27 |
SIM Cloning | p. 28 |
Phone Tumbling | p. 28 |
Subscription Fraud | p. 28 |
How Does Cellular Fraud Occur? | p. 29 |
Detecting Fraud | p. 29 |
What Is Being Done? | p. 29 |
What Can the User Do? | p. 29 |
New Security | p. 30 |
Cell Phone Hacking and Phreaking | p. 30 |
Phreaking | p. 30 |
Disassemblers | p. 31 |
Hackers Tracking People | p. 31 |
Vampire Phones | p. 31 |
Who's Tracking You and Your Cell Phone? | p. 31 |
Enhanced-911 | p. 31 |
"Find Friends" | p. 32 |
PCP Framework | p. 32 |
Cell Phone Security | p. 33 |
Combatting Sniffing and Cloning Phones | p. 33 |
PhonePrint | p. 33 |
Cell Phone Jamming/Silencing | p. 33 |
Precautions for Cellular Phones | p. 34 |
Other Threats and Vulnerabilities | p. 34 |
Wireless Denial-of-Service Attacks | p. 34 |
Attack Significance | p. 34 |
Attack Mitigation | p. 35 |
GPS Jamming | p. 35 |
Identity Theft | p. 35 |
History and Overview of Identity Theft | p. 35 |
"Virtual" Identity Theft | p. 36 |
Wireless Identity Theft | p. 37 |
New Technologies to Help Prevent Identity Theft | p. 38 |
Identity Theft and Terrorism | p. 38 |
Breeder Documents | p. 39 |
Corporate America and Identity Theft | p. 39 |
Bibliography | p. 39 |
3 Wireless Crime Fighting | p. 43 |
Wireless Crime Prevention Techniques | p. 43 |
Introduction | p. 43 |
E911 | p. 43 |
Police Use of Wireless Devices | p. 44 |
PacketCluster | p. 44 |
TotalRoam | p. 44 |
Hi-Tech Patrol Cars | p. 45 |
Personal Security and RFID | p. 45 |
How Does RFID Work? | p. 45 |
Personal Security | p. 45 |
Virtual Prisons | p. 45 |
Tagging Stalkers and Sex Offenders | p. 47 |
Wireless Honeypots | p. 47 |
Honeyd | p. 48 |
FakeAP | p. 48 |
How and Where It's Used | p. 49 |
Bibliography | p. 49 |
4 Digital Forensic Principles and Wireless Forensics | p. 51 |
CyberCrime and Forensic Principles | p. 51 |
What Is Cybercrime? | p. 51 |
Types of Cybercrime | p. 51 |
Cracking | p. 52 |
Harassment or Cyberstalking | p. 52 |
Corporate/Economic Espionage | p. 53 |
Child Pornography | p. 53 |
Fraud and Spam | p. 53 |
Identity Theft | p. 54 |
Copyright Piracy | p. 54 |
Extortion | p. 54 |
Investigating Cybercrime | p. 54 |
Principles of Computer-Based Electronic Evidence | p. 54 |
Roles and Responsibilities | p. 55 |
Network Forensics in a Wireless Environment | p. 56 |
Points of Evidence: Where Forensic Fingerprints Can Be Gathered | p. 56 |
802.11 Forensics | p. 57 |
Introduction | p. 57 |
Looking into a WLAN for Forensic Evidence | p. 58 |
Where to Find the Hardware? | p. 58 |
Identifying Digital Artifacts | p. 58 |
Capturing Wireless Traffic | p. 59 |
PDA Forensics | p. 59 |
The Term "PDA" in Forensics | p. 59 |
Standard Features of a PDA | p. 59 |
Physical Device Structure | p. 60 |
PDA Operating Systems | p. 61 |
PDA Memory and Storage | p. 61 |
Read-Only Memory (ROM) | p. 61 |
Random-Access Memory (RAM) | p. 61 |
PDA Power Sources | p. 61 |
Summary of Available Software and Tools | p. 62 |
Palm pdd | p. 62 |
Paraben's PDA Seizure | p. 62 |
Pilot-Link | p. 62 |
Guidance Software's EnCase | p. 63 |
POSE - Palm Operating System Emulator | p. 63 |
Conducting PDA Forensics | p. 63 |
Forensic Rules for PDAs | p. 64 |
Palm OS Modes of Operation | p. 65 |
Palm OS Reset Options | p. 65 |
Structure of the Palm OS | p. 66 |
Cards | p. 66 |
ROM | p. 66 |
RAM | p. 67 |
The HotSync Process | p. 67 |
The HotSync Process: The Steps | p. 68 |
Palm Communication Methods | p. 68 |
Bluetooth | p. 68 |
Web Clipping | p. 68 |
Telephony | p. 69 |
IrDA | p. 69 |
Examination Essentials: Palm OS | p. 70 |
Security Issues with Palm OS Version 5.0 | p. 70 |
The Cryptographic Provider Manager | p. 70 |
The Authorization Manager | p. 71 |
Protection Inherent in the Palm OS | p. 71 |
Frequently Used Encryption Standards | p. 71 |
Password Protection Options | p. 71 |
PDA Forensics on a Palm | p. 72 |
Treatment of PDAs | p. 72 |
The Palm OS Flowchart Processes Using Paraben's PDA Seizure | p. 72 |
Step 1 Close the HotSync Program on the Target Machine | p. 73 |
Step 2 Open PDA Seizure and Run the Acquisition Wizard | p. 74 |
Step 3 Examine the Evidence | p. 74 |
PDA Forensics on a Windows CE/Pocket PC | p. 79 |
Devices That Use Windows CE/Pocket PC | p. 79 |
What Is Windows CE? | p. 80 |
The Difference between Pocket PC and Mobile PC | p. 80 |
Pocket PC | p. 80 |
Mobile PC | p. 80 |
Windows CE Desktop Software | p. 81 |
Reset Options with Windows CE Devices | p. 81 |
Windows CE Structure: ROM | p. 82 |
Windows CE Structure: RAM | p. 82 |
Program Memory | p. 83 |
Storage Memory: Object Store | p. 83 |
What Is the Windows CE Registry? | p. 83 |
The Windows CE Acquisition Process Using Paraben's PDA Seizure | p. 83 |
BlackBerry Forensics | p. 83 |
What Is RIM BlackBerry? | p. 84 |
Enterprise Edition | p. 85 |
Internet Edition | p. 86 |
Devices That Use RIM BlackBerry | p. 86 |
Fundamental Differences between PDA OS and BlackBerry | p. 88 |
Standard Wireless Connect | p. 89 |
How Does a BlackBerry Connect? | p. 89 |
Forensic Rules for RIM BlackBerry Operating System | p. 90 |
Rule 1 Radio Control/Faraday Control | p. 90 |
Rule 2 Power Control | p. 92 |
Rule 3 Cables and Accessories | p. 93 |
Rule 4 Data Always Changing | p. 93 |
Rule 5 Understand Fundamentals | p. 93 |
How BlackBerry Uses RAM | p. 93 |
BlackBerry Security | p. 94 |
BlackBerry Examination Essentials | p. 94 |
BlackBerry Flowchart Processes Using Paraben's PDA Seizure | p. 94 |
Cell Phone Forensics | p. 94 |
Summary of Available Software and Tools | p. 95 |
BitPIM | p. 95 |
GSM.XRY | p. 96 |
Oxygen Phone Manager | p. 96 |
MOBILedit! | p. 97 |
Cell Seizure | p. 97 |
TULP 2G | p. 98 |
SIMIS | p. 98 |
ForensicSIM | p. 98 |
Forensic Card Reader | p. 98 |
SIMCon | p. 98 |
Forensic Rules for Cellular Phones | p. 99 |
Rule 1 Stop Wireless Receiving | p. 99 |
Rule 2 Charge Device | p. 99 |
Rule 3 Cabling and Accessories | p. 99 |
Rule 4 Acquire in Laboratory | p. 100 |
Cell Phone Flowchart Processes Using Paraben's Cell Seizure | p. 100 |
Cell Phone Data Storage | p. 101 |
Device Storage Areas | p. 102 |
SMS | p. 103 |
The Future: Multimedia Message Service (MMS) | p. 105 |
Cell Phone Acquisition Process Using Paraben's Cell Seizure | p. 106 |
SIM Card Forensics | p. 106 |
SIM Card Seizure Rules | p. 107 |
Forensic Data Associated with SIM Cards | p. 111 |
SIM Data Acquired | p. 118 |
Data Acquisition Options | p. 120 |
What Data Is Available from Mobile Phones? | p. 120 |
What Do the Providers Keep? | p. 121 |
How to Analyze Cell Phone Data | p. 121 |
SIM Card Security | p. 121 |
PIN versus PUK | p. 122 |
Handling Instructions for Mobile Phones | p. 122 |
Recovery and Packaging | p. 122 |
Legal Issues | p. 123 |
Title III and the Electronic Communications Privacy Act (ECPA) | p. 123 |
Issue 1 Federal Wire Tapping Act | p. 123 |
Issue 2 Stored Data | p. 123 |
Law Enforcement Questions | p. 124 |
Private Sector Questions | p. 124 |
Bibliography | p. 124 |
5 The Wireless Future | p. 127 |
Introduction | p. 127 |
New Twists | p. 128 |
Wearable Computers | p. 128 |
Radio Frequency Identification (RFID) | p. 129 |
Grocery Shopping | p. 129 |
Nightclubs | p. 130 |
ShotCode | p. 130 |
Grafedia | p. 131 |
Pervasive Computing and Cultural Shifts | p. 132 |
Wireless Shifts and Trends | p. 134 |
Social Connectivity and Entertainment | p. 134 |
Young People Will Build Relationships via Wireless Devices | p. 134 |
Multitasking Capabilities Will Flourish | p. 135 |
Personal Security and Convenience | p. 135 |
Personalization | p. 135 |
Gap Fillers | p. 136 |
Convergence | p. 136 |
Text Will Rival Voice Communications | p. 136 |
New Functionalities for Wireless Devices | p. 137 |
The Home Element | p. 137 |
Relationships, Virtual Communities, and Beyond | p. 139 |
Dating: How Things Are Changing | p. 139 |
Text Messages and Social Familiarity | p. 139 |
Mobile Phones and Friendships | p. 139 |
Positive Effects | p. 140 |
Negative Effects | p. 140 |
Virtual Communities | p. 140 |
Characteristics of Mobile Communications | p. 141 |
Characteristics of Virtual Communities | p. 141 |
Characteristics of Mobile Virtual Communities | p. 142 |
Hints of Tomorrow | p. 143 |
Vivienne: The Virtual Girlfriend | p. 143 |
City-Sized HotSpots | p. 144 |
Sports | p. 144 |
Music | p. 144 |
Dining | p. 145 |
Commerce | p. 145 |
RFID | p. 145 |
New Types of Wireless Information and Trade | p. 145 |
The Universal Wireless Payment Standard | p. 146 |
Security and Privacy: RFID Passports | p. 146 |
The Concept | p. 146 |
The Concerns and Consequences | p. 146 |
Latest Developments | p. 147 |
Entertainment and Travel | p. 147 |
Television | p. 147 |
24 Conspiracy | p. 147 |
The Adult Market | p. 148 |
Music | p. 148 |
Sports | p. 148 |
Gambling | p. 148 |
Travel | p. 148 |
Agriculture | p. 149 |
Healthcare | p. 149 |
Noppa | p. 150 |
VeriChip | p. 150 |
Camera Phones | p. 150 |
Disaster Recovery | p. 151 |
Education | p. 151 |
Military | p. 151 |
Conclusion | p. 152 |
Bibliography | p. 152 |
Glossary | p. 153 |
Appendix A p. 191 | |
Appendix B p. 197 | |
Appendix C p. 229 | |
Appendix D p. 239 | |
Index | p. 245 |