Skip to:Content
|
Bottom
Cover image for Wireless crime and forensic investigation
Title:
Wireless crime and forensic investigation
Personal Author:
Publication Information:
Boca Raton, FL : Auerbach Publications, 2007
ISBN:
9780849331886

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010133980 TK5103.2 K56 2007 Open Access Book Book
Searching...
Searching...
30000010134849 TK5103.2 K56 2007 Open Access Book Book
Searching...
Searching...
3000001026544 TK5103.2 K56 2007 Open Access Book Book
Searching...
Searching...
30000003495045 TK5103.2 K56 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.

From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy.

With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.


Table of Contents

1 Overview of Wireless Technologies and Securityp. 1
A Brief History of Wirelessp. 1
The Benefits of Modern Wireless Technologyp. 2
The New Risks Created by Wireless Technologyp. 3
Overview of Modern Wireless Technologyp. 4
Personal Area Networksp. 4
Bluetoothp. 4
InfraRedp. 5
Ultrawidebandp. 5
ZigBeep. 5
Wireless USBp. 6
Wireless Local Area Networksp. 6
802.11p. 6
900 MHz Packet Radiop. 7
Metropolitan Area Networksp. 7
Microwavep. 7
Free Space Opticsp. 7
Ricochetp. 7
WiMAXp. 8
Wide Area Networksp. 8
Satellitep. 8
Cellularp. 8
BlackBerryp. 9
Pagingp. 9
Other Technologies of Notep. 10
iModep. 10
Short Message Service (SMS)p. 10
VoWiFip. 10
Intel Centrinop. 10
Bibliographyp. 10
2 Wireless Threats, Vulnerabilities, and Securityp. 13
Introductionp. 13
Wireless LANsp. 14
Wireless Network Security Threatsp. 14
Eavesdroppingp. 14
Traffic Analysisp. 14
Data Tamperingp. 14
Masqueradingp. 14
Denial-of-Service (DoS)p. 15
Wireless Client Attacksp. 15
Other Issuesp. 15
War-Drivingp. 17
The Basic War Driving Kitp. 17
Why Are People War-Driving?p. 18
War-Chalkingp. 19
War Flyingp. 19
War-Driving and War-Chalking Ethicsp. 20
Is It Theft?p. 20
Is It Harmful?p. 21
Is It Stoppable?p. 21
Proactive Measuresp. 21
Common Wi-Fi Security Recommendations: Actions versus Realityp. 22
Personal Digital Assistantsp. 23
PDA Threats and Vulnerabilitiesp. 23
Mobile Device Attacksp. 23
How a PDA Connects to Other Computersp. 23
Viruses, Trojans, and Wormsp. 23
Theft of the PDA Devicep. 24
Data Theftp. 24
Mobile Code Exploitsp. 24
Authentication Theftp. 24
DoS Attacksp. 25
Session Hijackingp. 25
PDA Securityp. 25
Anti-Virus Softwarep. 25
Other PDA Security Measuresp. 25
Combating Handheld Attacksp. 25
Cell Phonesp. 26
Cell Phone Threats and Vulnerabilitiesp. 26
SMS Spoofingp. 26
Camera Phonesp. 26
Signal Interception and Interferencep. 26
Virusesp. 27
Handset Theftp. 27
Exploiting Cellular Technology: Cell Phone Fraudp. 27
Viewing or Changing Phone Settingsp. 27
Phone Network Sniffing/Scanningp. 27
SIM Cloningp. 28
Phone Tumblingp. 28
Subscription Fraudp. 28
How Does Cellular Fraud Occur?p. 29
Detecting Fraudp. 29
What Is Being Done?p. 29
What Can the User Do?p. 29
New Securityp. 30
Cell Phone Hacking and Phreakingp. 30
Phreakingp. 30
Disassemblersp. 31
Hackers Tracking Peoplep. 31
Vampire Phonesp. 31
Who's Tracking You and Your Cell Phone?p. 31
Enhanced-911p. 31
"Find Friends"p. 32
PCP Frameworkp. 32
Cell Phone Securityp. 33
Combatting Sniffing and Cloning Phonesp. 33
PhonePrintp. 33
Cell Phone Jamming/Silencingp. 33
Precautions for Cellular Phonesp. 34
Other Threats and Vulnerabilitiesp. 34
Wireless Denial-of-Service Attacksp. 34
Attack Significancep. 34
Attack Mitigationp. 35
GPS Jammingp. 35
Identity Theftp. 35
History and Overview of Identity Theftp. 35
"Virtual" Identity Theftp. 36
Wireless Identity Theftp. 37
New Technologies to Help Prevent Identity Theftp. 38
Identity Theft and Terrorismp. 38
Breeder Documentsp. 39
Corporate America and Identity Theftp. 39
Bibliographyp. 39
3 Wireless Crime Fightingp. 43
Wireless Crime Prevention Techniquesp. 43
Introductionp. 43
E911p. 43
Police Use of Wireless Devicesp. 44
PacketClusterp. 44
TotalRoamp. 44
Hi-Tech Patrol Carsp. 45
Personal Security and RFIDp. 45
How Does RFID Work?p. 45
Personal Securityp. 45
Virtual Prisonsp. 45
Tagging Stalkers and Sex Offendersp. 47
Wireless Honeypotsp. 47
Honeydp. 48
FakeAPp. 48
How and Where It's Usedp. 49
Bibliographyp. 49
4 Digital Forensic Principles and Wireless Forensicsp. 51
CyberCrime and Forensic Principlesp. 51
What Is Cybercrime?p. 51
Types of Cybercrimep. 51
Crackingp. 52
Harassment or Cyberstalkingp. 52
Corporate/Economic Espionagep. 53
Child Pornographyp. 53
Fraud and Spamp. 53
Identity Theftp. 54
Copyright Piracyp. 54
Extortionp. 54
Investigating Cybercrimep. 54
Principles of Computer-Based Electronic Evidencep. 54
Roles and Responsibilitiesp. 55
Network Forensics in a Wireless Environmentp. 56
Points of Evidence: Where Forensic Fingerprints Can Be Gatheredp. 56
802.11 Forensicsp. 57
Introductionp. 57
Looking into a WLAN for Forensic Evidencep. 58
Where to Find the Hardware?p. 58
Identifying Digital Artifactsp. 58
Capturing Wireless Trafficp. 59
PDA Forensicsp. 59
The Term "PDA" in Forensicsp. 59
Standard Features of a PDAp. 59
Physical Device Structurep. 60
PDA Operating Systemsp. 61
PDA Memory and Storagep. 61
Read-Only Memory (ROM)p. 61
Random-Access Memory (RAM)p. 61
PDA Power Sourcesp. 61
Summary of Available Software and Toolsp. 62
Palm pddp. 62
Paraben's PDA Seizurep. 62
Pilot-Linkp. 62
Guidance Software's EnCasep. 63
POSE - Palm Operating System Emulatorp. 63
Conducting PDA Forensicsp. 63
Forensic Rules for PDAsp. 64
Palm OS Modes of Operationp. 65
Palm OS Reset Optionsp. 65
Structure of the Palm OSp. 66
Cardsp. 66
ROMp. 66
RAMp. 67
The HotSync Processp. 67
The HotSync Process: The Stepsp. 68
Palm Communication Methodsp. 68
Bluetoothp. 68
Web Clippingp. 68
Telephonyp. 69
IrDAp. 69
Examination Essentials: Palm OSp. 70
Security Issues with Palm OS Version 5.0p. 70
The Cryptographic Provider Managerp. 70
The Authorization Managerp. 71
Protection Inherent in the Palm OSp. 71
Frequently Used Encryption Standardsp. 71
Password Protection Optionsp. 71
PDA Forensics on a Palmp. 72
Treatment of PDAsp. 72
The Palm OS Flowchart Processes Using Paraben's PDA Seizurep. 72
Step 1 Close the HotSync Program on the Target Machinep. 73
Step 2 Open PDA Seizure and Run the Acquisition Wizardp. 74
Step 3 Examine the Evidencep. 74
PDA Forensics on a Windows CE/Pocket PCp. 79
Devices That Use Windows CE/Pocket PCp. 79
What Is Windows CE?p. 80
The Difference between Pocket PC and Mobile PCp. 80
Pocket PCp. 80
Mobile PCp. 80
Windows CE Desktop Softwarep. 81
Reset Options with Windows CE Devicesp. 81
Windows CE Structure: ROMp. 82
Windows CE Structure: RAMp. 82
Program Memoryp. 83
Storage Memory: Object Storep. 83
What Is the Windows CE Registry?p. 83
The Windows CE Acquisition Process Using Paraben's PDA Seizurep. 83
BlackBerry Forensicsp. 83
What Is RIM BlackBerry?p. 84
Enterprise Editionp. 85
Internet Editionp. 86
Devices That Use RIM BlackBerryp. 86
Fundamental Differences between PDA OS and BlackBerryp. 88
Standard Wireless Connectp. 89
How Does a BlackBerry Connect?p. 89
Forensic Rules for RIM BlackBerry Operating Systemp. 90
Rule 1 Radio Control/Faraday Controlp. 90
Rule 2 Power Controlp. 92
Rule 3 Cables and Accessoriesp. 93
Rule 4 Data Always Changingp. 93
Rule 5 Understand Fundamentalsp. 93
How BlackBerry Uses RAMp. 93
BlackBerry Securityp. 94
BlackBerry Examination Essentialsp. 94
BlackBerry Flowchart Processes Using Paraben's PDA Seizurep. 94
Cell Phone Forensicsp. 94
Summary of Available Software and Toolsp. 95
BitPIMp. 95
GSM.XRYp. 96
Oxygen Phone Managerp. 96
MOBILedit!p. 97
Cell Seizurep. 97
TULP 2Gp. 98
SIMISp. 98
ForensicSIMp. 98
Forensic Card Readerp. 98
SIMConp. 98
Forensic Rules for Cellular Phonesp. 99
Rule 1 Stop Wireless Receivingp. 99
Rule 2 Charge Devicep. 99
Rule 3 Cabling and Accessoriesp. 99
Rule 4 Acquire in Laboratoryp. 100
Cell Phone Flowchart Processes Using Paraben's Cell Seizurep. 100
Cell Phone Data Storagep. 101
Device Storage Areasp. 102
SMSp. 103
The Future: Multimedia Message Service (MMS)p. 105
Cell Phone Acquisition Process Using Paraben's Cell Seizurep. 106
SIM Card Forensicsp. 106
SIM Card Seizure Rulesp. 107
Forensic Data Associated with SIM Cardsp. 111
SIM Data Acquiredp. 118
Data Acquisition Optionsp. 120
What Data Is Available from Mobile Phones?p. 120
What Do the Providers Keep?p. 121
How to Analyze Cell Phone Datap. 121
SIM Card Securityp. 121
PIN versus PUKp. 122
Handling Instructions for Mobile Phonesp. 122
Recovery and Packagingp. 122
Legal Issuesp. 123
Title III and the Electronic Communications Privacy Act (ECPA)p. 123
Issue 1 Federal Wire Tapping Actp. 123
Issue 2 Stored Datap. 123
Law Enforcement Questionsp. 124
Private Sector Questionsp. 124
Bibliographyp. 124
5 The Wireless Futurep. 127
Introductionp. 127
New Twistsp. 128
Wearable Computersp. 128
Radio Frequency Identification (RFID)p. 129
Grocery Shoppingp. 129
Nightclubsp. 130
ShotCodep. 130
Grafediap. 131
Pervasive Computing and Cultural Shiftsp. 132
Wireless Shifts and Trendsp. 134
Social Connectivity and Entertainmentp. 134
Young People Will Build Relationships via Wireless Devicesp. 134
Multitasking Capabilities Will Flourishp. 135
Personal Security and Conveniencep. 135
Personalizationp. 135
Gap Fillersp. 136
Convergencep. 136
Text Will Rival Voice Communicationsp. 136
New Functionalities for Wireless Devicesp. 137
The Home Elementp. 137
Relationships, Virtual Communities, and Beyondp. 139
Dating: How Things Are Changingp. 139
Text Messages and Social Familiarityp. 139
Mobile Phones and Friendshipsp. 139
Positive Effectsp. 140
Negative Effectsp. 140
Virtual Communitiesp. 140
Characteristics of Mobile Communicationsp. 141
Characteristics of Virtual Communitiesp. 141
Characteristics of Mobile Virtual Communitiesp. 142
Hints of Tomorrowp. 143
Vivienne: The Virtual Girlfriendp. 143
City-Sized HotSpotsp. 144
Sportsp. 144
Musicp. 144
Diningp. 145
Commercep. 145
RFIDp. 145
New Types of Wireless Information and Tradep. 145
The Universal Wireless Payment Standardp. 146
Security and Privacy: RFID Passportsp. 146
The Conceptp. 146
The Concerns and Consequencesp. 146
Latest Developmentsp. 147
Entertainment and Travelp. 147
Televisionp. 147
24 Conspiracyp. 147
The Adult Marketp. 148
Musicp. 148
Sportsp. 148
Gamblingp. 148
Travelp. 148
Agriculturep. 149
Healthcarep. 149
Noppap. 150
VeriChipp. 150
Camera Phonesp. 150
Disaster Recoveryp. 151
Educationp. 151
Militaryp. 151
Conclusionp. 152
Bibliographyp. 152
Glossaryp. 153
Appendix A

p. 191

Appendix B

p. 197

Appendix C

p. 229

Appendix D

p. 239

Indexp. 245
Go to:Top of Page