O'Reilly logo

Hiding Behind the Keyboard by John Bair, Brett Shavers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Digital Identity

Abstract

Capturing secret communications that describe the past or future crimes may be useless if the suspects' identities are not known. Physical identification of a person consists of biometric details, such as a fingerprint, which cannot be changed. However, the digital identity of a person can be fluid, dynamic, and changing. Nevertheless, it is possible to create the digital identity of a real person based on information collected from Internet sources that have been created by government, corporations, and individuals.

Keywords

Blood type; Digital; DNA; EXIF; Facial recognition; Fingerprints; Gait; Identity; Internet searches; Online identity; Passwords; PGP; Retina scan; Social networking; Username

Introduction

A suspect’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required