Index

A

Aerial surveillance
benefits, 5960
coordination with ground surveillance, 6061
video recording, 60
Altered evidence
authenticity validation, 237238
common access, difficulties, 239240
hash value, checking, 239
listing possible suspects, 239
metadata embedding, 239
Microsoft Windows operating systems, example, 239
modifying files, 238
possibilities, 237
track changes, checking, 239
two files with the same name, example, 238239
work schedules and, 240
Analogies
description, electronic data, 175176
effective use of, 176, 178
of digital forensic community, 175
folder access, listing, 179
password keeping, 177178
physical access to computer, impact on, 176177
reasonable comparison, using, 176
for visual aids, 176
Animations, for case ...

Get Placing the Suspect Behind the Keyboard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.