Computer Forensics and Privacy

Product Description
As society has become increasingly reliant on computers for document creation and information storage and transmittal, the amount of unauthorized theft of sensitive information stored in computers has increased correspondingly. This cutting-edge new book delivers a comprehensive treatment of the emerging field of computer forensics, making it a valuable resource for IT professionals in private businesses and government organizations, lawyers and law enforcement prof… More >>

Computer Forensics and Privacy

4 replies
  1. Anonymous says:

    This book is a great reference. I think that it is geared more towards the counter-forensics rather than forensic. That did not change my mind on how great a reference it is. This book shows me where to look and how to obtain the information I want.

    The links are another story. I understand that some links change but there are a lot of grammatical mistakes and link mispell errors. I think an errata needs to accompany this book – just a suggestion.
    Rating: 3 / 5

  2. Anonymous says:

    This is a long overdue book. It is readable, gives specific practical advice on online and offline computer privacy, and does not mince words.
    With book in hand, I found numerous holes in my own setup which I promptly closed. This book is a bible in its field.
    Rating: 5 / 5

  3. Stephen Moretti says:

    Very well written. Showed a different side to Computer Forensics that I had not considered. All my research has been on the side of the Computer Forensic Investigator and not on the issues of citizens rights to keep data private from Computer Forensic Hackers. Of the 25 books on Securtiy/Encryption/Forenscis purchased by myself this is the most unbiased and informative.
    Rating: 5 / 5

  4. Anonymous says:

    This book occupies a unique place in the literature of computer
    forensics. Most works in the field, such as Kruse and Heiser’s
    “Computer Forensics” (cf. BKCMPFRN.RVW), concentrate on documentation
    of the investigation with a view to presentation in court. The actual
    mechanics of data recovery tend to be left to commercial tools.
    Caloyannides demonstrates how to delve into corners of the computer in
    order to actually get the data out.

    At the same time, this work is inconsistent, on at least two levels.
    The perspective flips back and forth between forensics and privacy,
    alternately emphasizing how to find evidence, and how to hide
    evidence. The technology involved is the same, but the shifts in
    viewpoint can be jarring to the reader. At the same time, the depth
    of technical detail can vary wildly. At one point the book stops shy
    of telling you how to undelete files with a sector editor (an activity
    that could be useful to every computer user), while other sections
    list lengthy and extraordinary measures to secure personal computers.

    Part one concentrates on the data recovery aspect of computer
    forensics. Chapter one is entitled an introduction, but seems to be
    more of an editorial on privacy, with the added statement that the
    book is intended both for law enforcement personnel needing details of
    computer forensic techniques and those wishing to preserve the privacy
    of data. The use of, and factors related to the use of, computer
    forensics is supported by specific cases (rather than vague
    suppositions) in chapter two. One has to agree with the author’s
    statement, in chapter three, that “computer forensics can be done–
    and, sadly, is often done–by persons with a minimal amount of either
    education or experience.” Therefore it is unfortunate that the
    forensic tools list and book structure are both difficult at this
    point, although there is good material and writing, and Caloyannides
    is not afraid to tackle the social and political aspects of the field.
    Chapter four outlines various places (primarily in Windows) from which
    data may be recovered. It is an odd mix of little known and very
    valuable information, and extremely poor explanations of basic
    functions like manual undeletion and file overwriting. A strange and
    terse look at steganography, US and UK surveillance systems,
    cryptography, and anonymity makes up chapter five. Data acquisition,
    from sources such as key logging and Van Eck radiation, is reviewed in
    chapter six. Chapter seven debunks a short list of measures falsely
    believed to provide privacy protection.

    Part two turns to privacy and security. Chapter eight is a discussion
    of legal and commercial protections of privacy (mostly in the US) and
    their failings. Installing and configuring a privacy protected
    configuration of Windows is covered in chapter nine, in considerable
    detail. Chapter ten’s review of basic online privacy is heavy on
    additional software packages. Intermediate online privacy, in chapter
    eleven, looks at browser and email configurations, more packages, and
    has a section on tracing email that would be helpful in dealing with
    spam. (An unfortunate typesetting error seems to have deleted what
    might have been valuable information about PGP [Pretty Good Privacy].)
    Chapter twelve is more advanced, dealing with anonymizing services and
    personal firewalls, but may be beyond the average user. A general
    opinion piece on cryptography, chapter thirteen nevertheless provides
    a good, basic background, albeit with a social and political emphasis.
    Chapter fourteen looks at more practical encryption, detailing PGP and
    specialized cryptographic programs, with a detour into biometrics.

    Part three is a brief look at legal and other issues. Chapter fifteen
    is a brief look at laws, mostly in the US. Chapter sixteen touches on
    security aspects of VoIP (Voice over Internet Protocol) and GSM
    (Global System for Mobility) wireless services.

    Despite the ragged organization and style, and some glaring gaps in
    coverage, this book does contain a wealth of information for both the
    computer forensic examiner, and the user concerned with privacy. For
    anyone beyond the most basic user it is well worth a read.
    Rating: 4 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.