You are a great forensicator, but can you really place your suspect at the keyboard?  One of the most difficult tasks I had working as a police officer and detective assigned to investigating crimes was “Who do I arrest and what evidence proves it?”  I have always been fascinated with not only finding criminal suspects, but also proving it with as much evidence as I could dig up.  This is not as easy as primetime television will have you believe….

"The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest...the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes..."    Computing Reviews, Oct 29, 2014

    It is one thing to detect a crime, another to investigate a crime, and clearly another to gather enough evidence to place a suspect at a crime scene with motive and opportunity.  The difficulties compound when there are many possible suspects and none confess.  I have had drug cases where a single piece of evidence is “near” two possible suspects.  Who is arrested?  Both?  Neither?  Flip a coin and pick one?  Computer crimes are not unlike this, unless you catch the suspect at the keyboard committing a crime in front of you.

    I want you to impact the offenders and the victims with your work.  My intention throughout was to get the forensic examiner’s head out of the forensic image and into the case.  I also want to get the non-forensic examiner to more aware of the ability of the forensic examiners.I have written dozens upon dozens of tips and tricks of the investigative trade in this book, both in forensic and gumshoe detective work.  If just one of these tips saves you hours of effort, or helps connect the dots in a case, or virtually puts your suspect at a keyboard beyond a doubt, you will have a direct and immediate impact on that suspect.  But most importantly, you will have made an even bigger impact on the victim-justice and closure.  This applies to criminal and civil cases.  It is all nice to find evidence; however, nothing else really matters until you find evidence to nab your suspect.  How awesome is that?

 

“This book offers a complete picture of a cybercrime investigation, and with the author's clear and interesting writing, it manages to give aspiring digital forensic investigators a good idea of what such a job entails when working with law enforcement. It's a very easy and engaging read.”   Help Net Security 5 Sept 2013

 

“Shavers provides us an interesting, well-written, and easy-to-read book to help understand cyber crime. It is a brilliant version of combining the methods and techniques of both the criminal investigators and digital forensics”.    Information Security Journal: A Global Perspective Vol. 23 Issue 1-2, 2014