000319613 000__ 10111cam\a22003614a\4500 000319613 001__ 319613 000319613 005__ 20210513115449.0 000319613 008__ 060210s2007\\\\flua\\\\\b\\\\001\0\eng\\ 000319613 010__ $$a 2006040493 000319613 020__ $$a9780849331886 (alk. paper) 000319613 020__ $$a0849331889 (alk. paper) 000319613 035__ $$a(OCoLC)ocm64390596 000319613 035__ $$a319613 000319613 040__ $$aDLC$$cDLC$$dBAKER$$dUKM$$dBTCTA$$dC#P$$dYDXCP$$dLVB$$dCRH 000319613 042__ $$apcc 000319613 049__ $$aISEA 000319613 05000 $$aTK5103.2$$b.K565 2007 000319613 08200 $$a363.25/968$$222 000319613 1001_ $$aKipper, Gregory. 000319613 24510 $$aWireless crime and forensic investigation /$$cGregory Kipper. 000319613 260__ $$aBoca Raton, FL :$$bAuerbach Publications,$$cc2007. 000319613 300__ $$axxviii, 251 p. :$$bill. ;$$c25 cm. 000319613 504__ $$aIncludes bibliographical references and index. 000319613 5050_ $$a1. Overview of wireless technologies and security -- A brief history of wireless -- The benefits of modern wireless technology -- The new risks created by wireless technology -- Overview of modern wireless technology -- Personal area networks -- Bluetooth -- InfraRed -- Ultrawideband -- ZigBee -- Wireless USB -- Wireless local area networks -- 802.11 -- 900 MHz packet radio -- Metropolitan area networks -- Microwave -- Free space optics -- Ricochet -- WiMAX -- Wide area networks -- Satellite -- Cellular -- BlackBerry -- Paging -- Other technologies of note -- iMode -- Short message service (SMS) -- VoWiFi -- Intel Centrino -- Bibliography -- 000319613 5050_ $$a2. Wireless threats, vulnerabilities, and security -- Introduction -- Wireless LANs -- Wireless network security threats -- Eavesdropping -- Traffic analysis -- Data tampering -- Masquerading -- Denial-of-service (DoS) -- Wireless client attacks -- Other issues -- War-driving -- The basic war-driving kit -- Why are people war-driving? -- War-chalking -- War flying -- War-driving and war-chalking ethics -- Is it theft? -- Is it harmful? -- Is it stoppable? -- Proactive measures -- Common Wi-Fi security recommendations : actions versus reality -- Personal digital assistants -- PDA threats and vulnerabilities -- Mobile device attacks -- How a PDA connects to other computers -- Viruses, Trojans, and worms -- Theft of the PDA device -- Data theft -- Mobile code exploits -- Authentication theft -- DoS attacks -- Session hijacking -- PDA security -- Anti-virus software -- Other PDA security measures -- Combating handheld attacks -- Cell phones -- Cell phone threats and vulnerabilities -- SMS spoofing -- Camera phones -- Signal interception and interference -- Viruses -- Handset theft -- Exploiting cellular technology : cell phone fraud -- Viewing or changing phone settings -- Phone network sniffing/scanning -- SIM cloning -- Phone tumbling -- Subscription fraud -- How does cellular fraud occur? -- Detecting fraud -- What is being done? -- What can the user do? -- New security -- Cell phone hacking and phreaking -- Phreaking -- Disassemblers -- Hackers tracking people -- Vampire phones -- Who's tracking you and your cell phone? -- Enhanced-911 -- "Find friends" -- PCP framework -- Cell phone security -- Combatting sniffing and cloning phones -- PhonePrint -- Cell phone jamming/silencing -- Precautions for cellular phones -- Other threats and vulnerabilities -- Wireless denial-of-service attacks -- Attach significance -- Attack mitigation -- GPS jamming -- Identity theft -- History and overview of identity theft -- "Virtual" identity theft -- Wireless identity theft -- New technologies to help prevent identity theft -- Identity theft and terrorism -- Breeder documents -- Corporate America and identity theft -- Bibliography -- 000319613 5050_ $$a3. Wireless crime fighting -- Wireless crime prevention techniques -- Introduction -- E911 -- Police use of wireless devices -- PacketCluster -- TotalRoam -- Hi-Tech patrol cars -- Personal security and RFID -- How does RFID work? -- Personal security -- Virtual prisons -- Tagging stalkers and sex offenders -- Wireless honeypots -- Honeyd -- FakeAP -- How and where it's used -- Bibliography -- 000319613 5050_ $$a4. Digital forensic principles and wireless forensics -- CyberCrime and forensic principles -- What is cybercrime? -- Types of cybercrime -- Cracking -- Harassment or cyberstalking -- Corporate/economic espionage -- Child pornography -- Fraud and spam -- Identity theft -- Copyright piracy -- Extortion -- Investigating cybercrime -- Principles of computer-based electronic evidence -- Roles and responsibilities -- Network forensics in a wireless environment -- Points of evidence : where forensic fingerprints can be gathered -- 802.11 forensics -- Introduction -- Looking into a WLAN for forensic evidence -- Where to find the hardware? -- Identifying digital artifacts -- Capturing wireless traffic -- PDA forensics -- The term "PDA" in forensics -- Standard features of a PDA -- Physical device structure -- PDA operating systems -- PDA memory and storage -- Read-only memory (ROM) -- Random-access memory (RAM) -- PDA power sources -- Summary of available software and tools -- Palm pdd -- Paraben's PDA Seizure -- Pilot-Link -- Guidance software's EnCase -- POSE, palm operating system emulator -- Conducting PDA forensics -- Forensic rules for PDAs -- Palm OS modes of operation -- Palm OS reset options -- Structure of the Palm OS -- Cards -- ROM -- RAM -- The HotSync process -- The HotSync process : the steps -- Palm communication methods -- Bluetooth -- Web clipping -- Telephony -- IrDA -- Examination essentials : Palm OS -- Security issues with PALM OS version 5.0 -- The cryptographic provider manager -- The authorization manager -- Protection inherent in the Palm OS -- Frequently used encryption standards -- Password protection options -- PDA forensics on a Palm -- Treatment of PDAs -- The Palm OS flowchart processes using Paraben's PDA Seizure -- Step 1 : close the HotSync program on the target machine -- Step 2 : open PDA Seizure and run the acquisition wizard -- Step 3 : examine the evidence -- PDA forensics on a Windows CE/Pocket PC -- Devices that use Windows CE/Pocket PC -- What is Windows CE? -- The difference between Pocket PC and Mobile PC -- Pocket PC -- Mobile PC -- Windows CE desktop software -- Reset options with Windows CE devices -- Windows CE structure : ROM -- Windows CE structure : RAM -- Program memory -- Storage memory : object store -- What is the Windows CE registry? -- The Windows CE acquisition process using Paraben's PDA Seizure -- BlackBerry forensics -- What is RIM BlackBerry? -- Enterprise edition -- Internet edition -- Devices that use RIM BlackBerry -- Fundamental differences between PDA OS and BlackBerry -- Standard wireless connect -- How does a BlackBerry connect? -- Forensic rules for RIM BlackBerry operating system -- Rule 1 : radio control/Faraday control -- Rule 2 : power control -- Rule 3 : cables and accessories -- Rule 4 : data always changing -- Rule 5 : understand fundamentals -- How BlackBerry uses RAM -- BlackBerry security -- BlackBerry examination essentials -- BlackBerry flowchart processes using Paraben's PDA Seizure -- Cell phone forensics -- Summary of available software and tools -- BitPIM -- GSM.XRY -- Oxygen phone manager -- MOBILedit! -- Cell Seizure -- TULP -- SIMIS -- ForensicSIM -- Forensic card reader -- SIMCon -- Forensic rules for cellular phones -- Rule 1 : stop wireless receiving -- Rule 2 : charge device -- Rule 3 : cabling and accessories -- Rule 4 : acquire in laboratory -- Cell phone flowchart processes using Paraben's Cell Seizure -- Cell phone data storage -- Device storage areas -- SMS -- The future : multimedia message service (MMS) -- Cell phone acquisition process using Paraben's Cell Seizure -- SIM card forensics -- Sim card seizure rules -- Forensic data associated with SIM cards -- SIM data acquired -- Data acquisition options -- What data is available from mobile phones? -- What do the providers keep? -- How to analyze cell phone data -- SIM card security -- PIN versus PUK -- Handling instructions for mobile phones -- Recovery and packaging -- Legal issues -- Title III and the Electronic Communications Privacy Act (ECPA) -- Issue 1 : Federal Wire Tapping Act -- Issue 2 : stored data -- Law enforcement questions -- Private sector questions -- Bibliography -- 000319613 5050_ $$a5. The wireless future -- Introduction -- New twists -- Wearable computers -- Radio frequency identification (RFID) -- Grocery shopping -- Nightclubs -- ShotCode -- Grafedia -- Pervasive computing and cultural shifts -- Wireless shifts and trends -- Social connectivity and entertainment -- Young people will build relationships via wireless devices -- Multitasking capabilities will flourish -- Personal security and convenience -- Personalization -- Gap fillers -- Convergence -- Text will rival voice communications -- New functionalities for wireless devices -- The home element -- Relationships, virtual communities, and beyond -- Dating : how things are changing -- Text messages and social familiarity -- Mobile phones and friendships -- Positive effects -- Negative effects -- Virtual communities -- Characteristics of mobile communications -- Characteristics of virtual communities -- Characteristics of mobile virtual communities -- Hints of tomorrow -- Vivienne : the virtual girlfriend -- City-sized HotSpots -- Sports -- Music -- Dining -- Commerce -- RFID -- New types of wireless information and trade -- The universal wireless payment standard -- Security and privacy : RFID passports -- The concept -- The concerns and consequences -- Latest developments -- Entertainment and travel -- Television -- 24 conspiracy -- The adult market -- Music -- Sports -- Gambling -- Travel -- Agriculture -- HealthCare -- Noppa -- VeriChip -- Camera phones -- Disaster recovery -- Education -- Military -- Conclusion -- Bibliography -- Glossary. 000319613 650_0 $$aWireless communication systems$$xSecurity measures. 000319613 650_0 $$aComputer crimes$$xInvestigation. 000319613 650_0 $$aCell phones$$xSecurity measures. 000319613 650_0 $$aPocket computers$$xSecurity measures. 000319613 85200 $$bgen$$hTK5103.2$$i.K565$$i2007 000319613 85642 $$3Publisher description$$uhttp://www.loc.gov/catdir/enhancements/fy0647/2006040493-d.html 000319613 909CO $$ooai:library.usi.edu:319613$$pGLOBAL_SET 000319613 980__ $$aBIB 000319613 980__ $$aBOOK