This volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation.
Scandals such as those at OPCW and Gatwick Airport have reinforced the importance of crime science and the need to take proactive measures rather than a wait and see approach currently used by many organisations. This book proposes a new approach in dealing with cybercrime and unsociable behavior involving remote technologies using a combination of evidence-based disciplines in order to enhance cybersecurity and authorised controls. It starts by providing a rationale for combining selected disciplines to enhance cybersecurity by discussing relevant theories and highlighting the features that strengthen privacy when mixed. The essence of a holistic model is brought about by the challenge facing digital forensic professionals within environments where tested investigative practices are unable to provide satisfactory evidence and security. This book will be of interest to students, digital forensic and cyber security practitioners and policy makers. It marks a new route in the study of combined disciplines to tackle cybercrime using digital investigations and crime science.
PART 1: CRIME SCIENCE
Unraveling the Notre-Dame Cathedral Fire in Space and Time: An X-coherence Approach
Rafael Padilha, Fernanda A. Andaló, Luís A. M. Pereira, Anderson Rocha
Using Gesture Recognition to Prevent Drowning: A Crime Science Perspective
Anthony C. Ijeh
Modelling Criminal Investigation: Process, Quality and Requirements
Stig Andersen, Jens P. Fossdal, and Oslo Police District
Digital Investigation and the Trojan Défense, Revisited
Golden G. Richard III, Andrew Case, Modhuparna Manna, Elsa A. M. Hahne, Aisha Ali-Gombe
PART 2: DIGITAL FORENSICS
Law Enforcement Agencies in Europe and the use of Hacking Tools During Investigations: Some Legal Informatics, Civil Rights and Data Protection Issues.
Mobile Forensics – Tools, Techniques and Approach
Digital Forensics of Cyber Physical Systems and the Internet of Things
Sandhya Armoogum, Patricia Khonje, Xiaoming Li
Social Media Crime Investigation and Forensic Analysis
PART 3: CYBER SECURITY
Bayesian Networks and Cyber-crime Investigations
Richard E. Overill, and Kam-Pui Chow
The Future of Democracy in a Cyber-Security Framework
Marios P. Efthymiopoulos, Kleanthis Kyriakidis
Is it a Cyber Security Strategy for Social Development?
Anthony C Ijeh
NATO’s Current and Future Cyber-Defence Adaptability
Marios P. Efthymiopoulos