Start reading Placing the Suspect Behind the Keyboard on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device


Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects [Kindle Edition]

Brett Shavers

Print List Price: £36.99
Kindle Price: £22.86 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £14.13 (38%)
* Unlike print books, digital books are subject to VAT.


Amazon Price New from Used from
Kindle Edition £22.86  
Paperback £34.89  
Kindle Summer Sale: Over 500 Books from £0.99
Have you seen the Kindle Summer Sale yet? Browse selected books from popular authors and debut novelists, including new releases and bestsellers. Learn more

Special Offers and Product Promotions

  • Purchase any Kindle Book sold by and receive £1 credit to try out our Digital Music Store. Here's how (terms and conditions apply)

Product Description


"Shavers, with a background in the military and law enforcement, offers a comprehensive look at the unique complexities that can be involved in civil and criminal investigation where digital technologies play a significant and often deciding role. The book delves into the many aspects of digital investigations. Techniques of analysis for both 'live' (powered on) and 'dead' (powered off) computers are discussed. Suspect and victim interview techniques unique to digital investigations are presented."--Reference & Research Book News, December 2013 "I would highly recommend the book to anyone in the field of digital investigation, computer forensics, or who may just have an interest in the fascinating world of cybercrime investigation. This is a must read for any aspiring novice cybercrime investigator and the seasoned professional computer guru as well as a needed addition to any digital investigator's library."--Journal of Digital Forensics, Security and Law, Volume 8(2), 2013 "This book offers a complete picture of a cybercrime investigation, and with the author's clear and interesting writing, it manages to give aspiring digital forensic investigators a good idea of what such a job entails when working with law enforcement. It's a very easy and engaging read."--Help Net Security online, September 5, 2013

Product Description

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

• Learn the tools and investigative principles of both physical and digital cybercrime investigations—and how they fit together to build a solid and complete case.

• Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard."

• The only book to combine physical and digital investigative techniques.

Product details

  • Format: Kindle Edition
  • File Size: 4327 KB
  • Print Length: 266 pages
  • Publisher: Syngress; 1 edition (1 Feb 2013)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • Text-to-Speech: Enabled
  • X-Ray:
  • Amazon Bestsellers Rank: #437,132 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Author

Discover books, learn about writers, and more.

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on (beta) 4.3 out of 5 stars  6 reviews
5 of 6 people found the following review helpful
5.0 out of 5 stars IDENTIFYING THE CYBER CRIMINAL!! 5 May 2013
By COSMIC TRAVELER - Published on
Are you an investigator in law enforcement? If you are, then this book is for you! Author Brett Shavers, has done an outstanding job of writing a book that places the suspect behind the keyboard through a combination of digital forensics techniques and more traditional, non-technical investigative methods.

Author Shavers, begins by reminding you that depending upon the type of digital evidence, the type of investigation, and whether the suspect has been already identified, the manner of collection of the data will differ. In addition, the author discusses the questions that are needed for interrogations that are related to computer-related investigations. He then focuses on physical investigations, detailing only those points that are useful in supporting currently available electronic evidence, or finding additional sources of electronic evidence. The author then, covers the principles of extracting and interpreting digital evidence that can help place the suspect behind the keyboard. Next, he shows you how to identify the suspect; as well as, eliminating possible suspects by helping to develop your investigative mindset. In addition, the author introduces several methods, which may allow you to see inferences as you manage the information in your case. He continues by discussing methods of presenting electronic evidence for a variety of audiences. Then, the author shows you how to use reference materials as a constant reminder of staying the course in a case of placing the suspect behind the keyboard. Next, he discusses how technological changes make it easier for digital forensics and the investigator's ability to place a suspect behind a keyboard; and, how other times, these changes can make it difficult or impossible. In addition, the author shows you advanced techniques to search for information beyond simply using a search engine. Finally, he shows you a collection of briefed examples across a wide range of case studies.

Although the theme of this most excellent book primarily supports criminal investigations, many of the same methods and processes can be used in civil litigation and internal corporate matters. Perhaps more importantly, the principles presented in this great book are meant to be principles, not an absolute checklist, but a guide.
1 of 1 people found the following review helpful
5.0 out of 5 stars I got the big picture now 16 Sep 2013
By Frank Shells - Published on
The title of this book caught my eye, as did the price (it's higher than I usually spend for any book). But, because of the title, I bought it anyway hoping that it would answer the question on how to really put someone at a keyboard. The book was easy to read and thankfully, not too technical. I have a few digital forensics courses under my belt but I am far from being an expert. I also do not have police experience for investigations.

For my consulting work, I dabble a bit in forensics, but only what I am good at with the rest being subcontracted to experts (if it's Windows, I can do it, Mac, I'd rather not). There have been a few cases where I have been retained by law firms that either the defendant or plaintiff denied committing alleged acts of theft or malicious computer behavior. Almost all of these cases, the suspects have blamed others in their offices or homes or hackers. After reading this book, I finally got the big picture of how to get enough evidence, both electronic and other types of evidence, to affirmatively place the suspect at the keyboard, at the time of the incident.

I really liked the cheat sheets, the case management and presentation ideas, and the detailed actual case studies. The book took me through the entire process of case management, from start to end, with more advice and tips than I expected. When I say I finally get the big picture, I mean that in a way that I can see how police experience with investigating crimes can be a big benefit in civil litigation. I recommend this book to attorneys who deal in cyber related cases and any digital forensics examiner who could use a dozen tips about looking at the big picture and using investigative methods I would have never thought of.

Since the book is not heavy on technical descriptions, I thought I would not get as much benefit, but there were more references to describe forensics to make up for a lack in technical details. I can see why the book was written the way it was written. It really can benefit a wide audience from the examiner to the lawyer in court.

I enjoyed the book as an entertaining read that gave well needed information.
4.0 out of 5 stars Review of "Placing the Suspect Behind the Keyboard" 26 Aug 2013
By norcyn - Published on
If you are looking to learn more about the field of digital forensics, then this book offered by O'Reilly Media, will serve as an excellent guide. Written by Brett Shavers; as a former law enforcement officer he spent most of his career dedicated to digital forensics. Today, he continues to speak at conferences, blog, and work as an honorary member of the Computer Technology Investigators Network.

You have been assigned to your first digital evidence seizure mission and you arrive at the crime site, now what? You determine that the system is "live" with encryption and volatile memory is needed. Would you know what to do? Brett has developed a data acquisition decision making flow chart to assist investigators like you.

With this book you'll discover how to combine digital forensic techniques with more traditional, non-technical investigative methods. Beware that you will not read through this book in a linear fashion but rather refer to specific topics of interest as it is written with great detail. Some of the topics included are: collecting electronic data, questioning a suspect, physical and electronic surveillance, circumstantial and corroborating evidence, case presentation, and cheat sheets to stay on track.
4.0 out of 5 stars Good read for a technical book 26 Aug 2013
By NSlone - Published on
Format:Kindle Edition
I have had a hard time trying to write this review, not because of the way the book is written, but rather I had a hard time putting my thoughts in order for this project. I like the way the book is written, and had no problems reading it on my Kindle. Believe me, there are books I've had to return for a refund because of illegibility.
Placing the Suspect Behind the Keyboard is great for those who wish to learn forensic science in order to learn how to catch the subject and make sure it isn't the victim or an unsuspecting third party, such as if someone were to loan their PC to someone else.
Personally I allow no one to use my PC. That is just my preference. There are so many cybercrimes being committed in today's digital world that we should all be given an enlightening class in cybercrimes. Perhaps then we would be better prepared if someone did steal our laptops, net books, Macs, etc. It might even help in the case of identity theft.
There are many kinds of cybercrimes being committed on a daily bases, and I would rather someone read this book among others and investigate it right than to think someone else did it than to catch the real culprit.
I found the book to be informative and rather interesting, even though it is written in novelistic, technical manner.
4.0 out of 5 stars Methodical Case Preparation 12 Aug 2013
By J. W. Rine - Published on
Placing the Suspect Behind the keyboard details the investigative process of building a cyber-crime case. The book outlines methods of collecting evidence, maintaining a chain of custody, preparing a case, and presenting the facts of evidence in the case.

I liked the section of questioning a suspect. I found it to be entertaining as well as informative. The discussion of physical and electronic surveillance provided for interesting reading as well. The author was careful to point out the dangers of doing a sloppy job resulting in innocent people being wrongfully accused. The book is centered around the Windows operating system with mentions of Mac and Linux. This should not be a surprise given the number of Windows users when compared to other operating systems. The case studies also provided interesting reading.

I read this book on my Kindle Touch and the graphics were to small to be of any use. Reading a PDF version on the computer eliminates that problem. I will recommend the book with the following caveats. I feel this book will be highly useful to a very narrow audience of legal professionals involved with cyber-crime. Others may enjoy reading it from a curiosity standpoint. It does not contain hands on digital forensics information, however there are links that may prove useful in that regard.

Disclosure: I received a free ebook copy for review.
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category