In this part ...
You forensically find the tracks that even the most digitally devious desperadoes leave behind that connect them to the case or crime. Whether it's e-mail messages exposing illegal or illicit behavior, chat conversations meant to be forever confidential, data hidden in the caverns of unallocated space, documents and drafts in electronic landfills, or e-evidence on the run, you find and use these bytes as clues to figure out what happened, whodunit, and how, where, when, and maybe even why.
The six chapters in this part explain computer forensic investigations and subspecialties. You find out how to investigate the most incriminating of all evidence — e-mail and instant messages (see Chapter 9). The urge to e-mail is an investigator's best friend. Chapter 10 describes how to use data forensics to find hidden evidence. Chapter 11 covers document forensics, which team with e-mail forensics to keep litigators in high demand. The fastest-growing branch of forensics mirrors the indispensable, got-to-have-one-of-those personal devices. Power users of these devices surrendered their privacy when they plugged in (see Chapter 12). Network and exotic forensics expose evidence hoarded by devices we don't give thought to (see Chapter 13), but printers, SUVs, and home entertainment centers all have digital memories. Read on.
There is no branch of detective science which is so important and so much neglected as the art of tracing footsteps.