Artigo Revisado por pares

Presenting the Evidence Report

2003; Elsevier BV; Volume: 22; Issue: 6 Linguagem: Inglês

10.1016/s0167-4048(03)00604-7

ISSN

1872-6208

Tópico(s)

Digital and Cyber Forensics

Resumo

In our last column we took a look at encountering encrypted evidence. There is some additional information that has come to light since the last column. Hard wired keystroke loggers are available that can be installed within the target’s own keyboard. These take about fifteen minutes to install but cannot be detected easily by the person under surveillance. They typically have a capacity to store, using 128 bit encryption, up to two megabytes of keystrokes. This is about 300,000 words or a year’s worth of typing. Viewing the log is, after opening a word processor or WordPad, as simple as typing on the modified keyboard a password that you control. This will execute a menu program stored on the device and keystrokes can then be downloaded for analysis. There are other menu options that allow you to manage the storage associated with the surveillance device as well as changing its controlling password.

Referência(s)
Altmetric
PlumX