Chapter 13. Cyber Detective

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

• Find contact information on the Web

• Locate court records on the Web

• Locate criminal records on the Web

• Use Usenet newsgroups to gather information

Introduction

In the preceding chapters we have examined many facets of computer security. Three of those issues lead us to the content of this chapter. The first is identity theft, the second is hacking, and the third is investigating potential employees for sensitive positions.

In order for a criminal to perpetrate identity theft they have to take a small amount of information they find on their target and use that to garner even more information. Perhaps ...

Get Computer Security Fundamentals, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.