After reading this chapter and completing the exercises, you will be able to do the following:
• Find contact information on the Web
• Locate court records on the Web
• Locate criminal records on the Web
• Use Usenet newsgroups to gather information
In the preceding chapters we have examined many facets of computer security. Three of those issues lead us to the content of this chapter. The first is identity theft, the second is hacking, and the third is investigating potential employees for sensitive positions.
In order for a criminal to perpetrate identity theft they have to take a small amount of information they find on their target and use that to garner even more information. Perhaps ...