December 2008
Intermediate to advanced
336 pages
8h 26m
English
In the course of doing research for this book, we stumbled across someone who claimed to be an expert on cyber crime. We are always willing to share information about cyber crime with other professionals, but by our nature, we’re also very cautious about sharing too much information until we are certain of that person’s credentials.
As a matter of routine, we used public tools and websites to learn more about this person’s background. Her impetus for getting involved in cyber crime came from her claim of once having been a victim of a cyber stalker. We have worked with victims of both stalking and cyber stalking. People who have been through the horrors ...