Book description
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
- Provides step-by-step instructions on how to investigate crimes online
- Covers how new software tools can assist in online investigations
- Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations
- Details guidelines for collecting and documenting online evidence that can be presented in court
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Foreword
- Preface
- About the Authors
- About the Technical Editor
- Acknowledgments
-
Chapter 1. Introduction to Internet Crime
- Defining Internet crime
- Internet crime’s prevalence
- CSI 2010/2011 Computer Crime and Security Survey
- Norton™ Cybercrime Report 2011
- HTCIA 2011 Report on Cybercrime Investigation
- McAfee® Threats Reports
- 2012 Data Breach Investigations Report
- Internet Crime Compliant Center
- Internet harassment
- Traditional crimes and the Internet
- Investigative responses to Internet crime
- Why investigate Internet crime?
- What is needed to respond to Internet crime?
- Continuing investigative problems
- Conclusion
- Further reading
- Chapter 2. Internet Criminals
- Chapter 3. How the Internet Works
- Chapter 4. Collecting Legally Defensible Online Evidence
-
Chapter 5. Documenting Online Evidence
- Process for documenting online ESI
- Tools/techniques for documenting Internet evidence
- Collecting entire websites
- Authenticating the collected evidence
- Validation of online evidence collection tools
- Webcase®
- Collection from Apple Macintosh
- Organizing your online ESI
- The investigative report
- Conclusion
- Further reading
- Chapter 6. Using Online Investigative Tools
- Chapter 7. Online Digital Officer Safety
- Chapter 8. Tracing IP Addresses Through the Internet
- Chapter 9. Working Unseen on the Internet
- Chapter 10. Covert Operations on the Internet
- Chapter 11. Conducting Reactive and Proactive Internet Investigations
- Chapter 12. Internet Resources for Locating Evidence
- Chapter 13. Investigating Websites and Webpages
-
Chapter 14. Investigating Social Networking Sites
- Social networking’s impact on legal systems
- Starting a social networking site investigation
- The top social networking sites
- Examining social networking sites
- Application program interface and social media content
- Online social versus professional networking
- Finding individuals on social media sites
- Social media evidence collection
- Social networking through photographs
- Social media investigations policy
- Training on investigating social networks
- Conclusion
- Further reading
- Chapter 15. Investigating Methods of Communication
- Chapter 16. Detection and Prevention of Internet Crimes
- Chapter 17. Putting It All Together
- Chapter 18. Epilogue
-
Appendices
- Appendix A: HEX to ASCII Conversion Chart
- Appendix B: Stored Communications Act Quick Reference Guide: USDOJ Search and Seizure
- Appendix C: Online Crime Victim Interview
- Appendix D: Internet Investigations Report Format
- Appendix E: Digital Officer Safety Computer
- Appendix F: Router Setup Checklist
- Appendix G: Tracing Email Worksheet
- Appendix H: Undercover Persona Worksheet
- Appendix I: Model Policy For LE Investigative
- Appendix J: Model Policy For Off-Duty LE
- Appendix K: Investigating A Person Online
- Appendix L: Investigating A Website Worksheet
- Appendix M: Chat and Text Messaging Abbr List
- Appendix N: mIRC-commands
- Index
Product information
- Title: Investigating Internet Crimes
- Author(s):
- Release date: November 2013
- Publisher(s): Syngress
- ISBN: 9780124079298
You might also like
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Practical Social Engineering
Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise …
book
How Cybersecurity Really Works
You don’t need a technical background to understand core cybersecurity concepts and their practical applications – …
book
Practical Vulnerability Management
Bugs: they’re everywhere. Software, firmware, hardware — they all have them. Bugs even live in the …