Table of Contents

Cover image

Title page

Copyright

Dedication

Foreword

Preface

The target audience

About the Authors

About the Technical Editor

Acknowledgments

Chapter 1. Introduction to Internet Crime

Defining Internet crime

Internet crime’s prevalence

CSI 2010/2011 Computer Crime and Security Survey

Norton™ Cybercrime Report 2011

HTCIA 2011 Report on Cybercrime Investigation

McAfee® Threats Reports

2012 Data Breach Investigations Report

Internet Crime Compliant Center

Internet harassment

Traditional crimes and the Internet

Investigative responses to Internet crime

Why investigate Internet crime?

What is needed to respond to Internet crime?

Continuing investigative problems

Conclusion

Further reading

Chapter 2. Internet Criminals

Cybercrime profiling

Conclusion

Further reading

Chapter 3. How the Internet Works

A short history of the Internet

The importance of IP addresses

DNS records

Internet Protocol Version 6

The World Wide Web

Uniform resource locators

Domain name registration

Other services on the Internet

Relevant RFCs

Conclusion

Further reading

Chapter 4. Collecting Legally Defensible Online Evidence

Defining evidence

Conclusion

Appendix

Further reading

Chapter 5. Documenting Online Evidence

Process for documenting online ESI

Tools/techniques for documenting Internet evidence

Collecting entire websites

Authenticating the collected evidence

Validation of online evidence collection tools

Webcase®

Collection from Apple Macintosh

Organizing your online ESI

The investigative report

Conclusion

Further reading

Chapter 6. Using Online Investigative Tools

Investigative toolbars

The Internet Investigators Toolkit

Paid online services

Conclusion

Further reading

Chapter 7. Online Digital Officer Safety

Digital officer safety

Online investigative computer protection process

Cloning or image the investigator’s computer

Keeping your investigative computer secure

Conclusion

Further reading

Chapter 8. Tracing IP Addresses Through the Internet

Tracing IP addresses

Digging deeper into IP tracing—what the DNS tells us

Tracing emails

Faking an email and hiding its sender

Collecting email from a web-based system

Relevant RFCs related to IP tracing

Conclusions

Further reading

Chapter 9. Working Unseen on the Internet

Internet anonymity

To Tor or not to Tor

Tor’s hidden web services

Tor and tails

Tracking criminals who use anonymous methods to hide

Conclusion

Further reading

Chapter 10. Covert Operations on the Internet

Covert operations on the Internet

“On the Internet no one knows you are a dog” (Fleishman, 2000)

Conclusions

Further reading

Chapter 11. Conducting Reactive and Proactive Internet Investigations

Reactive versus proactive investigations

Managing undercover Internet investigations

Internet investigation policy

Internet crime analysis

Conclusion

References

Chapter 12. Internet Resources for Locating Evidence

Sources of online information

Finding information on a person

Finding business information

Finding telephone numbers and email addresses

Searching blogs

Professional communities

News searches

Conclusions

Further reading

Chapter 13. Investigating Websites and Webpages

Webpages and websites

How markup languages work

Website reconnaissance

Webpage examination

Documenting a website’s multimedia and images

The legal process of identifying a website

Monitoring websites over time

Conclusion

Further reading

Chapter 14. Investigating Social Networking Sites

Social networking’s impact on legal systems

Starting a social networking site investigation

The top social networking sites

Examining social networking sites

Application program interface and social media content

Online social versus professional networking

Finding individuals on social media sites

Social media evidence collection

Social networking through photographs

Social media investigations policy

Training on investigating social networks

Conclusion

Further reading

Chapter 15. Investigating Methods of Communication

Communicating on the Internet

Client server: protocols and tools

Conclusion

Further reading

Chapter 16. Detection and Prevention of Internet Crimes

Perception of law enforcement on the Internet

Contributing factors to the problem

Law enforcement’s response to internet crime

Methods of prevention

Investigator cybercrime education

What can you do to detect and prevent online crime?

Conclusions

Further reading

Chapter 17. Putting It All Together

Concepts in action

Basic Internet investigative steps

Case studies

Conclusion

Further reading

Chapter 18. Epilogue

Appendices

Appendix A: HEX to ASCII Conversion Chart

Appendix B: Stored Communications Act Quick Reference Guide: USDOJ Search and Seizure

Appendix C: Online Crime Victim Interview

Appendix D: Internet Investigations Report Format

Appendix E: Digital Officer Safety Computer

Appendix F: Router Setup Checklist

Appendix G: Tracing Email Worksheet

Appendix H: Undercover Persona Worksheet

Appendix I: Model Policy For LE Investigative

Appendix J: Model Policy For Off-Duty LE

Appendix K: Investigating A Person Online

Appendix L: Investigating A Website Worksheet

Appendix M: Chat and Text Messaging Abbr List

Appendix N: mIRC-commands

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.26.138