Investigating Internet Crimes book cover

Investigating Internet Crimes

An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.

Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.

Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.

Audience

Digital investigators, law enforcement personnel, private investigators, DoD, intelligence agencies and attorneys

Paperback, 496 Pages

Published: November 2013

Imprint: Syngress

ISBN: 978-0-12-407817-8

Contents

  •  

    Chapter 1 Introduction to Internet Crime

    Chapter 2 Internet Criminals

    Chapter 3 How the Internet Works

    Chapter 4 Collecting Legally Defensible Online Evidence

    Chapter 5 Documenting Online Evidence

    Chapter 6 Using Online Investigative Tools

    Chapter 7 Online Digital Officer Safety

    Chapter 8 Tracing IP Addresses Through the Internet

    Chapter 9 Working Unseen on the Internet

    Chapter 10 Covert Operations on the Internet

    Chapter 11 Conducting Reactive and Proactive Internet Investigations

    Chapter 12 Internet Resources for Locating Evidence

    Chapter 13 Investigating Websites and Webpages

    Chapter 14 Investigating Social Networking Sites

    Chapter 15 Investigating Methods of Communication

    Chapter 16 Detection and Prevention of Internet Crimes

    Chapter 17 Putting it all together

    Chapter 18 Conclusion

    Appendices and Resources

Advertisement

advert image