Investigating Internet Crimes
An Introduction to Solving Crimes in Cyberspace
- Todd Shipley, Todd G. Shipley, retired Detective Sergeant with over 30 years of law enforcement and civilian experience performing and teaching Internet and digital forensic investigations.
- Art Bowker, Art Bowker, an award winning author, has over 27 years experience in law enforcement/corrections and is recognized as an expert in managing cyber-risk in offender populations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
AudienceDigital investigators, law enforcement personnel, private investigators, DoD, intelligence agencies and attorneys
- Published: November 2013
- Imprint: SYNGRESS
- ISBN: 978-0-12-407817-8
"Both authors and technical editor Nick Selby have decades of law enforcement and real-world experience, so the book is authoritative and practical. For those needing a guide to get them up to speed on the topic, Investigating Internet Crimes is a great place to start."--Security Management,
Table of Contents
Chapter 1 Introduction to Internet Crime
Chapter 2 Internet Criminals
Chapter 3 How the Internet Works
Chapter 4 Collecting Legally Defensible Online Evidence
Chapter 5 Documenting Online Evidence
Chapter 6 Using Online Investigative Tools
Chapter 7 Online Digital Officer Safety
Chapter 8 Tracing IP Addresses Through the Internet
Chapter 9 Working Unseen on the Internet
Chapter 10 Covert Operations on the Internet
Chapter 11 Conducting Reactive and Proactive Internet Investigations
Chapter 12 Internet Resources for Locating Evidence
Chapter 13 Investigating Websites and Webpages
Chapter 14 Investigating Social Networking Sites
Chapter 15 Investigating Methods of Communication
Chapter 16 Detection and Prevention of Internet Crimes
Chapter 17 Putting it all together
Chapter 18 Conclusion
Appendices and Resources