Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

1st Edition - March 15, 2005

Write a review

  • Authors: Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
  • eBook ISBN: 9780080488653

Purchase options

Purchase options
DRM-free (EPub, PDF, Mobi)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order


Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Key Features

  • Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services
  • Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level
  • Targets a wide audience: personal computer users, specifically those interested in the online activities of their families


Everyday Computer Users

Table of Contents

  • Acknowledgments


    Technical Editor


    Chapter 1: Why Spy?

    Introduction to Spying

    Pray for Peace, Prepare for War

    Ethics of Spying

    Spying on Spouses

    Spying on Your Children

    When You Should Not Spy

    Real-World Case Study


    Chapter 2: Spying Basics


    Goals of Spying

    Psychology of Spying

    Spying Methodology

    Using Overt Monitoring as a Deterrent

    Using Covert Spying to Observe Behavior


    Case Study: Dangers of Misinterpretation and Distrust


    Chapter 3: Technology Overview: Computer Basics





    Chapter 4: Network Basics


    Network Basics

    IP Address

    Network Traffic


    Chapter 5: Taking Control


    Cover Your Tracks

    Basic Skills

    Software You Will Use

    Mastering Your Domain


    Chapter 6: Spying on the PC


    Mission 1: Collect the Basics

    Mission 2: Examining the Past

    Mission 3: Live for the Present

    Mission 4: Prepare for the Future

    Mission 5: Look for Hidden Information

    Case Study: Expand Your Investigation Beyond the Local Computer


    Chapter 7: Spying on Web Browsing


    What Is Web Browsing?

    What Can You Get from Web Browsing?

    Typical Web Browsers

    Basic Skills

    Collecting Information from Your Target’s Computer

    Collecting Information about Your Target from the Network


    Chapter 8: Spying on E-mail


    Overview of E-mail

    Popular E-mail Clients

    Web Mail

    Collecting E-mail

    Case Study: Return to Sender


    Chapter 9: Spying on Chat and Instant Messages


    What Is Instant Messaging?

    Types of Chat and Instant Messaging

    Collecting Passwords and Buddy Lists

    Collecting Chat and Instant Messages



    Chapter 10: Advanced Techniques


    Improving Your Skills

    Expanding Your Horizons


    Chapter 11: Counterspy: Are You Being Watched?


    How to Be Sneaky

    How to Tell If You Are Being Watched

    How to React If You Are a Target

    Identifying Who is Spying on You

    A Note about Spyware

    Case Study: Guilt is for Suckers, Not Spies



Product details

  • No. of pages: 400
  • Language: English
  • Copyright: © Syngress 2005
  • Published: March 15, 2005
  • Imprint: Syngress
  • eBook ISBN: 9780080488653

About the Authors

Eric Cole

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.

Affiliations and Expertise

Independant network security consultant and speaker, USA

Michael Nordfelt

Sandra Ring

Affiliations and Expertise

Deputy Directory for Research at the TSGI Advanced Technology Research Center, USA

Ted Fair

Ratings and Reviews

Write a review

There are currently no reviews for "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives"