
Cyber Crime Investigations
Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
- 1st Edition - March 21, 2007
- Imprint: Syngress
- Authors: James Steele, Anthony Reyes, Richard Brittson, Kevin O'Shea
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 1 3 3 - 4
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 5 3 6 3 - 4
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter “What i… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteThe book begins with the chapter “What is Cyber Crime?” This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner.
This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.
- This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases
- Discusses the complex relationship between the public and private sector with regards to cyber crime
- Provides essential information for IT security professionals and first responders on maintaining chain of evidence
Instructions for online access
Lead Author and Technical Editor
Contributors
Chapter 1: The Problem at Hand
Chapter 2: “Computer Crime” Discussed
Chapter 3: Preparing for Prosecution and Testifying
Chapter 4: Cyber Investigative Roles
Chapter 5: Incident Response
Chapter 6: Legal Issues of Intercepting WiFi Transmissions
Chapter 7: Seizure of Digital Information
Chapter 8: Conducting Cyber Investigations
Chapter 9: Digital Forensics and Analyzing Data
Chapter 10: Cyber Crime Prevention
Appendix A: Legal Principles for Information Security Evaluations
Appendix B: Investigating Insider Threat Using Enterprise Security Management
Index
- Edition: 1
- Published: March 21, 2007
- No. of pages (Paperback): 432
- No. of pages (eBook): 432
- Imprint: Syngress
- Language: English
- Paperback ISBN: 9781597491334
- eBook ISBN: 9780080553634
JS
James Steele
AR
Anthony Reyes
RB
Richard Brittson
KO
Kevin O'Shea
Prior to working at the University of New Hampshire, he was a Research Associate for Project Management within the Technical Analysis Group in the Institute for Security Technology Studies at Dartmouth College. He was a member of the research team and substantive author of three critical national reports to document and present the most pressing impediments facing the law-enforcement community when investigating and responding to cyber attacks: Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment, Gap Analysis, and the Research and Development Agenda.