LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
Digital investigators, law enforcement personnel, private investigators, DoD, intelligence agencies and attorneys
Dedication
Foreword
Preface
The target audience
About the Authors
About the Technical Editor
Acknowledgments
Chapter 1. Introduction to Internet Crime
Defining Internet crime
Internet crime’s prevalence
CSI 2010/2011 Computer Crime and Security Survey
Norton™ Cybercrime Report 2011
HTCIA 2011 Report on Cybercrime Investigation
McAfee® Threats Reports
2012 Data Breach Investigations Report
Internet Crime Compliant Center
Internet harassment
Traditional crimes and the Internet
Investigative responses to Internet crime
Why investigate Internet crime?
What is needed to respond to Internet crime?
Continuing investigative problems
Conclusion
Further reading
Chapter 2. Internet Criminals
Cybercrime profiling
Conclusion
Further reading
Chapter 3. How the Internet Works
A short history of the Internet
The importance of IP addresses
DNS records
Internet Protocol Version 6
The World Wide Web
Uniform resource locators
Domain name registration
Other services on the Internet
Relevant RFCs
Conclusion
Further reading
Chapter 4. Collecting Legally Defensible Online Evidence
Defining evidence
Conclusion
Appendix
Further reading
Chapter 5. Documenting Online Evidence
Process for documenting online ESI
Tools/techniques for documenting Internet evidence
Collecting entire websites
Authenticating the collected evidence
Validation of online evidence collection tools
Webcase®
Collection from Apple Macintosh
Organizing your online ESI
The investigative report
Conclusion
Further reading
Chapter 6. Using Online Investigative Tools
Investigative toolbars
The Internet Investigators Toolkit
Paid online services
Conclusion
Further reading
Chapter 7. Online Digital Officer Safety
Digital officer safety
Online investigative computer protection process
Cloning or image the investigator’s computer
Keeping your investigative computer secure
Conclusion
Further reading
Chapter 8. Tracing IP Addresses Through the Internet
Tracing IP addresses
Digging deeper into IP tracing—what the DNS tells us
Tracing emails
Faking an email and hiding its sender
Collecting email from a web-based system
Relevant RFCs related to IP tracing
Conclusions
Further reading
Chapter 9. Working Unseen on the Internet
Internet anonymity
To Tor or not to Tor
Tor’s hidden web services
Tor and tails
Tracking criminals who use anonymous methods to hide
Conclusion
Further reading
Chapter 10. Covert Operations on the Internet
Covert operations on the Internet
“On the Internet no one knows you are a dog” (Fleishman, 2000)
Conclusions
Further reading
Chapter 11. Conducting Reactive and Proactive Internet Investigations
Reactive versus proactive investigations
Managing undercover Internet investigations
Internet investigation policy
Internet crime analysis
Conclusion
References
Chapter 12. Internet Resources for Locating Evidence
Sources of online information
Finding information on a person
Finding business information
Finding telephone numbers and email addresses
Searching blogs
Professional communities
News searches
Conclusions
Further reading
Chapter 13. Investigating Websites and Webpages
Webpages and websites
How markup languages work
Website reconnaissance
Webpage examination
Documenting a website’s multimedia and images
The legal process of identifying a website
Monitoring websites over time
Conclusion
Further reading
Chapter 14. Investigating Social Networking Sites
Social networking’s impact on legal systems
Starting a social networking site investigation
The top social networking sites
Examining social networking sites
Application program interface and social media content
Online social versus professional networking
Finding individuals on social media sites
Social media evidence collection
Social networking through photographs
Social media investigations policy
Training on investigating social networks
Conclusion
Further reading
Chapter 15. Investigating Methods of Communication
Communicating on the Internet
Client server: protocols and tools
Conclusion
Further reading
Chapter 16. Detection and Prevention of Internet Crimes
Perception of law enforcement on the Internet
Contributing factors to the problem
Law enforcement’s response to internet crime
Methods of prevention
Investigator cybercrime education
What can you do to detect and prevent online crime?
Conclusions
Further reading
Chapter 17. Putting It All Together
Concepts in action
Basic Internet investigative steps
Case studies
Conclusion
Further reading
Chapter 18. Epilogue
Appendices
Appendix A: HEX to ASCII Conversion Chart
Appendix B: Stored Communications Act Quick Reference Guide: USDOJ Search and Seizure
Appendix C: Online Crime Victim Interview
Appendix D: Internet Investigations Report Format
Appendix E: Digital Officer Safety Computer
Appendix F: Router Setup Checklist
Appendix G: Tracing Email Worksheet
Appendix H: Undercover Persona Worksheet
Appendix I: Model Policy For LE Investigative
Appendix J: Model Policy For Off-Duty LE
Appendix K: Investigating A Person Online
Appendix L: Investigating A Website Worksheet
Appendix M: Chat and Text Messaging Abbr List
Appendix N: mIRC-commands
Index
TS
AB