04980oam 2200505 450 991082311880332120190911100030.00-12-407929-6(OCoLC)879310969(MiFhGG)GVRL6ZOR(EXLCZ)99255000000116147820131017d2014 uy 0engurun|---uuuuatxtccrInvestigating internet crimes an introduction to solving crimes in cyberspace /Todd G. Shipley, Art Bowker ; technical editor, Nick Selby1 Edition.Waltham, MA :Syngress,2014.1 online resource (xxiii, 472 pages) illustrationsGale eBooksDescription based upon print version of record.0-12-407817-6 1-306-13321-1 Includes bibliographical references and index.Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crimeWhy investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addressesMAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidenceDigital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodologyLocation identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading6 Using Online Investigative Tools Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diComputer crimesInvestigationComputer crimesInvestigation.363.25/968Shipley Todd G1712340Bowker ArtSelby NickMiFhGGMiFhGGBOOK9910823118803321Investigating internet crimes4104393UNINA