LEADER 05430nam 2200661 450 001 9910453711403321 005 20200520144314.0 010 $a0-12-407929-6 035 $a(CKB)2550000001161478 035 $a(EBL)1115158 035 $a(OCoLC)863821517 035 $a(SSID)ssj0001047147 035 $a(PQKBManifestationID)11992765 035 $a(PQKBTitleCode)TC0001047147 035 $a(PQKBWorkID)11137997 035 $a(PQKB)11696501 035 $a(MiAaPQ)EBC1115158 035 $a(CaSebORM)9780124078178 035 $a(Au-PeEL)EBL1115158 035 $a(CaPaEBR)ebr10808514 035 $a(CaONFJC)MIL544572 035 $a(EXLCZ)992550000001161478 100 $a20131017h20142014 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInvestigating internet crimes $ean introduction to solving crimes in cyberspace /$fTodd Shipley, Art Bowker ; technical editor, Nick Selby 205 $a1 Edition. 210 1$aWaltham, MA :$cSyngress,$d[2014] 210 4$d©2014 215 $a1 online resource (497 p.) 300 $aDescription based upon print version of record. 311 $a0-12-407817-6 311 $a1-306-13321-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime 327 $aWhy investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses 327 $aMAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence 327 $aDigital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology 327 $aLocation identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading 327 $a6 Using Online Investigative Tools 330 $a Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a di 606 $aComputer crimes$xInvestigation 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 676 $a363.25/968 700 $aShipley$b Todd G$0991875 701 $aBowker$b Art$0991876 701 $aSelby$b Nick$0991877 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453711403321 996 $aInvestigating internet crimes$92269978 997 $aUNINA