LEADER 04980oam 2200505 450 001 9910790766203321 005 20190911100030.0 010 $a0-12-407929-6 035 $a(OCoLC)879310969 035 $a(MiFhGG)GVRL6ZOR 035 $a(EXLCZ)992550000001161478 100 $a20131017d2014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aInvestigating internet crimes $ean introduction to solving crimes in cyberspace /$fTodd G. Shipley, Art Bowker ; technical editor, Nick Selby 205 $a1 Edition. 210 1$aWaltham, MA :$cSyngress,$d2014. 215 $a1 online resource (xxiii, 472 pages) $cillustrations 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a0-12-407817-6 311 $a1-306-13321-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfeeŽ Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime 327 $aWhy investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses 327 $aMAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence 327 $aDigital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology 327 $aLocation identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; WebcaseŽ; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading 327 $a6 Using Online Investigative Tools 330 $a Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a di 606 $aComputer crimes$xInvestigation 615 0$aComputer crimes$xInvestigation. 676 $a363.25/968 700 $aShipley$b Todd G$01580742 702 $aBowker$b Art 702 $aSelby$b Nick 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910790766203321 996 $aInvestigating internet crimes$93872101 997 $aUNINA