Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace.

By: Shipley, Todd GContributor(s): Bowker, ArtPublisher: Rockland, MA : Elsevier Science & Technology Books, 2013Copyright date: ©2014Description: 1 online resource (497 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780124079298Subject(s): Computer crimes -- InvestigationGenre/Form: Electronic books. Additional physical formats: Print version:: Investigating Internet Crimes : An Introduction to Solving Crimes in CyberspaceDDC classification: 363.25968 LOC classification: HV8079.C65.S55 2014Online resources: Click to View
Contents:
Front Cover -- Investigating Internet Crimes -- Copyright Page -- Contents -- Foreword -- Preface -- About the Authors -- About the Technical Editor -- Acknowledgments -- 1 Introduction to Internet Crime -- Defining Internet crime -- Internet crime's prevalence -- CSI 2010/2011 Computer Crime and Security Survey -- Norton™ Cybercrime Report 2011 -- HTCIA 2011 Report on Cybercrime Investigation -- McAfee® Threats Reports -- 2012 Data Breach Investigations Report -- Internet Crime Compliant Center -- Internet harassment -- Traditional crimes and the Internet -- Investigative responses to Internet crime -- Why investigate Internet crime? -- What is needed to respond to Internet crime? -- Continuing investigative problems -- Conclusion -- Further reading -- 2 Internet Criminals -- Cybercrime profiling -- Inductive profiles -- Cybercriminal profiles -- Cybersex offenders -- Internet harassment -- Cyberterrorism and cyberwarfare -- Internet Crime Compliant Center -- New York Police cyberstalking study -- Sex offenders online activities -- Capability -- Deductive profiling -- Conclusion -- Further reading -- 3 How the Internet Works -- A short history of the Internet -- The importance of IP addresses -- DHCP and assigning addresses -- MAC address -- Domain Name System -- DNS records -- Internet Protocol Version 6 -- Defining IPv6 -- Translating IPv6 -- Ipv4-Mapped IPv6 addresses -- IPv6 DUID -- The World Wide Web -- Uniform resource locators -- Domain name registration -- Internationalized domain names -- Autonomous system number -- Other services on the Internet -- File transfer protocol -- Email or the SMTP -- Post Office Protocol -- Internet Message Access Protocol -- News groups, Usenet, or the Network News Transfer Protocol -- Chatting with IRC -- Relevant RFCs -- Conclusion -- Further reading -- 4 Collecting Legally Defensible Online Evidence.
Defining evidence -- Digital versus online evidence -- Building a foundation -- Investigative planning -- Investigative components -- Authentication -- Privacy -- Electronic Communications Privacy Act -- Wiretap Act (18 U.S.C. 2510-22) -- Stored Communications Act (18 U.S.C. 2701-12) -- The Pen/Trap Statute (18 U.S.C. 3127-27) -- EU Privacy Directive -- Fair Credit Reporting Act (15 U.S.C. 1681 et seq.) -- Mutual legal assistance -- General guidance -- Conclusion -- Further reading -- 5 Documenting Online Evidence -- Process for documenting online ESI -- Collection -- Identification -- Protocol/application determination -- Collection methodology -- Location identification -- Preservation -- Presentation -- Tools/techniques for documenting Internet evidence -- Save As -- Pictures and video -- Hashing evidence -- Collecting entire websites -- Authenticating the collected evidence -- Validation of online evidence collection tools -- Webcase® -- Field collection of online ESI -- Making an online evidence field collection USB device -- Why use FTK imager? -- Field process for using the investigative USB device -- Collection from Apple Macintosh -- Apples in the field -- Apple office collection -- Organizing your online ESI -- The investigative report -- Conclusion -- Further reading -- 6 Using Online Investigative Tools -- Investigative toolbars -- Vere Software Investigative Toolbar -- IP Trace -- Web Find -- Website Info -- Internet service provider -- Secure -- Additional toolbar functions -- The Internet Investigators Toolkit -- Whois -- MX function -- Netstat -- Ping -- Resolve -- Traceroute -- TCP/IP function -- Stats function -- Other buttons -- Paid online services -- Lexis-Nexis® -- TLO® -- Conclusion -- Further reading -- 7 Online Digital Officer Safety -- Digital officer safety -- Online investigative computer protection process.
Basic investigative computer protection -- Firewall installation -- Hardware firewalls -- Software firewalls -- Malware protection -- Spyware protection -- Installing and updating browsers -- Useful browser-investigative extensions -- Blocking cookies -- Windows operating systems and application changes -- Disable file sharing -- Windows updates -- Cloning or image the investigator's computer -- Keeping your investigative computer secure -- Encryption -- Keeping your system clean -- Testing your security -- Conclusion -- Further reading -- 8 Tracing IP Addresses Through the Internet -- Tracing IP addresses -- Online tools for tracing an IP address -- IANA and RIR -- Internet commercial and freeware tools -- Geolocation of an IP address -- Digging deeper into IP tracing-what the DNS tells us -- DNS records -- Tracing emails -- Where is the evidence? -- Viewing email headers -- Time differences -- Header information translation -- Another email header -- A Microsoft Outlook header translation through an exchange server -- Multipurpose Internet Mail Extensions -- Looking at little X -- Faking an email and hiding its sender -- Collecting email from a web-based system -- Mail protocols -- Investigator's email collection options -- Zimbra Desktop email collections -- Using Outlook for email collections -- Relevant RFCs related to IP tracing -- Conclusions -- Further reading -- 9 Working Unseen on the Internet -- Internet anonymity -- Responsible use -- Common methods to gain web anonymity -- What your computer can reveal about you -- What your browser reveals (http requests) -- Anonymizing your surfing -- Using proxy servers with your own network -- Free online proxy servers -- To Tor or not to Tor -- Tor's hidden web services -- Tor and tails -- Tracking criminals who use anonymous methods to hide -- Tools for catching the hiding Internet target.
More proactive methods -- Conclusion -- Further reading -- 10 Covert Operations on the Internet -- Covert operations on the Internet -- "On the Internet no one knows you are a dog" (Fleishman, 2000) -- Internet operations and policy considerations -- Ethics during undercover operations -- Basic undercover procedures -- Developing your undercover persona -- The undercover role -- Online undercover accounts -- Finishing touches to your persona -- Countermeasures -- Undercover cell phones and credit cards -- Social networking site undercover challenges -- Computer equipment for undercover operations -- Conclusions -- Further reading -- 11 Conducting Reactive and Proactive Internet Investigations -- Reactive versus proactive investigations -- Reactive investigations -- Proactive investigations -- Community policing in cyberspace -- Social media policy considerations -- Social media monitoring -- Policy considerations for undercover operations -- Managing undercover Internet investigations -- Internet investigation policy -- Operational planning -- Internet crime analysis -- Conclusion -- References -- 12 Internet Resources for Locating Evidence -- Sources of online information -- Search services -- Searching with Google -- Google Basics -- Google's Advanced Operators -- TouchGraph -- Searching with Bing -- Finding information on a person -- Finding business information -- US government sources -- Non-US government sources -- Non-government sources -- Other business search sites -- Charity/nonprofit resource sites -- Finding telephone numbers and email addresses -- Searching blogs -- Professional communities -- News searches -- Video news -- Conclusions -- Further reading -- 13 Investigating Websites and Webpages -- Webpages and websites -- How webpages work -- Website structure -- How markup languages work -- Website reconnaissance -- URL traits.
Domain registration -- Website ranking and search engine optimization (SEO) sites -- Website history research -- Checking for malicious code on a site -- Webpage examination -- Foreign language websites -- Reviewing source code -- Webpage tracking bugs -- Documenting a website's multimedia and images -- Capturing website videos -- Two video metadata types -- File formats and what they contain -- Gspot -- Mediainfo -- Video inspector -- The legal process of identifying a website -- Monitoring websites over time -- Conclusion -- Further reading -- 14 Investigating Social Networking Sites -- Social networking's impact on legal systems -- Law enforcement, social media, and the news -- Social media in small town USA -- Social media around the world -- Social media evidence in the courts -- Starting a social networking site investigation -- Planning -- Social networking sites commonalities -- The top social networking sites -- Examining social networking sites -- Facebook -- Examining Facebook -- Internet tools for understanding a Facebook target -- Network overview, discovery and exploration in excel -- Using NodeXL -- Google+ -- Investigating user data -- Twitter -- Finding tweets -- Application program interface and social media content -- Other social networking sites of interest -- Online social versus professional networking -- Common business social networking sites -- Finding individuals on social media sites -- Social media evidence collection -- Social networking through photographs -- Flickr -- Photobucket -- Social media investigations policy -- Training on investigating social networks -- Conclusion -- Further reading -- 15 Investigating Methods of Communication -- Communicating on the Internet -- Client server: protocols and tools -- Instant Messaging -- Instant Messaging configuration -- Web-based chat -- Internet Relay Chat.
Connecting to an IRC.
Summary: Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated 110 billion to combat cybercrime, an average of nearly 200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover. Provides step-by-step instructions on how to investigate crimes online Covers how new software tools can assist in online investigations Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations Details guidelines for collecting and documenting online evidence that can be presented in court.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF00074863
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP00074863
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Front Cover -- Investigating Internet Crimes -- Copyright Page -- Contents -- Foreword -- Preface -- About the Authors -- About the Technical Editor -- Acknowledgments -- 1 Introduction to Internet Crime -- Defining Internet crime -- Internet crime's prevalence -- CSI 2010/2011 Computer Crime and Security Survey -- Norton™ Cybercrime Report 2011 -- HTCIA 2011 Report on Cybercrime Investigation -- McAfee® Threats Reports -- 2012 Data Breach Investigations Report -- Internet Crime Compliant Center -- Internet harassment -- Traditional crimes and the Internet -- Investigative responses to Internet crime -- Why investigate Internet crime? -- What is needed to respond to Internet crime? -- Continuing investigative problems -- Conclusion -- Further reading -- 2 Internet Criminals -- Cybercrime profiling -- Inductive profiles -- Cybercriminal profiles -- Cybersex offenders -- Internet harassment -- Cyberterrorism and cyberwarfare -- Internet Crime Compliant Center -- New York Police cyberstalking study -- Sex offenders online activities -- Capability -- Deductive profiling -- Conclusion -- Further reading -- 3 How the Internet Works -- A short history of the Internet -- The importance of IP addresses -- DHCP and assigning addresses -- MAC address -- Domain Name System -- DNS records -- Internet Protocol Version 6 -- Defining IPv6 -- Translating IPv6 -- Ipv4-Mapped IPv6 addresses -- IPv6 DUID -- The World Wide Web -- Uniform resource locators -- Domain name registration -- Internationalized domain names -- Autonomous system number -- Other services on the Internet -- File transfer protocol -- Email or the SMTP -- Post Office Protocol -- Internet Message Access Protocol -- News groups, Usenet, or the Network News Transfer Protocol -- Chatting with IRC -- Relevant RFCs -- Conclusion -- Further reading -- 4 Collecting Legally Defensible Online Evidence.

Defining evidence -- Digital versus online evidence -- Building a foundation -- Investigative planning -- Investigative components -- Authentication -- Privacy -- Electronic Communications Privacy Act -- Wiretap Act (18 U.S.C. 2510-22) -- Stored Communications Act (18 U.S.C. 2701-12) -- The Pen/Trap Statute (18 U.S.C. 3127-27) -- EU Privacy Directive -- Fair Credit Reporting Act (15 U.S.C. 1681 et seq.) -- Mutual legal assistance -- General guidance -- Conclusion -- Further reading -- 5 Documenting Online Evidence -- Process for documenting online ESI -- Collection -- Identification -- Protocol/application determination -- Collection methodology -- Location identification -- Preservation -- Presentation -- Tools/techniques for documenting Internet evidence -- Save As -- Pictures and video -- Hashing evidence -- Collecting entire websites -- Authenticating the collected evidence -- Validation of online evidence collection tools -- Webcase® -- Field collection of online ESI -- Making an online evidence field collection USB device -- Why use FTK imager? -- Field process for using the investigative USB device -- Collection from Apple Macintosh -- Apples in the field -- Apple office collection -- Organizing your online ESI -- The investigative report -- Conclusion -- Further reading -- 6 Using Online Investigative Tools -- Investigative toolbars -- Vere Software Investigative Toolbar -- IP Trace -- Web Find -- Website Info -- Internet service provider -- Secure -- Additional toolbar functions -- The Internet Investigators Toolkit -- Whois -- MX function -- Netstat -- Ping -- Resolve -- Traceroute -- TCP/IP function -- Stats function -- Other buttons -- Paid online services -- Lexis-Nexis® -- TLO® -- Conclusion -- Further reading -- 7 Online Digital Officer Safety -- Digital officer safety -- Online investigative computer protection process.

Basic investigative computer protection -- Firewall installation -- Hardware firewalls -- Software firewalls -- Malware protection -- Spyware protection -- Installing and updating browsers -- Useful browser-investigative extensions -- Blocking cookies -- Windows operating systems and application changes -- Disable file sharing -- Windows updates -- Cloning or image the investigator's computer -- Keeping your investigative computer secure -- Encryption -- Keeping your system clean -- Testing your security -- Conclusion -- Further reading -- 8 Tracing IP Addresses Through the Internet -- Tracing IP addresses -- Online tools for tracing an IP address -- IANA and RIR -- Internet commercial and freeware tools -- Geolocation of an IP address -- Digging deeper into IP tracing-what the DNS tells us -- DNS records -- Tracing emails -- Where is the evidence? -- Viewing email headers -- Time differences -- Header information translation -- Another email header -- A Microsoft Outlook header translation through an exchange server -- Multipurpose Internet Mail Extensions -- Looking at little X -- Faking an email and hiding its sender -- Collecting email from a web-based system -- Mail protocols -- Investigator's email collection options -- Zimbra Desktop email collections -- Using Outlook for email collections -- Relevant RFCs related to IP tracing -- Conclusions -- Further reading -- 9 Working Unseen on the Internet -- Internet anonymity -- Responsible use -- Common methods to gain web anonymity -- What your computer can reveal about you -- What your browser reveals (http requests) -- Anonymizing your surfing -- Using proxy servers with your own network -- Free online proxy servers -- To Tor or not to Tor -- Tor's hidden web services -- Tor and tails -- Tracking criminals who use anonymous methods to hide -- Tools for catching the hiding Internet target.

More proactive methods -- Conclusion -- Further reading -- 10 Covert Operations on the Internet -- Covert operations on the Internet -- "On the Internet no one knows you are a dog" (Fleishman, 2000) -- Internet operations and policy considerations -- Ethics during undercover operations -- Basic undercover procedures -- Developing your undercover persona -- The undercover role -- Online undercover accounts -- Finishing touches to your persona -- Countermeasures -- Undercover cell phones and credit cards -- Social networking site undercover challenges -- Computer equipment for undercover operations -- Conclusions -- Further reading -- 11 Conducting Reactive and Proactive Internet Investigations -- Reactive versus proactive investigations -- Reactive investigations -- Proactive investigations -- Community policing in cyberspace -- Social media policy considerations -- Social media monitoring -- Policy considerations for undercover operations -- Managing undercover Internet investigations -- Internet investigation policy -- Operational planning -- Internet crime analysis -- Conclusion -- References -- 12 Internet Resources for Locating Evidence -- Sources of online information -- Search services -- Searching with Google -- Google Basics -- Google's Advanced Operators -- TouchGraph -- Searching with Bing -- Finding information on a person -- Finding business information -- US government sources -- Non-US government sources -- Non-government sources -- Other business search sites -- Charity/nonprofit resource sites -- Finding telephone numbers and email addresses -- Searching blogs -- Professional communities -- News searches -- Video news -- Conclusions -- Further reading -- 13 Investigating Websites and Webpages -- Webpages and websites -- How webpages work -- Website structure -- How markup languages work -- Website reconnaissance -- URL traits.

Domain registration -- Website ranking and search engine optimization (SEO) sites -- Website history research -- Checking for malicious code on a site -- Webpage examination -- Foreign language websites -- Reviewing source code -- Webpage tracking bugs -- Documenting a website's multimedia and images -- Capturing website videos -- Two video metadata types -- File formats and what they contain -- Gspot -- Mediainfo -- Video inspector -- The legal process of identifying a website -- Monitoring websites over time -- Conclusion -- Further reading -- 14 Investigating Social Networking Sites -- Social networking's impact on legal systems -- Law enforcement, social media, and the news -- Social media in small town USA -- Social media around the world -- Social media evidence in the courts -- Starting a social networking site investigation -- Planning -- Social networking sites commonalities -- The top social networking sites -- Examining social networking sites -- Facebook -- Examining Facebook -- Internet tools for understanding a Facebook target -- Network overview, discovery and exploration in excel -- Using NodeXL -- Google+ -- Investigating user data -- Twitter -- Finding tweets -- Application program interface and social media content -- Other social networking sites of interest -- Online social versus professional networking -- Common business social networking sites -- Finding individuals on social media sites -- Social media evidence collection -- Social networking through photographs -- Flickr -- Photobucket -- Social media investigations policy -- Training on investigating social networks -- Conclusion -- Further reading -- 15 Investigating Methods of Communication -- Communicating on the Internet -- Client server: protocols and tools -- Instant Messaging -- Instant Messaging configuration -- Web-based chat -- Internet Relay Chat.

Connecting to an IRC.

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated 110 billion to combat cybercrime, an average of nearly 200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover. Provides step-by-step instructions on how to investigate crimes online Covers how new software tools can assist in online investigations Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations Details guidelines for collecting and documenting online evidence that can be presented in court.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.