1 option
Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace.
- Format:
- Book
- Author/Creator:
- Shipley, Todd G.
- Language:
- English
- Subjects (All):
- Computer crimes--Investigation.
- Computer crimes -- Investigation.
- Physical Description:
- 1 online resource (497 pages)
- Edition:
- 1st ed.
- Place of Publication:
- San Diego : Elsevier Science & Technology Books, 2013.
- Contents:
- Front Cover
- Investigating Internet Crimes
- Copyright Page
- Contents
- Foreword
- Preface
- About the Authors
- About the Technical Editor
- Acknowledgments
- 1 Introduction to Internet Crime
- Defining Internet crime
- Internet crime's prevalence
- CSI 2010/2011 Computer Crime and Security Survey
- Norton™ Cybercrime Report 2011
- HTCIA 2011 Report on Cybercrime Investigation
- McAfee® Threats Reports
- 2012 Data Breach Investigations Report
- Internet Crime Compliant Center
- Internet harassment
- Traditional crimes and the Internet
- Investigative responses to Internet crime
- Why investigate Internet crime?
- What is needed to respond to Internet crime?
- Continuing investigative problems
- Conclusion
- Further reading
- 2 Internet Criminals
- Cybercrime profiling
- Inductive profiles
- Cybercriminal profiles
- Cybersex offenders
- Cyberterrorism and cyberwarfare
- New York Police cyberstalking study
- Sex offenders online activities
- Capability
- Deductive profiling
- 3 How the Internet Works
- A short history of the Internet
- The importance of IP addresses
- DHCP and assigning addresses
- MAC address
- Domain Name System
- DNS records
- Internet Protocol Version 6
- Defining IPv6
- Translating IPv6
- Ipv4-Mapped IPv6 addresses
- IPv6 DUID
- The World Wide Web
- Uniform resource locators
- Domain name registration
- Internationalized domain names
- Autonomous system number
- Other services on the Internet
- File transfer protocol
- Email or the SMTP
- Post Office Protocol
- Internet Message Access Protocol
- News groups, Usenet, or the Network News Transfer Protocol
- Chatting with IRC
- Relevant RFCs
- 4 Collecting Legally Defensible Online Evidence.
- Defining evidence
- Digital versus online evidence
- Building a foundation
- Investigative planning
- Investigative components
- Authentication
- Privacy
- Electronic Communications Privacy Act
- Wiretap Act (18 U.S.C. 2510-22)
- Stored Communications Act (18 U.S.C. 2701-12)
- The Pen/Trap Statute (18 U.S.C. 3127-27)
- EU Privacy Directive
- Fair Credit Reporting Act (15 U.S.C. 1681 et seq.)
- Mutual legal assistance
- General guidance
- 5 Documenting Online Evidence
- Process for documenting online ESI
- Collection
- Identification
- Protocol/application determination
- Collection methodology
- Location identification
- Preservation
- Presentation
- Tools/techniques for documenting Internet evidence
- Save As
- Pictures and video
- Hashing evidence
- Collecting entire websites
- Authenticating the collected evidence
- Validation of online evidence collection tools
- Webcase®
- Field collection of online ESI
- Making an online evidence field collection USB device
- Why use FTK imager?
- Field process for using the investigative USB device
- Collection from Apple Macintosh
- Apples in the field
- Apple office collection
- Organizing your online ESI
- The investigative report
- 6 Using Online Investigative Tools
- Investigative toolbars
- Vere Software Investigative Toolbar
- IP Trace
- Web Find
- Website Info
- Internet service provider
- Secure
- Additional toolbar functions
- The Internet Investigators Toolkit
- Whois
- MX function
- Netstat
- Ping
- Resolve
- Traceroute
- TCP/IP function
- Stats function
- Other buttons
- Paid online services
- Lexis-Nexis®
- TLO®
- 7 Online Digital Officer Safety
- Digital officer safety
- Online investigative computer protection process.
- Basic investigative computer protection
- Firewall installation
- Hardware firewalls
- Software firewalls
- Malware protection
- Spyware protection
- Installing and updating browsers
- Useful browser-investigative extensions
- Blocking cookies
- Windows operating systems and application changes
- Disable file sharing
- Windows updates
- Cloning or image the investigator's computer
- Keeping your investigative computer secure
- Encryption
- Keeping your system clean
- Testing your security
- 8 Tracing IP Addresses Through the Internet
- Tracing IP addresses
- Online tools for tracing an IP address
- IANA and RIR
- Internet commercial and freeware tools
- Geolocation of an IP address
- Digging deeper into IP tracing-what the DNS tells us
- Tracing emails
- Where is the evidence?
- Viewing email headers
- Time differences
- Header information translation
- Another email header
- A Microsoft Outlook header translation through an exchange server
- Multipurpose Internet Mail Extensions
- Looking at little X
- Faking an email and hiding its sender
- Collecting email from a web-based system
- Mail protocols
- Investigator's email collection options
- Zimbra Desktop email collections
- Using Outlook for email collections
- Relevant RFCs related to IP tracing
- Conclusions
- 9 Working Unseen on the Internet
- Internet anonymity
- Responsible use
- Common methods to gain web anonymity
- What your computer can reveal about you
- What your browser reveals (http requests)
- Anonymizing your surfing
- Using proxy servers with your own network
- Free online proxy servers
- To Tor or not to Tor
- Tor's hidden web services
- Tor and tails
- Tracking criminals who use anonymous methods to hide
- Tools for catching the hiding Internet target.
- More proactive methods
- 10 Covert Operations on the Internet
- Covert operations on the Internet
- "On the Internet no one knows you are a dog" (Fleishman, 2000)
- Internet operations and policy considerations
- Ethics during undercover operations
- Basic undercover procedures
- Developing your undercover persona
- The undercover role
- Online undercover accounts
- Finishing touches to your persona
- Countermeasures
- Undercover cell phones and credit cards
- Social networking site undercover challenges
- Computer equipment for undercover operations
- 11 Conducting Reactive and Proactive Internet Investigations
- Reactive versus proactive investigations
- Reactive investigations
- Proactive investigations
- Community policing in cyberspace
- Social media policy considerations
- Social media monitoring
- Policy considerations for undercover operations
- Managing undercover Internet investigations
- Internet investigation policy
- Operational planning
- Internet crime analysis
- References
- 12 Internet Resources for Locating Evidence
- Sources of online information
- Search services
- Searching with Google
- Google Basics
- Google's Advanced Operators
- TouchGraph
- Searching with Bing
- Finding information on a person
- Finding business information
- US government sources
- Non-US government sources
- Non-government sources
- Other business search sites
- Charity/nonprofit resource sites
- Finding telephone numbers and email addresses
- Searching blogs
- Professional communities
- News searches
- Video news
- 13 Investigating Websites and Webpages
- Webpages and websites
- How webpages work
- Website structure
- How markup languages work
- Website reconnaissance
- URL traits.
- Domain registration
- Website ranking and search engine optimization (SEO) sites
- Website history research
- Checking for malicious code on a site
- Webpage examination
- Foreign language websites
- Reviewing source code
- Webpage tracking bugs
- Documenting a website's multimedia and images
- Capturing website videos
- Two video metadata types
- File formats and what they contain
- Gspot
- Mediainfo
- Video inspector
- The legal process of identifying a website
- Monitoring websites over time
- 14 Investigating Social Networking Sites
- Social networking's impact on legal systems
- Law enforcement, social media, and the news
- Social media in small town USA
- Social media around the world
- Social media evidence in the courts
- Starting a social networking site investigation
- Planning
- Social networking sites commonalities
- The top social networking sites
- Examining social networking sites
- Examining Facebook
- Internet tools for understanding a Facebook target
- Network overview, discovery and exploration in excel
- Using NodeXL
- Google+
- Investigating user data
- Finding tweets
- Application program interface and social media content
- Other social networking sites of interest
- Online social versus professional networking
- Common business social networking sites
- Finding individuals on social media sites
- Social media evidence collection
- Social networking through photographs
- Flickr
- Photobucket
- Social media investigations policy
- Training on investigating social networks
- 15 Investigating Methods of Communication
- Communicating on the Internet
- Client server: protocols and tools
- Instant Messaging
- Instant Messaging configuration
- Web-based chat
- Internet Relay Chat.
- Connecting to an IRC.
- Notes:
- Description based on publisher supplied metadata and other sources.
- Other Format:
- Print version: Shipley, Todd G. Investigating Internet Crimes
- ISBN:
- 9780124079298
- OCLC:
- 863821517
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.