My Account Log in

1 option

Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace.

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Shipley, Todd G.
Contributor:
Bowker, Art.
Language:
English
Subjects (All):
Computer crimes--Investigation.
Computer crimes -- Investigation.
Physical Description:
1 online resource (497 pages)
Edition:
1st ed.
Place of Publication:
San Diego : Elsevier Science & Technology Books, 2013.
Contents:
Front Cover
Investigating Internet Crimes
Copyright Page
Contents
Foreword
Preface
About the Authors
About the Technical Editor
Acknowledgments
1 Introduction to Internet Crime
Defining Internet crime
Internet crime's prevalence
CSI 2010/2011 Computer Crime and Security Survey
Norton™ Cybercrime Report 2011
HTCIA 2011 Report on Cybercrime Investigation
McAfee® Threats Reports
2012 Data Breach Investigations Report
Internet Crime Compliant Center
Internet harassment
Traditional crimes and the Internet
Investigative responses to Internet crime
Why investigate Internet crime?
What is needed to respond to Internet crime?
Continuing investigative problems
Conclusion
Further reading
2 Internet Criminals
Cybercrime profiling
Inductive profiles
Cybercriminal profiles
Cybersex offenders
Cyberterrorism and cyberwarfare
New York Police cyberstalking study
Sex offenders online activities
Capability
Deductive profiling
3 How the Internet Works
A short history of the Internet
The importance of IP addresses
DHCP and assigning addresses
MAC address
Domain Name System
DNS records
Internet Protocol Version 6
Defining IPv6
Translating IPv6
Ipv4-Mapped IPv6 addresses
IPv6 DUID
The World Wide Web
Uniform resource locators
Domain name registration
Internationalized domain names
Autonomous system number
Other services on the Internet
File transfer protocol
Email or the SMTP
Post Office Protocol
Internet Message Access Protocol
News groups, Usenet, or the Network News Transfer Protocol
Chatting with IRC
Relevant RFCs
4 Collecting Legally Defensible Online Evidence.
Defining evidence
Digital versus online evidence
Building a foundation
Investigative planning
Investigative components
Authentication
Privacy
Electronic Communications Privacy Act
Wiretap Act (18 U.S.C. 2510-22)
Stored Communications Act (18 U.S.C. 2701-12)
The Pen/Trap Statute (18 U.S.C. 3127-27)
EU Privacy Directive
Fair Credit Reporting Act (15 U.S.C. 1681 et seq.)
Mutual legal assistance
General guidance
5 Documenting Online Evidence
Process for documenting online ESI
Collection
Identification
Protocol/application determination
Collection methodology
Location identification
Preservation
Presentation
Tools/techniques for documenting Internet evidence
Save As
Pictures and video
Hashing evidence
Collecting entire websites
Authenticating the collected evidence
Validation of online evidence collection tools
Webcase®
Field collection of online ESI
Making an online evidence field collection USB device
Why use FTK imager?
Field process for using the investigative USB device
Collection from Apple Macintosh
Apples in the field
Apple office collection
Organizing your online ESI
The investigative report
6 Using Online Investigative Tools
Investigative toolbars
Vere Software Investigative Toolbar
IP Trace
Web Find
Website Info
Internet service provider
Secure
Additional toolbar functions
The Internet Investigators Toolkit
Whois
MX function
Netstat
Ping
Resolve
Traceroute
TCP/IP function
Stats function
Other buttons
Paid online services
Lexis-Nexis®
TLO®
7 Online Digital Officer Safety
Digital officer safety
Online investigative computer protection process.
Basic investigative computer protection
Firewall installation
Hardware firewalls
Software firewalls
Malware protection
Spyware protection
Installing and updating browsers
Useful browser-investigative extensions
Blocking cookies
Windows operating systems and application changes
Disable file sharing
Windows updates
Cloning or image the investigator's computer
Keeping your investigative computer secure
Encryption
Keeping your system clean
Testing your security
8 Tracing IP Addresses Through the Internet
Tracing IP addresses
Online tools for tracing an IP address
IANA and RIR
Internet commercial and freeware tools
Geolocation of an IP address
Digging deeper into IP tracing-what the DNS tells us
Tracing emails
Where is the evidence?
Viewing email headers
Time differences
Header information translation
Another email header
A Microsoft Outlook header translation through an exchange server
Multipurpose Internet Mail Extensions
Looking at little X
Faking an email and hiding its sender
Collecting email from a web-based system
Mail protocols
Investigator's email collection options
Zimbra Desktop email collections
Using Outlook for email collections
Relevant RFCs related to IP tracing
Conclusions
9 Working Unseen on the Internet
Internet anonymity
Responsible use
Common methods to gain web anonymity
What your computer can reveal about you
What your browser reveals (http requests)
Anonymizing your surfing
Using proxy servers with your own network
Free online proxy servers
To Tor or not to Tor
Tor's hidden web services
Tor and tails
Tracking criminals who use anonymous methods to hide
Tools for catching the hiding Internet target.
More proactive methods
10 Covert Operations on the Internet
Covert operations on the Internet
"On the Internet no one knows you are a dog" (Fleishman, 2000)
Internet operations and policy considerations
Ethics during undercover operations
Basic undercover procedures
Developing your undercover persona
The undercover role
Online undercover accounts
Finishing touches to your persona
Countermeasures
Undercover cell phones and credit cards
Social networking site undercover challenges
Computer equipment for undercover operations
11 Conducting Reactive and Proactive Internet Investigations
Reactive versus proactive investigations
Reactive investigations
Proactive investigations
Community policing in cyberspace
Social media policy considerations
Social media monitoring
Policy considerations for undercover operations
Managing undercover Internet investigations
Internet investigation policy
Operational planning
Internet crime analysis
References
12 Internet Resources for Locating Evidence
Sources of online information
Search services
Searching with Google
Google Basics
Google's Advanced Operators
TouchGraph
Searching with Bing
Finding information on a person
Finding business information
US government sources
Non-US government sources
Non-government sources
Other business search sites
Charity/nonprofit resource sites
Finding telephone numbers and email addresses
Searching blogs
Professional communities
News searches
Video news
13 Investigating Websites and Webpages
Webpages and websites
How webpages work
Website structure
How markup languages work
Website reconnaissance
URL traits.
Domain registration
Website ranking and search engine optimization (SEO) sites
Website history research
Checking for malicious code on a site
Webpage examination
Foreign language websites
Reviewing source code
Webpage tracking bugs
Documenting a website's multimedia and images
Capturing website videos
Two video metadata types
File formats and what they contain
Gspot
Mediainfo
Video inspector
The legal process of identifying a website
Monitoring websites over time
14 Investigating Social Networking Sites
Social networking's impact on legal systems
Law enforcement, social media, and the news
Social media in small town USA
Social media around the world
Social media evidence in the courts
Starting a social networking site investigation
Planning
Social networking sites commonalities
The top social networking sites
Examining social networking sites
Facebook
Examining Facebook
Internet tools for understanding a Facebook target
Network overview, discovery and exploration in excel
Using NodeXL
Google+
Investigating user data
Twitter
Finding tweets
Application program interface and social media content
Other social networking sites of interest
Online social versus professional networking
Common business social networking sites
Finding individuals on social media sites
Social media evidence collection
Social networking through photographs
Flickr
Photobucket
Social media investigations policy
Training on investigating social networks
15 Investigating Methods of Communication
Communicating on the Internet
Client server: protocols and tools
Instant Messaging
Instant Messaging configuration
Web-based chat
Internet Relay Chat.
Connecting to an IRC.
Notes:
Description based on publisher supplied metadata and other sources.
Other Format:
Print version: Shipley, Todd G. Investigating Internet Crimes
ISBN:
9780124079298
OCLC:
863821517

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account