Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication Foreword Preface
The target audience
About the Authors About the Technical Editor Acknowledgments Chapter 1. Introduction to Internet Crime
Defining Internet crime Internet crime’s prevalence CSI 2010/2011 Computer Crime and Security Survey Norton™ Cybercrime Report 2011 HTCIA 2011 Report on Cybercrime Investigation McAfee® Threats Reports 2012 Data Breach Investigations Report Internet Crime Compliant Center Internet harassment Traditional crimes and the Internet Investigative responses to Internet crime Why investigate Internet crime? What is needed to respond to Internet crime? Continuing investigative problems Conclusion Further reading
Chapter 2. Internet Criminals
Cybercrime profiling Conclusion Further reading
Chapter 3. How the Internet Works
A short history of the Internet The importance of IP addresses DNS records Internet Protocol Version 6 The World Wide Web Uniform resource locators Domain name registration Other services on the Internet Relevant RFCs Conclusion Further reading
Chapter 4. Collecting Legally Defensible Online Evidence
Defining evidence Conclusion Appendix Further reading
Chapter 5. Documenting Online Evidence
Process for documenting online ESI Tools/techniques for documenting Internet evidence Collecting entire websites Authenticating the collected evidence Validation of online evidence collection tools Webcase® Collection from Apple Macintosh Organizing your online ESI The investigative report Conclusion Further reading
Chapter 6. Using Online Investigative Tools
Investigative toolbars The Internet Investigators Toolkit Paid online services Conclusion Further reading
Chapter 7. Online Digital Officer Safety
Digital officer safety Online investigative computer protection process Cloning or image the investigator’s computer Keeping your investigative computer secure Conclusion Further reading
Chapter 8. Tracing IP Addresses Through the Internet
Tracing IP addresses Digging deeper into IP tracing—what the DNS tells us Tracing emails Faking an email and hiding its sender Collecting email from a web-based system Relevant RFCs related to IP tracing Conclusions Further reading
Chapter 9. Working Unseen on the Internet
Internet anonymity To Tor or not to Tor Tor’s hidden web services Tor and tails Tracking criminals who use anonymous methods to hide Conclusion Further reading
Chapter 10. Covert Operations on the Internet
Covert operations on the Internet “On the Internet no one knows you are a dog” (Fleishman, 2000) Conclusions Further reading
Chapter 11. Conducting Reactive and Proactive Internet Investigations
Reactive versus proactive investigations Managing undercover Internet investigations Internet investigation policy Internet crime analysis Conclusion References
Chapter 12. Internet Resources for Locating Evidence
Sources of online information Finding information on a person Finding business information Finding telephone numbers and email addresses Searching blogs Professional communities News searches Conclusions Further reading
Chapter 13. Investigating Websites and Webpages
Webpages and websites How markup languages work Website reconnaissance Webpage examination Documenting a website’s multimedia and images The legal process of identifying a website Monitoring websites over time Conclusion Further reading
Chapter 14. Investigating Social Networking Sites
Social networking’s impact on legal systems Starting a social networking site investigation The top social networking sites Examining social networking sites Application program interface and social media content Online social versus professional networking Finding individuals on social media sites Social media evidence collection Social networking through photographs Social media investigations policy Training on investigating social networks Conclusion Further reading
Chapter 15. Investigating Methods of Communication
Communicating on the Internet Client server: protocols and tools Conclusion Further reading
Chapter 16. Detection and Prevention of Internet Crimes
Perception of law enforcement on the Internet Contributing factors to the problem Law enforcement’s response to internet crime Methods of prevention Investigator cybercrime education What can you do to detect and prevent online crime? Conclusions Further reading
Chapter 17. Putting It All Together
Concepts in action Basic Internet investigative steps Case studies Conclusion Further reading
Chapter 18. Epilogue Appendices
Appendix A: HEX to ASCII Conversion Chart Appendix B: Stored Communications Act Quick Reference Guide: USDOJ Search and Seizure Appendix C: Online Crime Victim Interview Appendix D: Internet Investigations Report Format Appendix E: Digital Officer Safety Computer Appendix F: Router Setup Checklist Appendix G: Tracing Email Worksheet Appendix H: Undercover Persona Worksheet Appendix I: Model Policy For LE Investigative Appendix J: Model Policy For Off-Duty LE Appendix K: Investigating A Person Online Appendix L: Investigating A Website Worksheet Appendix M: Chat and Text Messaging Abbr List Appendix N: mIRC-commands
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion