SlideShare a Scribd company logo
1 of 2
Download to read offline
Written by experts on the frontlines, this book provides both seasoned and new
investigators with the background and tools they need to get the job done.
KEY FEATURES
• Provides step-by-step instructions on how to investigate crimes online
• Covers how new software tools can assist in online investigations
• Discusses how to track down, interpret, and understand online electronic evidence to benefit
investigations
• Details guidelines for collecting and documenting online evidence that can be presented in
court
DESCRIPTION
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new
investigators with the background and tools they need to investigate crime occurring in the online
world. This invaluable guide provides step-by-step instructions for investigating Internet crimes,
including locating, interpreting, understanding, collecting, and documenting online electronic
evidence to benefit investigations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed,
convenience and anonymity that the Internet provides to commit a diverse range of criminal
activities. Today's online crime includes attacks against computer data and systems, identity theft,
distribution of child pornography, penetration of online financial services, using social networks to
commit crimes, and the deployment of viruses, botnets, and email scams such as phishing.
Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion
to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility
for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer
number of crimes being committed but by a lack of adequate training material. This book provides
that fundamental knowledge, including how to properly collect and document online evidence,
trace IP addresses, and work undercover.
Investigating Internet Crimes
An Introduction to Solving Crimes in Cyberspace
Todd Shipley, retired Detective Sergeant with over 30 years of law
enforcement and civilian experience performing and teaching Internet and
digital forensic investigations.
Art Bowker, has over 28 years experience in law enforcement/corrections
and is an expert in managing cyber-risk in offender populations.
ISBN: 978-0-12-407817-8
PUB DATE: November 2013
LIST PRICE: $49.95
FORMAT: Paperback
PAGES: c. 480
TRIM: 7.5w x 9.25h
AUDIENCE
Digital investigators, law
enforcement personnel, private
investigators, DoD, intelligence
agencies and attorneys
COMPUTING
Please contact your Elsevier Sales or Customer Service Representative
TABLE OF CONTENTS
Chapter 1 Introduction to Internet Crime
Chapter 2 Internet Criminals
Chapter 3 How the Internet Works
Chapter 4 Collecting Legally Defensible Online Evidence
Chapter 5 Documenting Online Evidence
Chapter 6 Using Online Investigative Tools
Chapter 7 Online Digital Officer Safety
Chapter 8 Tracing IP Addresses Through the Internet
Chapter 9 Working Unseen on the Internet
Chapter 10 Covert Operations on the Internet
Chapter 11 Conducting Reactive and Proactive Internet Investigations
Chapter 12 Internet Resources for Locating Evidence
Chapter 13 Investigating Websites and Webpages
Chapter 14 Investigating Social Networking Sites
Chapter 15 Investigating Methods of Communication
Chapter 16 Detection and Prevention of Internet Crimes
Chapter 17 Putting it all together
Chapter 18 Conclusion
Appendices and Resources
What do Other Experts Have to Say about Investigating Internet Crimes?
“This book offers the most comprehensive, and understandable account of cybercrime currently available to all
different skill levels of investigators. It is suitable for novices and instructors, across the full spectrum of digital
investigations and will appeal to both advanced and new criminal investigators. It will no doubt become a must
have text for any law enforcement or corporate investigator’s investigative library.” Larry D. Johnson, Current CEO
at Castleworth Global LLC, Former Chief Security Officer at Genworth Financial and Special Agent in Charge,
Criminal Investigative Division, USSS, Retired.
“At last….. Informed, pragmatic guidance from two highly experienced professionals who have actually spent time
on the front line, not just the classroom. This book is relevant for practitioners working in both law enforcement
and within business – every aspiring cyber investigator should have a copy.” Neal Ysart, Director First August Ltd
“Cyber-crime, internet fraud, online predators…we think they’re being addressed until we become the victims.
Today’s law enforcement is ill-prepared to address against national security, let alone against our law-abiding
citizens. Todd Shipley and Art Bowker are able to communicate what law enforcement responders need to know
before they get the call – the information in this book must become a mandatory reference for law enforcement
agencies everywhere.” Jim Deal, United States Secret Service (Ret.) and original Supervisor of the San Francisco
USSS Electronic Crimes Task Force

More Related Content

What's hot

Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 
Dan Larkin - Biography
Dan Larkin - Biography Dan Larkin - Biography
Dan Larkin - Biography
Vivastream
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
atkinsondf
 

What's hot (20)

Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the world
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Dan Larkin - Biography
Dan Larkin - Biography Dan Larkin - Biography
Dan Larkin - Biography
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
THE CYBER-DOME
THE CYBER-DOMETHE CYBER-DOME
THE CYBER-DOME
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Digital law
Digital lawDigital law
Digital law
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
 
Role of youth in cyber law
Role of youth in cyber lawRole of youth in cyber law
Role of youth in cyber law
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Digital law
Digital lawDigital law
Digital law
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 

Similar to attach3

Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...
The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...
The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...
A Krista Kivisild
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The Cybercrime
Amjad Hussain
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The Cybercrime
Amjad Hussain
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
Professor Mary Aiken
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
tawnyataylor528
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
Kayisa Herman Dube
 
the answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docxthe answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docx
anhcrowley
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
Skills Academy
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 

Similar to attach3 (20)

Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...
The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...
The-Lure-The-True-Story-of-How-the-Department-of-Justice-Brought-Down_joa_Eng...
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The Cybercrime
 
Scene Of The Cybercrime
Scene Of The CybercrimeScene Of The Cybercrime
Scene Of The Cybercrime
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
The Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkThe Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New York
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptxALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
 
Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigation
 
the answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docxthe answer does not have to be long at all the question just has to .docx
the answer does not have to be long at all the question just has to .docx
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime Essay.pdf
Cyber Crime Essay.pdfCyber Crime Essay.pdf
Cyber Crime Essay.pdf
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 

attach3

  • 1. Written by experts on the frontlines, this book provides both seasoned and new investigators with the background and tools they need to get the job done. KEY FEATURES • Provides step-by-step instructions on how to investigate crimes online • Covers how new software tools can assist in online investigations • Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations • Details guidelines for collecting and documenting online evidence that can be presented in court DESCRIPTION Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover. Investigating Internet Crimes An Introduction to Solving Crimes in Cyberspace Todd Shipley, retired Detective Sergeant with over 30 years of law enforcement and civilian experience performing and teaching Internet and digital forensic investigations. Art Bowker, has over 28 years experience in law enforcement/corrections and is an expert in managing cyber-risk in offender populations. ISBN: 978-0-12-407817-8 PUB DATE: November 2013 LIST PRICE: $49.95 FORMAT: Paperback PAGES: c. 480 TRIM: 7.5w x 9.25h AUDIENCE Digital investigators, law enforcement personnel, private investigators, DoD, intelligence agencies and attorneys COMPUTING Please contact your Elsevier Sales or Customer Service Representative
  • 2. TABLE OF CONTENTS Chapter 1 Introduction to Internet Crime Chapter 2 Internet Criminals Chapter 3 How the Internet Works Chapter 4 Collecting Legally Defensible Online Evidence Chapter 5 Documenting Online Evidence Chapter 6 Using Online Investigative Tools Chapter 7 Online Digital Officer Safety Chapter 8 Tracing IP Addresses Through the Internet Chapter 9 Working Unseen on the Internet Chapter 10 Covert Operations on the Internet Chapter 11 Conducting Reactive and Proactive Internet Investigations Chapter 12 Internet Resources for Locating Evidence Chapter 13 Investigating Websites and Webpages Chapter 14 Investigating Social Networking Sites Chapter 15 Investigating Methods of Communication Chapter 16 Detection and Prevention of Internet Crimes Chapter 17 Putting it all together Chapter 18 Conclusion Appendices and Resources What do Other Experts Have to Say about Investigating Internet Crimes? “This book offers the most comprehensive, and understandable account of cybercrime currently available to all different skill levels of investigators. It is suitable for novices and instructors, across the full spectrum of digital investigations and will appeal to both advanced and new criminal investigators. It will no doubt become a must have text for any law enforcement or corporate investigator’s investigative library.” Larry D. Johnson, Current CEO at Castleworth Global LLC, Former Chief Security Officer at Genworth Financial and Special Agent in Charge, Criminal Investigative Division, USSS, Retired. “At last….. Informed, pragmatic guidance from two highly experienced professionals who have actually spent time on the front line, not just the classroom. This book is relevant for practitioners working in both law enforcement and within business – every aspiring cyber investigator should have a copy.” Neal Ysart, Director First August Ltd “Cyber-crime, internet fraud, online predators…we think they’re being addressed until we become the victims. Today’s law enforcement is ill-prepared to address against national security, let alone against our law-abiding citizens. Todd Shipley and Art Bowker are able to communicate what law enforcement responders need to know before they get the call – the information in this book must become a mandatory reference for law enforcement agencies everywhere.” Jim Deal, United States Secret Service (Ret.) and original Supervisor of the San Francisco USSS Electronic Crimes Task Force