This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed.
Scene of the Cybercrime, Second Edition is a completely revised and updated book covering all of the technological,legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audiences;IT security professionals and members of law enforcement. It gives the technical experts insight into the world of law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless.It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute Cybercrimes.
Chapter 1 Facing the Cybercrime Problem Head-On
Introduction
Defining Cybercrime
Understanding the Importance of Jurisdictional Issues
Quantifying Cybercrime
Differentiating Crimes That Use the Net from Crimes That Depend on the Net
Working toward a Standard Definition of Cybercrime
Categorizing Cybercrime
Collecting Statistical Data on Cybercrime
Developing Categories of Cybercrimes
Prioritizing Cybercrime Enforcement
Reasons for Cybercrimes
Fighting Cybercrime
Determining Who Will Fight Cybercrime
Educating Cybercrime Fighters
Getting Creative in the Fight against Cybercrime
Summary
Frequently Asked Questions
Chapter 2 The Evolution of Cybercrime
Chapter 3 Understanding the People on the Scene
Chapter 4 Understanding the Technology
Chapter 5 The Computer Investigation Process
Chapter 6 Computer Forensic Softwaare and Hardware
Chapter 7 Acquiring Data,Duplicating Data,and Recovering Deleted Files
Chapter 8 iPod,Cell Phone,PDA,and BlackBerry Forensics
Chapter 9 Understanding E-mail and Internet Crimes
Chapter 10 Understanding Network Intrusions and Attacks
Chapter 11 Passwords,Vulnerabilities,and Exploits
Chapter 12 Understanding Cybercrime Prevention
Chapter 13 Implementing System Secrtity
Chapter 14 Implementing Cybercrime Detection Techniques
Chapter 15 Collecting and Preserving Digital Evidence
Chapter 16 Building the Cybercrime Case
Chapter 17 Becoming an Expert Witness
Index