Cybercrime Investigations
A Comprehensive Resource for Everyone
John Bandler, Antonia Merzon
- 336 páginas
- English
- ePUB (apto para móviles)
- Disponible en iOS y Android
Cybercrime Investigations
A Comprehensive Resource for Everyone
John Bandler, Antonia Merzon
Información del libro
Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations.
Key features of this book include:
- Understanding cybercrime, computers, forensics, and cybersecurity
- Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications
- Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory
- Financial investigation
- Identification (attribution) of cyber-conduct
- Apprehension
- Litigation in the criminal and civil arenas.
This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal.
Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.
Preguntas frecuentes
Información
Part I
Understanding Cybercrime, Computers, and Cybersecurity
1 Introduction
The Need for Good Cybercrime Investigators
- You
- Law enforcement of all types: police, investigators, agents, prosecutors, analysts
- Those in the private sector investigating or dealing with cybercrime
- Regulators
- The technically skilled and those who are not
- Beginning cyber investigators, intermediate, and even experienced looking for a comprehensive view
- Lawyers and non-lawyers.
1.1 Why This Book
- We all can investigate cybercrime. Cybercriminals are running amok online partly because of the misconception that only specialized investigators with vast technological resources can work these cases. Tech skills and gadgets are great to have, but they are, by no means, a requirement for handling a cyber investigation.
- Cybercrime can be solved. Just because it is a cybercrime, doesn’t mean it is hard to solve. Cybercriminals – like every type of criminal – run the gamut, from low-level scammers to highly sophisticated organizations. They are not all tech-wizards. They are not all hard to find.
- Even the most sophisticated cybercriminals can be caught.
- Profit and Losses. Cybercrime is immensely profitable for cybercriminals, but immensely costly to the rest of us. Each year, U.S. businesses and consumers lose billions of dollars through cybercrime while the criminal and private investigation of these events remains completely inadequate. It is astonishing to consider that billions of dollars can be stolen annually without proper investigation or redress.
- Terrorism and Espionage. The profitable and disruptive nature of cybercrime means it is an activity of interest for terrorists and nation-states seeking income, intelligence, or simply a new way to inflict harm. The Internet provides a gateway and a network for all manner of nefarious activity at the local, national, and international levels. Our will to investigate this activity must measure up to the threat it presents.
- New Ways to Move Money. Cybercriminals have developed innovative money laundering techniques to pay each other and disguise their illicit income. Virtual currencies and cryptocurrencies, international wire transfer schemes, money held and moved in stored-value cards (like gift cards), criminal proceeds funneled through multiplayer video games – these are some of the methods cybercriminals use, along with more traditional money laundering mechanisms. Once proven successful, these techniques are adopted not just by cyber thieves, but by other criminals looking to conduct illicit transactions, such as child pornographers, narcotics dealers, and terrorists.
- Stalking, Revenge, and Harassment. Stealing is not the only form of cybercrime – the Internet is used to commit a wide variety of crimes meant to harass, stalk, menace, or otherwise target specific individuals. The increasingly sophisticated methods used to conduct these crimes are capable of inflicting tremendous, ongoing harm to victims. The scenarios range from teen sexting to cyber-revenge acts directed at employers, intimate partners, and political figures – and often require a response from a combination of law enforcement and private sector investigators.
- Civil Liability and Regulation. The scourge of cybercrime has an enormous impact on both our civil law and regulatory systems. When cybercriminals steal funds or data, injured victims may use the civil legal system to seek redress, including for cybersecurity negligence. Government regulators create and enforce rules that deal with the real threats that cybercrime presents to sensitive data and online commerce.
1.2 Who Investigates Cybercrime?
- Law Enforcement