Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

of: Babak Akhgar, Andrew Staniforth, Francesca Bosco

Elsevier Reference Monographs, 2014

ISBN: 9780128008119 , 307 Pages

Format: PDF, ePUB

Copy protection: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones

Price: 38,95 EUR



More of the content

Cyber Crime and Cyber Terrorism Investigator's Handbook


 

Front Cover

1

Cyber Crime and Cyber Terrorism Investigator’s Handbook

4

Copyright

5

Acknowledgments

6

Endorsements

8

Contents

10

Contributors

18

Author Biography

20

Foreword

22

Preface

24

Chapter 1: Cyberspace: The new frontier for policing?

26

The Shape of the Challenge

27

The Size of the Challenge

30

The Response

32

Conclusion

33

References

34

Chapter 2: Definitions of Cyber Terrorism

36

Introduction

36

The Confusion About Cyber Terrorism

36

Cyber Terrorism Definition

38

Has Cyber Terrorism ever Occurred?

41

Conclusions

41

References

41

Chapter 3: New and emerging threats of cyber crime and terrorism

44

Introduction

44

Some Historic Milestones

44

Cyber security lessons not learned from previous ICT innovation cycles

46

Organizational aspects not learned from previous ICT innovation cycles

48

Emerging threats

49

Conclusions

53

References

53

Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes

56

Introduction

56

Investigative Decision Making

57

Investigative Problem Solving

59

Developing Investigative Hypothesis

61

Investigative Innovation

62

Investigators Contact Management

63

Investigating Crime and Terror

64

Conclusion

66

References

67

Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations

68

Introduction

68

User Requirements and the Need for a User-Centered Approach?

70

Balancing Technological and Human Capabilities

72

Conducting User Requirements Elicitation

76

Capturing and Communicating User Requirements

78

Conclusion

80

Acknowledgment

81

References

81

Chapter 6: High-tech investigations of cyber crime

84

Introduction

84

High-Tech Investigations and Forensics

84

Core Concepts of High-Tech Investigations

85

Digital Landscapes

86

The “Crime Scene”

86

Live and Online Data Capture

87

Offline (Dead) Data Capture

88

Verification of the Data

89

Reviewing the Requirements

89

Starting the Analysis

89

Signature Analysis

91

Filtering Evidence

91

Keyword Searching

92

Core Evidence

92

Windows LNK Files

93

Windows Prefetch Files

93

Windows Event Logs

94

Windows Registry

94

Restore Points

94

Case Study

94

Summary

95

References

95

Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines

96

Introduction

96

Establishing Crime

96

Collecting Evidence for a Search Warrant

97

Reported by a Third Party

97

Identification of a Suspects Internet Protocol Address

97

IP Spoofing

98

Anonymizing Proxy Relay Services

98

Intrusion Detection Systems, Network Traffic and Firewall Logs

99

Interviews with Suspects

99

Analysis of Suspects Media

99

Doxing

99

Collecting Evidence

100

Seizing Equipment

100

Search for Written Passwords

101

Forensic Acquisition

102

Ram

102

Image

103

Forensic Analysis

103

Anti-forensics

104

RAM Analysis

104

Data Carving and Magic Values

105

Media Storage Forensics

105

The Structure and Format of a Hard Drive

105

Partitions

106

Master Boot Record

107

The VBR and BIOS parameter block

107

File System

107

File Table

107

Searching for Evidence

108

Keyword and Phrases Search

108

Recovering Deleted Information

108

Recovering Deleted Files and Folders

109

Recovering Deleted Partitions

109

Where Evidence Hides

109

Registry

109

Most Recently Used Lists

110

LastWrite Time

111

Hiberfil.sys

111

Pagefil.sys

111

System Volume Information Folders

112

Chapter Summary

113

References

113

Chapter 8: Digital forensics education, training and awareness

116

Introduction

116

Digital Forensics Laboratory Preparation and Training

118

Digital Anti Forensics Tools and Approaches

119

The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime

121

Educational Provision for the Study of Computer Forensics

122

The CFM Methodology

124

Conclusions

124

References

125

Chapter 9: Understanding the situational awareness in cybercrimes: case studies

126

Introduction

126

Taxonomical Classification of Cybercrime/Cyberterrorism

128

Case Studies

130

Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army

131

Who Are They?

131

Political or Moral Hackers?

131

Methods: Phishing and DDoS

132

Who Have They Hacked to Date?

132

CNN

133

Angry Birds

133

Microsoft (January 2014)

134

Saudi Arabian Government Websites (January 2014)

134

Social Media Presence

134

The Case of Stuxnet

135

The Cyber-Attacks on Banks

136

On a Global Scale

136

In the UK

137

The Case of the Anonymous Attacks on Scientology

138

Self-Actualization: The Case of “Mafiaboy”

139

Strategic Responses to Cyber Attacks

140

Concluding Remarks

142

References

143

Chapter 10: Terrorist use of the internet

148

Terrorist Use of the Internet

148

Propaganda—Indoctrination—Recruitment

148

The Role of the Video

148

Online Forums—Blogs

149

Online Social Network Services

149

Radicalization Process on the Internet

150

Particular case: lone wolf

150

Information Sharing

151

Future Developments

152

Cyber Terrorism

152

Financing

153

Darknet

155

3D Printing

155

Full VPN

156

Conclusion

156

References

157

Chapter 11: ICT as a protection tool against child exploitation

158

Introduction

158

Key Issues and Challenges

159

Information Awareness and Better Education

160

Government Responsibilities and Legal Framework

161

Technical Issues and Challenges

161

A Case Study on Use of Technology and Proposed Methodology

161

Objectivity, Consistency and Credibility

163

A Systems Approach to Child Protection

164

Child-Centered Information Flows

164

CBCTResponse System

167

Conclusions

171

References

171

Chapter 12: Cybercrime classification and characteristics

174

Introduction

174

What is Cybercrime?

175

What are the Classifications and Types of Cybercrime?

179

Cybercrime Categories

181

Phishing

181

Spam

183

Hacking

183

Cyber Harassment or Bullying

184

Identity Theft

184

Plastic Card Fraud

185

Internet Auction Fraud

185

Cyber-Attack Methods and Tools

185

Conclusion

187

References

188

Chapter 13: Cyber terrorism: Case studies

190

Introduction

190

Case Studies—Activities In Cyberspace Attributed to Terrorist Organizations

191

Analysis of Capabilities

193

Technological Capabilities, Intelligence Guidance, and Operational Capacity

195

Technological Capabilities

195

Intelligence-Guided Capability

195

Operational Capability

196

Conclusion

197

References

199

Chapter 14: Social media and Big Data

200

Introduction

200

Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies

201

Big Data and Social Surveillance: Public and Private Interplay in Social Control

203

Array of Approved eSurveillance Legislation

204

Forced “On Call” Collaboration by Private Entities

206

Data Collection for Crime Prediction and Prevention

207

Legitimacy

207

Use of Private Sector Tools and Resources

208

The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance

209

Preserving the E.U. data protection standard in a globalized world

211

References

215

Chapter 15: Social media and its role for LEAs: Review and applications

222

Introduction

222

Features of Social Media Users and Use

225

Differences in Demographics Across Networks

225

Rationales for Social Media Use

225

Influences on Social Media Behaviors

226

Disclosure and Trustworthiness of Information

228

Relevance to LEAs

229

LEA Usage Scenarios for Social Media

229

Social Media in “Lone-Wolf” Scenarios for Early Assessment and Identification of Threats

231

Social Media-Based Approach in a Hostage Scenario

232

Organized Crime Social Media Data Analysis

233

Crowd-Sourcing with a Collective Intelligence Platform

234

Application of Social Media in Human Trafficking Scenarios

236

Public Engagement on Social Media

238

From Social Media to LEA Intelligence

239

Concluding Remarks

241

References

241

Chapter 16: The rise of cyber liability insurance

246

A Brief History of Insurance

246

Business Interruption Insurance

246

What is Cyber Liability?

247

First-Party Cyber Liability

248

Third-Party Cyber Liability

249

Cyber Risks—A Growing Concern

249

The Cyber Threat

250

A Changing Regulatory Landscape

251

ICO Notification

251

What Does Cyber Liability Insurance Cover?

252

Who Offers Cyber Liability Insurance and What Should Customers Look Out For?

253

Conclusion

254

Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat

256

Introduction

256

A Botnet Roadmap

257

Primary Activities:

264

Support Activities:

264

Botnets How Do They Work. Network Topologies and Protocols

265

Case Study—Eurograbber (2012)

269

The Infection

270

The Money Theft

271

Case Study—ZeroAccess (2013)

272

Countermeasures for Fighting Botnets or Mitigating Botnets Effects

274

Conclusion and Future Trends (TOR, Mobile and Social Networks)

278

References

281

Chapter 18: Evolution of tetra through the integration with a number of communication platforms to support public protecti ...

284

Introduction

284

TETRA Technology

285

Current Trends of PPDR (i.e., TETRA) Technology

286

Technological and Economic Barriers and Issues

287

Progress Beyond the State-of-the-Art

288

Current PPDR Communication Network Architecture Landscape

288

State-of-the-Art on Mobile Communication Standard

290

General PMR standards

290

TETRAPOL

290

GSM

291

TETRA

291

Proposed PPDR Communication Network Architectural Solutions

292

TETRA over Mobile IP Network

292

Multi-technology communication mobile IP gateway (MIPGATE)

292

Multipath TCP

294

Security

294

TETRA over Mobile Ad-Hoc Network

295

TETRA over DVB-T/DTTV Network

296

Conclusion

297

References

298

Index

300