Search and Find
Service
Front Cover
1
Cyber Crime and Cyber Terrorism Investigator’s Handbook
4
Copyright
5
Acknowledgments
6
Endorsements
8
Contents
10
Contributors
18
Author Biography
20
Foreword
22
Preface
24
Chapter 1: Cyberspace: The new frontier for policing?
26
The Shape of the Challenge
27
The Size of the Challenge
30
The Response
32
Conclusion
33
References
34
Chapter 2: Definitions of Cyber Terrorism
36
Introduction
36
The Confusion About Cyber Terrorism
36
Cyber Terrorism Definition
38
Has Cyber Terrorism ever Occurred?
41
Conclusions
41
References
41
Chapter 3: New and emerging threats of cyber crime and terrorism
44
Introduction
44
Some Historic Milestones
44
Cyber security lessons not learned from previous ICT innovation cycles
46
Organizational aspects not learned from previous ICT innovation cycles
48
Emerging threats
49
Conclusions
53
References
53
Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes
56
Introduction
56
Investigative Decision Making
57
Investigative Problem Solving
59
Developing Investigative Hypothesis
61
Investigative Innovation
62
Investigators Contact Management
63
Investigating Crime and Terror
64
Conclusion
66
References
67
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations
68
Introduction
68
User Requirements and the Need for a User-Centered Approach?
70
Balancing Technological and Human Capabilities
72
Conducting User Requirements Elicitation
76
Capturing and Communicating User Requirements
78
Conclusion
80
Acknowledgment
81
References
81
Chapter 6: High-tech investigations of cyber crime
84
Introduction
84
High-Tech Investigations and Forensics
84
Core Concepts of High-Tech Investigations
85
Digital Landscapes
86
The “Crime Scene”
86
Live and Online Data Capture
87
Offline (Dead) Data Capture
88
Verification of the Data
89
Reviewing the Requirements
89
Starting the Analysis
89
Signature Analysis
91
Filtering Evidence
91
Keyword Searching
92
Core Evidence
92
Windows LNK Files
93
Windows Prefetch Files
93
Windows Event Logs
94
Windows Registry
94
Restore Points
94
Case Study
94
Summary
95
References
95
Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
96
Introduction
96
Establishing Crime
96
Collecting Evidence for a Search Warrant
97
Reported by a Third Party
97
Identification of a Suspects Internet Protocol Address
97
IP Spoofing
98
Anonymizing Proxy Relay Services
98
Intrusion Detection Systems, Network Traffic and Firewall Logs
99
Interviews with Suspects
99
Analysis of Suspects Media
99
Doxing
99
Collecting Evidence
100
Seizing Equipment
100
Search for Written Passwords
101
Forensic Acquisition
102
Ram
102
Image
103
Forensic Analysis
103
Anti-forensics
104
RAM Analysis
104
Data Carving and Magic Values
105
Media Storage Forensics
105
The Structure and Format of a Hard Drive
105
Partitions
106
Master Boot Record
107
The VBR and BIOS parameter block
107
File System
107
File Table
107
Searching for Evidence
108
Keyword and Phrases Search
108
Recovering Deleted Information
108
Recovering Deleted Files and Folders
109
Recovering Deleted Partitions
109
Where Evidence Hides
109
Registry
109
Most Recently Used Lists
110
LastWrite Time
111
Hiberfil.sys
111
Pagefil.sys
111
System Volume Information Folders
112
Chapter Summary
113
References
113
Chapter 8: Digital forensics education, training and awareness
116
Introduction
116
Digital Forensics Laboratory Preparation and Training
118
Digital Anti Forensics Tools and Approaches
119
The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime
121
Educational Provision for the Study of Computer Forensics
122
The CFM Methodology
124
Conclusions
124
References
125
Chapter 9: Understanding the situational awareness in cybercrimes: case studies
126
Introduction
126
Taxonomical Classification of Cybercrime/Cyberterrorism
128
Case Studies
130
Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
131
Who Are They?
131
Political or Moral Hackers?
131
Methods: Phishing and DDoS
132
Who Have They Hacked to Date?
132
CNN
133
Angry Birds
133
Microsoft (January 2014)
134
Saudi Arabian Government Websites (January 2014)
134
Social Media Presence
134
The Case of Stuxnet
135
The Cyber-Attacks on Banks
136
On a Global Scale
136
In the UK
137
The Case of the Anonymous Attacks on Scientology
138
Self-Actualization: The Case of “Mafiaboy”
139
Strategic Responses to Cyber Attacks
140
Concluding Remarks
142
References
143
Chapter 10: Terrorist use of the internet
148
Terrorist Use of the Internet
148
Propaganda—Indoctrination—Recruitment
148
The Role of the Video
148
Online Forums—Blogs
149
Online Social Network Services
149
Radicalization Process on the Internet
150
Particular case: lone wolf
150
Information Sharing
151
Future Developments
152
Cyber Terrorism
152
Financing
153
Darknet
155
3D Printing
155
Full VPN
156
Conclusion
156
References
157
Chapter 11: ICT as a protection tool against child exploitation
158
Introduction
158
Key Issues and Challenges
159
Information Awareness and Better Education
160
Government Responsibilities and Legal Framework
161
Technical Issues and Challenges
161
A Case Study on Use of Technology and Proposed Methodology
161
Objectivity, Consistency and Credibility
163
A Systems Approach to Child Protection
164
Child-Centered Information Flows
164
CBCTResponse System
167
Conclusions
171
References
171
Chapter 12: Cybercrime classification and characteristics
174
Introduction
174
What is Cybercrime?
175
What are the Classifications and Types of Cybercrime?
179
Cybercrime Categories
181
Phishing
181
Spam
183
Hacking
183
Cyber Harassment or Bullying
184
Identity Theft
184
Plastic Card Fraud
185
Internet Auction Fraud
185
Cyber-Attack Methods and Tools
185
Conclusion
187
References
188
Chapter 13: Cyber terrorism: Case studies
190
Introduction
190
Case Studies—Activities In Cyberspace Attributed to Terrorist Organizations
191
Analysis of Capabilities
193
Technological Capabilities, Intelligence Guidance, and Operational Capacity
195
Technological Capabilities
195
Intelligence-Guided Capability
195
Operational Capability
196
Conclusion
197
References
199
Chapter 14: Social media and Big Data
200
Introduction
200
Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
201
Big Data and Social Surveillance: Public and Private Interplay in Social Control
203
Array of Approved eSurveillance Legislation
204
Forced “On Call” Collaboration by Private Entities
206
Data Collection for Crime Prediction and Prevention
207
Legitimacy
207
Use of Private Sector Tools and Resources
208
The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
209
Preserving the E.U. data protection standard in a globalized world
211
References
215
Chapter 15: Social media and its role for LEAs: Review and applications
222
Introduction
222
Features of Social Media Users and Use
225
Differences in Demographics Across Networks
225
Rationales for Social Media Use
225
Influences on Social Media Behaviors
226
Disclosure and Trustworthiness of Information
228
Relevance to LEAs
229
LEA Usage Scenarios for Social Media
229
Social Media in “Lone-Wolf” Scenarios for Early Assessment and Identification of Threats
231
Social Media-Based Approach in a Hostage Scenario
232
Organized Crime Social Media Data Analysis
233
Crowd-Sourcing with a Collective Intelligence Platform
234
Application of Social Media in Human Trafficking Scenarios
236
Public Engagement on Social Media
238
From Social Media to LEA Intelligence
239
Concluding Remarks
241
References
241
Chapter 16: The rise of cyber liability insurance
246
A Brief History of Insurance
246
Business Interruption Insurance
246
What is Cyber Liability?
247
First-Party Cyber Liability
248
Third-Party Cyber Liability
249
Cyber Risks—A Growing Concern
249
The Cyber Threat
250
A Changing Regulatory Landscape
251
ICO Notification
251
What Does Cyber Liability Insurance Cover?
252
Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
253
Conclusion
254
Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat
256
Introduction
256
A Botnet Roadmap
257
Primary Activities:
264
Support Activities:
264
Botnets How Do They Work. Network Topologies and Protocols
265
Case Study—Eurograbber (2012)
269
The Infection
270
The Money Theft
271
Case Study—ZeroAccess (2013)
272
Countermeasures for Fighting Botnets or Mitigating Botnets Effects
274
Conclusion and Future Trends (TOR, Mobile and Social Networks)
278
References
281
Chapter 18: Evolution of tetra through the integration with a number of communication platforms to support public protecti ...
284
Introduction
284
TETRA Technology
285
Current Trends of PPDR (i.e., TETRA) Technology
286
Technological and Economic Barriers and Issues
287
Progress Beyond the State-of-the-Art
288
Current PPDR Communication Network Architecture Landscape
288
State-of-the-Art on Mobile Communication Standard
290
General PMR standards
290
TETRAPOL
290
GSM
291
TETRA
291
Proposed PPDR Communication Network Architectural Solutions
292
TETRA over Mobile IP Network
292
Multi-technology communication mobile IP gateway (MIPGATE)
292
Multipath TCP
294
Security
294
TETRA over Mobile Ad-Hoc Network
295
TETRA over DVB-T/DTTV Network
296
Conclusion
297
References
298
Index
300
All prices incl. VAT