Text
Cyber crime and cyber terrorism investigator's handbook
Table of Contents
Chapter 1: Cyberspace: The new frontier for policing?
Abstract
The Shape of the Challenge
The Size of the Challenge
The Response
Conclusion
Chapter 2: Definitions of Cyber Terrorism
Abstract
Introduction
The Confusion About Cyber Terrorism
Cyber Terrorism Definition
Has Cyber Terrorism Ever Occurred?
Conclusions
Chapter 3: New and emerging threats of cyber crime and terrorism
Abstract
Introduction
Some Historic Milestones
Cyber Security Lessons not Learned from Previous ICT Innovation Cycles
Organizational Aspects not Learned From Previous ICT Innovation Cycles
Emerging Threats
Conclusions
Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes
Abstract
Introduction
Investigative Decision Making
Investigative Problem Solving
Developing Investigative Hypothesis
Investigative Innovation
Investigators Contact Management
Investigating Crime and Terror
Conclusion
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations
Abstract
Introduction
User Requirements and the Need for a User-Centered Approach?
Balancing Technological and Human Capabilities
Conducting User Requirements Elicitation
Capturing and Communicating User Requirements
Conclusion
Acknowledgment
Chapter 6: High-tech investigations of cyber crime
Abstract
Introduction
High-Tech Investigations and Forensics
Core Concepts of High-Tech Investigations
Digital Landscapes
The “Crime Scene”
Reviewing the Requirements
Starting the Analysis
Core Evidence
Case Study
Summary
Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
Abstract
Introduction
Establishing Crime
Collecting Evidence for a Search Warrant
Reported by a Third Party
Identification of a Suspects Internet Protocol Address
IP Spoofing
Anonymizing Proxy Relay Services
Intrusion Detection Systems, Network Traffic and Firewall Logs
Interviews with Suspects
Analysis of Suspects Media
Doxing
Collecting Evidence
Seizing Equipment
Search for Written Passwords
Forensic Acquisition
RAM
Image
Forensic Analysis
Anti-forensics
RAM Analysis
Data Carving and Magic Values
Media Storage Forensics
Partitions
Master Boot Record
The VBR and BIOS Parameter Block
File System
File Table
Searching for Evidence
Keyword and Phrases Search
Recovering Deleted Information
Recovering Deleted Files and Folders
Recovering Deleted Partitions
Where Evidence Hides
Registry
Most Recently Used Lists
LastWrite Time
Hiberfil.sys
Pagefil.sys
System Volume Information Folders
Chapter Summary
Chapter 8: Digital forensics education, training and awareness
Abstract
Introduction
Digital Forensics Laboratory Preparation and Training
Digital Anti Forensics Tools and Approaches
The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime
Educational Provision for the Study of Computer Forensics
The CFM Methodology
Conclusions
Chapter 9: Understanding the situational awareness in cybercrimes: case studies
Abstract
Introduction
Taxonomical Classification of Cybercrime/Cyberterrorism
Case Studies
Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
The Case of Stuxnet
The Cyber-Attacks on Banks
The Case of the Anonymous Attacks on Scientology
Self-Actualization: The Case of “Mafiaboy”
Strategic Responses to Cyber Attacks
Concluding Remarks
Chapter 10: Terrorist use of the internet
Abstract
Terrorist Use of the Internet
Propaganda—Indoctrination—Recruitment
The Role of the Video
Online Forums—Blogs
Online Social Network Services
Radicalization Process on the Internet
Particular Case: Lone Wolf
Information Sharing
Future Developments
Conclusion
Chapter 11: ICT as a protection tool against child exploitation
Abstract
Introduction
Key Issues and Challenges
Information Awareness and Better Education
Government Responsibilities and Legal Framework
Technical Issues and Challenges
Child-Centered Information Flows
CBCT Response System
Conclusions
Chapter 12: Cybercrime classification and characteristics
Abstract
Introduction
What is Cybercrime?
What Are the Classifications and Types of Cybercrime?
Cybercrime Categories
Cyber-Attack Methods and Tools
Conclusion
Chapter 13: Cyber terrorism: Case studies
Abstract
Introduction
Case Studies—Activities in Cyberspace Attributed to Terrorist Organizations
Analysis of Capabilities
Technological Capabilities, Intelligence Guidance, and Operational Capacity
Conclusion
Chapter 14: Social media and Big Data
Abstract
Introduction
Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
Big Data and Social Surveillance: Public and Private Interplay in Social Control
The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
Preserving the E.U. Data Protection Standard in a Globalized World
Chapter 15: Social media and its role for LEAs: Review and applications
Abstract
Introduction
Features of Social Media Users and Use
LEA Usage Scenarios for Social Media
Concluding Remarks
Chapter 16: The rise of cyber liability insurance
Abstract
A Brief History of Insurance
Business Interruption Insurance
What Is Cyber Liability?
Cyber Risks—A Growing Concern
The Cyber Threat
A Changing Regulatory Landscape
ICO Notification
What Does Cyber Liability Insurance Cover?
Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
Conclusion
Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat
Abstract
Introduction
A Botnet Roadmap
Botnets How Do They Work. Network Topologies and Protocols
Case Study—Eurograbber (2012)
Case Study—ZeroAccess (2013)
Countermeasures for Fighting Botnets or Mitigating Botnets Effects
Conclusion and Future Trends (TOR, Mobile and Social Networks)
Chapter 18: Evolution of TETRA through the integration with a number of communication platforms to support public protection and disaster relief (PPDR)
Abstract
Introduction
Technological and Economic Barriers and Issues
Progress Beyond the State-of-the-Art
Proposed PPDR Communication Network Architectural Solutions
Conclusion
No other version available