_x000D_
_x000D_
_x000D_
_x000D_
Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations._x000D_
_x000D_
_x000D_
_x000D_
Key features of this book include:_x000D_
Understanding cybercrime, computers, forensics, and cybersecurity_x000D_
Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications_x000D_
Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory_x000D_
Financial investigation_x000D_
Identification (attribution) of cyber-conduct_x000D_
Apprehension_x000D_
Litigation in the criminal and civil arenas._x000D_
_x000D_
This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal._x000D_
_x000D_
Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.
_x000D_
Table of Contents_x000D_
_x000D_
_x000D_
_x000D_
Part I: Understanding Cybercrime, Computers, and Cybersecurity_x000D_
Chapter 1 The Need for Good Cybercrime Investigators (Introduction)_x000D_
Chapter 2 What is Cybercrime and Why is it Committed_x000D_
Chapter 3 Introduction to Computers, Networks, and Forensics_x000D_
Chapter 4 Introduction to Information Security and Cybersecurity_x000D_
_x000D_
Part II: Law for the Cybercrime Investigator_x000D_
Chapter 5 Fundamental Principles of Criminal and Civil Law_x000D_
Chapter 6 Cybercrime Defined: The Criminal Statutes Outlawing Criminal Conduct Online_x000D_
Chapter 7 The Law Enforcement Legal Toolbox for Investigating Cybercrime (Gathering Cyber Evidence)_x000D_
Chapter 8 Cyber Investigations Linked to Nation-States or Terrorists_x000D_
Chapter 9 Civil and Regulatory Legal Implications of Cybercrime (Civil & Regulatory Cyberlaw)_x000D_
_x000D_
Part III: The Cybercrime Investigation_x000D_
Chapter 10 Embarking on a Cybercrime Investigation: The Three Perspectives and Key Areas of Focus_x000D_
Chapter 11 General Investigation Methods: Organization, Open Source, Records, and Email_x000D_
Chapter 12 The Private Entity's Cybercrime Investigation_x000D_
Chapter 13 Law Enforcement’s Cybercrime Investigation_x000D_
Chapter 14 The Regulator’s Investigation_x000D_
Chapter 15 Financial Investigation: Following the Cybercrime Money_x000D_
Chapter 16 Identification of the Suspect: Attributing Cyber Conduct to a Person_x000D_
Chapter 17 Apprehending the Suspect and the Investigation that Follows_x000D_
_x000D_
Part IV: Litigation Cybercrime Investigations in Court _x000D_
Chapter 18 Criminal litigation_x000D_
Chapter 19 Civil Litigation_x000D_
_x000D_
Chapter 20 Conclusion