U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Investigating Computer Crime in the 21st Century, Second Edition

NCJ Number
208320
Author(s)
Ronald L. Mendell B.S.
Date Published
2004
Length
280 pages
Annotation
As was true of the first edition, the second edition of this text aims to apply generic investigative principles to computer crimes, with the addition of new information on various types of computer crime and investigative tools and techniques.
Abstract
This is a text for entry-level work for the investigative or security generalist. This new edition has sections on deciphering Internet-provider (IP) addresses and e-mail headers, on managing computer-crime cases, on the investigation of sexual exploitation on the Internet, and on inquiring more into Internet fraud. The first part of the book contains the original 12 chapters of the first edition, along with some new sections. Chapters in this part address "solvability" factors, retail security, the use of the Internet to provide false and misleading information and false fronts for personal advantage, intelligence gathering, the investigative process, identification of the crime, the preservation of evidence, establishing the criminal method, determining the responsible parties, and deciding on a course of action. The second part of the book provides new chapters on cryptography, "attack trees," risk and vulnerability analysis, and identity theft. The chapters of this part of the book focus on the widening criminal enterprises linked to computer networks and the Internet. The content and style of the presentation are geared toward a generalist investigator who is making an entry-level transition to computer-crime investigations. Appendixes discuss extremists and other threats from cyberspace, a general investigative checklist, investigating the background of a computer forensics or other computer expert, risk analysis outline, and vulnerability analysis from an attacker's perspective. A 61-item bibliography, a glossary, and a subject index