Table of Contents

Cover image

Title page

Copyright

Acknowledgments

Endorsements

Contributors

Author Biography

Babak Akhgar

Andrew Staniforth

Francesca Bosco

Foreword

Preface

Chapter 1: Cyberspace: The new frontier for policing?

Abstract

The Shape of the Challenge

The Size of the Challenge

The Response

Conclusion

Chapter 2: Definitions of Cyber Terrorism

Abstract

Introduction

The Confusion About Cyber Terrorism

Cyber Terrorism Definition

Has Cyber Terrorism Ever Occurred?

Conclusions

Chapter 3: New and emerging threats of cyber crime and terrorism

Abstract

Introduction

Some Historic Milestones

Cyber Security Lessons not Learned from Previous ICT Innovation Cycles

Organizational Aspects not Learned From Previous ICT Innovation Cycles

Emerging Threats

Conclusions

Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes

Abstract

Introduction

Investigative Decision Making

Investigative Problem Solving

Developing Investigative Hypothesis

Investigative Innovation

Investigators Contact Management

Investigating Crime and Terror

Conclusion

Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations

Abstract

Introduction

User Requirements and the Need for a User-Centered Approach?

Balancing Technological and Human Capabilities

Conducting User Requirements Elicitation

Capturing and Communicating User Requirements

Conclusion

Acknowledgment

Chapter 6: High-tech investigations of cyber crime

Abstract

Introduction

High-Tech Investigations and Forensics

Core Concepts of High-Tech Investigations

Digital Landscapes

The “Crime Scene”

Reviewing the Requirements

Starting the Analysis

Core Evidence

Case Study

Summary

Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines

Abstract

Introduction

Establishing Crime

Collecting Evidence for a Search Warrant

Reported by a Third Party

Identification of a Suspects Internet Protocol Address

IP Spoofing

Anonymizing Proxy Relay Services

Intrusion Detection Systems, Network Traffic and Firewall Logs

Interviews with Suspects

Analysis of Suspects Media

Doxing

Collecting Evidence

Seizing Equipment

Search for Written Passwords

Forensic Acquisition

RAM

Image

Forensic Analysis

Anti-forensics

RAM Analysis

Data Carving and Magic Values

Media Storage Forensics

Partitions

Master Boot Record

The VBR and BIOS Parameter Block

File System

File Table

Searching for Evidence

Keyword and Phrases Search

Recovering Deleted Information

Recovering Deleted Files and Folders

Recovering Deleted Partitions

Where Evidence Hides

Registry

Most Recently Used Lists

LastWrite Time

Hiberfil.sys

Pagefil.sys

System Volume Information Folders

Chapter Summary

Chapter 8: Digital forensics education, training and awareness

Abstract

Introduction

Digital Forensics Laboratory Preparation and Training

Digital Anti Forensics Tools and Approaches

The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime

Educational Provision for the Study of Computer Forensics

The CFM Methodology

Conclusions

Chapter 9: Understanding the situational awareness in cybercrimes: case studies

Abstract

Introduction

Taxonomical Classification of Cybercrime/Cyberterrorism

Case Studies

Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army

The Case of Stuxnet

The Cyber-Attacks on Banks

The Case of the Anonymous Attacks on Scientology

Self-Actualization: The Case of “Mafiaboy”

Strategic Responses to Cyber Attacks

Concluding Remarks

Chapter 10: Terrorist use of the internet

Abstract

Terrorist Use of the Internet

Propaganda—Indoctrination—Recruitment

The Role of the Video

Online Forums—Blogs

Online Social Network Services

Radicalization Process on the Internet

Particular Case: Lone Wolf

Information Sharing

Future Developments

Conclusion

Chapter 11: ICT as a protection tool against child exploitation

Abstract

Introduction

Key Issues and Challenges

Information Awareness and Better Education

Government Responsibilities and Legal Framework

Technical Issues and Challenges

Child-Centered Information Flows

CBCT Response System

Conclusions

Chapter 12: Cybercrime classification and characteristics

Abstract

Introduction

What is Cybercrime?

What Are the Classifications and Types of Cybercrime?

Cybercrime Categories

Cyber-Attack Methods and Tools

Conclusion

Chapter 13: Cyber terrorism: Case studies

Abstract

Introduction

Case Studies—Activities in Cyberspace Attributed to Terrorist Organizations

Analysis of Capabilities

Technological Capabilities, Intelligence Guidance, and Operational Capacity

Conclusion

Chapter 14: Social media and Big Data

Abstract

Introduction

Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies

Big Data and Social Surveillance: Public and Private Interplay in Social Control

The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance

Preserving the E.U. Data Protection Standard in a Globalized World

Chapter 15: Social media and its role for LEAs: Review and applications

Abstract

Introduction

Features of Social Media Users and Use

LEA Usage Scenarios for Social Media

Concluding Remarks

Chapter 16: The rise of cyber liability insurance

Abstract

A Brief History of Insurance

Business Interruption Insurance

What Is Cyber Liability?

Cyber Risks—A Growing Concern

The Cyber Threat

A Changing Regulatory Landscape

ICO Notification

What Does Cyber Liability Insurance Cover?

Who Offers Cyber Liability Insurance and What Should Customers Look Out For?

Conclusion

Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat

Abstract

Introduction

A Botnet Roadmap

Botnets How Do They Work. Network Topologies and Protocols

Case Study—Eurograbber (2012)

Case Study—ZeroAccess (2013)

Countermeasures for Fighting Botnets or Mitigating Botnets Effects

Conclusion and Future Trends (TOR, Mobile and Social Networks)

Chapter 18: Evolution of TETRA through the integration with a number of communication platforms to support public protection and disaster relief (PPDR)

Abstract

Introduction

Technological and Economic Barriers and Issues

Progress Beyond the State-of-the-Art

Proposed PPDR Communication Network Architectural Solutions

Conclusion

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset