We use cookies to provide essential features and services. By using our website you agree to our use of cookies .


COVID-19 Response at Fishpond

Read what we're doing...

Cyber Crime Fighters


Product Description
Product Details

Table of Contents

Chapter 1 Cyber Stalking 1High-Tech Stalkers 2"How I Stalked My Girlfriend" 4The Victim's Side 8Identity Assumption 9The Wild, Wild Web 10Sticks and Stones 13The "Stalker" E-Card 14Cyber Stalking and the Law 16Cyber Stalking Facts 17Lethality Assessment Tools 18If You Think You Are Being Cyber Stalked 19Teen/Tech Stalking 21 Teen Study 21Online Games-The New Stalker's Ground 22Online Gaming and Malware 23Would You Say It to My Face? 23National School Board Survey 23Women as Perpetrators 26Cyber Stalking Prevention Resources 26Chapter 2 Two Bedrooms Up, One Bedroom Down-What Someone Can Find Out About You on the Internet 27Your Digital Footprint 28The Best Sources to Find Out About People 28 "Tracking Teresa" 29 Town and City Websites 29 Zillow-We Know Your Neighborhood 31 We Know Your Dog's Name 31 Online Memorials 32 Political Contributions 32 People Search Sites 33 Search Your Own Name 33 The Wayback Machine 34 Website Registration Records 34E-Venge 35 DontDateHimGirl.com 36Lessons Learned 36Chapter 3 Cyber Crime Tools You Won't Believe 37Wi-Fi Tracking 37Packet Sniffers 37Bluetooth Locating 38What Is an IP Address 38Anonymizers and Anonymous Remailers 40Fake Name Generators 42Fake Caller ID 42Chapter 4 Upskirting, Downblousing, and Your Right to Privacy in the Cell Phone and Digital Age 47Upskirting and Downblousing 47We Fight for Changes in the Law 50Stickam: Voyeurism or Exhibitionism 51New Challenges to Voyeurism Law 51How Prevalent Is Voyeurism? 53How to Prevent Becoming a Victim of Voyeurism 54Is a Stranger Watching Your Nanny Cam? 54The Voyeur's Backpack 55Resources 55Chapter 5 Identity Theft 57Identity Theft: The Number-One Type of Fraud 5723,000 Victims Per Day: One Every 3.5 Seconds 58Cheap Credit Cards 58Identity Theft Versus Identity Fraud 59The Long Road to Recovery 60 The NCIC Identity Theft File 60 Guilty Until Proven Innocent 61Types of Identity Theft 61Delays in Notification 62Preventing Identity Theft 63 Monitor Your Accounts 63 Get Your Free Annual Credit Report (annualcreditreport.com) 63 Credit Report Tips 64 Felicia Finds "Rogue" Account 65 Monitor Your Child's Credit Report 66 Tips to Prevent Your Child's Identity from Being Stolen 66More Identity-Theft Prevention Tips 67Shred, Shred, Shred 69Fraudulent Donations 70If You Are a Victim of Identity Theft 70Identity Theft Services 72 LifeLock Gets Sued 72 Attorney General Becomes ID Theft Victim 73Resources 73Chapter 6 Online Dating-Are You Safe? 75Can Online Dating Be Made Safer? 77Criminal History Checks-What Can You Really Find Out? 77Online Dating Dilemmas 79Victim Reluctance to Report 82Lack of Evidence and Empathy 85Online Dating Safety Tips 87Chapter 7 We Catch Sexual Predators-What You Don't See on TV 89The Dateline Debacle: To Catch a Predator 89 Perverted Justice and To Catch a Predator in Action 90 Problems with To Catch a Predator 91 Does To Catch a Predator Hinder Law Enforcement? 91 The Good and the Bad 92 Misdemeanor Versus Felony 101 Laws Vary from State to State 102 Lessons Learned 102Free Babysitting 105The Internet-A Pedophile's New Playground 10512 Million Hits in 72 Hours 106Male Versus Female Offenders 107The Cyber Playground 109Chapter 8 Child Sexual Assault Images-The New View on Child Pornography 111Fritz Does Federal-Enticement Across State Lines 113Child Pornography Collectors 113Sex Offender Websites: Facts Versus Fiction 117The National Sex Offender Public Registry 122U.S. Supreme Court Rules CG Kiddie Porn Is Perfectly Legal 124 Digital Images 126 Congress Reacts 126The National Center for Missing and Exploited Children 126 Child Victim Identification Program (CVIP) 127Operation Avalanche 129 Landslide Productions 129How Far Does "Private Fantasy" Go? The Zidel Case 130 Recent Developments 131 Supreme Court Overturns Ruling 132Laws and Loopholes 134Laptops and Customs Searches 135 Laptop Search by Customs Is Challenged 135 Sex Offender Caught at Border 135A Balancing Act 136SAFE Act 136Social Networks and Sex Offenders 137 Facebook and MySpace Get Tougher on Sex Offenders? 137 KIDS Bill 138Child Porn Sites Shut Down? 138ICAC: The Internet Crimes Against Children Task Force 140The Child Advocacy Center: A Victim-Centered Approach 143Missouri: 30 Days, 7,000 Computers Trading Kiddie Porn 145NCMEC Survey 145Internet Safety Guidelines 146Resources 146Chapter 9 Social Networks/Social Nightmares 147Online Societies 147More and More Specialized Social Networks 148They Call It Love, We Call It Pedophilia 149Suicide "Assistance" Sites-alt.suicide.holiday (ASH) 150Never Say, "My Child Will Never..." 152Common Interest Guaranteed 157Words Can Never Hurt Me? 158Internet Safety Guidelines 158Chapter 10 Sexual Deviance Online (Child Sex Rings, Prostitution, Sexual Victimization, and Other Bizarre Stories) 161The Darker Side of the Online Sex Trade 162 The Emperor's Club 164 The Innocence Lost Initiative 165 Mayor Blames Craigslist for Child Prostitution 166 A Nationwide Epidemic-293,000 Children at Risk 168 Internet Sex and Robbery: "Operation FALCON" 169Child Sex Rings: The Darkest Side of the Internet 170The AMBER Alert 172 How You Can Help-Please Join In 174Cellular Porn: The Uglier Side of Cell Phones 175The Danger of Webcams 178Chapter 11 Phishing, Pharming, Spam, and Scams 179Phishing 179 Call to Action-Danger, Danger 180 Hyperlinks-Hyper Dangerous! 181 New Twists on Phishing 182 Charity Phishing Scams 182 How Do Phishers Make Money? 183Vishing-Cell Phone Phishing 183 Recent Trends-Vishing Over Phishing 184 IC3 Name Used in Fraudulent Phishing Scam 185Pharming-Fake Websites 185Spam, Spam, Spam 187 Where Did Spam Come From? 187 Who Profits from Spam? 188 Why Spam Is Dangerous 188 Spam Vigilantes 190 Spam Spiders 190 How to Reduce Spam 190 New Twist-Death Threats via Spam 191 Is Spam Illegal? 191 The CAN-SPAM Act 191 New Twist-Text Spam on Your Cell Phone 192 $234 Million Spam Judgment 192 Report Spam to spam@uce.gov 193 Yahoo! Sues Unknown Spammers in Lottery Scheme 193Resources 194The Nigerian Letter Advance Fee or "419" Scam 194 Recent Arrests 195 The "Lottery" Version 195 How Can They Profit? 196 Sample Nigerian Letter 197 Where to Report a Nigerian (419) Advance Fee Letter 198 The Cyber Crime Melting Pot 198Data Breaches-When Your Data Is Stolen 198Verizon Report: 87% of Breaches Were Avoidable 203 Data Breach Laws 204 Are Data Breach Laws Ineffective? 205 Privacy Rights Clearinghouse 205Online Auction Fraud 206 Escrow Services 206 Pay by Credit Card 206 Learn As Much As You Can About the Seller 207 Secure Versus Nonsecure Transactions 207If It Sounds Too Good to Be True, It Is 208Resources 208Work-at-Home Scams 209 How to Spot a Scam 209 Mystery Shopper Scams 210 Use Common Sense 211 Money Mules 211 The Power of Google-Turn the Tables 211Social Engineering Scams 212 400 People Click to Get a Computer Virus 213Women Versus Men-Who Gets Scammed More? 213The Easiest Way Not to Get Scammed 213Chapter 12 Peer-to-Peer Network Dangers 215P2P Networks 216 P2P and Music Piracy 216 Actual Cases 216 The RIAA Investigation 217 University Cooperation? 217 Challenges to the Lawsuit 218How P2P Works 218 P2P Dangers 218 What the Experts Say 218 Supreme Court Justice's Data Breached 219Chapter 13 Crimes on Camera 221Caught in a Trap 224Ten Hours of Video Uploaded Every Minute 225Using a Digital Camera or Cell Phone to Determine Coordinates 229What You Put Out There, Stays Out There 229Chapter 14 Computers and Drugs 231Techie Dealers 231 Rave Parties 232 Dust Masks and Glo-Sticks 232 A Different Dose Each Time 233 Rave Parties and the World Wide Web 234 Online Recipes 235 How Many Colds Can One Man Have? 235 The Exploding Kitchen 236 Scam Cannabis-One-Stop Marijuana Shopping 236 Steroids 237Drug Dealers Love Technology, Too 238 Tools of the Drug Dealers 238 Who's a Rat? 239Chapter 15 Who Is Tracking Your Online Activities? 241You've Been Profiled-Data Aggregators 241 Cookies-Not the Sugar Kind 242 What Kind of Information Do Cookies Track? 243 Preventing Cookies 243 Our Take on Cookies 243What's a EULA? 244 Even Hackers Have EULAs 245You Need to Know About Bots and Botnets 245 Commtouch Report: 10 Million Infected Computers 246 Operation Bot Roast 247 How They Did It 247 Trends in Botnet Operations 248 Is Your Computer Part of a Botnet? 248 Symptoms of a Bot 248 If You Think Your Computer Is Part of a Botnet 249 The "Gift" That Keeps on Giving 249Chapter 16 Your Online Safety Checkup 251Keep Your System Updated 251Install Virus Protection 252Install Spyware and Malware Detection Programs 253 Malware City 253 StopBadware Report 253Passwords 253 Creating Strong Passwords 254 Multiple Accounts, Multiple Passwords? 255 Password Management Tools 255 Hacking-The New High School Curriculum 256Would You Leave Your Door Unlocked? Unsecured Wi-Fi 256 Piggybacking 257 Wardriving 258 Wi-Fi and "Evil Twin" Spoofing 259 How to Secure Your Home Wi-Fi Connection 259Protecting Your Cell Phone 261 Cell Phone Safety Tips 262Getting Rid of That Old Computer 262 Deleted Files Are Not Deleted! 262 Would You Hand Over Your Checkbook? 263 Secure Wipe Versus Reformat 263 Assume Whatever You Did on the Computer Is Still There 264 Electronic Depots 264How to Recover Your Stolen Laptop 265 Stolen Laptop Locator Services 265Lock Your Car, Please! 266Chapter 17 How We Would Combat Cyber Crime 267The Victim's Perspective 268The Anonymity of the Internet 268Crimes Are Often Multijurisdictional 268How We Would Fight Cyber Crime 269 Recognize That Cyber Crime Is a Business! 269 Develop Greater Cooperation with Financial Institutions 270 Change Law Enforcement's Paradigm of Cyber Crime 270 Create a Single Reporting Site for Cyber Crime 271 Collect Better Statistics 271 Parents Need to Take Control 273 Develop Partnerships and Share Information 274 Cops on the Cyber Beat 275 "Virtual" Policing and Cyber Patrols 275 The "New" Community 276 Offer More Education Programs for Parents 276 Eliminate Territorial Boundaries 277 Use Police Civilians as Experts 277 Adopt Tougher and More Consistent Cyber Crime Laws 278 Standardize Forms 279 Provide More Training on Cyber Crime to Law Enforcement 279 Understand the Changing Nature of Cyber Crime 280Cyber Crime and Cyber Terrorism 280Appendix A Toys They Don't Want You to Know About 283Thumb Drives You Won't Believe 285Appendix B CSI Versus Reality 287 List of CasesGPS for the Ex-Spouse 3Computer Key Stroke Stalking 5A Tale of Technological Terror 6Cops Use GPS, Too 9An Easy Way to Tarnish a Reputation 10The Dean Isenberg Case 11The Amy Boyer Story 12Teachers-The New Cyber Stalker's Target 24Teachers Fight Back: The Erik Trosch Story 24The Anna Draker Case 26Felicia Gets Caught Up in a Homicide Investigation 43Smile for the Hidden Camera 48The Susan Wilson Story 48Location, Location, Location 49Ohio 2008 Voyeurism Case-30 Days in Jail 49The Florentino Avila Case: Our Firsthand Experience 50The Brian Presken Case 52Illegal Use of Legal Name Change 59The Alicia M. Case 66The Jeffrey Marsalis Case 76Jeanette's Story 81Genevieve's Story 83Date Rape Drugs 85The Nurse's Revenge 86NBC Settles Suicide Lawsuit 91Our Version of To Catch a Predator 93The Teacher and His "Student" 103The Jerry Jones Case-A Triple Threat 106The Jacob Silva Case 111The Pumpkin Man 114The Predator's Family Heirloom 116The New Hygiene 116The Lingerie Connection 117The Douglas Simmons Case 121Cop Gets 14 Years for Distributing Kiddie Porn: The John Schenberger Case 123Priest Gets 4 Years 124Can You Keep Your Password Private? The Sebastian Boucher Case 133The "Tara" Series: A Horrific, Yet Bittersweet Success Story 140Online Suicide Pacts 150Online Suicides 151More Online Suicides 151The Megan Meier Story 152Make a Difference for Kids: The Rachel Neblett Story 154Online Murder Plots 154The Art of Murder: The Taylor Behl Story 155Blogging About Cannibalism 157supalover666 165The Justin Berry Story 167Brooke Bennett Goes Missing 170An AMBER Alert with a Happier Ending 173Another AMBER Alert Success Story 173The Elizabeth Smart Story 174A Shocking Story of a Victim, But No Crime 176Swinging Sex Parties in a Quaint New England Town 177Man Charged with Child Porn Was Spam Victim 189The TJ Maxx Data Breach-Largest in History 199The Hannaford Brothers Data Breach 202Pfizer Pharmaceuticals Breach 203Sharing Kiddie Porn 219The Florida Teen Beating 222The Beating of an Art Teacher 224

About the Author

Felicia Donovan (NH) is a law enforcement technology and cybercrime expert who has spent ten years as information systems manager at a New England police department. Kristyn Bernier (NH), a detective and 15-year veteran of a New England-based police department, currently specializes in undercover work in fighting Internet crimes.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Security
Item ships from and is sold by Fishpond.com, Inc.
Back to top