- ホーム
- > 洋書
- > 英文書
- > Internet / General
Full Description
"Cyber Crime Fightersinsightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least want to have it."-Maureen Boyle, crime reporter,The Enterprise of Brockton, MA"Experts Felicia Donovan and Kristyn Bernier pull no punches in explaining the dangers lurking on the Web, from identity appropriation and theft to using new technology and the Internet to facilitate real-life stalking. Parents especially will be shocked at how easy it is for predators to target and solicit children online."By clearly explaining the dangers that lurk online and highlighting practical tips to minimize your risk, the authors have created a book that not only educates but empowers readers to protect themselves."-Jennifer Hemmingsen, columnist and former public safety reporter,The (Cedar Rapids, Iowa) GazetteWritten by leading cyber crime investigators, Cyber Crime Fighters: Tales from the Trenches takes you behind the scenes to reveal the truth behind Internet crime, telling shocking stories that aren't covered by the media, and showing you exactly how to protect yourself and your children. This is the Internet crime wave as it really looks to law enforcement insiders: the truth about crime on social networks and YouTube, cyber stalking and criminal cyber bullying, online child predators, identity theft, even the latest cell phone crimes. Here are actual cases and actual criminals, presented by investigators who have been recognized by the FBI and the N.H. Department of Justice. These stories are true-and if you want to stay safe, you need to know about them. * Learn how today's criminals can track your whereabouts, read your emails, and steal your identity* Find out how much of your personal information is already online-and how to keep the rest private* Learn how cyber stalkers really think-and how to protect yourself from them* Protect your laptop, your iPod, and your precious data from getting stolen* Encounter the "dark side" of Internet dating * Discover the hidden crime wave on today's specialized social networks * Uncover the cell phone "upskirters" and "downblousers" -and the technicalities that keep them out of jail* Follow cyber crime specialists as they investigate and catch online sexual predators * Get the real truth about phishing, pharming, criminal spam, and online scams* See how investigations really work-and why TV crime shows often get it wrong!* Walk through your own personal, step-by-step, online safety checkup
Contents
Chapter 1 Cyber Stalking 1High-Tech Stalkers 2"How I Stalked My Girlfriend" 4The Victim's Side 8Identity Assumption 9The Wild, Wild Web 10Sticks and Stones 13The "Stalker" E-Card 14Cyber Stalking and the Law 16Cyber Stalking Facts 17Lethality Assessment Tools 18If You Think You Are Being Cyber Stalked 19Teen/Tech Stalking 21Teen Study 21Online Games-The New Stalker's Ground 22Online Gaming and Malware 23Would You Say It to My Face? 23National School Board Survey 23Women as Perpetrators 26Cyber Stalking Prevention Resources 26Chapter 2 Two Bedrooms Up, One Bedroom Down-What Someone Can Find Out About You on the Internet 27Your Digital Footprint 28The Best Sources to Find Out About People 28"Tracking Teresa" 29Town and City Websites 29Zillow-We Know Your Neighborhood 31We Know Your Dog's Name 31Online Memorials 32Political Contributions 32People Search Sites 33Search Your Own Name 33The Wayback Machine 34Website Registration Records 34E-Venge 35DontDateHimGirl.com 36Lessons Learned 36Chapter 3 Cyber Crime Tools You Won't Believe 37Wi-Fi Tracking 37Packet Sniffers 37Bluetooth Locating 38What Is an IP Address 38Anonymizers and Anonymous Remailers 40Fake Name Generators 42Fake Caller ID 42Chapter 4 Upskirting, Downblousing, and Your Right to Privacy in the Cell Phone and Digital Age 47Upskirting and Downblousing 47We Fight for Changes in the Law 50Stickam: Voyeurism or Exhibitionism 51New Challenges to Voyeurism Law 51How Prevalent Is Voyeurism? 53How to Prevent Becoming a Victim of Voyeurism 54Is a Stranger Watching Your Nanny Cam? 54The Voyeur's Backpack 55Resources 55Chapter 5 Identity Theft 57Identity Theft: The Number-One Type of Fraud 5723,000 Victims Per Day: One Every 3.5 Seconds 58Cheap Credit Cards 58Identity Theft Versus Identity Fraud 59The Long Road to Recovery 60The NCIC Identity Theft File 60Guilty Until Proven Innocent 61Types of Identity Theft 61Delays in Notification 62Preventing Identity Theft 63Monitor Your Accounts 63Get Your Free Annual Credit Report (annualcreditreport.com) 63Credit Report Tips 64Felicia Finds "Rogue" Account 65Monitor Your Child's Credit Report 66Tips to Prevent Your Child's Identity from Being Stolen 66More Identity-Theft Prevention Tips 67Shred, Shred, Shred 69Fraudulent Donations 70If You Are a Victim of Identity Theft 70Identity Theft Services 72LifeLock Gets Sued 72Attorney General Becomes ID Theft Victim 73Resources 73Chapter 6 Online Dating-Are You Safe? 75Can Online Dating Be Made Safer? 77Criminal History Checks-What Can You Really Find Out? 77Online Dating Dilemmas 79Victim Reluctance to Report 82Lack of Evidence and Empathy 85Online Dating Safety Tips 87Chapter 7 We Catch Sexual Predators-What You Don't See on TV 89The Dateline Debacle: To Catch a Predator 89Perverted Justice and To Catch a Predator in Action 90Problems with To Catch a Predator 91Does To Catch a Predator Hinder Law Enforcement? 91The Good and the Bad 92Misdemeanor Versus Felony 101Laws Vary from State to State 102Lessons Learned 102Free Babysitting 105The Internet-A Pedophile's New Playground 10512 Million Hits in 72 Hours 106Male Versus Female Offenders 107The Cyber Playground 109Chapter 8 Child Sexual Assault Images-The New View on Child Pornography 111Fritz Does Federal-Enticement Across State Lines 113Child Pornography Collectors 113Sex Offender Websites: Facts Versus Fiction 117The National Sex Offender Public Registry 122U.S. Supreme Court Rules CG Kiddie Porn Is Perfectly Legal 124Digital Images 126Congress Reacts 126The National Center for Missing and Exploited Children 126Child Victim Identification Program (CVIP) 127Operation Avalanche 129Landslide Productions 129How Far Does "Private Fantasy" Go? The Zidel Case 130Recent Developments 131Supreme Court Overturns Ruling 132Laws and Loopholes 134Laptops and Customs Searches 135Laptop Search by Customs Is Challenged 135Sex Offender Caught at Border 135A Balancing Act 136SAFE Act 136Social Networks and Sex Offenders 137Facebook and MySpace Get Tougher on Sex Offenders? 137KIDS Bill 138Child Porn Sites Shut Down? 138ICAC: The Internet Crimes Against Children Task Force 140The Child Advocacy Center: A Victim-Centered Approach 143Missouri: 30 Days, 7,000 Computers Trading Kiddie Porn 145NCMEC Survey 145Internet Safety Guidelines 146Resources 146Chapter 9 Social Networks/Social Nightmares 147Online Societies 147More and More Specialized Social Networks 148They Call It Love, We Call It Pedophilia 149Suicide "Assistance" Sites-alt.suicide.holiday (ASH) 150Never Say, "My Child Will Never..." 152Common Interest Guaranteed 157Words Can Never Hurt Me? 158Internet Safety Guidelines 158Chapter 10 Sexual Deviance Online (Child Sex Rings, Prostitution, Sexual Victimization, and Other Bizarre Stories) 161The Darker Side of the Online Sex Trade 162The Emperor's Club 164The Innocence Lost Initiative 165Mayor Blames Craigslist for Child Prostitution 166A Nationwide Epidemic-293,000 Children at Risk 168Internet Sex and Robbery: "Operation FALCON" 169Child Sex Rings: The Darkest Side of the Internet 170The AMBER Alert 172How You Can Help-Please Join In 174Cellular Porn: The Uglier Side of Cell Phones 175The Danger of Webcams 178Chapter 11 Phishing, Pharming, Spam, and Scams 179Phishing 179Call to Action-Danger, Danger 180Hyperlinks-Hyper Dangerous! 181New Twists on Phishing 182Charity Phishing Scams 182How Do Phishers Make Money? 183Vishing-Cell Phone Phishing 183Recent Trends-Vishing Over Phishing 184IC3 Name Used in Fraudulent Phishing Scam 185Pharming-Fake Websites 185Spam, Spam, Spam 187Where Did Spam Come From? 187Who Profits from Spam? 188Why Spam Is Dangerous 188Spam Vigilantes 190Spam Spiders 190How to Reduce Spam 190New Twist-Death Threats via Spam 191Is Spam Illegal? 191The CAN-SPAM Act 191New Twist-Text Spam on Your Cell Phone 192$234 Million Spam Judgment 192Report Spam to spam@uce.gov 193Yahoo! Sues Unknown Spammers in Lottery Scheme 193Resources 194The Nigerian Letter Advance Fee or "419" Scam 194Recent Arrests 195The "Lottery" Version 195How Can They Profit? 196Sample Nigerian Letter 197Where to Report a Nigerian (419) Advance Fee Letter 198The Cyber Crime Melting Pot 198Data Breaches-When Your Data Is Stolen 198Verizon Report: 87% of Breaches Were Avoidable 203Data Breach Laws 204Are Data Breach Laws Ineffective? 205Privacy Rights Clearinghouse 205Online Auction Fraud 206Escrow Services 206Pay by Credit Card 206Learn As Much As You Can About the Seller 207Secure Versus Nonsecure Transactions 207If It Sounds Too Good to Be True, It Is 208Resources 208Work-at-Home Scams 209How to Spot a Scam 209Mystery Shopper Scams 210Use Common Sense 211Money Mules 211The Power of Google-Turn the Tables 211Social Engineering Scams 212400 People Click to Get a Computer Virus 213Women Versus Men-Who Gets Scammed More? 213The Easiest Way Not to Get Scammed 213Chapter 12 Peer-to-Peer Network Dangers 215P2P Networks 216P2P and Music Piracy 216Actual Cases 216The RIAA Investigation 217University Cooperation? 217Challenges to the Lawsuit 218How P2P Works 218P2P Dangers 218What the Experts Say 218Supreme Court Justice's Data Breached 219Chapter 13 Crimes on Camera 221Caught in a Trap 224Ten Hours of Video Uploaded Every Minute 225Using a Digital Camera or Cell Phone to Determine Coordinates 229What You Put Out There, Stays Out There 229Chapter 14 Computers and Drugs 231Techie Dealers 231Rave Parties 232Dust Masks and Glo-Sticks 232A Different Dose Each Time 233Rave Parties and the World Wide Web 234Online Recipes 235How Many Colds Can One Man Have? 235The Exploding Kitchen 236Scam Cannabis-One-Stop Marijuana Shopping 236Steroids 237Drug Dealers Love Technology, Too 238Tools of the Drug Dealers 238Who's a Rat? 239Chapter 15 Who Is Tracking Your Online Activities? 241You've Been Profiled-Data Aggregators 241Cookies-Not the Sugar Kind 242What Kind of Information Do Cookies Track? 243Preventing Cookies 243Our Take on Cookies 243What's a EULA? 244Even Hackers Have EULAs 245You Need to Know About Bots and Botnets 245Commtouch Report: 10 Million Infected Computers 246Operation Bot Roast 247How They Did It 247Trends in Botnet Operations 248Is Your Computer Part of a Botnet? 248Symptoms of a Bot 248If You Think Your Computer Is Part of a Botnet 249The "Gift" That Keeps on Giving 249Chapter 16 Your Online Safety Checkup 251Keep Your System Updated 251Install Virus Protection 252Install Spyware and Malware Detection Programs 253Malware City 253StopBadware Report 253Passwords 253Creating Strong Passwords 254Multiple Accounts, Multiple Passwords? 255Password Management Tools 255Hacking-The New High School Curriculum 256Would You Leave Your Door Unlocked? Unsecured Wi-Fi 256Piggybacking 257Wardriving 258Wi-Fi and "Evil Twin" Spoofing 259How to Secure Your Home Wi-Fi Connection 259Protecting Your Cell Phone 261Cell Phone Safety Tips 262Getting Rid of That Old Computer 262Deleted Files Are Not Deleted! 262Would You Hand Over Your Checkbook? 263Secure Wipe Versus Reformat 263Assume Whatever You Did on the Computer Is Still There 264Electronic Depots 264How to Recover Your Stolen Laptop 265Stolen Laptop Locator Services 265Lock Your Car, Please! 266Chapter 17 How We Would Combat Cyber Crime 267The Victim's Perspective 268The Anonymity of the Internet 268Crimes Are Often Multijurisdictional 268How We Would Fight Cyber Crime 269Recognize That Cyber Crime Is a Business! 269Develop Greater Cooperation with Financial Institutions 270Change Law Enforcement's Paradigm of Cyber Crime 270Create a Single Reporting Site for Cyber Crime 271Collect Better Statistics 271Parents Need to Take Control 273Develop Partnerships and Share Information 274Cops on the Cyber Beat 275"Virtual" Policing and Cyber Patrols 275The "New" Community 276Offer More Education Programs for Parents 276Eliminate Territorial Boundaries 277Use Police Civilians as Experts 277Adopt Tougher and More Consistent Cyber Crime Laws 278Standardize Forms 279Provide More Training on Cyber Crime to Law Enforcement 279Understand the Changing Nature of Cyber Crime 280Cyber Crime and Cyber Terrorism 280Appendix A Toys They Don't Want You to Know About 283Thumb Drives You Won't Believe 285Appendix B CSI Versus Reality 287List of CasesGPS for the Ex-Spouse 3Computer Key Stroke Stalking 5A Tale of Technological Terror 6Cops Use GPS, Too 9An Easy Way to Tarnish a Reputation 10The Dean Isenberg Case 11The Amy Boyer Story 12Teachers-The New Cyber Stalker's Target 24Teachers Fight Back: The Erik Trosch Story 24The Anna Draker Case 26Felicia Gets Caught Up in a Homicide Investigation 43Smile for the Hidden Camera 48The Susan Wilson Story 48Location, Location, Location 49Ohio 2008 Voyeurism Case-30 Days in Jail 49The Florentino Avila Case: Our Firsthand Experience 50The Brian Presken Case 52Illegal Use of Legal Name Change 59The Alicia M. Case 66The Jeffrey Marsalis Case 76Jeanette's Story 81Genevieve's Story 83Date Rape Drugs 85The Nurse's Revenge 86NBC Settles Suicide Lawsuit 91Our Version of To Catch a Predator 93The Teacher and His "Student" 103The Jerry Jones Case-A Triple Threat 106The Jacob Silva Case 111The Pumpkin Man 114The Predator's Family Heirloom 116The New Hygiene 116The Lingerie Connection 117The Douglas Simmons Case 121Cop Gets 14 Years for Distributing Kiddie Porn: The John Schenberger Case 123Priest Gets 4 Years 124Can You Keep Your Password Private? The Sebastian Boucher Case 133The "Tara" Series: A Horrific, Yet Bittersweet Success Story 140Online Suicide Pacts 150Online Suicides 151More Online Suicides 151The Megan Meier Story 152Make a Difference for Kids: The Rachel Neblett Story 154Online Murder Plots 154The Art of Murder: The Taylor Behl Story 155Blogging About Cannibalism 157supalover666 165The Justin Berry Story 167Brooke Bennett Goes Missing 170An AMBER Alert with a Happier Ending 173Another AMBER Alert Success Story 173The Elizabeth Smart Story 174A Shocking Story of a Victim, But No Crime 176Swinging Sex Parties in a Quaint New England Town 177Man Charged with Child Porn Was Spam Victim 189The TJ Maxx Data Breach-Largest in History 199The Hannaford Brothers Data Breach 202Pfizer Pharmaceuticals Breach 203Sharing Kiddie Porn 219The Florida Teen Beating 222The Beating of an Art Teacher 224



