Cyber Crime Fighters: Tales from the Trenches [NOOK Book]

Overview

Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least want to have it.”

—Maureen Boyle, crime reporter,

The Enterprise of Brockton, MA

“Experts Felicia Donovan and Kristyn Bernier pull no punches in explaining the dangers lurking on the Web, from identity appropriation ...

See more details below
Cyber Crime Fighters: Tales from the Trenches

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.49
BN.com price
(Save 41%)$17.99 List Price

Overview

Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least want to have it.”

—Maureen Boyle, crime reporter,

The Enterprise of Brockton, MA

“Experts Felicia Donovan and Kristyn Bernier pull no punches in explaining the dangers lurking on the Web, from identity appropriation and theft to using new technology and the Internet to facilitate real-life stalking. Parents especially will be shocked at how easy it is for predators to target and solicit children online.

“By clearly explaining the dangers that lurk online and highlighting practical tips to minimize your risk, the authors have created a book that not only educates but empowers readers to protect themselves.”

—Jennifer Hemmingsen, columnist and former public safety reporter,

The (Cedar Rapids, Iowa) Gazette

Written by leading cyber crime investigators, Cyber Crime Fighters: Tales from the Trenches takes you behind the scenes to reveal the truth behind Internet crime, telling shocking stories that aren’t covered by the media, and showing you exactly how to protect yourself and your children. This is the Internet crime wave as it really looks to law enforcement insiders: the truth about crime on social networks and YouTube, cyber stalking and criminal cyber bullying, online child predators, identity theft, even the latest cell phone crimes. Here are actual cases and actual criminals, presented by investigators who have been recognized by the FBI and the N.H. Department of Justice. These stories are true–and if you want to stay safe, you need to know about them.

• Learn how today’s criminals can track your whereabouts, read your emails, and steal your identity

• Find out how much of your personal information is already online–and how to keep the rest private

• Learn how cyber stalkers really think–and how to protect yourself from them

• Protect your laptop, your iPod, and your precious data from getting stolen

• Encounter the “dark side” of Internet dating

• Discover the hidden crime wave on today’s specialized social networks

• Uncover the cell phone “upskirters” and “downblousers” –and the technicalities that keep them out of jail

• Follow cyber crime specialists as they investigate and catch online sexual predators

• Get the real truth about phishing, pharming, criminal spam, and online scams

• See how investigations really work–and why TV crime shows often get it wrong!

• Walk through your own personal, step-by-step, online safety checkup

Read More Show Less

Product Details

  • ISBN-13: 9780768687521
  • Publisher: Pearson Education
  • Publication date: 12/18/2008
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 336
  • Sales rank: 1,344,245
  • File size: 3 MB

Meet the Author

Felicia Donovan is a recognized law enforcement technology and cyber crime expert who spent ten years at a New England police department and received recognition from the FBI on her work related to cases. The author of the popular The Black Widow Agency series, she has been featured in Law Enforcement Technology magazine.

Kristyn Bernier, a detective and 15-year veteran of a New England-based police department, currently specializes in undercover work fighting Internet crimes. As an investigator with the Northern New England Internet Crimes Against Children Task Force, she has been honored by the N.H. Department of Justice.

Read More Show Less

Read an Excerpt

PrefaceA Message from the Authors

"The only thing necessary for the triumph of evil is for good men to do nothing."

—Edmund Burke

Cyber Crime Fighters: Tales from the Trenches is an important part of your personal safety arsenal. The reality these days is that you are far more likely to become a victim of a cyber crime than a physical crime. Preventing victimization online can translate into preventing yourself from being vulnerable offline as well. Studies show a significant correlation between stalking and physical abuse, sexual assault, and even homicide; therefore, every step toward education, awareness, and prevention can make a huge difference in regard to your safety.

Many books are now available about cyber crime and online safety, but few are written from the perspective of two women with over 25 years of combined law-enforcement experience who understand both the limitations of law enforcement and the court system in prosecuting cyber crime—as investigators, experts, and victims of cyber crime.

For example, the reality of the legal system today is that prosecuting a cyber stalker, even if a guilty verdict is obtained, does not mean the offender will necessarily spend a great deal of time behind bars—if they're even sent to prison at all. This does not take into account that only a fraction of these incidences are ever reported, let alone prosecuted. It is estimated that 1.4 million people are stalked in America every year. Only 42% actually report their stalker to the police, with 57% saying that they did not initially report for fear of being ignored or laughed at (University of Leicester, 2005). It is estimated that over 80% of stalking incidences on college campuses are not reported to the police (National Victimization of College Women, Fisher, Cullen & Turner, 2000). That's the painful reality we see day in and day out in our real jobs.

Cyber Crime Fighters: Tales from the Trenches chronicles the real-life stories of fighting cyber crime, how it can be prevented, and the human component of victimization—putting a face on the issues and telling the stories of victims that are never told .

We'll show you the shocking tools readily available to cyber stalkers and identity thieves. This book becomes an important tool in your personal safety arsenal by providing information in an easy-to-understand format with resources for further investigation.

We'll reveal tools available to track someone's whereabouts—both in person and online—including many that can be installed in under 5 minutes! It covers important issues such as whether it's legal for someone to covertly take your picture with a digital camera and post it online. We'll provide specific websites for you to get a better idea of how much of your personal information is already available online, plus teach you how to limit your information from getting out there in the first place. These are the tools of cyber stalkers, but we want you to be aware of them so you know exactly how a cyber stalker thinks. For a cyber stalker, information is dominance and power, and we show you the websites they use and the lengths they'll go to obtain that power. CCF shows how a few simple steps can reduce your web whereabouts from being tracked. We introduce the concept of online voyeurism while explaining the laws about digital privacy, and we give you easy steps to follow to shore up your computer's defenses to prevent identity theft. CCF covers the most recent stories and technologies to ensure your personal online safety. We even share our own personal experiences, including becoming victims of cyber crime and trying to "catch our own predators." We also give you and your children important safety tools to use.

Cyber Crime Fighters: Tales from the Trenches covers the impact of social networks, the migration of cyber crime to the cell phone platform, the Adam Walsh Act, legislation to stiffen penalties against sex offenders, voyeurism, YouTube as a virtual ground for all kinds of criminal activity, and the horror of online dating gone bad.

If you were to install a security system in your house, does it guarantee you'll never get burglarized? Of course not, but it can significantly reduce the chances of someone breaking into your house. You still need to be vigilant and mindful. Consider this book an adjunct to your personal safety system. It is the flashing red alert to advise you that the email that sounds too good to be true, is. It is the caution flag that let's you know someone's demeanor could easily lead them to becoming an online stalker. It is the resource that shows you what tools are available that make it easy for someone to track your whereabouts, read your email, and steal your identity. We even show you ways to protect your iPod and laptop from getting stolen.

The purpose of this book is not to scare anyone away from going online, but rather to educate readers on how to go online and be safe. The Internet can be a very safe place with some basic knowledge of what is not safe and how to avoid it.

Stay safe.

—Felicia and Kristyn

Note - Whenever possible, we have used actual cases that have been publicly disseminated. In many cases, we have identified offenders by name. We do not, however, identify victims by name, even if their names were publicly released. We have changed the names of victims in order to protect their identity. We feel very strongly about not revictimizing anyone for the sake of this book.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Table of Contents

Chapter 1 Cyber Stalking 1

High-Tech Stalkers 2

“How I Stalked My Girlfriend” 4

The Victim’s Side 8

Identity Assumption 9

The Wild, Wild Web 10

Sticks and Stones 13

The “Stalker” E-Card 14

Cyber Stalking and the Law 16

Cyber Stalking Facts 17

Lethality Assessment Tools 18

If You Think You Are Being Cyber Stalked 19

Teen/Tech Stalking 21

Teen Study 21

Online Games—The New Stalker’s Ground 22

Online Gaming and Malware 23

Would You Say It to My Face? 23

National School Board Survey 23

Women as Perpetrators 26

Cyber Stalking Prevention Resources 26

Chapter 2 Two Bedrooms Up, One Bedroom Down—What Someone Can Find Out About You on the Internet 27

Your Digital Footprint 28

The Best Sources to Find Out About People 28

“Tracking Teresa” 29

Town and City Websites 29

Zillow—We Know Your Neighborhood 31

We Know Your Dog’s Name 31

Online Memorials 32

Political Contributions 32

People Search Sites 33

Search Your Own Name 33

The Wayback Machine 34

Website Registration Records 34

E-Venge 35

DontDateHimGirl.com 36

Lessons Learned 36

Chapter 3 Cyber Crime Tools You Won’t Believe 37

Wi-Fi Tracking 37

Packet Sniffers 37

Bluetooth Locating 38

What Is an IP Address 38

Anonymizers and Anonymous Remailers 40

Fake Name Generators 42

Fake Caller ID 42

Chapter 4 Upskirting, Downblousing, and Your Right to Privacy in the Cell Phone and Digital Age 47

Upskirting and Downblousing 47

We Fight for Changes in the Law 50

Stickam: Voyeurism or Exhibitionism 51

New Challenges to Voyeurism Law 51

How Prevalent Is Voyeurism? 53

How to Prevent Becoming a Victim of Voyeurism 54

Is a Stranger Watching Your Nanny Cam? 54

The Voyeur’s Backpack 55

Resources 55

Chapter 5 Identity Theft 57

Identity Theft: The Number-One Type of Fraud 57

23,000 Victims Per Day: One Every 3.5 Seconds 58

Cheap Credit Cards 58

Identity Theft Versus Identity Fraud 59

The Long Road to Recovery 60

The NCIC Identity Theft File 60

Guilty Until Proven Innocent 61

Types of Identity Theft 61

Delays in Notification 62

Preventing Identity Theft 63

Monitor Your Accounts 63

Get Your Free Annual Credit Report (annualcreditreport.com) 63

Credit Report Tips 64

Felicia Finds “Rogue” Account 65

Monitor Your Child’s Credit Report 66

Tips to Prevent Your Child’s Identity from Being Stolen 66

More Identity-Theft Prevention Tips 67

Shred, Shred, Shred 69

Fraudulent Donations 70

If You Are a Victim of Identity Theft 70

Identity Theft Services 72

LifeLock Gets Sued 72

Attorney General Becomes ID Theft Victim 73

Resources 73

Chapter 6 Online Dating—Are You Safe? 75

Can Online Dating Be Made Safer? 77

Criminal History Checks—What Can You Really Find Out? 77

Online Dating Dilemmas 79

Victim Reluctance to Report 82

Lack of Evidence and Empathy 85

Online Dating Safety Tips 87

Chapter 7 We Catch Sexual Predators—What You Don’t See on TV 89

The Dateline Debacle: To Catch a Predator 89

Perverted Justice and To Catch a Predator in Action 90

Problems with To Catch a Predator 91

Does To Catch a Predator Hinder Law Enforcement? 91

The Good and the Bad 92

Misdemeanor Versus Felony 101

Laws Vary from State to State 102

Lessons Learned 102

Free Babysitting 105

The Internet—A Pedophile’s New Playground 105

12 Million Hits in 72 Hours 106

Male Versus Female Offenders 107

The Cyber Playground 109

Chapter 8 Child Sexual Assault Images—The New View on Child Pornography 111

Fritz Does Federal—Enticement Across State Lines 113

Child Pornography Collectors 113

Sex Offender Websites: Facts Versus Fiction 117

The National Sex Offender Public Registry 122

U.S. Supreme Court Rules CG Kiddie Porn Is Perfectly Legal 124

Digital Images 126

Congress Reacts 126

The National Center for Missing and Exploited Children 126

Child Victim Identification Program (CVIP) 127

Operation Avalanche 129

Landslide Productions 129

How Far Does “Private Fantasy” Go? The Zidel Case 130

Recent Developments 131

Supreme Court Overturns Ruling 132

Laws and Loopholes 134

Laptops and Customs Searches 135

Laptop Search by Customs Is Challenged 135

Sex Offender Caught at Border 135

A Balancing Act 136

SAFE Act 136

Social Networks and Sex Offenders 137

Facebook and MySpace Get Tougher on Sex Offenders? 137

KIDS Bill 138

Child Porn Sites Shut Down? 138

ICAC: The Internet Crimes Against Children Task Force 140

The Child Advocacy Center: A Victim-Centered Approach 143

Missouri: 30 Days, 7,000 Computers Trading Kiddie Porn 145

NCMEC Survey 145

Internet Safety Guidelines 146

Resources 146

Chapter 9 Social Networks/Social Nightmares 147

Online Societies 147

More and More Specialized Social Networks 148

They Call It Love, We Call It Pedophilia 149

Suicide “Assistance” Sites—alt.suicide.holiday (ASH) 150

Never Say, “My Child Will Never…” 152

Common Interest Guaranteed 157

Words Can Never Hurt Me? 158

Internet Safety Guidelines 158

Chapter 10 Sexual Deviance Online (Child Sex Rings, Prostitution, Sexual Victimization, and Other Bizarre Stories) 161

The Darker Side of the Online Sex Trade 162

The Emperor’s Club 164

The Innocence Lost Initiative 165

Mayor Blames Craigslist for Child Prostitution 166

A Nationwide Epidemic—293,000 Children at Risk 168

Internet Sex and Robbery: “Operation FALCON” 169

Child Sex Rings: The Darkest Side of the Internet 170

The AMBER Alert 172

How You Can Help—Please Join In 174

Cellular Porn: The Uglier Side of Cell Phones 175

The Danger of Webcams 178

Chapter 11 Phishing, Pharming, Spam, and Scams 179

Phishing 179

Call to Action—Danger, Danger 180

Hyperlinks—Hyper Dangerous! 181

New Twists on Phishing 182

Charity Phishing Scams 182

How Do Phishers Make Money? 183

Vishing—Cell Phone Phishing 183

Recent Trends—Vishing Over Phishing 184

IC3 Name Used in Fraudulent Phishing Scam 185

Pharming—Fake Websites 185

Spam, Spam, Spam 187

Where Did Spam Come From? 187

Who Profits from Spam? 188

Why Spam Is Dangerous 188

Spam Vigilantes 190

Spam Spiders 190

How to Reduce Spam 190

New Twist—Death Threats via Spam 191

Is Spam Illegal? 191

The CAN-SPAM Act 191

New Twist—Text Spam on Your Cell Phone 192

$234 Million Spam Judgment 192

Report Spam to spam@uce.gov 193

Yahoo! Sues Unknown Spammers in Lottery Scheme 193

Resources 194

The Nigerian Letter Advance Fee or “419” Scam 194

Recent Arrests 195

The “Lottery” Version 195

How Can They Profit? 196

Sample Nigerian Letter 197

Where to Report a Nigerian (419) Advance Fee Letter 198

The Cyber Crime Melting Pot 198

Data Breaches—When Your Data Is Stolen 198

Verizon Report: 87% of Breaches Were Avoidable 203

Data Breach Laws 204

Are Data Breach Laws Ineffective? 205

Privacy Rights Clearinghouse 205

Online Auction Fraud 206

Escrow Services 206

Pay by Credit Card 206

Learn As Much As You Can About the Seller 207

Secure Versus Nonsecure Transactions 207

If It Sounds Too Good to Be True, It Is 208

Resources 208

Work-at-Home Scams 209

How to Spot a Scam 209

Mystery Shopper Scams 210

Use Common Sense 211

Money Mules 211

The Power of Google—Turn the Tables 211

Social Engineering Scams 212

400 People Click to Get a Computer Virus 213

Women Versus Men—Who Gets Scammed More? 213

The Easiest Way Not to Get Scammed 213

Chapter 12 Peer-to-Peer Network Dangers 215

P2P Networks 216

P2P and Music Piracy 216

Actual Cases 216

The RIAA Investigation 217

University Cooperation? 217

Challenges to the Lawsuit 218

How P2P Works 218

P2P Dangers 218

What the Experts Say 218

Supreme Court Justice’s Data Breached 219

Chapter 13 Crimes on Camera 221

Caught in a Trap 224

Ten Hours of Video Uploaded Every Minute 225

Using a Digital Camera or Cell Phone to Determine Coordinates 229

What You Put Out There, Stays Out There 229

Chapter 14 Computers and Drugs 231

Techie Dealers 231

Rave Parties 232

Dust Masks and Glo-Sticks 232

A Different Dose Each Time 233

Rave Parties and the World Wide Web 234

Online Recipes 235

How Many Colds Can One Man Have? 235

The Exploding Kitchen 236

Scam Cannabis—One-Stop Marijuana Shopping 236

Steroids 237

Drug Dealers Love Technology, Too 238

Tools of the Drug Dealers 238

Who’s a Rat? 239

Chapter 15 Who Is Tracking Your Online Activities? 241

You’ve Been Profiled—Data Aggregators 241

Cookies—Not the Sugar Kind 242

What Kind of Information Do Cookies Track? 243

Preventing Cookies 243

Our Take on Cookies 243

What’s a EULA? 244

Even Hackers Have EULAs 245

You Need to Know About Bots and Botnets 245

Commtouch Report: 10 Million Infected Computers 246

Operation Bot Roast 247

How They Did It 247

Trends in Botnet Operations 248

Is Your Computer Part of a Botnet? 248

Symptoms of a Bot 248

If You Think Your Computer Is Part of a Botnet 249

The “Gift” That Keeps on Giving 249

Chapter 16 Your Online Safety Checkup 251

Keep Your System Updated 251

Install Virus Protection 252

Install Spyware and Malware Detection Programs 253

Malware City 253

StopBadware Report 253

Passwords 253

Creating Strong Passwords 254

Multiple Accounts, Multiple Passwords? 255

Password Management Tools 255

Hacking—The New High School Curriculum 256

Would You Leave Your Door Unlocked? Unsecured Wi-Fi 256

Piggybacking 257

Wardriving 258

Wi-Fi and “Evil Twin” Spoofing 259

How to Secure Your Home Wi-Fi Connection 259

Protecting Your Cell Phone 261

Cell Phone Safety Tips 262

Getting Rid of That Old Computer 262

Deleted Files Are Not Deleted! 262

Would You Hand Over Your Checkbook? 263

Secure Wipe Versus Reformat 263

Assume Whatever You Did on the Computer Is Still There 264

Electronic Depots 264

How to Recover Your Stolen Laptop 265

Stolen Laptop Locator Services 265

Lock Your Car, Please! 266

Chapter 17 How We Would Combat Cyber Crime 267

The Victim’s Perspective 268

The Anonymity of the Internet 268

Crimes Are Often Multijurisdictional 268

How We Would Fight Cyber Crime 269

Recognize That Cyber Crime Is a Business! 269

Develop Greater Cooperation with Financial Institutions 270

Change Law Enforcement’s Paradigm of Cyber Crime 270

Create a Single Reporting Site for Cyber Crime 271

Collect Better Statistics 271

Parents Need to Take Control 273

Develop Partnerships and Share Information 274

Cops on the Cyber Beat 275

“Virtual” Policing and Cyber Patrols 275

The “New” Community 276

Offer More Education Programs for Parents 276

Eliminate Territorial Boundaries 277

Use Police Civilians as Experts 277

Adopt Tougher and More Consistent Cyber Crime Laws 278

Standardize Forms 279

Provide More Training on Cyber Crime to Law Enforcement 279

Understand the Changing Nature of Cyber Crime 280

Cyber Crime and Cyber Terrorism 280

Appendix A Toys They Don’t Want You to Know About 283

Thumb Drives You Won’t Believe 285

Appendix B CSI Versus Reality 287

List of Cases

GPS for the Ex-Spouse 3

Computer Key Stroke Stalking 5

A Tale of Technological Terror 6

Cops Use GPS, Too 9

An Easy Way to Tarnish a Reputation 10

The Dean Isenberg Case 11

The Amy Boyer Story 12

Teachers—The New Cyber Stalker’s Target 24

Teachers Fight Back: The Erik Trosch Story 24

The Anna Draker Case 26

Felicia Gets Caught Up in a Homicide Investigation 43

Smile for the Hidden Camera 48

The Susan Wilson Story 48

Location, Location, Location 49

Ohio 2008 Voyeurism Case—30 Days in Jail 49

The Florentino Avila Case: Our Firsthand Experience 50

The Brian Presken Case 52

Illegal Use of Legal Name Change 59

The Alicia M. Case 66

The Jeffrey Marsalis Case 76

Jeanette’s Story 81

Genevieve’s Story 83

Date Rape Drugs 85

The Nurse’s Revenge 86

NBC Settles Suicide Lawsuit 91

Our Version of To Catch a Predator 93

The Teacher and His “Student” 103

The Jerry Jones Case—A Triple Threat 106

The Jacob Silva Case 111

The Pumpkin Man 114

The Predator’s Family Heirloom 116

The New Hygiene 116

The Lingerie Connection 117

The Douglas Simmons Case 121

Cop Gets 14 Years for Distributing Kiddie Porn: The John Schenberger Case 123

Priest Gets 4 Years 124

Can You Keep Your Password Private? The Sebastian Boucher Case 133

The “Tara” Series: A Horrific, Yet Bittersweet Success Story 140

Online Suicide Pacts 150

Online Suicides 151

More Online Suicides 151

The Megan Meier Story 152

Make a Difference for Kids: The Rachel Neblett Story 154

Online Murder Plots 154

The Art of Murder: The Taylor Behl Story 155

Blogging About Cannibalism 157

supalover666 165

The Justin Berry Story 167

Brooke Bennett Goes Missing 170

An AMBER Alert with a Happier Ending 173

Another AMBER Alert Success Story 173

The Elizabeth Smart Story 174

A Shocking Story of a Victim, But No Crime 176

Swinging Sex Parties in a Quaint New England Town 177

Man Charged with Child Porn Was Spam Victim 189

The TJ Maxx Data Breach—Largest in History 199

The Hannaford Brothers Data Breach 202

Pfizer Pharmaceuticals Breach 203

Sharing Kiddie Porn 219

The Florida Teen Beating 222

The Beating of an Art Teacher 224

Read More Show Less

Preface

PrefaceA Message from the Authors

"The only thing necessary for the triumph of evil is for good men to do nothing."

—Edmund Burke

Cyber Crime Fighters: Tales from the Trenches is an important part of your personal safety arsenal. The reality these days is that you are far more likely to become a victim of a cyber crime than a physical crime. Preventing victimization online can translate into preventing yourself from being vulnerable offline as well. Studies show a significant correlation between stalking and physical abuse, sexual assault, and even homicide; therefore, every step toward education, awareness, and prevention can make a huge difference in regard to your safety.

Many books are now available about cyber crime and online safety, but few are written from the perspective of two women with over 25 years of combined law-enforcement experience who understand both the limitations of law enforcement and the court system in prosecuting cyber crime—as investigators, experts, and victims of cyber crime.

For example, the reality of the legal system today is that prosecuting a cyber stalker, even if a guilty verdict is obtained, does not mean the offender will necessarily spend a great deal of time behind bars—if they're even sent to prison at all. This does not take into account that only a fraction of these incidences are ever reported, let alone prosecuted. It is estimated that 1.4 million people are stalked in America every year. Only 42% actually report their stalker to the police, with 57% saying that they did not initially report for fear of being ignored or laughed at (University ofLeicester, 2005). It is estimated that over 80% of stalking incidences on college campuses are not reported to the police (National Victimization of College Women, Fisher, Cullen & Turner, 2000). That's the painful reality we see day in and day out in our real jobs.

Cyber Crime Fighters: Tales from the Trenches chronicles the real-life stories of fighting cyber crime, how it can be prevented, and the human component of victimization—putting a face on the issues and telling the stories of victims that are never told .

We'll show you the shocking tools readily available to cyber stalkers and identity thieves. This book becomes an important tool in your personal safety arsenal by providing information in an easy-to-understand format with resources for further investigation.

We'll reveal tools available to track someone's whereabouts—both in person and online—including many that can be installed in under 5 minutes! It covers important issues such as whether it's legal for someone to covertly take your picture with a digital camera and post it online. We'll provide specific websites for you to get a better idea of how much of your personal information is already available online, plus teach you how to limit your information from getting out there in the first place. These are the tools of cyber stalkers, but we want you to be aware of them so you know exactly how a cyber stalker thinks. For a cyber stalker, information is dominance and power, and we show you the websites they use and the lengths they'll go to obtain that power. CCF shows how a few simple steps can reduce your web whereabouts from being tracked. We introduce the concept of online voyeurism while explaining the laws about digital privacy, and we give you easy steps to follow to shore up your computer's defenses to prevent identity theft. CCF covers the most recent stories and technologies to ensure your personal online safety. We even share our own personal experiences, including becoming victims of cyber crime and trying to "catch our own predators." We also give you and your children important safety tools to use.

Cyber Crime Fighters: Tales from the Trenches covers the impact of social networks, the migration of cyber crime to the cell phone platform, the Adam Walsh Act, legislation to stiffen penalties against sex offenders, voyeurism, YouTube as a virtual ground for all kinds of criminal activity, and the horror of online dating gone bad.

If you were to install a security system in your house, does it guarantee you'll never get burglarized? Of course not, but it can significantly reduce the chances of someone breaking into your house. You still need to be vigilant and mindful. Consider this book an adjunct to your personal safety system. It is the flashing red alert to advise you that the email that sounds too good to be true, is. It is the caution flag that let's you know someone's demeanor could easily lead them to becoming an online stalker. It is the resource that shows you what tools are available that make it easy for someone to track your whereabouts, read your email, and steal your identity. We even show you ways to protect your iPod and laptop from getting stolen.

The purpose of this book is not to scare anyone away from going online, but rather to educate readers on how to go online and be safe. The Internet can be a very safe place with some basic knowledge of what is not safe and how to avoid it.

Stay safe.

—Felicia and Kristyn

Note - Whenever possible, we have used actual cases that have been publicly disseminated. In many cases, we have identified offenders by name. We do not, however, identify victims by name, even if their names were publicly released. We have changed the names of victims in order to protect their identity. We feel very strongly about not revictimizing anyone for the sake of this book.


© Copyright Pearson Education. All rights reserved.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted December 19, 2008

    AWESOME BOOK

    I am a parent of a teens, and being naive about the internet, I purchased this book and could not put it down. It was very informative and very enjoyable at the same time. The stories are great and really drive the point home about how to stay safe on the internet. A must read for anyone who has a computer.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)