Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations.
Key features of this book include:
- Understanding cybercrime, computers, forensics, and cybersecurity
- Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications
- Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory
- Financial investigation
- Identification (attribution) of cyber-conduct
- Litigation in the criminal and civil arenas.
This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal.
Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.
Related collections and offers
|Sold by:||Barnes & Noble|
|File size:||6 MB|
About the Author
John Bandler is a former cybercrime prosecutor and state trooper now in private practice helping businesses and individuals with cybercrime investigations, traditional investigations, cybersecurity, data privacy, policy review, anti-fraud, and anti-money laundering. While a prosecutor at the New York County District Attorney’s Office, he led a groundbreaking investigation into global cybercrime, data trafficking, and digital currency money laundering which led to the arrest, extradition, and conviction of several international cybercriminals and a dozen domestic identity thieves. This case occurred before virtual currencies and data breaches were regular news, and culminated with a successful trial against the last three defendants, a Ukrainian cybercriminal and two New York identity thieves. Prior to becoming a prosecutor in Mr. Morgenthau’s office, he served as a New York State Trooper in a busy station providing all police services to the local community. Mr. Bandler has a broad range of experience with unique areas of expertise, is licensed to practice law in NY, CT, and DC, holds many professional certifications, and is on the adjunct faculty at Pace University's Law School and John Jay College of Criminal Justice. He teaches a law school course, which he developed, on cybersecurity and cybercrime prosecution, and teaches undergraduate courses on security and cyberlaw. He recently authored the comprehensive book "Cybersecurity for the Home and Office: The Lawyer’s Guide to Taking Charge of your Own Information Security" published by the American Bar Association, and he has written many articles on cybersecurity, cybercrime, fraud, money laundering, criminal justice, and more.
Table of Contents
Part 1: Cyber Law. 1. Introduction. 2. Cybercrimes and Criminal Statutes. 3. Laws Pertaining to the Criminal Investigative Process. 4. Nation State and Terrorist Nexus. 5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal Investigation. 6. The Crime (Act). 7. Gathering Leads and Potential Evidence. 8. Following the Money. 9. Gathering Records and Evidence with an Eye towards Potential Trial. 10. Identification and Attribution of the Suspect. 11. Getting Technical. 12. Apprehending the Suspect and Follow on Actions. 13. The Criminal Investigation and Case Continues after Arrest. Part 3: The Civil Investigation. 14. Comparing the Civil Investigation to the Criminal Investigation. 15. Civil Legal Process Available. 16. E-Discovery. 17. Sharing with Law Enforcement. Part 4: Appendix. 18. Statutes. 19. Criminal Cases. 20. Civil Cases. 21. Cybercrime Investigation Organizations. 22. Cybersecurity Organizations.