
The “Investigations Involving the Internet and Computer Networks” handbook (
PDF ) on 137 pages details how to use the Internet during investigative activities. Dozens of top US computer security and Internet intelligence experts from both government departments and commercial companies, including Hewlett-Packard, Computer Forensics and even eBay, took part in its compilation. It is assumed that this manual will be distributed to investigators in all states, and they will carefully study it and begin to put into practice methods of high-tech intelligence.
This knowledge is becoming increasingly relevant, because more and more often the police have to use Internet technology during the investigation. The point is not even that the number of cybercrime, such as sexual harassment in chat rooms, spamming or the exchange of pirated files, is increasing. The fact is that nowadays almost
any criminal can be found evidence on the Internet . Criminals use the Network for a variety of purposes, including searching for victims, hiding their own identity, exchanging information with accomplices, etc.
The detective should know the technical arsenal of the criminal and be able to carry out the investigation. Signs can be found on websites, in mailboxes, chat rooms and file-sharing networks.
Separate chapters of the book are devoted to specific operational-search activities.
')
IP address calculation
Email Investigation
Website Investigation
Investigation of IM-services, chat and IRC
Investigation of file sharing networks
Investigation of network intrusions and DoS attacks
Investigation of forums, mailing lists and newsgroups
It is usually easy to calculate the computer from which the email or chat message was sent. But the authors of the manual warn the detective that the owner of this computer is not necessarily the culprit, especially if it is a PC running Windows, because this system is extremely vulnerable to outside penetration. Moreover, criminals very often declare their innocence, choosing a "Trojan" line of defense. To find out the truth, you need to investigate the suspect's hard drive.