Cybercrime Investigations & Computer Crime Prevention

I. INVESTIGATIVE RESEARCH & RESOURCES

A. Internet protocol number lookups





B. Person name searches



 C. Phone numbers






D. Legal resources

E. Other

          E-mail headers - how to open the header to find the source IP address
          
http://www.haltabuse.org/help/headers/index.shtml


----------------------------------------------------------------------

II. SYSTEM PROTECTION

A. Anti-virus

 B. Anti-spyware

C. Firewalls


D. Data removal


E. Encryption


----------------------------------------------------------------------

III. MONITORING & SURVEILLANCE SOFTWARE



----------------------------------------------------------------------

IV. EVIDENCE COLLECTION

    Shipley, T.G. and Reeve, H.G. (2006). Collecting evidence from a running computer: A technical and legal
    primer for the justice community. SEARCH, The National Consortium for Justice Information and Statistics.
    Sacramento, CA. 12 pages. Retrieved April 28, 2007 from
    www.search.org/files/pdf/CollectEvidenceRunComputer.pdf


Cyberthreats

Investigations

Prevention

Contact:

Dr. Frank Kardasz  
P.O. Box 45048
Phoenix AZ 85064

e-mail:  kardasz(at)kardasz.org
Blog:
http://kardasz.blogspot.com/
Linkedin: http://www.linkedin.com/in/kardasz
Facebook: http://www.facebook.com/Dr.Kardasz