As the use of the Internet and other computer networks has grown rapidly in recent years, so has the opportunity for electronic crime. Unlawful activity can be committed or facilitated online. Criminals can trade and share info., mask their identity, identify and gather info. on victims, and communicate with co-conspirators. This report is intended to be a resource for individuals responsible for investigations involving the Internet and other computer networks. The recommendations presented in this guide are not mandates or policy directives and may not represent the only correct course of action. It does not discuss all of the issues that may arise in these investigations and does not attempt to cover traditional investigative procedures. Illus.Most common Web browsers allow users to view the source of a Web page. Exhibit 10 shows a screen capture for the www.nist.gov Web site, followed by the HTML source information. To view the HTML source using Internet ExplorerAr, selectanbsp;...
|Title||:||Investigations Involving the Internet and Computer Networks|
|Publisher||:||DIANE Publishing - 2010-01|