This book presents a comprehensive view of cybercrime and its investigation, offering information on the broad array of topics necessary to properly investigate these pervasive crimes. It is ideal as a professional reference for practitioners from the public and private sectors, and perfect as a coursebook for future professionals. It is written for a wide audience of investigators, professionals and any others with an interest in cybercrime investigation. It is well organized and modular, please see the chapter listing below, and additional information on using this as a coursebook or for training.

Cybercrime Investigations: A Comprehensive Resource for Everyone, by John Bandler and Antonia Merzon

Part I: Understanding Cybercrime, Computers, and Cybersecurity

  • Chapter 1 The Need for Good Cybercrime Investigators (Introduction)
  • Chapter 2 What is Cybercrime and Why is it Committed
  • Chapter 3 Introduction to Computers, Networks, and Forensics
  • Chapter 4 Introduction to Information Security and Cybersecurity

Part II: Law for the Cybercrime Investigator

  • Chapter 5 Fundamental Principles of Criminal and Civil Law
  • Chapter 6 Cybercrime Defined: The Criminal Statutes Outlawing Criminal Conduct Online
  • Chapter 7 The Law Enforcement Legal Toolbox for Investigating Cybercrime (Laws for Gathering Criminal Cyber Evidence)
  • Chapter 8 Cyber Investigations Linked to Nation-States or Terrorists
  • Chapter 9 Civil and Regulatory Legal Implications of Cybercrime (Cyberlaw in the Civil and Regulatory Sectors)

Part III: The Cybercrime Investigation

  • Chapter 10 Embarking on a Cybercrime Investigation: The Three Perspectives and Key Areas of Focus
  • Chapter 11 General Investigation Methods: Organization, Open Source, Records, and Email
  • Chapter 12 The Private Entity's Cybercrime Investigation
  • Chapter 13 Law Enforcement’s Cybercrime Investigation
  • Chapter 14 The Regulator’s Investigation
  • Chapter 15 Financial Investigation: Following the Cybercrime Money
  • Chapter 16 Identification of the Suspect: Attributing Cyber Conduct to a Person
  • Chapter 17 Apprehending the Suspect and the Investigation that Follows

Part IV: Litigation  (Cybercrime Investigations in Court)  

  • Chapter 18 Criminal litigation
  • Chapter 19 Civil Litigation
  • Chapter 20 Conclusion

Throughout the book are vignettes on a host of interesting topics, including the thread case of People of the State of New York v. Western Express International, Inc., et al. We worked on this cybercrime investigation and prosecution for eight years, from the report of the first criminal incident through the defendants' conviction after trial, and it led us across the United States and around the globe.

The book also contains interesting and informative tables, figures, and diagrams. Some of the diagrams feature original art in the cartoon characters, see our acknowledgment page for more details.

Click here for information on purchasing the book.

Click here for information on using this as a coursebook for your course or training.