Visit us at
Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that ﬁt the demands of our customers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site.
SOLUTIONS WEB SITE
To register your book, visit www.syngress.com/solutions. Once registered, you can access our email@example.com Web pages. There you may ﬁnd an assortment of value-added features related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s).
Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Conﬁguration, to name a few.
For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably.
Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at signiﬁcant savings.
Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at firstname.lastname@example.org for more information.
Many organizations welcome the ability to combine parts of multiple Syngress books, as well as their own content, into a single volume for their own internal use. Contact us at email@example.com for more information.
Cyber Crime Investigations
Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors Anthony Reyes
New York City Police Department’s Computer Crimes Squad Detective, Retired
Kevin O’Shea Jim Steele Jon R. Hansen Captain Benjamin R. Jean Thomas Ralph
Elsevier, Inc., the author(s), and any person or ﬁrm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of proﬁts, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and ﬁles. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Prooﬁng®,” are registered trademarks of Elsevier, Inc. “Syngress:The Deﬁnition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 HJIRTCV764 002 PO9873D5FG 003 829KM8NJH2 004 78SPLBBC72 005 CVPLQ6WQ23 006 VBP965T5T5 007 HJJJ863WD3E 008 2987GVTWMK 009 629MP5SDJT 010 IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors
Copyright © 2007 by Elsevier, Inc. All rights reserved. Printed in the United...
United States National Strategy to Secure Cyberspace, February 14, 2003 (hereinafter “National Strategy”) at 10.The National Strategy is available at: http://www.whitehouse.gov/pcipb/.
See Testimony of Keith Lourdeau, Deputy Assistant Director, Cyber Division, FBI Before the Senate Judiciary Subcommittee on Terrorism,Technology, and Homeland Security, February 24, 2004 (“The FBI assesses the cyberterrorism threat to the U.S
Please join StudyMode to read the full document