ABSTRACT

Chapter Objectives Understand scams and how scam artists work Become familiar with the crime of identity theft Look at the issue of Internet fraud See how scams and identity theft are closely related Identify methods and techniques to obtain evidence from Internet and Web resources Look at issues of child molestation and predators who are using the Web Recognize the resources for identifying evidence stored on business and personal computer assets Learn the technical and legal terms relating to scams, fraud, and identity theft

Introduction The computer forensic investigator must understand the environment where crimes are committed. The Internet and the computer-networking environment are a complex subject. The investigators must understand the complex issues relating to personal computer-user safety and security. There are many possibilities of predators, who pose both financial and personal risks, waiting for some unsuspecting victim.