ABSTRACT

Introduction This book does not pretend to solve all the issues surrounding Internet investigations, cybervetting, and intelligence, but it will allow any practitioner or organization to establish the foundation for sound methodology, policies, and procedures. The urgency of the need to address Internet behaviors and data available online is illustrated in this book, but perhaps a bit more discussion would be useful for both cyber investigations and ethics.