For a limited time, you can purchase your copy of High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front and SAVE 35% off the list price. Click here and enter the coupon code: CRIMES-05 during checkout to receive this discount, plus Free shipping in the US. Offer expires July 31, 2005.

While I believe this is a great book, don't just take my word for it. Here are a sample of the reviews that I have received.
  • Alex Moskalyuk wrote in the IT Observer that the book reads like "... a report from the sheriff's office telling the reader how the high-tech crimes are solved, how the criminals are traced, why certain crimes take years to solve and why others one don't get solved at all."
  • Kristy Westphal wrote in UNIX REVIEW.COM that "High Tech Crimes deftly balances the technical explanations with plain English and humor to appeal to the technology-saavy reader as well as the executive."
  • ComputerWorld has even featured a chapter.
  • For more reviews click here.

    Available from:
  • Amazon.com
  • Walmart
  • Barnes and Noble
  • Addison Wesley (the publisher!)

    The table of contents for High Tech Crimes Revealed

    Section 1 Inside high tech crimes

    Chapter 1 An Attack on the Telephone Network

  • The first meeting
  • How did this start?
  • Next steps
  • Cyber-tailing
  • The management update
  • A review of the data…
  • Decisions, decisions…
  • Off to see the law
  • Building the search warrant
  • Execution of the warrant
  • The computer forensics
  • The end game
  • Conclusions

    Chapter 2 An Attack on an ISP

  • The start of a case
  • You can never find…
  • A surprising find
  • Time for another search
  • Pulling it back together
  • The conclusion

    Chapter 3 If He Had Just Paid the Rent

  • Introduction
  • The eviction
  • A Simple Twist
  • NYECTF
  • Time to Collect the Stuff
  • The Initial Examination
  • The previous owner
  • The Prosecution
  • Why Speeding Is Not Such A Good Idea
  • Fugitive lessons
  • The Fugitive’s Choice
  • Wesley’s moves
  • Technicalities
  • End-game

    Chapter 4 Inside a Hacker Sting Operation…

  • Operation Cybersnare background
  • Being a Confidential Informant
  • The Sting starts
  • Forensic findings
  • The 7 steps of hacking:
  • Time to act
  • The leftovers

    Chapter 5 Identity Theft

  • What is Identity Theft
  • How did we get here?
  • The resultant crimes
  • What and when do people notice
  • What to do if you are a victim?
  • What else can be done

    What drive high tech crimes

    Chapter 6 Let’s ask the hackers…

  • Bob gets some attention
  • The initial exam of the drive
  • Evaluating the damage
  • The hacker interview
  • Next hacker: Alphie
  • Lessons learned:

    Chapter 7 Why do hackers hack?

  • Technology itself isn’t the solution
  • Know your adversary
  • What drives them?
  • The hacker motivations
  • Further refinements
  • Insiders: Motivated by profit and revenge
  • Outsiders: Motivated by profit and curiosity
  • What can be done?

    Chapter 8 Setting the Stage

  • The growth of high tech crime
  • In the beginning…
  • Distributed computing begins
  • Today’s corporate network
  • The result of network evolution
  • The Network Growth
  • What upsets network security
  • Closing thoughts

    Lessons Learned

    Chapter 9 High Tech Crime

  • Why is High Technology Popular?
  • What is a high tech crime?
  • The growing threat
  • Information IS the target
  • Complexities with High Tech Crimes
  • What about private citizens
  • High Tech versus society

    Chapter 10 What not to do

  • What could possibly go wrong?
  • Some lessons
  • Management team issues
  • Poor case management
  • Impatience/ Rushing Cases
  • Lacking of understanding of the technology being investigated
  • Miscommunication
  • Bad luck

    Chapter 11 How to run a high tech case

  • Some concerns
  • The basics
  • How does a case start?
  • Actively investigate the case.
  • Make your move
  • See the case through
  • The end game

    Chapter 12 What have We Learned

  • A High Tech Crime Timeline
  • Warning labels
  • A virtual identity makes crime easier.
  • Computers in society
  • Running ahead of ourselves?
  • Is there hope?
  • How to respond?
  • Parting thoughts

    Appendix