CONTENTS:- CYBER TERRORISM - The Internet opens New Arena for outlaws; COUNTERING THE CYBER TERRORISM - Gathering Intelligence, Tools Techniques; CYBER HOAXES - Not so funny, Incur Heavy losses sometimes; CHILD PORNOGRAPHY ON THE INTERNET - The Book "Lolita" and its horrible aftermath; RISE & DEVELOPMENT OF PORN INDUSTRY - The secret history of civilization; COMPUTER VIRUSES ON THE INTERNET - Their history, evolution and reality; SEARCHING & SEIZING COMPUTERS UNDER LAW - The US procedure could well suit us too; ELECTRONIC SURVEILLANCE OF NETWORKS - Rising question of privacy infringement; THE CRIME COMBAT: FBI DEVELOPS SNIFFER - The carnivore project under controversy; RANDOM REPORTS OF NET CRIMES - Writing on the wall.
DESCRIPTION
It is now well established that cyber crimes can be countered effectively through an evolving blend of awareness, education and organized counter measures. In the following pages are to be found the much needed coverage of the major abuses of the Internet; Cyber terrorism, Virus, Hoax, and Pornography. The detailed descriptions and exhaustive illustrations from actual records provide a valuable starting point for all those involved in the task of finding ways and means of curbing the abuse of the Internet. As such, the present publication acquires the significance of a social document, a valuable addition to all college and university libraries.