![]() |
PROGRAM FOR INVESTIGATORS SHOWS YOU HOW TO: TRACK AND TRACE ANYONE ACROSS THE INTERNET CD-Rom In PDF Files Or Both! |

| CHAPTERS |
| CHAPTER 1 - CRIMES ON THE INTERNET |
| CHAPTER 2 - GETTING STARTED ON THE INTERNET |
| CHAPTER 3 - BASIC COMPUTER AND INTERNET SAFETY |
| CHAPTER 4 - BEWARE OF GIFTS FROM THE WEB |
| CHAPTER 5- INTELLIGENCE FROM A WEB SITE |
| CHAPTER 6 - SOFTWARE FOR COLLECTING THE EVIDENCE |
| CHAPTER 7 - PREDATORS IN NEWSGROUPS |
| CHAPTER 8 - PREDATORS IN YAHOO! PERSONALS, CLUBS AND INSTANT MESSAGES |
| CHAPTER 9 - ILLEGAL ACTIVITY IN MAILING LISTS |
| CHAPTER 10 - EXAMINING E-MAIL HEADERS |
| CHAPTER 11 - MAKING TELEPHONE CALLS |
| CHAPTER 12- USING ONLINE PUBLIC RECORDS |
| APPENDIX |
| APPENDIX 1 - STALKING INCIDENT LOG |
| APPENDIX 2 - UNDERCOVER ALIAS PROFILE INFORMATION |
| APPENDIX 3 - INVESTIGATION EVIDENCE LOG |
| APPENDIX 4 - ANSWERS TO THEIR COMMON QUESTIONS |
| APPENDIX 5 - INTERNET SERVICE PROVIDER LEGAL DEPARTMENT CONTACTS |
| APPENDIX 6 - GLOSSARY OF INTERNET ACRONYMS AND EMOTICONS |
| APPENDIX 7 - AOL SUBPOENA AND SEARCH WARRANT INFORMATION |
| APPENDIX 8 - KIDS ONLINE SAFETY QUIZ |
| APPENDIX 9 - ONLINE SAFETY PLEDGE |
