After reading this chapter, you will be able to understand the following:
How to gather personal data about a suspect from a variety of online sources;
Databases available to law enforcement to profile a suspect;
Different types of online crime and how criminal investigations are conducted online; and
How to capture Internet communications, video, images, and other content to add to an investigative ...