Cybercrime Investigative Case Management An Excerpt
from Placing the Suspect Behind the Keyboard 1st
Edition Brett Shavers - PDF Download (2025)
https://ebookultra.com/download/cybercrime-investigative-case-
management-an-excerpt-from-placing-the-suspect-behind-the-
keyboard-1st-edition-brett-shavers/
Visit ebookultra.com today to download the complete set of
ebooks or textbooks
Here are some recommended products for you. Click the link to
download, or explore more at ebookultra.com
Banking Across Boundaries Placing Finance in Capitalism
1st Edition Brett Christophers
https://ebookultra.com/download/banking-across-boundaries-placing-
finance-in-capitalism-1st-edition-brett-christophers/
Investigative Interviewing The Conversation Management
Approach 2nd Edition Shepherd
https://ebookultra.com/download/investigative-interviewing-the-
conversation-management-approach-2nd-edition-shepherd/
Blackhatonomics An Inside Look at the Economics of
Cybercrime 1st Edition Will Gragido
https://ebookultra.com/download/blackhatonomics-an-inside-look-at-the-
economics-of-cybercrime-1st-edition-will-gragido/
Behind the Scenes of the Universe From the Higgs to Dark
Matter 1st Edition Gianfranco Bertone
https://ebookultra.com/download/behind-the-scenes-of-the-universe-
from-the-higgs-to-dark-matter-1st-edition-gianfranco-bertone/
Security Risk Management Building an Information Security
Risk Management Program from the Ground Up 1st Edition
Evan Wheeler
https://ebookultra.com/download/security-risk-management-building-an-
information-security-risk-management-program-from-the-ground-up-1st-
edition-evan-wheeler/
The Case Management Workbook Defining the Role of
Physicians Nurses and Case Managers 1st Edition Cherilyn
G. Murer
https://ebookultra.com/download/the-case-management-workbook-defining-
the-role-of-physicians-nurses-and-case-managers-1st-edition-cherilyn-
g-murer/
Cybercrime The Psychology of Online Offenders Gráinne
Kirwan
https://ebookultra.com/download/cybercrime-the-psychology-of-online-
offenders-grainne-kirwan/
Forensic Science An Introduction to Scientific and
Investigative Techniques Third Edition Bell
https://ebookultra.com/download/forensic-science-an-introduction-to-
scientific-and-investigative-techniques-third-edition-bell/
An Introduction to the Chinese Economy The Driving Forces
Behind Modern Day China 1st Edition Rongxing Guo
https://ebookultra.com/download/an-introduction-to-the-chinese-
economy-the-driving-forces-behind-modern-day-china-1st-edition-
rongxing-guo/
Cybercrime Investigative Case Management An Excerpt
from Placing the Suspect Behind the Keyboard 1st
Edition Brett Shavers Digital Instant Download
Author(s): Brett Shavers
ISBN(s): 9780124095069, 0124095062
Edition: 1
File Details: PDF, 2.69 MB
Year: 2012
Language: english
Cybercrime Investigative
Case Management
This page intentionally left blank
Cybercrime Investigative
Case Management
Using Digital Forensics and
Investigative Techniques to Identify
Cybercrime Suspects
Brett Shavers
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Syngress is an imprint of Elsevier
Syngress is an imprint of Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK
225 Wyman Street, Waltham, MA 02451, USA
First published 2013
Copyright r 2013 Elsevier Inc. All rights reserved.
The material in this book is excerpted from Placing the Suspect Behind the Keyboard: Using
Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.
No part of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or any information storage and
retrieval system, without permission in writing from the publisher. Details on how to seek
permission, further information about the Publisher’s permissions policies and our arrangement
with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency,
can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by
the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and
experience broaden our understanding, changes in research methods, professional practices,
or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in
evaluating and using any information, methods, compounds, or experiments described herein.
In using such information or methods they should be mindful of their own safety and the safety
of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors,
assume any liability for any injury and/or damage to persons or property as a matter of products
liability, negligence or otherwise, or from any use or operation of any methods, products,
instructions, or ideas contained in the material herein.
Trademarks/Registered Trademarks: Brand names mentioned in this book are protected by their
respective trademarks and are acknowledged.
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-409506-9
For information on all Syngress publications
visit our website at store.elsevier.com
This book has been manufactured using Print On Demand technology. Each copy is produced
to order and is limited to black ink. The online version of this book will show color figures
where appropriate.
CONTENTS
Chapter 1 Investigative Case Management ...........................................1
1.1 Introduction ..............................................................................1
1.1.1 Basic Case Tracking ..................................................................2
1.1.2 The Case Name .........................................................................3
1.1.3 Note Taking ..............................................................................5
1.1.4 Analyzing Your Notes...............................................................6
1.1.5 Analysis with Spreadsheets........................................................9
1.1.6 Analysis with Databases..........................................................12
1.1.7 Analysis Using Charts .............................................................15
1.1.8 Analysis Using Maps...............................................................18
1.1.9 Fresh Set of Eyes.....................................................................21
1.1.10 Summary .................................................................................21
Bibliography .......................................................................................22
This page intentionally left blank
CHAPTER 1
Investigative Case Management
1.1 INTRODUCTION ...................................................................................1
1.1.1 Basic Case Tracking.......................................................................2
1.1.2 The Case Name ..............................................................................3
1.1.3 Note Taking....................................................................................5
1.1.4 Analyzing Your Notes...................................................................6
1.1.5 Analysis with Spreadsheets .........................................................9
1.1.6 Analysis with Databases............................................................ 12
1.1.7 Analysis Using Charts ................................................................ 15
1.1.8 Analysis Using Maps .................................................................. 18
1.1.9 Fresh Set of Eyes ........................................................................ 21
1.1.10 Summary...................................................................................... 21
BIBLIOGRAPHY......................................................................................... 22
1.1 INTRODUCTION
This chapter introduces several methods which may allow you to see
inferences as you manage the information in your case. These infer-
ences help connect the dots between evidence and suspects. Instead of
simply taking notes during your investigation, create a system that can
lead to discoveries that may be otherwise missed. Gone are the days of
writing reports and placing reports in binders such as seen in
Figure 1.1. A case with any amount electronic evidence from a single
storage device will quickly overwhelm a system of binders.
Investigative case management enables you to find information
quickly and help you understand your investigation as a whole.
Comprehending your reconstruction of the incident in your investiga-
tion will allow to you see the totality of the reconstructed incident as if
2 Cybercrime Investigative Case Management
Figure 1.1 Finding a single document in a shelf of binders can take more time than necessary compared to search-
ing an electronic folder.
you were there when it occurred. You will have more “Eureka!”
moments when data can be seen as a whole and inferences between
suspects and acts stand out clearly among all information.
There may be a few investigators and analysts who can keep a neat
desk during complex cases whilst the rest of us struggle to keep ahead of
growing mounds of paper. Hundreds of pages are printed to be sorted
throughout the case, duplicates of forms, photos, mail, court orders,
and evidence requests are constantly generated to be filed in some man-
ner, and this can quickly engulf anyone. With multiple cases and exams
of multiple storage devices in each case generating even more case
records, a common scene of the work area can appear to look like the
results of a small office hurricane. Work areas that are cluttered and dis-
organized will also coincidently consist of cases that are not solved
quickly, or even solved at all. This chapter intends to give methods of
controlling information and analyzing it at the same time.
1.1.1 Basic Case Tracking
If there is one rule to remember, it is to handle evidence and informa-
tion as it is collected. As long as each item is bagged and tagged in
your system, the odds of losing or overlooking information are mini-
mized. Bagging and tagging can easily be accomplished using logs
where evidence or information that arrives is logged on paper, as it
arrives, and filed away.
Investigative Case Management 3
Tip
A Stitch in Time Saves Nine
I have never seen success with any method of evidence that does not
involve handling it immediately when collected. Evidence that is placed
aside to deal with at a later time usually results in lost or missing evidence
or forgetting where items of evidence originated. Handle it as soon as
you touch it or you may never see it again.
All other methods of dealing with evidence make your case man-
agement that much easier. If you have a good system already, perhaps
it can be made better using one of the methods described. And if one
suggestion saves you minutes or hours over a period of time, then it is
a worthwhile change to make.
Although electronic data can be reproduced and fingerprint cards
photocopied and scanned, the reproductions of the actual physical
items cannot be cloned. The storage of these types of items requires
safe storage within a secured facility. Physical evidence storage is
vitally important, but this will not be the focus of this chapter. The
focus is to manage your investigation information so that suspects
can be clearly identified and evidence supporting suppositions are
evident.
1.1.2 The Case Name
Before you can analyze your own information, you need to be able to
find it. As seemingly unimportant it sounds, naming your cases
deserves some attention. Depending upon your agency or organization,
there may be an automated system for case names and you have no
choice other than what the system gives you. There is nothing wrong
with that as an internal system is already in place.
But what if you are responsible for creating the name for all your
cases? In that instance, especially if there is more than one person that
works cases in your organization, having any system is better than
having more than one system or no system at all. Figure 1.2 shows a
simple case numbering system that is based on the date the case was
created with an additional sequential number if more than one case is
drawn on that particular day.
4 Cybercrime Investigative Case Management
12-042701
01 = sequential case
12 = year 04 = month 27 = day
number on this date
Figure 1.2 Case numbering system based on the case creation date.
It might seem easier to name a case with its legal name, such as
Doe v. Smith, or maybe even use the name of the client, suspect,
or victim. Realistically, this is not the best method as clients may
change during a civil case, identified suspects may be cleared, or
additional victims identified. Even a court case number can change
if the court venue is changed, perhaps from a state case to a federal
case. There are too many variables that can change with any such
designated name. A date-based format is unaffected by any variables
as it is based on the date created and not the content of an
investigation.
The electronic file names within an investigation may be organized
by using your case name. Simply, each file’s name can be preceded by
its respective case number for ease of searching and cataloging. An
example is seen in Figure 1.3, where case folders contain files named
by the case and type of file. Cases where more than one person creates
documents require a central repository for all documents, which
could be stored on a shared network drive or internal database.
Electronic records propagate quickly and can just as quickly be lost or
overlooked.
If you currently have cases where your electronic case files have
no order in naming conventions, what can you do? Spend hours
renaming dozens or more individual files to some order? To save time
and get your files in order, you could use a file renaming software
utility, such as the Bulk Rename Utility seen in Figure 1.4. In one
Investigative Case Management 5
Figure 1.3 Simplicity in electronic document management will help you keep track of case information.
Figure 1.4 Bulk Rename Utility, http://www.bulkrenameutility.co.uk/.
fell swoop, an entire folder can have the prefix of your case inserted
into each file name.
1.1.3 Note Taking
Sometimes, during the investigative or analysis steps of an investiga-
tion, facts jump out and directly point to a suspect. Other times, it can
6 Cybercrime Investigative Case Management
take much longer to review and follow up on information just to be
able to develop a list of potential suspects. Unless an investigation
clearly points to a single suspect, the effort to develop leads begins
with taking notes and reviewing those notes as the case develops.
Taking notes should be seen as more than documenting your investiga-
tive steps. Note taking is one of your investigative steps. Whether your
notes are scribbled in a notepad or entered into a database, when reviewed
at later dates, you most likely will be able to put one piece of information
together with another that you didn’t see before, forming an inference and
potentially leading to case resolution. It’s getting a “Eureka!” moment
when you least expect it by analyzing your own notes and reports.
One method of keeping all investigative notes and related information
in one place can be accomplished through multifaceted programs, such
as OneNote from Microsoft Office (http://office.microsoft.com/en-us/
onenote/) and EverNote (https://evernote.com/). There are similarities
between both programs, such as being able to save all your notes in one
location with search capabilities. Your notes can include pictures, audio
and video recordings, faxes, e-mails, and almost any electronic file format
you may be using as you conduct your analysis and investigation.
Other benefits to programs like OneNote (Figure 1.5) and EverNote
(Figure 1.6) are that the information can be sent and accessed in the
field through mobile devices. Investigators can take a photo of evidence
with a mobile device in the field and send it directly into the case file.
Web screenshots can also be saved directly into the program. As an
information management option, these types of programs may be useful
to your investigation to organize case data.
Tip
Screen Captures and Graphics
There is truth to the adage “a picture is worth a thousand words.” Visual
representations of your data show the totality of case aspects much faster
and clearer than reading pages of information which describe it.
1.1.4 Analyzing Your Notes
Gone are the days of typewriters. Reports are now typed using any one
of the many word processing software applications available or typed
directly into an internal system. Report narratives, summaries, and briefs
Investigative Case Management 7
Figure 1.5 OneNote interface with a sample case.
Figure 1.6 EverNote interface.
8 Cybercrime Investigative Case Management
are created and stored electronically. The ability to search these electronic
files for information that may have been entered months or years earlier
eliminates the need for physically searching for paper documents. Instead
of spending hours sifting through a dozen boxes of case files looking for
one document, you can search electronically in seconds.
But is typing your notes using a word processing application good
enough? For a final report, any word processing application will work,
however, reviewing a word processed report may not be the easiest to
analyze. As notes are written and typed chronologically, reviewing all
instances of a specific event is a difficult process with a chronological
report. An example would be finding all instances when a USB device
was connected in multiple systems. A typed, chronological report requires
reading through every page to find every instance this information was
typed. Sometimes, being able to review notes out of chronological order
helps find the information needed to understand a case. Perhaps an appli-
cation that is not a simple word processing program would be better.
One example of such an application is KeepNote (http://www.keep-
note.org), a cross-platform note taking utility. As seen in Figure 1.7,
Figure 1.7 KeepNote, http://www.keepnote.org.
Investigative Case Management 9
data is stored in a hierarchy format and customizable to a specific case
or need. The information is able to be searched electronically, files of
various formats can be attached, and reports generated in html or xml
format. KeepNote can also be run from a portable storage device.
Although KeepNote has a simple interface, it provides the analysis of
investigator notes with supporting evidence without completely relying
upon chronological information.
There are other similar applications, available freely through open
source or freeware applications. Some of these are primarily report
writing utilities or light case management utilities, which leaves scal-
ability as a drawback. A program similar to KeepNote is NoteKeeper
(http://www.tolon.co.uk/software/notekeeper/). NoteKeeper is also free-
ware and useful for organizing investigative notes. Another note taking
utility with capabilities of encryption and tamperproof notes is CaseNotes
(http://qccis.com/resources/forensic-tools/casenotes-lite/). CaseNotes, like
NoteKeeper and KeepNotes, is freely available.
The point to be made in analyzing your notes is that although the
information in the notes consists of investigative steps taken, including
analysis of electronic evidence, being able to analyze your actual notes
can be productive. Sometimes, a short sentence created weeks earlier
can take on a whole new meaning when reviewed with other notes cre-
ated later.
1.1.5 Analysis with Spreadsheets
The spreadsheet is perhaps one of the most commonly used, versatile,
and powerful software application used in digital forensics investiga-
tions. The spreadsheet could be used for entering text as if it were a
word processing application, but it shines when used to analyze mas-
sive amounts of information such as displaying events in a chronologi-
cal timeline. Timeline analysis allows viewing and interpreting of data
by sorting the data by various criteria, such as chronological dates or
specific event types.
Timelines can be used to display internet history, event logs, reg-
istry files, or a combination of system and file data. Important
events in a timeline can be given focus through the use of color and
bold text to draw attention during review of the data. As spread-
sheets can be sorted by columns, any header of interest can be
chosen to view in ascending or descending order, or other selection
10 Cybercrime Investigative Case Management
of criteria available. The header columns are the titles for the meta-
data for each data item. The metadata consists of timestamps, file
names, file paths, or any user-selected metadata descriptor that may
be available.
Manipulating a spreadsheet in this manner allows you to quickly
find specific information, even if there are hundreds of thousands of
data rows. This manipulation of how data is viewed also helps to
change your perspective on the data to perhaps see information leading
to investigative leads or conclusions.
Creating a timeline usually involves importing a raw or filtered
amount of information in .csv format into a spreadsheet that can
range from thousands to millions of rows of data. This data can be
collected using timeline applications, including such applications as
Log2timeline (http://log2timeline.net/), Aftertime (http://www.holmes.
nl/NFIlabs/Aftertime), or through scripts and applications such as
RegRipper (http://code.google.com/p/regripper/) developed for collect-
ing timeline data.
Even the export of file lists from forensic analysis applications such
as X-Ways Forensics (http://www.x-ways.net) can be used to create a
timeline. However, exporting massive amounts of data will most likely
contain an amount of information not needed for your investigation.
At that point, time will be needed to substantially cull the data in
order to understand specifics and context of a certain incident.
As information can be imported into a timeline that is specific to a
file type, separate timelines are able to show focus on specific events.
For instance, graphic files, documents, or system related data such as
registry files can be either combined into one timeline or separated
into individual timelines depending on your objective. Figure 1.8
shows filtered data of USB device use only, sorted by date created, as
an example of a narrowly focused timeline, or mini-timeline, displayed
in a spreadsheet.
Because a spreadsheet timeline can contain millions of rows of
data, analysts may simply underutilize this method of analysis fear-
ing being overwhelmed. Even if a massive spreadsheet was sorted
and filtered for review, the time spent can be intensive. However,
I know of no better method of showing the chronology of events
than a timeline.
Investigative Case Management 11
Figure 1.8 Spreadsheet timeline example with USB device data.
Figure 1.9 Example of Internet history displayed in a spreadsheet.
Charts and graphs created in spreadsheet applications are an
effective means to visualize massive amounts of data. Using data in a
particular spreadsheet, charts and graphs can be updated as informa-
tion is updated. Visual representations of data may make it easier to
comprehend the nuances of relationships between events. The visual
impact of a chart as compared to a listing of information is shown in
Figures 1.9 and 1.10. Figure 1.9 is an example of internet history
shown in a spreadsheet that includes the number of visits per web site.
Creating a chart of this data gives a clearer picture of the differences
of web site visits as seen in Figure 1.10.
12 Cybercrime Investigative Case Management
60
50
40
30
20
10
0
Ccleaner Eraser Fox News Breaking News Google e-Discovery, Computer
Forensics
http://www.ccleaner.com http://eraser.heidi.ie http://www.foxnews.com http://www.google.com http://www.accessdata.com
02-042701-001 02-042701-001 02-042701-001 02-042701-001 02-042701-001
Figure 1.10 Example of a graph visually displaying the number of web site visits.
The chart seen in Figure 1.10 shows that the “Ccleaner” web site
was visited much more than the other listed web sites. As a case pre-
sentation method, this is impactful to explain data. As an analysis
method, it can be insightful for your data. Given massive datasets of
internet history, outliers of pertinent facts are glaringly obvious.
The spreadsheet timeline is an effect method of analyzing data, find-
ing patterns or anomalies, and differentiating which data is evidence
from data which is not. Although using charts and graphs in spread-
sheets assists in the analysis of data, these same methods can be used in
the presentation of data, which I have detailed in another book.
1.1.6 Analysis with Databases
As storage device capacity grows, the amount of data grows with it.
Spreadsheets can become overwhelmed with data and at that point
become useless. A database is an option to consider helping with data
analysis when the amount has outpaced a spreadsheet. Relational data-
bases, such as Microsoft Access seen in Figure 1.11, can be linked to
spreadsheets, searched, shared, and used to determine relationships
between data.
Depending upon the chosen database application, scalability can extend
from small teams of investigators to an entire organization. A spreadsheet
timeline can be imported into a database or converted into a database
for analysis. Because databases have a powerful ability to store, orga-
nize, and manage large datasets, the ability to import multiple spread-
sheet timelines allow management of many separate datasets as one.
Investigative Case Management 13
Figure 1.11 Microsoft Access, http://www.microsoft.com.
Especially when multiple timelines have been created for multiple
computer systems, databases are an effective means of analyzing the
timelines through importing into a single database. Creating queries to
generate tables and reports based on a single or multiple filters can be
run against millions of rows of imported spreadsheet timelines. One
example of a query could be a search for a USB device serial number
or particular file. When queried, a database will output a table or
report of all instances of that file, across all imported spreadsheet time-
lines. Mini-timelines consisting of hundreds or fewer rows can be
created from a query in a short period of time rather than searching
millions of rows in multiple spreadsheets for the same information.
Since timelines are based on timestamps from the filesystem, com-
bining different timelines into a single database requires converting all
timestamps into a common timezone, such as Coordinated Universal
Time (UTC) also known as Greenwich Mean Time (GMT). UTC/
GMT is the time standard used worldwide and is a good option of
standardization multiple time zones in your investigation. Otherwise,
the timeline will be confusing at best.
Other documents randomly have
different content
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com