Preface - Wired for Crime. Part 1 Terminal velocity: 1.1 Timelines of technology; 1.2 Doubtful definitions - from computer fraud to e-crime; 1.3 Scales and justice; 1.4 Who is (s)he and what is (s)he to you? Part 2 System error: 2.1 Hacked, cracked and phraked; 2.2 Self made disasters (and a few own goals); 2.3 The threat inside; 2.4 Dispensing cash; 2.5 Digital laundering; 2.6 My electronic wallet; 2.7 Virus Attacks. Part 3 Wideopentoabuse.com: 3.1 The medium is the message; 3.2 The wheels of fortune; 3.3 Images of innocence; 3.4 Identity theft. Part 4 Information warfare: 4.1 Origins and definitions; 4.2 Old wine in new bottles; 4.3 A war fought by terrorists; 4.4 A useful business tool? Part 5 Privacy lost: 5.1 We've got a line on you; 5.2 Cookies, Carnivore and Echelon; 5.3 Echelon keywords (perhaps?); 5.4 Spam, glorious Spam; 5.5 Abuse by e-mail. Part 6 Gimme shelter: Hints, tips, ideas and suggestions to fight crime, fraud and risk in the digital age.