Digital Crime and Digital Terrorism / Edition 1

Digital Crime and Digital Terrorism / Edition 1

by Robert W. Taylor, Tory J. Caeti, Kall J. Loper, Eric J. Fritsch
     
 

ISBN-10: 0131141376

ISBN-13: 9780131141377

Pub. Date: 05/15/2005

Publisher: Prentice Hall

Digital Crime and Digital Terrorism is written for students and practitioners with a beginning interest in studying crimes and terrorist acts committed using digital technology. The text is written in a user-friendly fashion designed to be understood by even the most technologically challenged reader. Issues addressed in the book include descriptions of the types of…  See more details below

Overview

Digital Crime and Digital Terrorism is written for students and practitioners with a beginning interest in studying crimes and terrorist acts committed using digital technology. The text is written in a user-friendly fashion designed to be understood by even the most technologically challenged reader. Issues addressed in the book include descriptions of the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other types of digital criminals, an overview of the legal strategies and tactics targeting this type of crime, and in-depth coverage of investigating and researching digital crime and digital terrorism. This book is also applicable for those in criminal justice interested in computer and network crime, those interested in the criminological and criminal justice applications of the computer science field, and for practitioners who are beginning their study in this area.

Product Details

ISBN-13:
9780131141377
Publisher:
Prentice Hall
Publication date:
05/15/2005
Series:
Pearson Criminal Justice Series
Edition description:
Older Edition
Pages:
416
Product dimensions:
6.96(w) x 9.14(h) x 0.83(d)

Table of Contents

(NOTE: Each chapter concludes with Summary and Review Questions.)

SECTION I: THE ETIOLOGY OF DIGITAL CRIME AND DIGITAL TERRORISM.

1. Introduction and Overview of Digital Crime.

Chapter Objectives.

Introduction.

New Threats to the Information Age.
Purpose and Scope of this Book.

Digital Crime and Digital Terrorism.

A Developmental Perspective of the Growing Problem.
Increases in Cyber Victimization.
The Changing Character of Cyber Victimization

Types of Computer Crime.

The Computer as Target.
The Computer as an Instrument of a Crime.
The Computer as Incidental to a Crime.
Crimes Associated with the Prevalence of Computers.

2. Digital Terrorism.

Chapter Objectives.

Defining the Concepts.

Buzzwords: Information Warfare and Cyber-Terrorism.

Risk and Critical Infrastructure Attacks.

Information Attacks.

Web-Site Defacement.
Cyberplagues—Viruses and Worms.
Distributed Denial of Service Attacks.
Unauthorized Intrusions.

Cyber and Technological Facilitation.

Facilitation of Attack.
Data Hiding.
Cryptography.

Propaganda and Promotion.

Cyber-Terrorism as an Adjunct Attack.

Al-Qaeda and Information Technology.

China and Information Warfare.

3. The Criminology of Computer Crime.

Introduction.

Choice Theory.

Routine Activities.

Deterrence Theory.

Psychological Theories.

Moral Development and Crime.
Personality Disorders.

Pedophiles and Psychological Theory.

Social Structure Theories.

Strain Theory.
White-Collar Crime and Strain Theory.
Subculture Theory.

Hackers and Social Structure Theories.

Social Process Theories.

Learning Theory.
Social Control Theory.

Virus Writers and Social Process Theories.

Terrorism and Political Theory.

4. Digital Criminals and Hackers.

Chapter Objectives.

What is a Hacker?

The Original Meaning of “Hacker”.
What did Hackers Become?
Retaking the word: Hacker.
What do Hackers Do?

The Hacker Subculture.

Prosocial Hacking.
The Hacker Ethic.

Hacker Typology.

Old School Hackers.
The Merger of Phone Phreaks and Hackers.
Bedroom Hackers.
Larval Hackers (Newbies).
Warez Doodz.
Internet Hackers.
Script Kiddies.
Hacktivists.

A Hacker by Any Other Name...

Computer Criminals vs. Hackers.
Crackers.
White Hat versus Black Hat.

Hackers and the Media.

Fear, Uncertainty, and Doubt - FUD.

SECTION II: DIGITAL CRIME: TYPES, NATURE, AND EXTENT.

5. White Collar Crimes.

Chapter Objectives.

Embezzlement.

A Computer-Assisted Crime.

Corporate Espionage.

Money Laundering.

E-Commerce and the Internet.

Identity Theft.

Internet Fraud Schemes.

6. Viruses and Malicious Code.

Chapter Objectives.

Viruses and Malicious Code.

History and Development.
Viruses.
Worms.
Trojan Horses.
Adware and Spyware.
Denial of Service Attacks.
Blended Threats.

Extent of Viruses and Malicious Codes.

Attack Trends.
Malicious Code Trends.
Vulnerability Highlights.
Current Issues.
Virus Hoaxes.

Virus Writers and Virus Experts.

7. Exploitation, Stalking and Obscenity on the WWW.

Chapter Objectives.

Nature of Exploitation on the Internet.

Incidence and Prevalence of Victimization Online.

Stalking via the WWW.

Dynamics and Nature of Stalking and Cyber Stalking.
Characteristics of Stalkers and Their Victims.
Law Enforcement and Legislation Targeting Stalking.

Obscenity on the WWW.

Laws and Legislation Protecting Children Online.

Child Pornography.

The “New” Child Pornographers.
The Process of Moving from Pornography to Molestation.

Child Molestation.

The Problem of Child Sexual Abuse.

Sex Tourism.

The Process of Sex Tourism.

Issues in the Investigation of Internet Exploitation, Cyber-Stalking, and Obscenity.

Law Enforcement Initiatives.
Overlapping Jurisdiction and Duplication of Effort.
Identification of Suspects.
Issues with Evidence and Detection.

8. Anarchy and Hate on the World Wide Web.

Chapter Objectives.

Digital Hate.

White Supremacy, Hate and the Internet.

Terrorist Extremists from the Left.

ELF and ALF.

Domestic Terrorists in Cyberspace.

Dehumanize, Desensitize and Demonize.
Internet Cartoons.

Storage and Dissemination of Information.

Publishing Information on Potential Victims.
Fundraising.

Terrorism, Intelligence Gathering and the USA PATRIOT Act.

A Short History of Intelligence in the United States.
Domestic Intelligence and Policing.
Conflicting Roles.
Defining Intelligence.
U.S. Intelligence Weaknesses.

The USA PATRIOT Act.

Constitutional Rights and the USA PATRIOT Act.

SECTION III: CONTROLLING DIGITAL CRIME: LEGISLATION, LAW ENFORCEMENT, AND INVESTIGATION.

9. Digital Laws and Legislation.

Chapter Objectives.

Search and Seizure Law for Digital Evidence.

Searches With Warrants.
Searches Without Warrants.

Federal Statutes.

The Pen/Trap Statute 18 U.S.C. §3121-27.
The Wiretap Statute (“Title III”) 18 U.S.C. §2510-22.
Electronic Communications Privacy Act “ECPA” 18 U.S.C. §2701-11.
USA PATRIOT Act.
Communication Assistance for Law Enforcement Act.
Federal Criminal Statutes.

Admitting Evidence at Trial.

Authentication.
Hearsay.
The Best Evidence Rule.

Significant Court Cases.

10. Law Enforcement Roles and Responses.

Chapter Objectives.

Federal Roles and Responses.

The Secret Service.
The Department of Justice.
The Federal Bureau of Investigation.
The National Security Agency.
The Federal Trade Commission.
The Postal Service.
The Bureau of Customs and Border Protection.
The Department of Energy.

State and Local Roles.

Critical Needs as the State and Local Levels of Enforcement.

Interagency Cooperation and Collaboration.

11. The Investigation of Computer-Related Crime.

Chapter Objectives.

Investigator Roles and Responsibilities.

First Responders.
Investigators.
Forensic Analysts.
Private Police.
Subject Matter Experts.

Single Location Crime Scenes.

Search Warrants and Electronic Evidence.

Computer Systems.
External Storage Media.
Personal Data Devices (PDA’s).
Other Electronic Devises.
Executing the Search Warrant.
Examining of the Crime Scene.
Multiple Location and Network Crime Scenes.
Identifying Network Architectures.
Modeling Network Transactions.
Locating Evidence.
Key Information for Locating Network Trace Evidence.

Presenting Digital Evidence at Trial.

The Hearsay Rule.
Using Notes on the Witness Stand.
Business Records.
Presenting Best Evidence.
Chain of Custody.
Expert Testimony.

12. Digital Forensics.

Chapter Objectives.

The Basic Process of Storage Forensics.

Preparation for Forensic Analysis.

Acquisition of Data.
Authentication of Data.
Imaging of the Evidence Drive.
Wiping the Analysis Drive.
Restoring.

Forensic Analysis.

The Forensic Analyst as Expert Witness.

Computer Storage Systems.

Volatile Storage Systems.
Non-Volatile Storage Systems.

File Systems.

FAT: File Allocation Table.
NTFS: New Technology File System.
Dynamic Disks.
Encrypting File Systems — EFS.

Evidence Recovering from Slack Space.

Application: Defragmenting a Disk.

Commercial Forensic Packages.

Extended Analysis and Searching.
User Interface.
Centralized Report Writing and Auditing.
Validation and Support.

SECTION IV: THE FUTURE OF DIGITAL CRIME AND DIGITAL TERRORISM: PREVENTION AND TRENDS.

13. Information Security and Infrastructure Protection.

Chapter Objectives.

Mastering the Technology and the Environment.

Personal Computers and Intruders.
The Internet Explosion.

Principles of Risk Analysis.

Assessment and Evaluation.
Threats.
Cost-Effective Security.
Security Technologies.
Back-Ups.
Firewalls.
Limitations of Firewalls.
Encryption.
Password Discipline.

Security Vendor Technologies.

Home Users.

14. Digital Crime and Terrorism: A Forecast of Trends and Policy Implications. Adapted from David L. Carter and Andra J. Katz-Bannister.

Chapter Objectives.

The Impact of Computer Crime: The Future Is Now.

Predicting the Future: Surveying the Experts.
Limitations to Data Collection.

The Future of Digital Crime and Digital Terrorism: Forecasts.

Forecast 1.
Forecast 2.
Forecast 3.
Forecast 4.
Forecast 5.
Forecast 6.
Forecast 7.
Forecast 8.

Overarching Factors Contributing to these Forecasts.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >