Digital Crime and Digital Terrorism / Edition 1

Paperback (Print)
Rent from
(Save 59%)
Est. Return Date: 07/26/2015
Buy New
Buy New from
Buy Used
Buy Used from
(Save 34%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (20) from $1.99   
  • New (2) from $58.77   
  • Used (18) from $1.99   


This book focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes. For professionals in the technical field as well as forensic investigators and other criminal justice professionals.

Read More Show Less

Product Details

  • ISBN-13: 9780131141377
  • Publisher: Prentice Hall
  • Publication date: 5/15/2005
  • Series: Pearson Criminal Justice Series
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 416
  • Product dimensions: 6.96 (w) x 9.14 (h) x 0.83 (d)

Table of Contents

(NOTE: Each chapter concludes with Summary and Review Questions.)


1. Introduction and Overview of Digital Crime.

Chapter Objectives.


New Threats to the Information Age.
Purpose and Scope of this Book.

Digital Crime and Digital Terrorism.

A Developmental Perspective of the Growing Problem.
Increases in Cyber Victimization.
The Changing Character of Cyber Victimization

Types of Computer Crime.

The Computer as Target.
The Computer as an Instrument of a Crime.
The Computer as Incidental to a Crime.
Crimes Associated with the Prevalence of Computers.

2. Digital Terrorism.

Chapter Objectives.

Defining the Concepts.

Buzzwords: Information Warfare and Cyber-Terrorism.

Risk and Critical Infrastructure Attacks.

Information Attacks.

Web-Site Defacement.
Cyberplagues—Viruses and Worms.
Distributed Denial of Service Attacks.
Unauthorized Intrusions.

Cyber and Technological Facilitation.

Facilitation of Attack.
Data Hiding.

Propaganda and Promotion.

Cyber-Terrorism as an Adjunct Attack.

Al-Qaeda and Information Technology.

China and Information Warfare.

3. The Criminology of Computer Crime.


Choice Theory.

Routine Activities.

Deterrence Theory.

Psychological Theories.

Moral Development and Crime.
Personality Disorders.

Pedophiles and Psychological Theory.

Social Structure Theories.

Strain Theory.
White-Collar Crime and Strain Theory.
Subculture Theory.

Hackers and Social Structure Theories.

Social Process Theories.

Learning Theory.
Social Control Theory.

Virus Writers and Social Process Theories.

Terrorism and Political Theory.

4. Digital Criminals and Hackers.

Chapter Objectives.

What is a Hacker?

The Original Meaning of “Hacker”.
What did Hackers Become?
Retaking the word: Hacker.
What do Hackers Do?

The Hacker Subculture.

Prosocial Hacking.
The Hacker Ethic.

Hacker Typology.

Old School Hackers.
The Merger of Phone Phreaks and Hackers.
Bedroom Hackers.
Larval Hackers (Newbies).
Warez Doodz.
Internet Hackers.
Script Kiddies.

A Hacker by Any Other Name...

Computer Criminals vs. Hackers.
White Hat versus Black Hat.

Hackers and the Media.

Fear, Uncertainty, and Doubt - FUD.


5. White Collar Crimes.

Chapter Objectives.


A Computer-Assisted Crime.

Corporate Espionage.

Money Laundering.

E-Commerce and the Internet.

Identity Theft.

Internet Fraud Schemes.

6. Viruses and Malicious Code.

Chapter Objectives.

Viruses and Malicious Code.

History and Development.
Trojan Horses.
Adware and Spyware.
Denial of Service Attacks.
Blended Threats.

Extent of Viruses and Malicious Codes.

Attack Trends.
Malicious Code Trends.
Vulnerability Highlights.
Current Issues.
Virus Hoaxes.

Virus Writers and Virus Experts.

7. Exploitation, Stalking and Obscenity on the WWW.

Chapter Objectives.

Nature of Exploitation on the Internet.

Incidence and Prevalence of Victimization Online.

Stalking via the WWW.

Dynamics and Nature of Stalking and Cyber Stalking.
Characteristics of Stalkers and Their Victims.
Law Enforcement and Legislation Targeting Stalking.

Obscenity on the WWW.

Laws and Legislation Protecting Children Online.

Child Pornography.

The “New” Child Pornographers.
The Process of Moving from Pornography to Molestation.

Child Molestation.

The Problem of Child Sexual Abuse.

Sex Tourism.

The Process of Sex Tourism.

Issues in the Investigation of Internet Exploitation, Cyber-Stalking, and Obscenity.

Law Enforcement Initiatives.
Overlapping Jurisdiction and Duplication of Effort.
Identification of Suspects.
Issues with Evidence and Detection.

8. Anarchy and Hate on the World Wide Web.

Chapter Objectives.

Digital Hate.

White Supremacy, Hate and the Internet.

Terrorist Extremists from the Left.

ELF and ALF.

Domestic Terrorists in Cyberspace.

Dehumanize, Desensitize and Demonize.
Internet Cartoons.

Storage and Dissemination of Information.

Publishing Information on Potential Victims.

Terrorism, Intelligence Gathering and the USA PATRIOT Act.

A Short History of Intelligence in the United States.
Domestic Intelligence and Policing.
Conflicting Roles.
Defining Intelligence.
U.S. Intelligence Weaknesses.


Constitutional Rights and the USA PATRIOT Act.


9. Digital Laws and Legislation.

Chapter Objectives.

Search and Seizure Law for Digital Evidence.

Searches With Warrants.
Searches Without Warrants.

Federal Statutes.

The Pen/Trap Statute 18 U.S.C. §3121-27.
The Wiretap Statute (“Title III”) 18 U.S.C. §2510-22.
Electronic Communications Privacy Act “ECPA” 18 U.S.C. §2701-11.
Communication Assistance for Law Enforcement Act.
Federal Criminal Statutes.

Admitting Evidence at Trial.

The Best Evidence Rule.

Significant Court Cases.

10. Law Enforcement Roles and Responses.

Chapter Objectives.

Federal Roles and Responses.

The Secret Service.
The Department of Justice.
The Federal Bureau of Investigation.
The National Security Agency.
The Federal Trade Commission.
The Postal Service.
The Bureau of Customs and Border Protection.
The Department of Energy.

State and Local Roles.

Critical Needs as the State and Local Levels of Enforcement.

Interagency Cooperation and Collaboration.

11. The Investigation of Computer-Related Crime.

Chapter Objectives.

Investigator Roles and Responsibilities.

First Responders.
Forensic Analysts.
Private Police.
Subject Matter Experts.

Single Location Crime Scenes.

Search Warrants and Electronic Evidence.

Computer Systems.
External Storage Media.
Personal Data Devices (PDA’s).
Other Electronic Devises.
Executing the Search Warrant.
Examining of the Crime Scene.
Multiple Location and Network Crime Scenes.
Identifying Network Architectures.
Modeling Network Transactions.
Locating Evidence.
Key Information for Locating Network Trace Evidence.

Presenting Digital Evidence at Trial.

The Hearsay Rule.
Using Notes on the Witness Stand.
Business Records.
Presenting Best Evidence.
Chain of Custody.
Expert Testimony.

12. Digital Forensics.

Chapter Objectives.

The Basic Process of Storage Forensics.

Preparation for Forensic Analysis.

Acquisition of Data.
Authentication of Data.
Imaging of the Evidence Drive.
Wiping the Analysis Drive.

Forensic Analysis.

The Forensic Analyst as Expert Witness.

Computer Storage Systems.

Volatile Storage Systems.
Non-Volatile Storage Systems.

File Systems.

FAT: File Allocation Table.
NTFS: New Technology File System.
Dynamic Disks.
Encrypting File Systems — EFS.

Evidence Recovering from Slack Space.

Application: Defragmenting a Disk.

Commercial Forensic Packages.

Extended Analysis and Searching.
User Interface.
Centralized Report Writing and Auditing.
Validation and Support.


13. Information Security and Infrastructure Protection.

Chapter Objectives.

Mastering the Technology and the Environment.

Personal Computers and Intruders.
The Internet Explosion.

Principles of Risk Analysis.

Assessment and Evaluation.
Cost-Effective Security.
Security Technologies.
Limitations of Firewalls.
Password Discipline.

Security Vendor Technologies.

Home Users.

14. Digital Crime and Terrorism: A Forecast of Trends and Policy Implications. Adapted from David L. Carter and Andra J. Katz-Bannister.

Chapter Objectives.

The Impact of Computer Crime: The Future Is Now.

Predicting the Future: Surveying the Experts.
Limitations to Data Collection.

The Future of Digital Crime and Digital Terrorism: Forecasts.

Forecast 1.
Forecast 2.
Forecast 3.
Forecast 4.
Forecast 5.
Forecast 6.
Forecast 7.
Forecast 8.

Overarching Factors Contributing to these Forecasts.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)