BN.com Gift Guide

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Hardcover (Print)
Buy New
Buy New from BN.com
$26.83
Buy Used
Buy Used from BN.com
$20.58
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 94%)
Other sellers (Hardcover)
  • All (30) from $1.99   
  • New (9) from $4.70   
  • Used (21) from $1.99   

Overview

Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes.

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run.

Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice.

Inside, you'll find extensive information on

  • Actual hacker investigations, including the harm caused and how the criminals were tracked and caught
  • The ins and outs of identity theft, a rapidly growing crime with potential for serious damage
  • Using the criminology and psychology of hackers to detect and deter attacks
  • The risks associated with various technologies
  • Do's and don'ts for high-tech criminal investigations

This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen—and what can be done to protect yourself.

"Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well."

—Mike Tarrani, Independent Consultant

"Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security."

—Michael Nickle, Lead Consultant, VeriSign

"Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy."

—David Kensiski, Director of Operations, InfiniRoute Networks

"The modern high-tech industry brought new things to our lives. Buying a book, selling a car, or robbing a bank has never been so easy. Why is that? You've got to read this book to find out!"

—Denis Scherbakov, Systems Administrator, MCSA: Security, MCSA, MCP, Security+Atlant Telecom, ISP

"Steven Branigan has been deeply involved with many real incidents of high-tech crimes—some of them I know of are too sensitive to disclose by name. Yet, High-Tech Crimes Revealed gives outsiders an opportunity to find out what actually takes place in this often-misunderstood field. By combining his powerful knowledge of computers and technology with the legal and behavioral considerations that are overlooked by those less experienced, Branigan demonstrates just how much private industry and government need to cooperate in order to find the facts and identify criminals. While his topic is deadly-serious, he conveys his riveting stories with humor and distills observations into clearly understood rules that we all should know as we go about our lives."

—Ed Stroz, Former Supervisory Special Agent of the Federal Bureau of Investigation's Computer Crime Squad in New York and President of Stroz Friedberg LLC

"Steven brings us behind the scenes of some very exciting hacker investigations and interviews, and tells the stories like few others. This book is an exciting read because he describes the people and their actions, showing us how these new-age crimes can affect all of us."

—Steve Jurvetson, Managing Director of Draper Fisher Jurvetson

"Finally, real-life credible stories that deliver first-hand accounts of tactical and strategic high-tech operations. This book is a rare look into what goes on behind the scenes. Take a front row seat with the author as he brings you into a world few have seen."

—Bob Weaver, Retired Deputy Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service, Washington, D.C.

"Steve's intellect and real-world experience in criminal investigations, forensic analysis, and security principles is evident on every page. Sprinkle in some sound advice and a bit of humor and you have a book that is interesting, informative, and most of all, useful. I highly recommend it."

—Fred Staples, Retired Director of Computer and Network Security Consulting for Telcordia Technologies

"This book details story after story of computer crimes and identity theft. The best way to prevent yourself from being a victim is to take these narratives to heart."

—Ben Rothke, Senior Security Consultant, ThruPoint Inc.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Steven Branigan was investigating cybercrime long before most folks knew it existed. In this book, he takes you inside several of those investigations, offering important insights into what drives the perpetrators and essential lessons about how they can be brought to justice.

Branigan’s cases range from attacks on telephone networks to ISPs. He also takes you behind the scenes at a classic sting operation that involved “turning” a hacker and using him to penetrate the inner circle of a criminal ring. Most useful to both corporate security specialists and professional law enforcement: Branigan’s guidance on high-tech forensic techniques and the complex legal processes associated with building a case that’ll stand up in court. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780321218735
  • Publisher: Addison-Wesley
  • Publication date: 8/27/2004
  • Pages: 412
  • Product dimensions: 6.06 (w) x 8.89 (h) x 1.02 (d)

Meet the Author

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front About the Author

STEVEN BRANIGAN, President of CyanLine LLC, has over 15 years of experience in computer science and forensics. He is internationally recognized as an expert in computer security, and has testified before Congress, qualified as an expert witness for the government and has lectured on network security issues to N.A.T.O., the US Department of Justice and the US Secret Service.

In addition to being a founding member of the NY Electronic Crimes task force with Bob Weaver, Branigan worked as a Senior Manager with Bill Cheswick in Bell Labs Computing and Network Research, and together they subsequently founded Lumeta Corporation. In his "spare" time, he is pursuing his MBA at Columbia University.

Read More Show Less

Read an Excerpt

  • Appendix A

Steven Branigan Normal End User 2 2000-10-24T22:22:00Z 2004-04-27T21:41:00Z 2004-04-27T21:41:00Z 3 885 5049 sb 42 10 6200 9.3220

0 0

High-Tech Crimes Revealed:Cyberwar Stories from the DigitalFront

by StevenBranigan

Preface

“Give a man a fish, you'llfeed him for a day.

Teach a man to fish, you won't haveto listen to his incessant whining about how hungry he is.”

- Author unknown

Stories about hacking, stolen credit card numbers,computer viruses and identity theft are all around us, but what do they reallymean to us? The goal of this book, quite simply, is to help educate people onthe issues with high-tech crimes, to help answer that question. Just as thequote above teaches us, let’s not just talk about these issues,let’s understand them.

There are many fine books on the market that explainhow hackers exploit computer and networks. They explain the details of theexploits and methods to protect against them, and as such are targeted forthose with strong technical knowledge. That is not the case here. You will notlearn the intricacies of the latest hacking attack. You will learn how hackersuse these exploits, why they use them and in some cases how they get caught.

Basically high tech crimes are just a mixture ofregular crimes like theft, fraud, and revenge attacks using new techniques. So,the concepts should be very easy to understand. Because of the subject nature,there are some technological references in these cases. Don't worry if youdon't understand all the technicalities, they are there to make the storiesricher for more technicallyexperienced readers.

We like technology because it makes our lives easier,but unfortunately it also makes the lives of criminals easier. Sadly, mostusers of high technology are not really aware that high-tech crimes mightaffect them and that is a problem. While many of these stories have beenreported in the media, very little time has been spent on explaining how thesecrimes might affect us. Demystifying these crimes and raising the awareness tousers of technology will make people smarter and safer users and that will makeall of us safer in the long run.

With my background as a sworn law-enforcement officer(cop), system administrator (geek), computer programmer (geek), Internetsecurity consultant (geek with tie) and network security researcher (geek inshorts), I offer a unique perspective to help people better understand the manyissues with high-tech crime and how they might be affected. What follows aresome of the high-tech cases I have personally been involved with over the yearsalong with the details of how the problems were discovered and how the caseswere eventually resolved. All of the cases that follow are real. Since not allof the cases resulted in convictions, you will notice that I have taken theliberty of changing the names of the players, to protect the guilty as well asthe innocent.

The reader will get a great perspective on howhigh-tech crimes are investigated and will notice that in many ways thesecrimes are very similar to the traditional investigations. After all, one thingthat both high tech and low tech crimes have in common is that both are committedby criminals.

Eachcase has created the framework from which law enforcement now operates, as wellas provided a platform of awareness to help other companies and individualsfrom being victimized. A lot has changed over the past decade. Terms like computerviruses, broadband Internet, hacked web-sites and Identity theft are phrasesthat weren’t very well known to the general public just 10 short yearsago. They sure are now.

No prior technical experience is necessary in order tounderstand the issues involved with each case. Primarily the stories focus onthe people, and the use and abuse of technology plays a minor supporting role.In the first 4 chapters, we will walk through hacker investigations, pointingout how hackers were causing damage, pointing out the potential additionaldamage that could be caused and how they were tracked and caught. Chapter 5starts with an introductory story on identity theft and is followed with manyissues about this growing crime.

For the next two chapters, I draw upon my experiencein interviewing hackers. Chapter 6 details the conversations and the lessonslearned. The next one, Chapter 7, is where I put forth a theory on whatmotivates hackers to do what they do, drawing upon lessons from criminology,psychology and personal observation. Here, the hope is that by a betterunderstanding of what makes a hacker hack, we can do early detection or evenprevention on certain high-tech crimes.

The next 2 chapters explain some of the technologiesthat we encountered in the previous chapters in more detail. This is where Ican better explain the potential risks associated with technologies.

Chapter 10 and 11 explain what works as well as whatdoes not work in high-tech crime investigations. Chapter 10 uses small caseswhere mistakes led to failed investigations to highlight what can go wrongduring a high-tech investigation. Even though  discussing all the things that can go wrong is a great way to learn, Chapter 11  focuses on how to avoid the mistakes inthe first place.

Finally, the concluding chapter pulls it all together,so that the reader is aware of the issues surrounding high tech crimes.

One important note that I want to share. I startedthis book in 1999 and by mid 2001 I was finally making some very good progress.I felt like I would have been done by the beginning of 2002. Then, after theevents of Sept. 11, I found it hard to continue. While I was fortunate in thefact that I did not lose any family or close friends in the attack, some of myfriends were not so fortunate. In addition, the towers complex was an area thatwas a second home for me, as I spent a lot of time in 7WTC. I even had myfavorite parking spot that always impressed Ches. It was time to help ourfriends that needed us.

 

I took me the better part of a year to finally getpast the grieving and get back to work. You’ll see some of those thoughtshave weaved their way into Chapter 3. Please, let us never forget those who welost that tragic day. I know that I never will…

 

Read More Show Less

Table of Contents

Foreword.

Preface.

1. An Attack on the Telephone Network.

The First Meeting.

The Beginning.

Follow Up.

Cyber-Tailing.

The Management Update.

A Review of the Data….

Decisions, Decisions….

Off to See the Law.

Building the Search Warrant.

Execution of the Warrant.

The Computer Forensics.

The End Game .

Conclusions.

2. An Attack on an ISP.

Starting Up a Case.

A Simple Call to Customer Support.

Handle the Crisis.

What Are the Options.

You Can Never Find…

The Investigation Begins.

The Search Warrant.

A Method for Performing a Computer Search Without Removing Equipment.

Post-Evidence Collection.

A Surprising Find.

Call in the Feds.

Squeezing the CW Like a Lemon.

Coming to America.

Time for Another Search.

Finding an Unlisted ISP.

Package Up the Data.

Pulling It Back Together.

The Conclusion.

3. If He Had Just Paid the Rent.

The Eviction.

A Simple Twist.

NYECTF.

Time to Collect the Stuff.

The Initial Examination.

The Previous Owner.

The Prosecution.

Why Speeding Is Not Such a Good Idea.

Fugitive Lessons.

The Fugitive’s Choice.

Wesley’s Moves.

Technicalities.

End-Game.

4. Inside a Hacker Sting Operation…

Operation Cybersnare Background.

Being a Confidential Informant.

The Sting Starts.

Forensic Findings.

The Seven Steps of Hacking.

Time to Act.

The Leftovers.

5. Identity Theft.

What Is Identity Theft?

How Did We Get Here?

Purchasing on Credit.

The Resultant Crimes.

Credit Card Fraud.

Utility Subscription Fraud.

Bank Fraud

Employment Fraud.

Loan Frauds.

Government Document/Benefits Fraud.

Other.

What and When Do People Notice?

What To Do if You Are a Victim.

Discover Any Criminal Issues.

Secure Your Credit.

What Else Can Be Done?

Consumer.

Business and Law Enforcement.

6. Let’s Ask the Hackers…

Bob Gets Some Attention.

The Initial Exam of the Drive.

Evaluating the Damage.

The Hacker Interview.

Preferred Target: Technology Companies.

Hacked and Re-Hacked Systems.

Controlled by an Uber-Hacker.

Another Hacker–Alphie.

Off to the Prison.

Hacking Tools.

Motivation for Creating Tools.

7. Why Do Hackers Hack?

Technology Itself Isn’t the Solution.

Know Your Adversary.

Pseudo-Hacker Types.

What Drives Them?

The Hacker Motivations.

Revenge .

Profit .

Hacking Money and Monetary Tools.

Pride.

Intellectual Challenge (Curiosity).

Further Refinements.

Insiders: Motivated by Profit and Revenge.

Outsiders: Motivated by Profit and Curiosity.

What Can Be Done?

8. Setting the Stage.

The Growth of High-Tech Crime.

In the Beginning….

Phone Systems and Voicemail.

Timeshare Systems.

The Drive to Network.

Distributed Computing Begins.

Setting the Corporate Network Stage.

More Useful Networks.

Remote Access to Data.

Today’s Corporate Network.

Computers.

The Result of Network Evolution.

Firewalls.

Virus Scanners.

Web Proxies.

DMZs.

Virtual Private Networks (VPNs).

The Network Growth.

What Upsets Network Security.

Business Partner Connectivity.

Merger or Divestiture.

Introduction of New Services.

Internal Employees That Know a Better Way to Do Something.

Closing Thoughts.

Increased High Technology.

Convenience Reduces Security.

Static Security Policies.

9. High-Tech Crime .

Why Is High Technology Popular?

What Is a High-Tech Crime?

Computer Hacking Attacks.

Viruses.

Technology Used in the Commission of a Crime.

Technology as the Target of a Crime.

The Growing Threat.

Information IS the Target.

Information Copying.

Credit Card Number Theft.

Deleting or Altering Information.

Eavesdropping.

Complexities with High-Tech Crimes.

Jurisdiction Issues.

Corporate Role.

Forensic Examinations.

Intelligence of the Criminal.

What About Private Citizens?

High-Tech Versus Society.

DMCA.

Summary.

10. What Not to Do.

What Could Possibly Go Wrong?

Analyzing the Options.

Trouble on the Horizon.

Mistakes, Mistakes.

Is Everything Lost?

Some Lessons.

Management Team Issues.

Poor Case Management.

Impatience–Rushing Cases.

Lacking of Understanding of the Technology Being Investigated.

Miscommunication.

Bad Luck.

11. How to Run a High-Tech Case.

Some Concerns.

The Basics.

How Does a Case Start?

Unsolicited Report.

Personally Witness.

Automated Detection.

Leads from Another Investigation.

High-Tech Reporting Issues.

Actively Investigating the Case.

Establish the Case Parameters.

Evidence Collection.

Maintain Records.

Issues with Evidence Collection.

Make Your Move.

See the Case Through.

The End Game.

12. What Have We Learned.

A High-Tech Crime Timeline.

Warning Labels.

A Virtual Identity Makes Crime Easier.

Computers in Society.

Business Improvements.

Home Improvements.

Running Ahead of Ourselves.

Is There Hope?

How to Respond.

Improved Laws and Law Enforcement.

Improved Handling of Internal Hackers.

Increased Awareness of High-Tech Crime.

Parting Thoughts.

Appendix A.

Additional Information for Part 4, “Inside a Hacker Sting Operation”.

Operation Cybersnare.

Additional Information for Part 6, “Let’s Ask the Hackers”.

Bibliography.

Index.

Read More Show Less

Preface

High-Tech Crimes Revealed:

Cyberwar Stories from the DigitalFront

by StevenBranigan

Preface

“Give a man a fish, you'llfeed him for a day.

Teach a man to fish, you won't haveto listen to his incessant whining about how hungry he is.”

- Author unknown

Stories about hacking, stolen credit card numbers,computer viruses and identity theft are all around us, but what do they reallymean to us? The goal of this book, quite simply, is to help educate people onthe issues with high-tech crimes, to help answer that question. Just as thequote above teaches us, let’s not just talk about these issues,let’s understand them.

There are many fine books on the market that explainhow hackers exploit computer and networks. They explain the details of theexploits and methods to protect against them, and as such are targeted forthose with strong technical knowledge. That is not the case here. You will notlearn the intricacies of the latest hacking attack. You will learn how hackersuse these exploits, why they use them and in some cases how they get caught.

Basically high tech crimes are just a mixture ofregular crimes like theft, fraud, and revenge attacks using new techniques. So,the concepts should be very easy to understand. Because of the subject nature,there are some technological references in these cases. Don't worry if youdon't understand all the technicalities, they are there to make the storiesricher for more technically experienced readers.

We like technology because it makes our lives easier,but unfortunately it also makes the lives of criminals easier. Sadly, mostusers of high technology are not really aware that high-tech crimes mightaffect them and that is a problem. While many of these stories have beenreported in the media, very little time has been spent on explaining how thesecrimes might affect us. Demystifying these crimes and raising the awareness tousers of technology will make people smarter and safer users and that will makeall of us safer in the long run.

With my background as a sworn law-enforcement officer(cop), system administrator (geek), computer programmer (geek), Internetsecurity consultant (geek with tie) and network security researcher (geek inshorts), I offer a unique perspective to help people better understand the manyissues with high-tech crime and how they might be affected. What follows aresome of the high-tech cases I have personally been involved with over the yearsalong with the details of how the problems were discovered and how the caseswere eventually resolved. All of the cases that follow are real. Since not allof the cases resulted in convictions, you will notice that I have taken theliberty of changing the names of the players, to protect the guilty as well asthe innocent.

The reader will get a great perspective on howhigh-tech crimes are investigated and will notice that in many ways thesecrimes are very similar to the traditional investigations. After all, one thingthat both high tech and low tech crimes have in common is that both are committedby criminals.

Eachcase has created the framework from which law enforcement now operates, as wellas provided a platform of awareness to help other companies and individualsfrom being victimized. A lot has changed over the past decade. Terms like computerviruses, broadband Internet, hacked web-sites and Identity theft are phrasesthat weren’t very well known to the general public just 10 short yearsago. They sure are now.

No prior technical experience is necessary in order tounderstand the issues involved with each case. Primarily the stories focus onthe people, and the use and abuse of technology plays a minor supporting role.In the first 4 chapters, we will walk through hacker investigations, pointingout how hackers were causing damage, pointing out the potential additionaldamage that could be caused and how they were tracked and caught. Chapter 5starts with an introductory story on identity theft and is followed with manyissues about this growing crime.

For the next two chapters, I draw upon my experiencein interviewing hackers. Chapter 6 details the conversations and the lessonslearned. The next one, Chapter 7, is where I put forth a theory on whatmotivates hackers to do what they do, drawing upon lessons from criminology,psychology and personal observation. Here, the hope is that by a betterunderstanding of what makes a hacker hack, we can do early detection or evenprevention on certain high-tech crimes.

The next 2 chapters explain some of the technologiesthat we encountered in the previous chapters in more detail. This is where Ican better explain the potential risks associated with technologies.

Chapter 10 and 11 explain what works as well as whatdoes not work in high-tech crime investigations. Chapter 10 uses small caseswhere mistakes led to failed investigations to highlight what can go wrongduring a high-tech investigation. Even though discussing all the things that can go wrong is a great way to learn, Chapter 11 focuses on how to avoid the mistakes inthe first place.

Finally, the concluding chapter pulls it all together,so that the reader is aware of the issues surrounding high tech crimes.

One important note that I want to share. I startedthis book in 1999 and by mid 2001 I was finally making some very good progress.I felt like I would have been done by the beginning of 2002. Then, after theevents of Sept. 11, I found it hard to continue. While I was fortunate in thefact that I did not lose any family or close friends in the attack, some of myfriends were not so fortunate. In addition, the towers complex was an area thatwas a second home for me, as I spent a lot of time in 7WTC. I even had myfavorite parking spot that always impressed Ches. It was time to help ourfriends that needed us.

I took me the better part of a year to finally getpast the grieving and get back to work. You’ll see some of those thoughtshave weaved their way into Chapter 3. Please, let us never forget those who welost that tragic day. I know that I never will…

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted January 8, 2005

    Total buzz-kill

    I was totaly baked before I began reading this title. Before I was half way threw, My buzz was gone. What a total buzz-kill! A sobering run down of all the high tech ways to steal someones dope money.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 16, 2004

    moderately educational

    A moderately technical survey of high technology crimes. You certainly do not need a computing background to follow most of the narrative. Branigan gives examples of crackers breaking into systems. Sometimes over a network. But sometimes also by having physical access to a machine at a workplace, and thence using it and its network connection to spawn attacks. He offers an anlysis of the different motivations of crackers and the effect these might have on the damage they can cause. En route, he gives an example of the infamous Nigerian 419 scam email. Plus also an example of phishing. The latter has increased remarkably in frequency and sophistication in the last two years. Both try to fool their readers. But phishing is getting insidiously crafty in its visual presentation. Branigan offers little to combat it. He does reassure you that having your credit card number copied fradulently has very little financial drag on you. But he warns that having your identity electronically copied can be far harder to undo.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)