Preface |
|
xvii | |
Acknowledgments |
|
xxiv | |
Section I The Etiology of Cyber Crime and Cyber Terrorism |
|
|
|
|
Introduction And Overview Of Cyber Crime And Cyber Terrorism |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
1 | (4) |
|
New Threats to the Information Age |
|
|
2 | (1) |
|
Purpose and Scope of This Book |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (7) |
|
A Developmental Perspective on a Growing Problem |
|
|
5 | (2) |
|
The Reality of Increased Cybervictimization |
|
|
7 | (1) |
|
Changes to Cybervictimization and the Emergence of Cyber Terror |
|
|
8 | (1) |
|
|
9 | (3) |
|
Classification of Computer Crime |
|
|
12 | (6) |
|
Carter's Classification of Computer Crimes |
|
|
13 | (4) |
|
Other Classification Schemes |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
Critical Thinking Exercises |
|
|
19 | (1) |
|
|
19 | (3) |
|
Chapter 2 Cyber Terrorism And Information Warfare |
|
|
22 | (27) |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (3) |
|
Buzzwords: Information Warfare, Cyberterrorism, and Cybercrime |
|
|
24 | (3) |
|
Risk and Critical Infrastructure Attacks |
|
|
27 | (4) |
|
|
27 | (1) |
|
|
28 | (3) |
|
|
31 | (5) |
|
|
32 | (1) |
|
Cyberplagues: Viruses and Worms |
|
|
32 | (1) |
|
Distributed Denial-of-Service Attacks |
|
|
33 | (2) |
|
|
35 | (1) |
|
Cyber and Technological Facilitation |
|
|
36 | (2) |
|
Facilitation of Attack and Dissemination of Ideology |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (3) |
|
Funding and Financing Terrorist Groups |
|
|
39 | (2) |
|
Cyberterrorism as an Adjunct Attack |
|
|
41 | (2) |
|
Al Qaeda, the Islamic State, and Information Technology |
|
|
41 | (2) |
|
Perspectives on Information Warfare |
|
|
43 | (2) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Critical Thinking Exercises |
|
|
46 | (1) |
|
|
46 | (3) |
|
Chapter 3 The Criminology Of Computer Crime |
|
|
49 | (28) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (3) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (3) |
|
Moral Development and Crime |
|
|
53 | (1) |
|
|
54 | (1) |
|
Pedophiles and Psychological Theory |
|
|
55 | (1) |
|
Social Structure Theories |
|
|
56 | (3) |
|
|
56 | (2) |
|
White-Collar Crime and Strain Theory |
|
|
58 | (1) |
|
|
59 | (12) |
|
|
60 | (7) |
|
Hackers and Learning Theories |
|
|
67 | (2) |
|
Virus Writers and Learning Theories |
|
|
69 | (1) |
|
|
70 | (1) |
|
Terrorism and Political Theory |
|
|
71 | (3) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Critical Thinking Exercises |
|
|
74 | (1) |
|
|
74 | (3) |
|
|
77 | (32) |
|
|
77 | (1) |
|
Introduction: What Is a Hacker? |
|
|
77 | (6) |
|
Who and What Is a Hacker? |
|
|
78 | (1) |
|
|
79 | (4) |
|
|
83 | (6) |
|
Cyber criminals Versus Hackers |
|
|
83 | (3) |
|
|
86 | (1) |
|
|
86 | (1) |
|
White Hat Versus Black Hat |
|
|
87 | (1) |
|
|
88 | (1) |
|
The Origins and History of Hacking |
|
|
89 | (4) |
|
|
89 | (1) |
|
The Criminalization of Hacking |
|
|
90 | (2) |
|
Challenges and Changes in Hacking |
|
|
92 | (1) |
|
|
93 | (12) |
|
|
94 | (2) |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
99 | (3) |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Critical Thinking Exercises |
|
|
105 | (1) |
|
|
106 | (3) |
|
Chapter 5 Sophisticated Cyber Criminal Organizations |
|
|
109 | (29) |
|
|
109 | (1) |
|
|
109 | (2) |
|
Espionage and the Theft of Intellectual Property |
|
|
111 | (4) |
|
|
115 | (5) |
|
|
118 | (2) |
|
Sophisticated Criminal Organizations |
|
|
120 | (9) |
|
The Impact of Organized Crime |
|
|
120 | (1) |
|
Use of Social Media by Organized Crime |
|
|
121 | (1) |
|
African Criminal Enterprises |
|
|
122 | (1) |
|
Asian Criminal Enterprises |
|
|
123 | (1) |
|
|
124 | (1) |
|
Balkan Criminal Enterprises |
|
|
125 | (1) |
|
Eurasian Criminal Enterprises-Russian Organized Crime |
|
|
126 | (1) |
|
Italian Organized Crime-La Cosa Nostra (LCN) Mafia |
|
|
126 | (2) |
|
Middle Eastern Criminal Enterprises |
|
|
128 | (1) |
|
Mexican and South American Drug Cartels |
|
|
128 | (1) |
|
The Indiscriminant Underground Marketplace-The Deep Web or Tor Network |
|
|
129 | (6) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Critical Thinking Exercises |
|
|
136 | (1) |
|
|
136 | (2) |
Section II Cyber Crime: Types, Nature, and Extent |
|
|
Chapter 6 White-Collar Crimes |
|
|
138 | (21) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (2) |
|
|
141 | (3) |
|
|
144 | (4) |
|
|
148 | (4) |
|
|
152 | (4) |
|
|
156 | (1) |
|
|
157 | (1) |
|
Critical Thinking Exercises |
|
|
157 | (1) |
|
|
157 | (2) |
|
Chapter 7 Viruses And Malicious Code |
|
|
159 | (31) |
|
|
159 | (1) |
|
|
159 | (4) |
|
The Language of Malicious Software (Malware) |
|
|
163 | (1) |
|
Viruses and Other Malware |
|
|
164 | (14) |
|
|
166 | (1) |
|
|
167 | (3) |
|
|
170 | (2) |
|
|
172 | (3) |
|
|
175 | (1) |
|
Denial-of-Service Attacks |
|
|
176 | (1) |
|
|
176 | (2) |
|
Extent of Viruses and Malicious Code Attacks |
|
|
178 | (2) |
|
Virus Writers and Virus Experts |
|
|
180 | (6) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Critical Thinking Exercises |
|
|
187 | (1) |
|
|
187 | (3) |
|
Chapter 8 Sex Crimes, Victimization, And Obscenity On The World Wide Web |
|
|
190 | (56) |
|
|
190 | (1) |
|
|
190 | (1) |
|
Nature of Exploitation on the Internet |
|
|
191 | (6) |
|
Online Victimization of Young People |
|
|
193 | (3) |
|
|
196 | (1) |
|
Stalking via the World Wide Web |
|
|
197 | (6) |
|
The Mechanisms of Traditional Stalking and Cyberstalking |
|
|
198 | (2) |
|
Characteristics of Stalkers and Their Victims |
|
|
200 | (2) |
|
Legislation Targeting Stalking |
|
|
202 | (1) |
|
Obscenity on the World Wide Web |
|
|
203 | (4) |
|
Laws and Legislation Protecting Children Online |
|
|
204 | (3) |
|
Pedophilia and Child Pornography |
|
|
207 | (8) |
|
The "New" Child Pornographers |
|
|
210 | (2) |
|
Moving from Pornography to Molestation |
|
|
212 | (3) |
|
|
215 | (4) |
|
The Problem of Child Sexual Abuse |
|
|
217 | (2) |
|
Prostitution and the Sex Trade |
|
|
219 | (16) |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (2) |
|
|
227 | (3) |
|
The Process of Sex Tourism |
|
|
230 | (5) |
|
Issues in the Investigation of Internet Exploitation, Cyberstalking, and Obscenity |
|
|
235 | (3) |
|
Law Enforcement Initiatives |
|
|
235 | (1) |
|
Overlapping Jurisdictions and Duplication of Effort |
|
|
236 | (1) |
|
Identification of Suspects |
|
|
237 | (1) |
|
Issues with Evidence and Detection |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
Critical Thinking Exercises |
|
|
239 | (1) |
|
|
239 | (7) |
|
Chapter 9 Anarchy And Hate On The World Wide Web |
|
|
246 | (24) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (2) |
|
White Supremacy, Hate, and the Internet |
|
|
248 | (1) |
|
Terrorist Extremists from the Left |
|
|
249 | (3) |
|
|
250 | (2) |
|
Domestic Terrorists in Cyberspace |
|
|
252 | (2) |
|
Dehumanize, Desensitize, and Demonize |
|
|
252 | (1) |
|
|
253 | (1) |
|
Storage and Dissemination of Information |
|
|
254 | (7) |
|
Publishing Information on Potential Victims |
|
|
257 | (3) |
|
|
260 | (1) |
|
Terrorism, Intelligence Gathering, and the USA PATRIOT Act |
|
|
261 | (3) |
|
A Short History of Intelligence in the United States |
|
|
261 | (1) |
|
Domestic Intelligence and Policing |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
U.S. Intelligence Weaknesses |
|
|
263 | (1) |
|
The USA PATRIOT Act of 2001 |
|
|
264 | (3) |
|
The Reauthorized PATRIOT Act of 2006 |
|
|
265 | (1) |
|
The Reauthorized PATRIOT Act of 2011 |
|
|
265 | (1) |
|
Constitutional Rights and the USA PATRIOT Act |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
267 | (1) |
|
Critical Thinking Exercises |
|
|
267 | (1) |
|
|
267 | (3) |
Section III Controlling Cyber Crime: Legislation, Law Enforcement, and Investigation |
|
|
Chapter 10 Digital Laws And Legislation |
|
|
270 | (20) |
|
|
270 | (1) |
|
|
270 | (1) |
|
Search and Seizure Law for Digital Evidence |
|
|
270 | (6) |
|
|
271 | (2) |
|
Searches Without Warrants |
|
|
273 | (3) |
|
|
276 | (4) |
|
The Pen/Trap Statute 18 U.S.C. §3121-27 |
|
|
277 | (1) |
|
The Wiretap Statute (Title III) 18 U.S.C. §2510-22 |
|
|
277 | (1) |
|
Electronic Communications Privacy Act (ECPA) 18 U.S.C. §§2701-11 |
|
|
278 | (2) |
|
USA PATRIOT Act/USA Freedom Act |
|
|
280 | (4) |
|
Communication Assistance for Law Enforcement Act |
|
|
281 | (1) |
|
Federal Criminal Statutes |
|
|
281 | (3) |
|
Admitting Evidence at Trial |
|
|
284 | (2) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Critical Thinking Exercises |
|
|
289 | (1) |
|
|
289 | (1) |
|
Chapter 11 Law Enforcement Roles And Responses |
|
|
290 | (17) |
|
|
290 | (1) |
|
|
290 | (1) |
|
Federal Roles and Responses |
|
|
290 | (12) |
|
The Department of Justice |
|
|
291 | (1) |
|
The Federal Bureau of Investigation |
|
|
292 | (2) |
|
The National Security Agency |
|
|
294 | (1) |
|
The Federal Trade Commission |
|
|
294 | (2) |
|
|
296 | (1) |
|
|
297 | (1) |
|
The Department of Homeland Security |
|
|
298 | (1) |
|
U.S. Immigration and Customs Enforcement |
|
|
299 | (2) |
|
|
301 | (1) |
|
|
302 | (2) |
|
Critical Needs at the State and Local Levels of Enforcement |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
Critical Thinking Exercises |
|
|
305 | (1) |
|
|
305 | (2) |
|
Chapter 12 The Investigation Of Computer-Related Crime |
|
|
307 | (26) |
|
|
307 | (1) |
|
|
307 | (1) |
|
Investigator Roles and Responsibilities |
|
|
308 | (3) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
Single-Location Crime Scenes |
|
|
310 | (1) |
|
Search Warrants and Electronic Evidence |
|
|
311 | (14) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
Executing the Search Warrant |
|
|
313 | (2) |
|
Examining the Crime Scene |
|
|
315 | (5) |
|
Multiple-Location and Network Crime Scenes |
|
|
320 | (1) |
|
Identifying Network Architectures |
|
|
321 | (1) |
|
Modeling Network Transactions |
|
|
321 | (1) |
|
|
322 | (1) |
|
Key Information for Locating Network Trace Evidence |
|
|
323 | (2) |
|
Collecting Network Trace Evidence |
|
|
325 | (1) |
|
Presenting Digital Evidence at Trial |
|
|
325 | (5) |
|
|
326 | (1) |
|
Using Notes on the Witness Stand |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
Challenges to Forensic Analysis Strategies |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
Critical Thinking Exercises |
|
|
330 | (1) |
|
|
330 | (3) |
|
Chapter 13 Digital Forensics |
|
|
333 | (26) |
|
|
333 | (1) |
|
|
333 | (1) |
|
The Basic Process of Storage Forensics |
|
|
334 | (1) |
|
Preparation for Forensic Analysis |
|
|
334 | (8) |
|
|
335 | (1) |
|
|
336 | (1) |
|
Imaging of the Evidence Drive |
|
|
337 | (1) |
|
Wiping the Analysis Drive |
|
|
338 | (1) |
|
|
339 | (3) |
|
|
342 | (2) |
|
The Forensic Analyst as Expert Witness |
|
|
344 | (1) |
|
|
344 | (4) |
|
|
344 | (2) |
|
Nonvolatile Storage Systems |
|
|
346 | (2) |
|
|
348 | (3) |
|
FAT: File Allocation Table |
|
|
348 | (1) |
|
NTFS: New Technology File System |
|
|
349 | (2) |
|
Application: Defragmenting a Disk |
|
|
351 | (1) |
|
Evidence Recovery from Slack Space |
|
|
352 | (1) |
|
Commercial Forensic Packages |
|
|
353 | (4) |
|
Extended Analysis and Searching |
|
|
355 | (1) |
|
|
355 | (1) |
|
Centralized Report Writing and Auditing |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Critical Thinking Exercises |
|
|
357 | (1) |
|
|
358 | (1) |
Section IV The Future of Cyber Crime and Cyber Terrorism: Prevention and Trends |
|
|
Chapter 14 Information Security And Infrastructure Protection |
|
|
359 | (26) |
|
|
359 | (1) |
|
|
359 | (1) |
|
Mastering the Technology and the Environment |
|
|
360 | (2) |
|
Personal Computers and Intruders |
|
|
360 | (1) |
|
|
361 | (1) |
|
Principles of Risk Analysis |
|
|
362 | (3) |
|
Assessment and Evaluation |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
365 | (8) |
|
Wireless Networks and Security |
|
|
366 | (1) |
|
|
366 | (3) |
|
|
369 | (1) |
|
|
369 | (3) |
|
|
372 | (1) |
|
Security Vendor Technologies |
|
|
373 | (2) |
|
|
374 | (1) |
|
A Recap of the Evolution of Cyberattacks |
|
|
375 | (7) |
|
The Early Attacks (1980-2000) |
|
|
377 | (2) |
|
New Century Attacks (2000 to Present) |
|
|
379 | (3) |
|
|
382 | (1) |
|
|
383 | (1) |
|
Critical Thinking Exercises |
|
|
383 | (1) |
|
|
383 | (2) |
|
Chapter 15 Cyber Crime And Terrorism: A Forecast Of Trends And Policy Implications |
|
|
385 | (31) |
|
|
385 | (1) |
|
The Impact of Cyber Crime |
|
|
385 | (3) |
|
The Future of Cyber Crime and Cyber Terrorism: Forecasts |
|
|
388 | (22) |
|
Forecast 1: Computer Crime Will Significantly Impact the Police and Courts |
|
|
389 | (4) |
|
Forecast 2: Fraud and Identity Theft Will Be the Largest Computer Crime Problem Impacting the Police |
|
|
393 | (2) |
|
Forecast 3: Virtual Crimes Will Continue to Rapidly Increase |
|
|
395 | (1) |
|
Forecast 4: The Threat from Computer Hacker Groups Will Increase |
|
|
396 | (1) |
|
Forecast 5: Organized Crime Groups Will Increasingly Adopt Computerization as a Criminal Instrument |
|
|
397 | (6) |
|
Forecast 6: Terrorist Groups Will Increasingly Use Global Networking |
|
|
403 | (2) |
|
Forecast 7: The Character of Espionage Will Continue to Broaden |
|
|
405 | (1) |
|
Forecast 8: Criminals Will Increasingly Use Technology-Based Instruments and Methodologies to Carry Out Attacks |
|
|
406 | (4) |
|
|
410 | (1) |
|
|
411 | (1) |
|
Critical Thinking Exercises |
|
|
411 | (1) |
|
|
411 | (5) |
Index |
|
416 | |