Muutke küpsiste eelistusi

Cyber Crime and Cyber Terrorism 4th edition [Pehme köide]

  • Formaat: Paperback / softback, 464 pages, kõrgus x laius x paksus: 250x200x24 mm, kaal: 960 g
  • Ilmumisaeg: 21-Feb-2018
  • Kirjastus: Pearson
  • ISBN-10: 0134846516
  • ISBN-13: 9780134846514
Teised raamatud teemal:
  • Formaat: Paperback / softback, 464 pages, kõrgus x laius x paksus: 250x200x24 mm, kaal: 960 g
  • Ilmumisaeg: 21-Feb-2018
  • Kirjastus: Pearson
  • ISBN-10: 0134846516
  • ISBN-13: 9780134846514
Teised raamatud teemal:

For courses in computer crime.

A complete, easy-to-understand introduction to computer crime
Cyber Crime and Cyber Terrorism is a comprehensive introduction to the acts and theories of cyber crime, cyber terrorism, and information warfare. Assuming no prior knowledge of technology, the authors cover the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other digital criminals, and investigative, research, and legal strategies targeting these acts. Like no other on the market, the text bridges the gap between criminal justice knowledge and the technical issues that arise during investigations of cyber crime. The 4th edition adds material on new technologies and trends, plus updated review questions and activities.

Preface xvii
Acknowledgments xxiv
Section I The Etiology of Cyber Crime and Cyber Terrorism
Chapter 1
Introduction And Overview Of Cyber Crime And Cyber Terrorism
1(1)
Objectives
1(1)
Introduction
1(4)
New Threats to the Information Age
2(1)
Purpose and Scope of This Book
3(1)
Defining the Terms
4(1)
Overview
5(7)
A Developmental Perspective on a Growing Problem
5(2)
The Reality of Increased Cybervictimization
7(1)
Changes to Cybervictimization and the Emergence of Cyber Terror
8(1)
The Costs of Cybercrime
9(3)
Classification of Computer Crime
12(6)
Carter's Classification of Computer Crimes
13(4)
Other Classification Schemes
17(1)
Summary
18(1)
Review Questions
19(1)
Critical Thinking Exercises
19(1)
Endnotes
19(3)
Chapter 2 Cyber Terrorism And Information Warfare
22(27)
Objectives
22(1)
Introduction
22(2)
Defining the Concepts
24(3)
Buzzwords: Information Warfare, Cyberterrorism, and Cybercrime
24(3)
Risk and Critical Infrastructure Attacks
27(4)
Low-Level Cyberwar
27(1)
Infrastructure Reliance
28(3)
Information Attacks
31(5)
Web Site Defacement
32(1)
Cyberplagues: Viruses and Worms
32(1)
Distributed Denial-of-Service Attacks
33(2)
Unauthorized Intrusions
35(1)
Cyber and Technological Facilitation
36(2)
Facilitation of Attack and Dissemination of Ideology
36(1)
Data Hiding
37(1)
Cryptography
37(1)
Propaganda and Promotion
38(3)
Funding and Financing Terrorist Groups
39(2)
Cyberterrorism as an Adjunct Attack
41(2)
Al Qaeda, the Islamic State, and Information Technology
41(2)
Perspectives on Information Warfare
43(2)
The Russian Perspective
43(1)
The Chinese Perspective
44(1)
Summary
45(1)
Review Questions
46(1)
Critical Thinking Exercises
46(1)
Endnotes
46(3)
Chapter 3 The Criminology Of Computer Crime
49(28)
Objectives
49(1)
Introduction
49(1)
Choice Theory
49(3)
Routine Activities
50(2)
Deterrence Theory
52(1)
Psychological Theories
53(3)
Moral Development and Crime
53(1)
Personality Disorders
54(1)
Pedophiles and Psychological Theory
55(1)
Social Structure Theories
56(3)
Strain Theory
56(2)
White-Collar Crime and Strain Theory
58(1)
Social Process Theories
59(12)
Learning Theory
60(7)
Hackers and Learning Theories
67(2)
Virus Writers and Learning Theories
69(1)
Social Control Theory
70(1)
Terrorism and Political Theory
71(3)
Summary
74(1)
Review Questions
74(1)
Critical Thinking Exercises
74(1)
Endnotes
74(3)
Chapter 4 Hackers
77(32)
Objectives
77(1)
Introduction: What Is a Hacker?
77(6)
Who and What Is a Hacker?
78(1)
Today's Hackers
79(4)
Defining Hackers
83(6)
Cyber criminals Versus Hackers
83(3)
Crackers
86(1)
Script Kiddies
86(1)
White Hat Versus Black Hat
87(1)
Hacktivists
88(1)
The Origins and History of Hacking
89(4)
Hacking Changes
89(1)
The Criminalization of Hacking
90(2)
Challenges and Changes in Hacking
92(1)
The Hacker Subculture
93(12)
Technology
94(2)
Knowledge
96(2)
Commitment
98(1)
Categorization
99(3)
Law
102(3)
Summary
105(1)
Review Questions
105(1)
Critical Thinking Exercises
105(1)
Endnotes
106(3)
Chapter 5 Sophisticated Cyber Criminal Organizations
109(29)
Objectives
109(1)
Introduction
109(2)
Espionage and the Theft of Intellectual Property
111(4)
Insider Fraud
115(5)
Sabotage
118(2)
Sophisticated Criminal Organizations
120(9)
The Impact of Organized Crime
120(1)
Use of Social Media by Organized Crime
121(1)
African Criminal Enterprises
122(1)
Asian Criminal Enterprises
123(1)
Operation Avalanche
124(1)
Balkan Criminal Enterprises
125(1)
Eurasian Criminal Enterprises-Russian Organized Crime
126(1)
Italian Organized Crime-La Cosa Nostra (LCN) Mafia
126(2)
Middle Eastern Criminal Enterprises
128(1)
Mexican and South American Drug Cartels
128(1)
The Indiscriminant Underground Marketplace-The Deep Web or Tor Network
129(6)
Summary
135(1)
Review Questions
136(1)
Critical Thinking Exercises
136(1)
Endnotes
136(2)
Section II Cyber Crime: Types, Nature, and Extent
Chapter 6 White-Collar Crimes
138(21)
Objectives
138(1)
Introduction
138(1)
Embezzlement
139(2)
Corporate Espionage
141(3)
Money Laundering
144(4)
Identity Theft
148(4)
Internet Fraud Schemes
152(4)
Summary
156(1)
Review Questions
157(1)
Critical Thinking Exercises
157(1)
Endnotes
157(2)
Chapter 7 Viruses And Malicious Code
159(31)
Objectives
159(1)
Introduction
159(4)
The Language of Malicious Software (Malware)
163(1)
Viruses and Other Malware
164(14)
History and Development
166(1)
Viruses
167(3)
Worms
170(2)
Trojan Horses
172(3)
Adware and Spyware
175(1)
Denial-of-Service Attacks
176(1)
Blended Threats
176(2)
Extent of Viruses and Malicious Code Attacks
178(2)
Virus Writers and Virus Experts
180(6)
Summary
186(1)
Review Questions
186(1)
Critical Thinking Exercises
187(1)
Endnotes
187(3)
Chapter 8 Sex Crimes, Victimization, And Obscenity On The World Wide Web
190(56)
Objectives
190(1)
Introduction
190(1)
Nature of Exploitation on the Internet
191(6)
Online Victimization of Young People
193(3)
Cyberbullying
196(1)
Stalking via the World Wide Web
197(6)
The Mechanisms of Traditional Stalking and Cyberstalking
198(2)
Characteristics of Stalkers and Their Victims
200(2)
Legislation Targeting Stalking
202(1)
Obscenity on the World Wide Web
203(4)
Laws and Legislation Protecting Children Online
204(3)
Pedophilia and Child Pornography
207(8)
The "New" Child Pornographers
210(2)
Moving from Pornography to Molestation
212(3)
Child Molestation
215(4)
The Problem of Child Sexual Abuse
217(2)
Prostitution and the Sex Trade
219(16)
Massage Parlors
222(1)
Pornography and Webcams
223(2)
Online Dating Fraud
225(2)
Sex Tourism
227(3)
The Process of Sex Tourism
230(5)
Issues in the Investigation of Internet Exploitation, Cyberstalking, and Obscenity
235(3)
Law Enforcement Initiatives
235(1)
Overlapping Jurisdictions and Duplication of Effort
236(1)
Identification of Suspects
237(1)
Issues with Evidence and Detection
237(1)
Summary
238(1)
Review Questions
239(1)
Critical Thinking Exercises
239(1)
Endnotes
239(7)
Chapter 9 Anarchy And Hate On The World Wide Web
246(24)
Objectives
246(1)
Introduction
246(1)
Digital Hate
247(2)
White Supremacy, Hate, and the Internet
248(1)
Terrorist Extremists from the Left
249(3)
ELF and ALF
250(2)
Domestic Terrorists in Cyberspace
252(2)
Dehumanize, Desensitize, and Demonize
252(1)
Internet Cartoons
253(1)
Storage and Dissemination of Information
254(7)
Publishing Information on Potential Victims
257(3)
Fund-Raising
260(1)
Terrorism, Intelligence Gathering, and the USA PATRIOT Act
261(3)
A Short History of Intelligence in the United States
261(1)
Domestic Intelligence and Policing
261(1)
Conflicting Roles
262(1)
Defining Intelligence
262(1)
U.S. Intelligence Weaknesses
263(1)
The USA PATRIOT Act of 2001
264(3)
The Reauthorized PATRIOT Act of 2006
265(1)
The Reauthorized PATRIOT Act of 2011
265(1)
Constitutional Rights and the USA PATRIOT Act
265(2)
Summary
267(1)
Review Questions
267(1)
Critical Thinking Exercises
267(1)
Endnotes
267(3)
Section III Controlling Cyber Crime: Legislation, Law Enforcement, and Investigation
Chapter 10 Digital Laws And Legislation
270(20)
Objectives
270(1)
Introduction
270(1)
Search and Seizure Law for Digital Evidence
270(6)
Searches with Warrants
271(2)
Searches Without Warrants
273(3)
Federal Statutes
276(4)
The Pen/Trap Statute 18 U.S.C. §3121-27
277(1)
The Wiretap Statute (Title III) 18 U.S.C. §2510-22
277(1)
Electronic Communications Privacy Act (ECPA) 18 U.S.C. §§2701-11
278(2)
USA PATRIOT Act/USA Freedom Act
280(4)
Communication Assistance for Law Enforcement Act
281(1)
Federal Criminal Statutes
281(3)
Admitting Evidence at Trial
284(2)
Authentication
284(1)
Hearsay
285(1)
The Best Evidence Rule
285(1)
Significant Court Cases
286(2)
Summary
288(1)
Review Questions
288(1)
Critical Thinking Exercises
289(1)
Endnotes
289(1)
Chapter 11 Law Enforcement Roles And Responses
290(17)
Objectives
290(1)
Introduction
290(1)
Federal Roles and Responses
290(12)
The Department of Justice
291(1)
The Federal Bureau of Investigation
292(2)
The National Security Agency
294(1)
The Federal Trade Commission
294(2)
The Postal Service
296(1)
The Department of Energy
297(1)
The Department of Homeland Security
298(1)
U.S. Immigration and Customs Enforcement
299(2)
The U.S. Secret Service
301(1)
State and Local Roles
302(2)
Critical Needs at the State and Local Levels of Enforcement
303(1)
Summary
304(1)
Review Questions
305(1)
Critical Thinking Exercises
305(1)
Endnotes
305(2)
Chapter 12 The Investigation Of Computer-Related Crime
307(26)
Objectives
307(1)
Introduction
307(1)
Investigator Roles and Responsibilities
308(3)
First Responders
308(1)
Investigators
309(1)
Digital Analysts
309(1)
Corporate Security
309(1)
Subject Matter Experts
310(1)
Single-Location Crime Scenes
310(1)
Search Warrants and Electronic Evidence
311(14)
Computer Systems
312(1)
External Storage Media
312(1)
Handheld Devices
312(1)
Other Electronic Devices
313(1)
Networking Equipment
313(1)
Executing the Search Warrant
313(2)
Examining the Crime Scene
315(5)
Multiple-Location and Network Crime Scenes
320(1)
Identifying Network Architectures
321(1)
Modeling Network Transactions
321(1)
Locating Evidence
322(1)
Key Information for Locating Network Trace Evidence
323(2)
Collecting Network Trace Evidence
325(1)
Presenting Digital Evidence at Trial
325(5)
The Hearsay Rule
326(1)
Using Notes on the Witness Stand
326(1)
Business Records
327(1)
Presenting Best Evidence
327(1)
Challenges to Forensic Analysis Strategies
328(1)
Chain of Custody
329(1)
Expert Testimony
330(1)
Summary
330(1)
Review Questions
330(1)
Critical Thinking Exercises
330(1)
Endnotes
330(3)
Chapter 13 Digital Forensics
333(26)
Objectives
333(1)
Introduction
333(1)
The Basic Process of Storage Forensics
334(1)
Preparation for Forensic Analysis
334(8)
Acquisition of Data
335(1)
Authentication of Data
336(1)
Imaging of the Evidence Drive
337(1)
Wiping the Analysis Drive
338(1)
Restoring
339(3)
Forensic Analysis
342(2)
The Forensic Analyst as Expert Witness
344(1)
Computer Storage Systems
344(4)
Volatile Storage Systems
344(2)
Nonvolatile Storage Systems
346(2)
File Systems
348(3)
FAT: File Allocation Table
348(1)
NTFS: New Technology File System
349(2)
Application: Defragmenting a Disk
351(1)
Evidence Recovery from Slack Space
352(1)
Commercial Forensic Packages
353(4)
Extended Analysis and Searching
355(1)
User Interface
355(1)
Centralized Report Writing and Auditing
356(1)
Validation and Support
356(1)
Summary
357(1)
Review Questions
357(1)
Critical Thinking Exercises
357(1)
Endnotes
358(1)
Section IV The Future of Cyber Crime and Cyber Terrorism: Prevention and Trends
Chapter 14 Information Security And Infrastructure Protection
359(26)
Objectives
359(1)
Introduction
359(1)
Mastering the Technology and the Environment
360(2)
Personal Computers and Intruders
360(1)
The Internet Explosion
361(1)
Principles of Risk Analysis
362(3)
Assessment and Evaluation
362(1)
Threats
363(2)
Cost-Effective Security
365(1)
Security Technologies
365(1)
Backups
365(8)
Wireless Networks and Security
366(1)
Firewalls
366(3)
Limitations of Firewalls
369(1)
Encryption
369(3)
Password Discipline
372(1)
Security Vendor Technologies
373(2)
Home Users
374(1)
A Recap of the Evolution of Cyberattacks
375(7)
The Early Attacks (1980-2000)
377(2)
New Century Attacks (2000 to Present)
379(3)
Summary
382(1)
Review Questions
383(1)
Critical Thinking Exercises
383(1)
Endnotes
383(2)
Chapter 15 Cyber Crime And Terrorism: A Forecast Of Trends And Policy Implications
385(31)
Objectives
385(1)
The Impact of Cyber Crime
385(3)
The Future of Cyber Crime and Cyber Terrorism: Forecasts
388(22)
Forecast 1: Computer Crime Will Significantly Impact the Police and Courts
389(4)
Forecast 2: Fraud and Identity Theft Will Be the Largest Computer Crime Problem Impacting the Police
393(2)
Forecast 3: Virtual Crimes Will Continue to Rapidly Increase
395(1)
Forecast 4: The Threat from Computer Hacker Groups Will Increase
396(1)
Forecast 5: Organized Crime Groups Will Increasingly Adopt Computerization as a Criminal Instrument
397(6)
Forecast 6: Terrorist Groups Will Increasingly Use Global Networking
403(2)
Forecast 7: The Character of Espionage Will Continue to Broaden
405(1)
Forecast 8: Criminals Will Increasingly Use Technology-Based Instruments and Methodologies to Carry Out Attacks
406(4)
Summary
410(1)
Review Questions
411(1)
Critical Thinking Exercises
411(1)
Endnotes
411(5)
Index 416
About our author Robert W. Taylor is currently a tenured full Professor in the Department of Criminology and Criminal Justice at The University of Texas at Dallas. The Department was recently ranked fifth in the world in academic excellence based on the strength of its PhD program. Before this position, he was the Director of the Executive Masters in Justice Administration and Leadership Program and the former program Head for the Public Affairs Program at UT-Dallas. Both are academic programs integrating the traditions of management, governmental affairs, policy analysis and decision science in the public sector. The Public Affairs Program hosted one of the largest graduate degree programs on campus, including Doctoral (PhD) and masters degrees in Public Affairs and Public Administration.

From January 2008 through 2010, Dr. Taylor was the Executive Director of the W.W. Caruth Jr. Police Institute at Dallas (CPI). The Institute was established through a $9.5 million grant from the Communities Foundation of Texas. Dr. Taylor was a principal party to the development of the Institute and was appointed the founding director by the University of North Texas System. The primary mission of the Institute is to provide direction and coordination of major training and research projects for the Dallas Police Department. The Institute represents a national think tank on policing strategies focused on major urban cities in the United States. He remains a Scholar-in-Residence at the Institute. From 1996 to 2008, Dr. Taylor was professor and chair of the Department of Criminal Justice at the University of North Texas. He served in this capacity for 13 years, and under his direction the Department gained national prominence, especially with the establishment of the Caruth Police Institute.

In 1995, Dr. Taylor took a leave of absence from university administration and teaching to join Emergency Resources International, Inc., the parent company of the famed Red Adair firefighters. His duties as Senior Vice-President, Crisis Management Division, included liaison with foreign governments and authorities, extensive contract negotiations, and the strategic development of a worldwide communication and information system. Dr. Taylors major project was acting as team leader on the largest oil spill in history (3 million barrels), located in the remote Nenets District of Russia, over 200 miles north of the Arctic Circle.

For the past 40 years, Dr. Taylor has studied criminal justice administration and specifically police responses to crime and terrorism, focusing on issues in the Middle East. He has traveled extensively throughout the Middle East, meeting several heads of state in that region. He has acted as a consultant to numerous federal, state and local agencies, and since September 11, 2001, Dr. Taylor has been a consultant to the U.S. Department of Justice working with the Institute for Intergovernmental Research (IIR) as a lead instructor in the State and Local Anti-Terrorism Training Program (SLATT). Dr. Taylor has also worked extensively throughout the Middle East, especially in the country of Turkey. He has been an instructor for the U.S. Department of State, Anti-Terrorism Assistance (ATA) Program (20012006) and taught internationally in the Executive Seminar on Cyber Terrorism presented to executives of foreign governments. Dr. Taylor holds appropriate top secret national security clearances through the JPASS system (archived).

Dr. Taylor has authored or coauthored more than 200 articles, books and manuscripts. Most of his publications focus on police administration and management, police procedures, international and domestic terrorism, drug trafficking and criminal justice policy. His articles appear in numerous journals, including Defense Analysis (University of Oxford, England Press), the ANNALS (American Academy of Political and Social Sciences), Police Quarterly, Crime and Delinquency, and the Police Chief (International Association of Chiefs of Police). Dr. Taylor is coauthor of two leading textbooks, Police Administration: Structures, Processes, and Behavior (Upper Saddle River, NJ: Pearson Publishing, 2017), currently in its 9th edition, and Criminal Investigation (New York: McGraw-Hill, 2018), currently in its 12th edition. These texts are used in more than 500 universities, colleges and police departments throughout the United States. He is also the senior author of Juvenile Justice: Policies, Practices, and Programs (McGraw-Hill, 2014) in its 4th edition, Cyber Crime and Cyber Terrorism (Pearson, 2018) in its 4th edition, and Police Patrol Allocation and Deployment (Pearson, 2011).

Dr. Taylor has an extensive background in academic and professional criminal justice, having taught at four major universities and serving as a sworn police officer and major crimes detective (lateral rank of sergeant) in Portland, Oregon, for over six years.

In 1984, Dr. Taylor was appointed as a Research Fellow at the International Center for the Study of Violence at the University of South Florida, Tampa, Florida, conducting various studies involving international and domestic terrorism, police training and management, public violence and homicide, computerized mapping and international drug trafficking. He continues to conduct research in these areas and is the recipient of numerous grants and contracts (over $18 million in funded projects). His latest work is concentrated in four areas: (1) quality improvement in police agencies through advanced leadership and management practices; (2) international terrorism, especially Middle Eastern groups, and the spread of radical Islam; (3) evaluation of community policing, CompStat and intelligence-led policing strategies in the United States; and (4) intelligence analysis, fusion centers and decision making, particularly during protracted conflict or crisis situations.

In 2004, the International Justice Mission in Washington, D.C., asked Dr. Taylor to assist in the training of the Cambodian National Police on child sex slavery and human trafficking as part of a large project funded through the U.S. Department of State ($1 million). His interest and research in this area have led to a leadership role in designing and developing training efforts in the United States aimed at raising awareness of the human trafficking tragedy for American law enforcement officers, funded in part through the U.S. Department of Justice. Dr. Taylor focuses on the nexus between human trafficking, drug trafficking and the financing of terrorist incidents internationally and domestically. He continues this important work as a guest lecturer, speaking at conferences internationally on these subjects.

In 2003, Dr. Taylor was awarded the University of North Texas, Regents Lecture Award for his work in the Middle East. In March 2008, the Academy of Criminal Justice Sciences presented Dr. Taylor with the prestigious O.W. Wilson Award in recognition of his outstanding contribution to police education, research and practice.

Dr. Taylor has been a consultant to the U.S. Army, the U.S. Marine Corps, the U.S. Department of Homeland Security, the U.S. Department of Treasury, Federal Law Enforcement Training Center, the U.S. Secret Service, the Bureau of Alcohol, Tobacco, and Firearms, the U.S. Department of Justice, the Federal Bureau of Investigation, the Drug Enforcement Administration, the Police Foundation, the Police Executive Research Forum (PERF), the International Association of Chiefs of Police (IACP), and numerous state and local municipalities and private corporations. He has also conducted significant training in the United States protectorates of the U.S. Virgin Islands, Guam and Saipan, and the countries of Canada, England, France, Switzerland, Thailand, Cambodia, Barbados, Northern Cyprus, Bahrain, Venezuela, Russia, Finland, United Arab Emirates, Kenya, Singapore and Turkey. He is an active member of the Academy of Criminal Justice Sciences (elected National Chair of the ACJS Police Section, 2002), the American Society for Public Administration and the American Society of Criminology.

Dr. Taylor is a graduate of Michigan State University (Master of Science, 1973) and Portland State University (Doctor of Philosophy, 1981).