Preface |
|
xi | |
|
|
xiii | |
|
|
xv | |
|
|
1 | (2) |
|
|
3 | (18) |
|
|
3 | (3) |
|
2.2 The impact of cyberspace |
|
|
6 | (1) |
|
2.3 Identity and authentication |
|
|
7 | (4) |
|
|
11 | (4) |
|
|
15 | (2) |
|
|
17 | (4) |
|
3 New opportunities for criminality |
|
|
21 | (40) |
|
3.1 Unprecedented access to information |
|
|
21 | (2) |
|
3.2 Crimes directed against cyberspace |
|
|
23 | (13) |
|
|
23 | (4) |
|
3.2.2 Crimes of destruction |
|
|
27 | (2) |
|
3.2.3 Monetized cybercrimes |
|
|
29 | (2) |
|
|
31 | (2) |
|
|
33 | (3) |
|
3.3 Crimes that rely on cyberspace |
|
|
36 | (6) |
|
3.3.1 Spam, scams, and cons |
|
|
37 | (3) |
|
|
40 | (1) |
|
|
40 | (2) |
|
3.3.4 Crimes against children |
|
|
42 | (1) |
|
3.4 Crimes done differently because of cyberspace |
|
|
42 | (5) |
|
3.4.1 Disseminating hatred |
|
|
42 | (1) |
|
|
43 | (2) |
|
3.4.3 Stalking and crime preparation |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (8) |
|
|
48 | (1) |
|
3.5.2 The financial system |
|
|
49 | (4) |
|
3.5.3 International money laundering |
|
|
53 | (1) |
|
|
54 | (1) |
|
3.6 Overlap with violent extremism |
|
|
55 | (6) |
|
4 New ways for criminals to interact |
|
|
61 | (8) |
|
4.1 Criminal collaboration |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (3) |
|
|
64 | (2) |
|
|
66 | (1) |
|
4.3.3 Sharing vulnerabilities |
|
|
66 | (1) |
|
4.4 International interactions |
|
|
67 | (2) |
|
5 Data analytics makes criminals easier to find |
|
|
69 | (32) |
|
5.1 Understanding by deduction |
|
|
70 | (4) |
|
5.2 Understanding by induction |
|
|
74 | (5) |
|
5.3 Subverting data analytics |
|
|
79 | (2) |
|
5.4 Intelligence-led policing |
|
|
81 | (1) |
|
|
82 | (9) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
5.5.5 Social network position |
|
|
87 | (4) |
|
5.6 Exploiting skewed distributions |
|
|
91 | (10) |
|
|
101 | (28) |
|
|
101 | (3) |
|
6.2 Types of data collected |
|
|
104 | (10) |
|
|
104 | (1) |
|
|
105 | (4) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
6.2.8 Protecting data collected by law enforcement |
|
|
114 | (1) |
|
6.3 Issues around data collection |
|
|
114 | (15) |
|
|
114 | (2) |
|
6.3.2 Wholesale data collection |
|
|
116 | (2) |
|
|
118 | (1) |
|
6.3.4 Racism and other-isms |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (3) |
|
6.3.7 Sabotaging data collection |
|
|
123 | (1) |
|
6.3.8 Getting better data by sharing |
|
|
124 | (5) |
|
7 Techniques for data analytics |
|
|
129 | (52) |
|
|
129 | (8) |
|
|
137 | (3) |
|
7.3 Meta issues in prediction |
|
|
140 | (14) |
|
7.3.1 Classification versus regression |
|
|
140 | (1) |
|
7.3.2 Problems with the data |
|
|
140 | (2) |
|
7.3.3 Why did the model make this prediction? |
|
|
142 | (1) |
|
7.3.4 How good is this model? |
|
|
143 | (3) |
|
7.3.5 Selecting attributes |
|
|
146 | (2) |
|
7.3.6 Making predictions in stages |
|
|
148 | (1) |
|
7.3.7 Bagging and boosting |
|
|
149 | (3) |
|
|
152 | (1) |
|
|
152 | (1) |
|
7.3.10 Should I make a prediction at all? |
|
|
153 | (1) |
|
7.4 Prediction techniques |
|
|
154 | (8) |
|
7.4.1 Counting techniques |
|
|
154 | (6) |
|
7.4.2 Optimization techniques |
|
|
160 | (2) |
|
|
162 | (1) |
|
7.5 Social network analysis |
|
|
162 | (9) |
|
7.6 Natural language analytics |
|
|
171 | (5) |
|
7.7 Making data analytics available |
|
|
176 | (1) |
|
7.8 Demonstrating compliance |
|
|
177 | (4) |
|
|
181 | (48) |
|
8.1 Predicting crime rates |
|
|
181 | (3) |
|
|
184 | (9) |
|
8.3 Geographical distribution patterns |
|
|
193 | (3) |
|
|
196 | (3) |
|
|
199 | (5) |
|
8.6 Criminal networks with a purpose |
|
|
204 | (2) |
|
8.7 Analyzing online posts |
|
|
206 | (14) |
|
8.7.1 Detecting abusive language |
|
|
209 | (3) |
|
|
212 | (3) |
|
|
215 | (2) |
|
8.7.4 Detecting fraud in text |
|
|
217 | (2) |
|
8.7.5 Detecting sellers in dark-web marketplaces |
|
|
219 | (1) |
|
8.8 Behavior -- detecting fraud from mouse movements |
|
|
220 | (1) |
|
8.9 Understanding drug trafficking pathways |
|
|
221 | (8) |
|
9 Law enforcement can use interaction too |
|
|
229 | (10) |
|
9.1 Structured interaction through transnational organizations |
|
|
230 | (2) |
|
9.2 Divisions within countries |
|
|
232 | (1) |
|
9.3 Sharing of information about crimes |
|
|
233 | (1) |
|
|
233 | (2) |
|
|
235 | (1) |
|
|
236 | (3) |
|
|
239 | (12) |
Bibliography |
|
251 | (4) |
Index |
|
255 | |