Digital Crime and Digital Terrorism

Digital Crime and Digital Terrorism

3.5 (20 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author)  , By (author) 

List price: US$72.20

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


For courses in terrorism and computer crime. This text focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these more

Product details

  • Paperback | 416 pages
  • 175.3 x 231.1 x 20.3mm | 544.32g
  • Pearson Education (US)
  • Pearson
  • United States
  • English
  • 0131141376
  • 9780131141377

Table of contents

(NOTE:Each chapter concludes with Summary and Review Questions.) SECTION I: THE ETIOLOGY OF DIGITAL CRIME AND DIGITAL TERRORISM. 1. Introduction and Overview of Digital Crime. Chapter Objectives. Introduction. New Threats to the Information Age. Purpose and Scope of this Book.Digital Crime and Digital Terrorism. A Developmental Perspective of the Growing Problem. Increases in Cyber Victimization. The Changing Character of Cyber Victimization Types of Computer Crime. The Computer as Target. The Computer as an Instrument of a Crime. The Computer as Incidental to a Crime. Crimes Associated with the Prevalence of Computers. 2. Digital Terrorism. Chapter Objectives. Defining the Concepts. Buzzwords: Information Warfare and Cyber-Terrorism.Risk and Critical Infrastructure Attacks. Information Attacks. Web-Site Defacement. Cyberplagues-Viruses and Worms. Distributed Denial of Service Attacks. Unauthorized Intrusions. Cyber and Technological Facilitation. Facilitation of Attack. Data Hiding. Cryptography. Propaganda and Promotion. Cyber-Terrorism as an Adjunct Attack. Al-Qaeda and Information Technology. China and Information Warfare. 3. The Criminology of Computer Crime. Introduction. Choice Theory. Routine Activities.Deterrence Theory. Psychological Theories. Moral Development and Crime. Personality Disorders. Pedophiles and Psychological Theory. Social Structure Theories. Strain Theory. White-Collar Crime and Strain Theory. Subculture Theory.Hackers and Social Structure Theories. Social Process Theories. Learning Theory. Social Control Theory.Virus Writers and Social Process Theories. Terrorism and Political Theory. 4. Digital Criminals and Hackers. Chapter Objectives. What is a Hacker? The Original Meaning of "Hacker". What did Hackers Become? Retaking the word: Hacker. What do Hackers Do?The Hacker Subculture. Prosocial Hacking. The Hacker Ethic.Hacker Typology. Old School Hackers. The Merger of Phone Phreaks and Hackers. Bedroom Hackers. Larval Hackers (Newbies). Warez Doodz. Internet Hackers. Script Kiddies. Hacktivists. A Hacker by Any Other Name... Computer Criminals vs. Hackers. Crackers. White Hat versus Black Hat. Hackers and the Media. Fear, Uncertainty, and Doubt - FUD. SECTION II: DIGITAL CRIME: TYPES, NATURE, AND EXTENT. 5. White Collar Crimes. Chapter Objectives. Embezzlement. A Computer-Assisted Crime.Corporate Espionage. Money Laundering. E-Commerce and the Internet.Identity Theft. Internet Fraud Schemes. 6. Viruses and Malicious Code. Chapter Objectives. Viruses and Malicious Code. History and Development. Viruses. Worms. Trojan Horses. Adware and Spyware. Denial of Service Attacks. Blended Threats. Extent of Viruses and Malicious Codes. Attack Trends. Malicious Code Trends. Vulnerability Highlights. Current Issues. Virus Hoaxes. Virus Writers and Virus Experts. 7. Exploitation, Stalking and Obscenity on the WWW. Chapter Objectives. Nature of Exploitation on the Internet. Incidence and Prevalence of Victimization Online.Stalking via the WWW. Dynamics and Nature of Stalking and Cyber Stalking. Characteristics of Stalkers and Their Victims. Law Enforcement and Legislation Targeting Stalking. Obscenity on the WWW. Laws and Legislation Protecting Children Online.Child Pornography. The "New" Child Pornographers. The Process of Moving from Pornography to Molestation. Child Molestation. The Problem of Child Sexual Abuse.Sex Tourism. The Process of Sex Tourism.Issues in the Investigation of Internet Exploitation, Cyber-Stalking, and Obscenity. Law Enforcement Initiatives. Overlapping Jurisdiction and Duplication of Effort. Identification of Suspects. Issues with Evidence and Detection. 8. Anarchy and Hate on the World Wide Web. Chapter Objectives. Digital Hate. White Supremacy, Hate and the Internet.Terrorist Extremists from the Left. ELF and ALF.Domestic Terrorists in Cyberspace. Dehumanize, Desensitize and Demonize. Internet Cartoons. Storage and Dissemination of Information. Publishing Information on Potential Victims. Fundraising. Terrorism, Intelligence Gathering and the USA PATRIOT Act. A Short History of Intelligence in the United States. Domestic Intelligence and Policing. Conflicting Roles. Defining Intelligence. U.S. Intelligence Weaknesses. The USA PATRIOT Act. Constitutional Rights and the USA PATRIOT Act.SECTION III: CONTROLLING DIGITAL CRIME: LEGISLATION, LAW ENFORCEMENT, AND INVESTIGATION. 9. Digital Laws and Legislation. Chapter Objectives. Search and Seizure Law for Digital Evidence. Searches With Warrants. Searches Without Warrants. Federal Statutes. The Pen/Trap Statute 18 U.S.C. 3121-27. The Wiretap Statute ("Title III") 18 U.S.C. 2510-22. Electronic Communications Privacy Act "ECPA" 18 U.S.C. 2701-11. USA PATRIOT Act. Communication Assistance for Law Enforcement Act. Federal Criminal Statutes. Admitting Evidence at Trial. Authentication. Hearsay. The Best Evidence Rule. Significant Court Cases. 10. Law Enforcement Roles and Responses. Chapter Objectives. Federal Roles and Responses. The Secret Service. The Department of Justice. The Federal Bureau of Investigation. The National Security Agency. The Federal Trade Commission. The Postal Service. The Bureau of Customs and Border Protection. The Department of Energy. State and Local Roles. Critical Needs as the State and Local Levels of Enforcement.Interagency Cooperation and Collaboration. 11. The Investigation of Computer-Related Crime. Chapter Objectives. Investigator Roles and Responsibilities. First Responders. Investigators. Forensic Analysts. Private Police. Subject Matter Experts. Single Location Crime Scenes. Search Warrants and Electronic Evidence. Computer Systems. External Storage Media. Personal Data Devices (PDA's). Other Electronic Devises. Executing the Search Warrant. Examining of the Crime Scene. Multiple Location and Network Crime Scenes. Identifying Network Architectures. Modeling Network Transactions. Locating Evidence. Key Information for Locating Network Trace Evidence. Presenting Digital Evidence at Trial. The Hearsay Rule. Using Notes on the Witness Stand. Business Records. Presenting Best Evidence. Chain of Custody. Expert Testimony. 12. Digital Forensics. Chapter Objectives. The Basic Process of Storage Forensics. Preparation for Forensic Analysis. Acquisition of Data. Authentication of Data. Imaging of the Evidence Drive. Wiping the Analysis Drive. Restoring. Forensic Analysis. The Forensic Analyst as Expert Witness. Computer Storage Systems. Volatile Storage Systems. Non-Volatile Storage Systems.File Systems. FAT: File Allocation Table. NTFS: New Technology File System. Dynamic Disks. Encrypting File Systems - EFS. Evidence Recovering from Slack Space. Application: Defragmenting a Disk. Commercial Forensic Packages. Extended Analysis and Searching. User Interface. Centralized Report Writing and Auditing. Validation and Support. SECTION IV: THE FUTURE OF DIGITAL CRIME AND DIGITAL TERRORISM: PREVENTION AND TRENDS. 13. Information Security and Infrastructure Protection. Chapter Objectives. Mastering the Technology and the Environment. Personal Computers and Intruders. The Internet Explosion. Principles of Risk Analysis. Assessment and Evaluation. Threats. Cost-Effective Security. Security Technologies. Back-Ups. Firewalls. Limitations of Firewalls. Encryption. Password Discipline. Security Vendor Technologies. Home Users.14. Digital Crime and Terrorism: A Forecast of Trends and Policy Implications. Adapted from David L. Carter and Andra J. Katz-Bannister. Chapter Objectives. The Impact of Computer Crime: The Future Is Now. Predicting the Future: Surveying the Experts. Limitations to Data Collection. The Future of Digital Crime and Digital Terrorism: Forecasts. Forecast 1. Forecast 2. Forecast 3. Forecast 4. Forecast 5. Forecast 6. Forecast 7. Forecast 8. Overarching Factors Contributing to these more

Rating details

20 ratings
3.5 out of 5 stars
5 15% (3)
4 35% (7)
3 35% (7)
2 15% (3)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X