Cybercrime and Digital Forensics: An Introduction - 3rd Edition

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: • key theoretical and methodological perspectives; • computer hacking and malicious software; • digital piracy and intellectual theft; • economic crime and online fraud; • pornography and online sex crime; • cyber-bullying and cyber-stalking; • cyber-terrorism and extremism; • the rise of the Dark Web; • digital forensic investigation and its legal context around the world; • the law enforcement response to cybercrime transnationally; • cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Author(s): Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar
Edition: 3
Publisher: Routledge
Year: 2022

Language: English
Pages: 813
City: New York, NY

Taylor &. Francis
Taylor &. Francis
Contents
Figures
Tables
Boxes
Taylor &. Francis
Chapter Goals
Introduction
The Importance of Technology in Modern Society
Technology as a Landscape for Crime
Technology as a Communications Medium
Technology as a Target of or Means to Engage in Crime
Box 1.1 Getting Around Russian Extradition Laws
Technology as Evidence
A Typology of Cybercrime
Cyber-Trespass
Cyber-Deception/Theft
Cyber-Porn/Obscenity
Cyber-Violence
Overview of the Textbook
Key Terms
Discussion Questions
References
Chapter Goals
Introduction
Role of Municipal Police Departments and Sheriff Offices in Investigating Cybercrime
Box 2.1 Increasing Local Police Capacity to Investigate Cybercrime
State Agencies’ Roles in Investigating Cybercrime
Box 2.2 Assessing the Credibility of a Fusion Center’s Analysis of a Cyberattack
Federal Law Enforcement and Cybercrime
Civil Investigation and Application of Digital Evidence
Box 2.3 The Role of Digital Evidence in Divorce Cases
Extralegal Agencies and Nongovernmental Organizations
Spamhaus
Computer Emergency Readiness Teams (CERTs)
Cyber Civil Rights Initiative (CCRI)
International Enforcement Challenges
The Tension Between Security and Privacy
Box 2.4 An Examination of Why We Should Be Concerned By Government Spying Campaigns
Summary
Key Terms
Discussion Questions
References
Chapter Goals
Introduction
Defining Computer Hacking
Non-Nation-State Actors vs. Nation-State Actors
The Human Aspects of the Hacker Subculture
Box 3.1 The Jargon File Definition of Hacking
Hacking History
1950s: The Origins
Timeline of Computer Hacking
Box 3.2 Mainframe Computing Systems
1960s and 1970s: The Hacker Ethic
1980s: PCs, Entertainment, and the Hacker Manifesto
Box 3.3 A Hacker Talks about WarGames
Box 3.4 The Criminal Exploits of Kevin Mitnick
1990s: Affordable Technology, the Computer Security Community, and Financial Gain
Box 3.5 The Electronic Disturbance Theater and Cyberattacks
Box 3.6 The Ongoing Conflict Between Indian and Pakistani Hackers
The Contemporary Hacker Subculture
Technology
Knowledge
Secrecy
Legal Frameworks to Prosecute Hacking
Enforcing and Investigating Hacker Activity
Box 3.7 Exploits of LulzSec
Summary
Key Terms
Discussion Questions
References
Taylor &. Francis
Chapter Goals
Introduction
The Basics of Malware
Box 4.1 The Debate over Public or Private Vulnerability Disclosures
Viruses, Trojans, and Worms
Viruses
Box 4.2 F-Secure Report on Virus W32/Concept Malware
Trojans
Worms
Blended Threats and Ancillary Tools
Botnets and DDoS Attacks
Exploit Packs
Box 4.3 Interview with MPack Creator
Ransomware
Box 4.4 An Example of Cybersecurity Costs in Ransomware Attacks
The Global Impact of Malware
Hackers and Malware Writers
Box 4.5 Interview with the Malware Writer Corpse
Legal Challenges in Dealing with Malware
Box 4.6 One of the First Modern Prosecutions for Malware Distribution in the United States
Coordination and Management in
Addressing Malware
Summary
Key Terms
Discussion Questions
References
Chapter Goals
Introduction
Box 5.1 Pirating Avengers: Endgame
What Is Intellectual Property?
The Theft of Corporate IP Relative to Pirated Content
Counterfeiting, E-Commerce, and Intellectual Property Theft
Box 5.2 The Rise of Virtual Brand Protection Communities
The Evolution of Piracy and Pirating Methods
Box 5.3 Changing Film Practices and Their Impact on Piracy
The Subculture of Piracy
The Evolution of Legislation to Deal with Intellectual Property Theft
Berne Convention
Copyright Act of 1976
WIPO Copyright Treaty
US Legislation in the 1990s on Intellectual
Property Theft
European Directives
Additional US Legislation Protecting Trademarks and Patents
The Law Enforcement and Industry Response
Box 5.4 Digital Piracy in India
Summary
Key Terms
Discussion Questions
References
Taylor &. Francis
Chapter Goals
Introduction
Box 6.1 Twitter Promoting a Phishing Site
Fraud and Computer-Mediated Communications
Identity Theft
Email-Based Scams
Nigerian Email Schemes
Box 6.2 Nigerian Email Text
Phishing Emails
Box 6.3 Phishing Example
Romance Scams
Box 6.4 Understanding the Human Dimensions of Romance Scams
Business Email Compromise
Data Breaches and Identity Crimes
Box 6.5 Synthetic Identity Theft Stemming From Data Breaches
Identity Theft and Fraud Laws
Investigating and Regulating Fraud Globally
Box 6.6 The Overlapping Role of the Secret Service and Federal Bureau of Investigation
Summary
Key Terms
Discussion Questions
References
Taylor &. Francis
Chapter Goals
Introduction
Pornography in the Digital Age
Box 7.1 The Growth of VR Porn Content in 2020
Image-Based Sexual Abuse
Box 7.2 The Impact of Image-Based Sexual Abuse on Its Victims
Prostitution and Sex Work
Box 7.3 The Challenges of Escort Review Sites
The Clients of Sex Workers
Box 7.4 The Opinions of a Hobbyist in Canada
Dealing with Obscenity and Pornography Online
Existing Legislation
Box 7.5 The Vagaries of Prosecuting Obscene Content Online
Self-Regulation by the Pornography Industry
Summary
Key Terms
Discussion Questions
References
Taylor &. Francis
Chapter Goals
Introduction
Box 8.1 The Practices of To Catch a Predator
Defining and Differentiating Child Pornography and CSEM from Obscene Content
Box 8.2 The 10-Point COPINE Scale
Box 8.3 Detail on Operation Delego
The Role of Technology in Child Sexual Exploitation Material
Box 8.4 Livestreaming Sexual Abuse Content
Box 8.5 Understanding Attempts to Solicit Youth into Documenting Sexual Acts
Box 8.6 The Scope of CSAM on the Dark Web
Explorations of the Pedophile Subculture Online
Typologies of CSEM Use and Consumption
Box 8.7 The Rogers Seigfried-Spellar Hybrid Model
The Legal Status of CSEM Around the Globe
Nonprofit Organization Efforts
Law Enforcement Efforts to Combat CSEM
Box 8.8 Immigration and Customs Enforcement Operations in Action
Box 8.9 The Virtual Global Taskforce in Action
Summary
Key Terms
Discussion Questions
References
Chapter Goals
Introduction
Defining Cyberbullying
The Prevalence of Cyberbullying
Predictors of Bullying Online and Offline
Differentiating Online Harassment and Stalking
Box 9.1 Vickie Newton and Negative Outcomes of Cyberstalking
Rates of Harassment and Stalking
Understanding Victims’ Experiences of Cyber-Violence
Box 9.2 The Unfortunate Suicides Resulting from Bullying
Reporting Online Bullying, Harassment, and Stalking
Regulating Cyberbullying
Box 9.3 The Computer Fraud and Abuse Act Applied to Megan Meier’s Death
Box 9.4 The Failure of the Megan Meier Bullying Legislation
Regulating Online Harassment and Stalking
Enforcing Cyber-Violence Laws and Norms
Box 9.5 Facebook Security Suggestions for Parents
Summary
Key Terms
Discussion Questions
References
10
Chapter Goals
Introduction
Defining Terror, Hacktivism, and Cyberterror
Box 10.1 The Use of Technology in Protest Activities
Box 10.2 Ultimatum for DDoS Attacks Against US Banks
Box 10.3 The Use of Encrypted Chat Applications by Terrorists
The Use of the Internet in the Indoctrination and Recruitment of Extremist Groups
Box 10.4 Anonymous Open Letter Example
Box 10.5 The Role of Social Media in Recruitment and Radicalization
Box 10.6 An Example of Facebook Live Being Used for Terrorism
Box 10.7 Online Gaming as A Flash Point for Far Right Indoctrination
Electronic Attacks by Extremist Groups
Box 10.8 Examples of Cyberattacks Against SCADA Systems in Water Treatment
The Radical Far Right Online
The E-Jihad
Legislating Extremism and Cyberterror
Investigating and Securing Cyberspace from the Threat of Terror
The Federal Bureau of Investigation
The Department of Homeland Security
Other Nations’ Responses to Cyberterror
Summary
Key Terms
Discussion Questions
References
Taylor &. Francis
11
Chapter Goals
Introduction
Box 11.1 An Opinion on the Risk of Data Breaches to National Security
Defining Warfare and Cyberwarfare
The Role of Nation-State Actors in Cyberattacks
Box 11.2 The Use of Civilians in Nation-State Actions
Offensive and Defensive Cyber-Operations
Box 11.3 The Harm Caused by WannaCry Malware
Box 11.4 Understanding the Risk of Social Engineering as a Tool for Cyberattack
Box 11.5 Small Businesses Matter in Military Cybersecurity Planning
Box 11.6 The Challenge of Using Active Defense Tools in Practice
Information Warfare Campaigns Online
Box 11.7 How the Creative Arts Can Be Used for Disinformation and Misinformation
Box 11.8 Inside the Russian Troll Organization
Box 11.9 The Role of Russian Hacking in Climategate?
Box 11.10 How Nations are Using Disinformation to Their Benefit
Securing Cyberspace from the Threat of Cyberwar
Box 11.11 The Tools Created by the NSA for Espionage and Attack
Summary
Key Terms
Discussion Questions
References
12
Chapter Goals
Introduction
Differentiating Physical and Virtual Markets
Box 12.1 How Drug Dealers’ Use of Shipping Services Can Lead to Arrest
Box 12.2 The Risk of Exit Scams in Dark Web Markets
The Development and Evolution of Illicit Markets Online
Box 12.3 Early Drug Sales Online
Box 12.4 Taking Down E-Gold
Box 12.5 Charting New Directions for Online Illicit Markets
Contextualizing the Practices of Illicit Market Participants
Box 12.6 Dark Web Gun Sales and the Law
Debunking Claims Related to Illicit Market Operations
Box 12.7 Assessing the Red Room Phenomenon
Box 12.8 The Threat of Hitmen Services on the Dark Web
Summary
Key Terms
Discussion Questions
References
13
Chapter Goals
Introduction
Applying Criminological Theories to Cybercrime Offending
Subcultural Theories
Overview
Subcultures and Cybercrime
Social Learning Theory and Cybercrime
Overview
Box 13.1 Examples of Websites that Provide Information on Hacking Techniques
General Theory of Crime
Overview
Agnew’s General Strain Theory
Overview
Box 13.2 Emotional, Mental, Behavioral, and Physical Effects of Cyberbullying
Techniques of Neutralization
Overview
Box 13.3 Justifications for Hacking
Deterrence Theory
Applying Criminological Theories to Cybercrime Victimization
Routine Activity Theory
Overview
Box 13.4 Self-Protection While Online
General Theory of Crime and Victimization
Overview
Need for New Cyberspace Theories?
Space Transition Theory
Digital Drift
Box 13.5 Psychological Theories of Cybercrime
Summary
Key Terms
Discussion Questions
References
14
Chapter Goals
Introduction
From Computer Forensics to Digital Forensics
Events of the 1970s
Box 14.1 The Flaggler Dog Track Incident
Early 1980s: Pre-Forensics/Ad Hoc Phase
Mid-1980s: Structured Phase
Early 2000s: The Golden Age
End of the Golden Era and the Challenges of New Technologies
Box 14.2 Digital Evidence in Amazon Echo
Box 14.3 Criminals and Vault Apps
Stages of Digital Forensic Investigation
Survey/Identification
Collection/Acquisition
Box 14.4 Video Game Systems and Digital Evidence
Examination/Analysis
Report/Presentation
The Role of Digital Evidence
Types of Hardware, Peripherals, and Electronic Evidence
Box 14.5 Legacy Systems and Vulnerabilities
Box 14.6 Digital Evidence and Real-World Crime
Evidence Integrity
Summary
Key Terms
Discussion Questions
References
15
Chapter Goals
Introduction
Data Preservation
Imaging
Verification
Box 15.1 MD5 Algorithm
Digital Forensic Imaging Tools
Box 15.2 The Adam Walsh Act
EnCase®
Box 15.3 The Murder Trial of Ler Wee Teang
Forensic Toolkit ® (FTK ® )
Uncovering Digital Evidence
Physical Extraction
Logical Extraction
Box 15.4 Example of Partition Recovery
Box 15.5 Data Sectors
Box 15.6 Slack Space
Box 15.7 An Example of Encryption
Data Analysis
Reporting of Findings
Summary
Key Terms
Discussion Questions
References
16
Chapter Goals
Introduction
Constitutional Issues in Digital Investigations
The Fourth Amendment
Privacy
Search and Seizure
Box 16.1 A Fictional Search Warrant for Electronic Devices
Exceptions to the Rule
Box 16.2 A Fictional Search Warrant for an Email Account
The Fifth Amendment
Box 16.3 Double Jeopardy
Key Disclosure
Box 16.4 Apple, the FBI, and iPhone Security Features
Admissibility of Evidence in Court
Overview
Box 16.5 An Excerpt from the US Federal Rules of Evidence
Box 16.6 Indian Evidence Act of 1872
The Frye Standard
Federal Rules of Evidence 702
The Daubert Standard
International Response to Daubert and Frye
Admissibility of Digital Forensics as Expert Testimony
Summary
Key Terms
Discussion Questions
References
17
Chapter Goals
Introduction
Considering the Future of Cybercrime
Box 17.1 Understanding Why Hackers Target Trusted Services
Box 17.2 Understanding the Role of OnlyFans in Sex Work
How Technicways Will Shift with New Technologies
Box 17.3 The Difficulties of Using Contact Tracing Apps
Box 17.4 An Example of a Serious, but Controlled, Vehicle Hack
Social Movements, Technology, and Social Change
Box 17.5 Understanding QAnon-Related Violence
Need for New Cyber Criminological Theories?
Shifting Enforcement Strategies in the
Age of the Internet
Box 17.6 The Risks Encrypted Apps Pose to the Criminal Justice System
Box 17.7 The Challenge of Law Enforcement Efforts to Hack Tor
Considering the Future of Forensics
The Challenge to Policy-Makers Globally
Summary
Key Terms
Discussion Questions
References
Glossary
Taylor &. Francis
Index