Cybercrime and Digital Forensics: An Introduction
812Cybercrime and Digital Forensics: An Introduction
812Paperback(3rd ed.)
-
PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
Overview
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:
- key theoretical and methodological perspectives;
- computer hacking and malicious software;
- digital piracy and intellectual theft;
- economic crime and online fraud;
- pornography and online sex crime;
- cyber-bullying and cyber-stalking;
- cyber-terrorism and extremism;
- the rise of the Dark Web;
- digital forensic investigation and its legal context around the world;
- the law enforcement response to cybercrime transnationally;
- cybercrime policy and legislation across the globe.
The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web.
This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.
Product Details
ISBN-13: | 9780367360078 |
---|---|
Publisher: | Taylor & Francis |
Publication date: | 05/31/2022 |
Edition description: | 3rd ed. |
Pages: | 812 |
Sales rank: | 581,270 |
Product dimensions: | 6.80(w) x 9.50(h) x 1.50(d) |
About the Author
Thomas J. Holt is Professor in the School of Criminal Justice at Michigan State University. His research focuses on all forms of cybercrime and the police response to these offenses. Dr. Holt's work has appeared in outlets such as British Journal of Criminology, Crime & Delinquency, and Terrorism & Political Violence. His research has been funded by the Australian Research Council, the Department of Homeland Security, the National Institute of Justice, and the National Science Foundation.
Adam M. Bossler is Professor and Chair of the Department of Criminal Justice and Criminology at Georgia Southern University. His research interests focus on the applicability of criminological theories to cybercrime offending and victimization and the law enforcement response to cybercrime. His research has been funded by the Department of Justice, National Science Foundation, and United Kingdom Home Office. He has co-authored three books, co-edited the Palgrave Handbook of International Cybercrime and Cyberdeviance, and written for various peer-reviewed journals, including Criminology & Public Policy, Policing, International Journal of Offender Therapy and Comparative Criminology, Journal of Criminal Justice, and Deviant Behavior. In addition to being a co-founder of ancient astronaut criminology, he is also a member of the American Society of Criminology Division of Cybercrime, the International Interdisciplinary Research Consortium on Cybercrime (IIRCC), and the European Society of Criminology's Working Group on Cybercrime.
Kathryn C. Seigfried-Spellar is Associate Professor in the Cyberforensics program in the Department of Computer and Information Technology (CIT) at Purdue University. She is a member of the Tippecanoe High Tech Crime Unit and has Special Deputy status for the Tippecanoe County Prosecutor's Office. Dr. Seigfried-Spellar's primary research area of interest is the personality characteristics and socio-legal factors associated with cyberdeviance, specifically internet crimes against children. Dr. Seigfried-Spellar has published in the area of digital forensics, specifically the ability to conduct a behavioral analysis of digital forensic evidence from child pornography investigations. She is a Fellow of the Digital and Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), member of the American Psychological Association (APA), and member of the International Association of Law Enforcement Intelligence Analysts (IALEIA).
Table of Contents
List of Figures xiv
List of Tables xvi
List of Boxes xvii
1 Technology and Cybercrime 1
Introduction 2
The Importance of Technology in Modern Society 3
Technology as a Landscape for Crime 5
A Typology of Cybercrime 19
Overview of the Textbook 24
2 Law Enforcement, Privacy, and Security in Dealing with Cybercrime 35
Introduction 36
Role of Municipal Police Departments and Sheriff Offices in Investigating Cybercrime 38
State Agencies' Roles in Investigating Cybercrime 42
Federal Law Enforcement and Cybercrime 44
Civil Investigation and Application of Digital Evidence 45
Extralegal Agencies and Nongovernmental Organizations 49
International Enforcement Challenges 51
The Tension Between Security and Privacy 53
3 Computer Hackers and Hacking 67
Introduction 68
Defining Computer Hacking 69
Non-Nation-State Actors vs. Nation-State Actors 72
The Human Aspects of the Hacker Subculture 75
Hacking History 79
The Contemporary Hacker Subculture 96
Legal Frameworks to Prosecute Hacking 103
Enforcing and Investigating Hacker Activity 110
4 Malware and Automated Computer Attacks 125
Introduction 126
The Basics of Malware 127
Viruses, Trojans, and Worms 129
Blended Threats and Ancillary Tools 139
The Global Impact of Malware 145
Hackers and Malware Writers 148
Legal Challenges in Dealing with Malware 150
Coordination and Management in Addressing Malware 154
5 Digital Piracy and Intellectual Property Theft 163
Introduction 164
What Is Intellectual Property? 167
The Theft of Corporate IP Relative to Pirated Content 169
Counterfeiting, E-Commerce, and Intellectual Property Theft 171
The Evolution of Piracy and Pirating Methods 177
The Subculture of Piracy 183
The Evolution of Legislation to Deal with Intellectual Property Theft 185
The Law Enforcement and Industry Response 194
6 Online Fraud 209
Introduction 210
Fraud and Computer-Mediated Communications 213
Identity Theft 214
Email-Based Scams 217
Phishing Emails 221
Data Breaches and Identity Crimes 231
Identity Theft and Fraud Laws 233
Investigating and Regulating Fraud Globally 237
7 Pornography, Image-Based Sexual Abuse, and Prostitution 253
Introduction 254
Pornography in the Digital Age 256
Image-Based Sexual Abuse 261
Prostitution and Sex Work 265
The Clients of Sex Workers 267
Dealing with Obscenity and Pornography Online 269
8 Child Sexual Exploitation Material Offenses 287
Introduction 288
Defining and Differentiating Child Pornography and CSEM from Obscene Content 290
The Role of Technology in Child Sexual Exploitation Material 295
Explorations of the Pedophile Subculture Online 299
Typologies of CSEM Use and Consumption 302
The Legal Status of CSEM Around the Globe 309
Nonprofit Organization Efforts 315
Law Enforcement Efforts to Combat CSEM 317
9 Cyberbullying Online Harassment, and Cyberstalking 331
Introduction 332
Defining Cyberbullying 334
The Prevalence of Cyberbullying 336
Predictors of Bullying Online and Offline 338
Differentiating Online Harassment and Stalking 340
Rates of Harassment and Stalking 342
Understanding Victims' Experiences of Cyber-Violence 344
Reporting Online Bullying, Harassment, and Stalking 347
Regulating Cyberbullying 349
Regulating Online Harassment and Stalking 352
Enforcing Cyber-Violence Laws and Norms 356
10 Online Extremism and Cyberterror 371
Introduction 372
Defining Terror, Hacktivism, and Cyberterror 374
The Use of the Internet in the Indoctrination and Recruitment of Extremist Groups 380
Electronic Attacks by Extremist Groups 390
The Radical Far Right Online 393
The E-Jihad 396
Legislating Extremism and Cyberterror 399
Investigating and Securing Cyberspace from the Threat of Terror 403
11 Cyberwarfare and Information Operations Online 417
Introduction 418
Defining Warfare and Cyberwarfare 420
The Role of Nation-State Actors in Cyberattacks 425
Offensive and Defensive Cyber-Operations 427
Information Warfare Campaigns Online 433
Securing Cyberspace from the Threat of Cyberwar 439
12 Illicit Market Operations Online 451
Introduction 452
Differentiating Physical and Virtual Markets 453
The Development and Evolution of Illicit Markets Online 460
Contextualizing the Practices of Illicit Market Participants 466
Debunking Claims Related to Illicit Market Operations 469
13 Cybercrime and Criminological Theories 479
Introduction 480
Applying Criminological Theories to Cybercrime Offending 482
Applying Criminological Theories to Cybercrime Victimization 502
Need for New Cyberspace Theories? 511
14 Evolution of Digital Forensics 533
Introduction 534
From Computer Forensics to Digital Forensics 535
Stages of Digital Forensic Investigation 550
The Role of Digital Evidence 555
Types of Hardware, Peripherals, and Electronic Evidence 558
Evidence Integrity 564
15 Acquisition and Examination of Forensic Evidence 575
Introduction 576
Data Preservation 577
Digital Forensic Imaging Tools 583
Uncovering Digital Evidence 593
Data Analysis 605
Reporting of Findings 608
16 Legal Challenges in Digital Forensic Investigations 619
Introduction 620
Constitutional Issues in Digital Investigations 622
Admissibility of Evidence in Court 648
Admissibility of Digital Forensics as Expert Testimony 659
17 The Future of Cybercrime, Terror, and Policy 671
Introduction 672
Considering the Future of Cybercrime 674
How Technicways Will Shift with New Technologies 677
Social Movements, Technology, and Social Change 680
Need for New Cyber Criminological Theories? 684
Shifting Enforcement Strategies in the Age of the Internet 686
Considering the Future of Forensics 690
The Challenge to Policy-Makers Globally 692
Glossary 703
Index 759