Cybercrime and Digital Forensics: An Introduction

Cybercrime and Digital Forensics: An Introduction

Cybercrime and Digital Forensics: An Introduction

Cybercrime and Digital Forensics: An Introduction

Paperback(3rd ed.)

$48.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:

- key theoretical and methodological perspectives;

- computer hacking and malicious software;

- digital piracy and intellectual theft;

- economic crime and online fraud;

- pornography and online sex crime;

- cyber-bullying and cyber-stalking;

- cyber-terrorism and extremism;

- the rise of the Dark Web;

- digital forensic investigation and its legal context around the world;

- the law enforcement response to cybercrime transnationally;

- cybercrime policy and legislation across the globe.

The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web.

This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.


Product Details

ISBN-13: 9780367360078
Publisher: Taylor & Francis
Publication date: 05/31/2022
Edition description: 3rd ed.
Pages: 812
Sales rank: 581,270
Product dimensions: 6.80(w) x 9.50(h) x 1.50(d)

About the Author

Thomas J. Holt is Professor in the School of Criminal Justice at Michigan State University. His research focuses on all forms of cybercrime and the police response to these offenses. Dr. Holt's work has appeared in outlets such as British Journal of Criminology, Crime & Delinquency, and Terrorism & Political Violence. His research has been funded by the Australian Research Council, the Department of Homeland Security, the National Institute of Justice, and the National Science Foundation.

Adam M. Bossler is Professor and Chair of the Department of Criminal Justice and Criminology at Georgia Southern University. His research interests focus on the applicability of criminological theories to cybercrime offending and victimization and the law enforcement response to cybercrime. His research has been funded by the Department of Justice, National Science Foundation, and United Kingdom Home Office. He has co-authored three books, co-edited the Palgrave Handbook of International Cybercrime and Cyberdeviance, and written for various peer-reviewed journals, including Criminology & Public Policy, Policing, International Journal of Offender Therapy and Comparative Criminology, Journal of Criminal Justice, and Deviant Behavior. In addition to being a co-founder of ancient astronaut criminology, he is also a member of the American Society of Criminology Division of Cybercrime, the International Interdisciplinary Research Consortium on Cybercrime (IIRCC), and the European Society of Criminology's Working Group on Cybercrime.

Kathryn C. Seigfried-Spellar is Associate Professor in the Cyberforensics program in the Department of Computer and Information Technology (CIT) at Purdue University. She is a member of the Tippecanoe High Tech Crime Unit and has Special Deputy status for the Tippecanoe County Prosecutor's Office. Dr. Seigfried-Spellar's primary research area of interest is the personality characteristics and socio-legal factors associated with cyberdeviance, specifically internet crimes against children. Dr. Seigfried-Spellar has published in the area of digital forensics, specifically the ability to conduct a behavioral analysis of digital forensic evidence from child pornography investigations. She is a Fellow of the Digital and Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), member of the American Psychological Association (APA), and member of the International Association of Law Enforcement Intelligence Analysts (IALEIA).

Table of Contents

List of Figures xiv

List of Tables xvi

List of Boxes xvii

1 Technology and Cybercrime 1

Introduction 2

The Importance of Technology in Modern Society 3

Technology as a Landscape for Crime 5

A Typology of Cybercrime 19

Overview of the Textbook 24

2 Law Enforcement, Privacy, and Security in Dealing with Cybercrime 35

Introduction 36

Role of Municipal Police Departments and Sheriff Offices in Investigating Cybercrime 38

State Agencies' Roles in Investigating Cybercrime 42

Federal Law Enforcement and Cybercrime 44

Civil Investigation and Application of Digital Evidence 45

Extralegal Agencies and Nongovernmental Organizations 49

International Enforcement Challenges 51

The Tension Between Security and Privacy 53

3 Computer Hackers and Hacking 67

Introduction 68

Defining Computer Hacking 69

Non-Nation-State Actors vs. Nation-State Actors 72

The Human Aspects of the Hacker Subculture 75

Hacking History 79

The Contemporary Hacker Subculture 96

Legal Frameworks to Prosecute Hacking 103

Enforcing and Investigating Hacker Activity 110

4 Malware and Automated Computer Attacks 125

Introduction 126

The Basics of Malware 127

Viruses, Trojans, and Worms 129

Blended Threats and Ancillary Tools 139

The Global Impact of Malware 145

Hackers and Malware Writers 148

Legal Challenges in Dealing with Malware 150

Coordination and Management in Addressing Malware 154

5 Digital Piracy and Intellectual Property Theft 163

Introduction 164

What Is Intellectual Property? 167

The Theft of Corporate IP Relative to Pirated Content 169

Counterfeiting, E-Commerce, and Intellectual Property Theft 171

The Evolution of Piracy and Pirating Methods 177

The Subculture of Piracy 183

The Evolution of Legislation to Deal with Intellectual Property Theft 185

The Law Enforcement and Industry Response 194

6 Online Fraud 209

Introduction 210

Fraud and Computer-Mediated Communications 213

Identity Theft 214

Email-Based Scams 217

Phishing Emails 221

Data Breaches and Identity Crimes 231

Identity Theft and Fraud Laws 233

Investigating and Regulating Fraud Globally 237

7 Pornography, Image-Based Sexual Abuse, and Prostitution 253

Introduction 254

Pornography in the Digital Age 256

Image-Based Sexual Abuse 261

Prostitution and Sex Work 265

The Clients of Sex Workers 267

Dealing with Obscenity and Pornography Online 269

8 Child Sexual Exploitation Material Offenses 287

Introduction 288

Defining and Differentiating Child Pornography and CSEM from Obscene Content 290

The Role of Technology in Child Sexual Exploitation Material 295

Explorations of the Pedophile Subculture Online 299

Typologies of CSEM Use and Consumption 302

The Legal Status of CSEM Around the Globe 309

Nonprofit Organization Efforts 315

Law Enforcement Efforts to Combat CSEM 317

9 Cyberbullying Online Harassment, and Cyberstalking 331

Introduction 332

Defining Cyberbullying 334

The Prevalence of Cyberbullying 336

Predictors of Bullying Online and Offline 338

Differentiating Online Harassment and Stalking 340

Rates of Harassment and Stalking 342

Understanding Victims' Experiences of Cyber-Violence 344

Reporting Online Bullying, Harassment, and Stalking 347

Regulating Cyberbullying 349

Regulating Online Harassment and Stalking 352

Enforcing Cyber-Violence Laws and Norms 356

10 Online Extremism and Cyberterror 371

Introduction 372

Defining Terror, Hacktivism, and Cyberterror 374

The Use of the Internet in the Indoctrination and Recruitment of Extremist Groups 380

Electronic Attacks by Extremist Groups 390

The Radical Far Right Online 393

The E-Jihad 396

Legislating Extremism and Cyberterror 399

Investigating and Securing Cyberspace from the Threat of Terror 403

11 Cyberwarfare and Information Operations Online 417

Introduction 418

Defining Warfare and Cyberwarfare 420

The Role of Nation-State Actors in Cyberattacks 425

Offensive and Defensive Cyber-Operations 427

Information Warfare Campaigns Online 433

Securing Cyberspace from the Threat of Cyberwar 439

12 Illicit Market Operations Online 451

Introduction 452

Differentiating Physical and Virtual Markets 453

The Development and Evolution of Illicit Markets Online 460

Contextualizing the Practices of Illicit Market Participants 466

Debunking Claims Related to Illicit Market Operations 469

13 Cybercrime and Criminological Theories 479

Introduction 480

Applying Criminological Theories to Cybercrime Offending 482

Applying Criminological Theories to Cybercrime Victimization 502

Need for New Cyberspace Theories? 511

14 Evolution of Digital Forensics 533

Introduction 534

From Computer Forensics to Digital Forensics 535

Stages of Digital Forensic Investigation 550

The Role of Digital Evidence 555

Types of Hardware, Peripherals, and Electronic Evidence 558

Evidence Integrity 564

15 Acquisition and Examination of Forensic Evidence 575

Introduction 576

Data Preservation 577

Digital Forensic Imaging Tools 583

Uncovering Digital Evidence 593

Data Analysis 605

Reporting of Findings 608

16 Legal Challenges in Digital Forensic Investigations 619

Introduction 620

Constitutional Issues in Digital Investigations 622

Admissibility of Evidence in Court 648

Admissibility of Digital Forensics as Expert Testimony 659

17 The Future of Cybercrime, Terror, and Policy 671

Introduction 672

Considering the Future of Cybercrime 674

How Technicways Will Shift with New Technologies 677

Social Movements, Technology, and Social Change 680

Need for New Cyber Criminological Theories? 684

Shifting Enforcement Strategies in the Age of the Internet 686

Considering the Future of Forensics 690

The Challenge to Policy-Makers Globally 692

Glossary 703

Index 759

From the B&N Reads Blog

Customer Reviews