Logout succeed
Logout succeed. See you again!

Cybercrime and digital forensics: an introduction PDF
Preview Cybercrime and digital forensics: an introduction
Cybercrime and Digital Forensics This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: • key theoretical and methodological perspectives; • computer hacking and malicious software; • digital piracy and intellectual theft; • economic crime and online fraud; • pornography and online sex crime; • cyber-bullying and cyber-stalking; • cyber-terrorism and extremism; • digital forensic investigation and its legal context around the world; • the law enforcement response to cybercrime transnationally; • cybercrime policy and legislation across the globe. The new edition features two new chapters, the first looking at the law enforcement response to cybercrime and the second offering an extended discussion of online child pornography and sexual exploitation. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. This new edition includes QR codes throughout to connect directly with relevant websites. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology. Thomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University, USA. Adam M. Bossler is a Professor of Criminal Justice and Criminology at Georgia Southern University, USA. Kathryn C. Seigfried-Spellar is an Assistant Professor in the Department of Computer and Information Technology at Purdue University, USA. “The second and expanded edition of Cybercrime and Digital Forensics is a most welcome update on this popular introductory text that covers the field, from the origins of computer hacking to the seizure and preservation of digital data. Each chapter begins with a useful general overview of the relevant literature on the 2 topic or issue covered, whether economic cybercrimes or online stalking, and then provides coverage of laws, cases, and problems not just in the US but pertinent to other jurisdictions. Additional chapters on child exploitation materials, the role of transnational police and private investigation of cybercrime, and expanded treatment of cyber-terrorism, allow for more in depth treatment of these topics and, importantly, options for streaming or modifying the content of taught courses on cybercrime and digital investigations. The authors have again provided numerous online sources in the text and cases for students to explore, and a supporting website that should help to keep readers and instructors in touch with this rapidly changing field.” — Roderic Broadhurst, Professor of Criminology, RegNet, Australian National University “It is unusual to find a book in this field that does not simply focus on the technical aspects of the subject area. This book brings together a wide range of literature, sources, and real case-studies to provide an in-depth look at this ever-changing subject area. The book is rich in material and is a good read for those just starting to look at cyber-security, all the way through to those living and breathing it.” — Emlyn Butterfield, Course Director, School of Computing, Creative Technologies and Engineering, Leeds Beckett University “The style and organization of the book are ideal, not only for the introductory student, but also for the lay reader. What’s more, the timeliness and detail of the issues discussed make it a useful resource for more advanced researchers. In this book, the authors have delivered something for everyone.” — Peter Grabosky, Professor Emeritus, RegNet, Australian National University “Cybercrime and Digital Forensics provides an excellent introduction to the theory and practice of cybercrime. This second edition introduces new chapters on law enforcement responses to cybercrime and an extended section on online child pornography and sexual exploitation. The authors have introduced new and recent case material making the subject relevant and accessible to academics and students interested in this new and exciting field of study. I used the first edition of this book extensively in teaching an undergraduate course on cybercrime. This new edition updates and expands on the topic. Both students and teachers will be attracted to the clarity of presentation and extensive use of cases to focus discussion on challenging issues.” — Dr Lennon Chang, Lecturer in Criminology, School of Social Sciences, Monash University 3 Cybercrime and Digital Forensics An Introduction Second Edition Thomas J. Holt, Adam M. Bossler and Kathryn C. Seigfried-Spellar 4 Second edition published 2018 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN and by Routledge 711 Third Avenue, New York, NY 10017 Routledge is an imprint of the Taylor & Francis Group, an informa business © 2018 Thomas J. Holt, Adam M. Bossler and Kathryn C. Seigfried-Spellar The right of Thomas J. Holt, Adam M. Bossler and Kathryn Seigfried-Spellar to be identified as authors of this work has been asserted by them in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. First edition published by Routledge 2015 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data Names: Holt, Thomas J., 1978– author. | Bossler, Adam M., author. | Seigfried-Spellar, Kathryn C., author. Title: Cybercrime and digital forensics : an introduction / Thomas J. Holt, Adam M. Bossler and Kathryn C. Seigfried-Spellar. Description: Second edition. | Abingdon, Oxon ; New York, NY : Routledge, 2018. | Includes bibliographical references and index. Identifiers: LCCN 2017017922 | ISBN 9781138238725 (hardback) | ISBN 9781138238732 (pbk.) | ISBN 9781315296975 (ebook) Subjects: LCSH: Computer crimes. | Forensic sciences. Classification: LCC HV6773 .H648 2018 | DDC 363.25/968—dc23 LC record available at https://lccn.loc.gov/2017017922 ISBN: 978-1-138-23872-5 (hbk) 5 ISBN: 978-1-138-23873-2 (pbk) ISBN: 978-1-315-29697-5 (ebk) Typeset in Bembo by Apex CoVantage, LLC Visit the companion website: www.routledge.com/cw/holt 6 Contents List of figures List of tables List of boxes 1 TECHNOLOGY AND CYBERCRIME Introduction Technology as a landscape for crime A typology of cybercrime This text 2 LAW ENFORCEMENT, PRIVACY, AND SECURITY IN DEALING WITH CYBERCRIME Introduction Local police and sheriffs' offices State agencies Federal law enforcement Civil investigation and application of digital evidence Extralegal agencies and non-governmental organizations International enforcement challenges The tension between security and privacy Summary 3 COMPUTER HACKERS AND HACKING Introduction Defining computer hacking Victims of hacking The human aspects of the hacker subculture Hacking history The modern hacker subculture Legal frameworks to prosecute hacking Enforcing and investigating hacker activity Summary 4 MALWARE AND AUTOMATED COMPUTER ATTACKS Introduction The basics of malware 7 Viruses, trojans, and worms The global impact of malware Hackers and malware writers The market for malicious software Legal challenges in dealing with malware Coordination and management in addressing malware Summary 5 DIGITAL PIRACY AND INTELLECTUAL PROPERTY THEFT Introduction What is intellectual property? The evolution of piracy over time The subculture of piracy The evolution of legislation to deal with piracy The law enforcement and industry response Summary 6 ECONOMIC CRIMES AND ONLINE FRAUD Introduction Fraud and computer-mediated communications Identity theft Email-based scams Romance scams The problem of carding and stolen data markets Identity theft and fraud laws Summary 7 PORNOGRAPHY, PROSTITUTION, AND SEX CRIMES Introduction The spectrum of sexuality online Pornography in the digital age Prostitution and sex work Dealing with obscenity and pornography online Self-regulation by the pornography industry Summary 8 CHILD PORNOGRAPHY AND SEXUAL EXPLOITATION Introduction Defining and differentiating child porn from obscene content The role of technology in child pornography and exploitation 8 Explorations of the pedophile subculture online The legal status of child pornography around the globe Summary 9 CYBERBULLYING, ONLINE HARASSMENT, AND CYBERSTALKING Online threats, bullying, and harassment Defining cyberbullying Predictors of bullying online and offline Summary 10 ONLINE EXTREMISM, CYBERTERROR, AND CYBERWARFARE Introduction Defining terror, hacktivism, and cyberterror The role of nation-state vs. non-nation-state attacks The use of the Internet in the indoctrination and recruitment of extremist groups Electronic attacks by extremist groups Cyberwar and the nation-state Legislating extremism and cyberterror Investigating and securing cyberspace from the threat of terror and war Cyberwar and response Summary 11 CYBERCRIME AND CRIMINOLOGICAL THEORIES Introduction Subcultural theories Social learning theory and cybercrime General theory of crime Agnew's general strain theory Techniques of neutralization Deterrence theory Theories of cybercrime victimization Need for new cyberspace theories? Summary 12 EVOLUTION OF DIGITAL FORENSICS Introduction From computer forensics to digital forensics Stages of digital forensic investigation 9 The role of digital evidence Types of hardware, peripherals, and electronic evidence Evidence integrity Summary 13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE Introduction Data preservation Digital forensic imaging tools Uncovering digital evidence Data analysis Data reduction and filtering Reporting of findings Summary 14 LEGAL CHALLENGES IN DIGITAL FORENSIC INVESTIGATIONS Introduction Constitutional issues in digital investigations Federal Rules of Evidence 702 Summary 15 THE FUTURE OF CYBERCRIME, TERROR, AND POLICY Introduction Considering the future of cybercrime How technicways will shift with new technologies Social movements, technology, and social change Need for new cyber criminological theories? Shifting enforcement strategies in the age of the Internet Considering the future of forensics The challenge to policy makers globally Summary Glossary Index 10