Digital Crime and Digital Terrorism, Second Edition, is written for students and practitioners with a beginning interest in studying crimes and terrorist acts committed using digital technology. This user-friendly book offers a conversational writing style that distills complex technical concepts and issues to make them accessible to even the most technologically challenged reader. Issues addressed in the book include descriptions of the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other types of digital criminals, an overview of the legal strategies and tactics targeting this type of crime, and in-depth coverage of investigating and researching digital crime and digital terrorism. Some new features to this edition include: Added significant material relating to the use of electronic communication and the Internet by terrorist groups, both domestically and in
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.
This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations
Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.
On January 15, 1990, the AT&T long-distance phone network crashed. Although it was eventually ruled an accident, the event was a wake-up call to telephone companies and law enforcement agencies everywhere, exposing the fragility of the systems that we all heavily depend on. The feds decided that the time had come to crack down on the handful of computer hackers they had been monitoring for several years in connection with the phone companies. The term "hacker" is about to become a household word, and not in the sense of "great programming."
Set against this backdrop, two rival gangs–The Legion of Doom and The Masters of Deception–are about to go to war. What sounds like a clash of comic-book supervillains is actually a feud between factions of teenagers, fueled by misunderstandings and adolescent testosterone. The events leading up to the conflict and its climax are riveting and fun. The book features great depictions of some of the earliest celebrities of hackerdom, including Acid Phreak and Phiber Optik, as well as tales of their exploits and rivalries. Slatalla and Quittner do a great job of portraying the principals as both the powerful cyberspace masters they want to be and the scared, emotional young men they really are.
Continue reading “Masters of Deception: The Gang That Ruled Cyberspace”
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
—Garth Bruen, Project KnujOn Designer
There’s a new breed of online predators—serious criminals intent on stealing big bucks and top-secret information—and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online threats.
Continue reading “Crimeware: Understanding New Attacks and Defenses”
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.
You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents’ methods Handle passwords and encrypted data Work with the courts and win the case
Continue reading “Computer Forensics For Dummies”