ebook img

Computer Forensics and Cyber Crime: An Introduction PDF

405 Pages·8.367 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computer Forensics and Cyber Crime: An Introduction

T hird E dit i on Computer Forensics and Cyber Crime An Introduction This page intentionally left blank T hird E dit i on Computer Forensics and Cyber Crime An Introduction Marjie T. Britz, Ph.D. Professor of Criminal Justice Clemson University @drmarjie Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Vernon R. Anthony Art Director: Jane Conte Acquisitions Editor: Gary Bauer Cover Designer: Karen Salzbach Editor, Digital Projects: Nichole Caldwell Cover Image: Shutterstock Editorial Assistant: Lynda Cramer Full-Service Project Management and Director of Marketing: David Gesell Composition: George Jacob, Integra Software Marketing Manager: Mary Salzman Services, Ltd. Senior Marketing Coordinator: Alicia Wozniak Text and Cover Printer/Binder: Senior Marketing Assistant: Les Roberts Edwards Brothers Malloy Senior Managing Editor: JoEllen Gohr Media Project Manager: Karen Bretz Project Manager: Holly Shufeldt Text Font: 11/13, Minion Pro Credits and acknowledgments for materials borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright © 2013, 2009, 2004 by Pearson Education, Inc. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Britz, Marjie. Computer forensics and cyber crime : an introduction/Marjie T. Britz, Ph.D., Clemson University.—Third Edition. pages cm ISBN-13: 978-0-13-267771-4 ISBN-10: 0-13-267771-7 1. Computer security. 2. Computer crimes. I. Title. QA76.9.A25B77 2013 005.8—dc23 2013002351 10 9 8 7 6 5 4 3 2 1 ISBN 10: 0-13267771-7 ISBN 13: 978-0-13-267771-4 Dedication This book is dedicated to Dr. Amir Yazdan, who brought my son back to life on New Year’s Eve 2012. He is my hero, Tiger’s guardian angel, and a gift from God. I can never repay him for saving all of our lives that night. Thank you, Amir. I owe you everything. ConTEnTS Foreword xv Acknowledgments xvii About the Author xviii Chapter 1 IntroduCtIon and overvIew of Computer forensICs and CyberCrIme 1 I. Introduction 2 II. Cyberspace and Criminal Behavior 3 III. Clarification of Terms 5 IV. Traditional Problems Associated with Computer Crime 6 a. Physicality and Jurisdictional Concerns 7 b. Perceived Insignificance, Stereotypes, and Incompetence 8 c. Prosecutorial Reluctance 9 d. Lack of Reporting 10 e. Lack of Resources 11 f. Jurisprudential Inconsistency 14 V. Extent of the Problem 16 VI. The Emergence of e-Cash: A New Problem for Law Enforcement 20 a. Prepaid Cards 20 b. Stored Value Cards 20 c. Mobile Payments 20 d. Internet Payment Services 21 e. Digital Precious Metals 21 VII. Conclusions 21 Discussion Questions 22 Recommended Reading 22 Web Resources 22 Endnotes 23 Chapter 2 Computer termInology and HIstory 25 I. A Brief History of Computers 26 II. Computer Language 28 a. Understanding Data 28 III. Computer Hardware 29 a. Input Devices 29 b. Output Devices 29 c. Hard Drives and Other Mass Storage Devices 31 IV. Computer Software 31 a. Boot Sequence 31 b. Operating System 32 V. Beyond DOS: Contemporary Operating Systems 32 a. Microsoft Windows 32 b. Macintosh 34 c. UNIX 36 d. LINUX 36 vi Contents vii e. Smart Phones 37 VI. Application Software 38 VII. A Brief History of the Internet 39 VIII. Network Language 41 a. Commonly Used Terms 41 IX. Realms of the Cyberworld 44 X. Data Bandwith Transfer Rates 45 XI. Categorizing Internet Communication 45 a. World Wide Web 45 b. Newsgroups/Bulletin Boards (Usenet Groups) 46 c. Internet Relay Chat 47 XII. Future Issues and Conclusions 48 Discussion Questions 49 Recommended Reading 49 Web Resources 49 Endnotes 49 Chapter 3 tradItIonal Computer CrIme: early HaCkers and tHeft of Components 51 I. Introduction 52 II. Traditional Problems 52 III. Recognizing and Defining Computer Crime 54 IV. Three Incidents 55 V. Phreakers: Yesterday’s Hackers 59 a. What Is Phreaking? 59 b. The War on Phreaking 60 VI. Hacking 61 a. Defining Hacking 62 b. Evolution in the Hacking Community 62 c. Contemporary Motivation 63 d. Hierarchy of Contemporary Cybercriminals 65 VII. Computers as Commodities 67 a. Hardware 67 VIII. Theft of Intellectual Property 69 a. Software 69 b. Film Piracy 71 XI. Conclusions 71 Discussion Questions 72 Recommended Reading 72 Web Resources 72 Endnotes 73 Chapter 4 Contemporary Computer CrIme 74 I. Web-Based Criminal Activity 75 a. Interference with Lawful Use of Computers 76 II. Malware 77 a. Viruses and Worms 78 b. DoS and DDoS Attacks 80 c. Botnets and Zombie Armies 80 viii Contents d. Spam 82 e. Ransomware and the Kidnapping of Information 84 III. Theft of Information, Data Manipulation, and Web Encroachment 86 a. Traditional Methods of Proprietary Information Theft 86 b. Trade Secrets and Copyrights 87 c. Political Espionage 87 IV. Terrorism 89 a. Cyberterrorism 90 V. Neotraditional Crime: Old Wine in New Bottles 91 a. Dissemination of Contraband or Offensive Materials 91 b. Threatening and Harassing Communications 97 c. Online Fraud 100 d. e-Fencing 105 e. Fraudulent Instruments 106 VI. Ancillary Crimes 106 a. Money Laundering 106 VII. Conclusions 110 Discussion Questions 111 Recommended Reading 111 Web Resources 111 Endnotes 112 Chapter 5 IdentIty tHeft and IdentIty fraud 114 I. Introduction 115 II. Typologies of Identity Theft/Fraud 116 a. Assumption of Identity 117 b. Theft for Employment and/or Border Entry 118 c. Criminal Record Identity Theft/Fraud 119 d. Virtual Identity Theft/Fraud 120 e. Credit Identity Theft/Fraud 121 III. Prevalence and Victimology 122 a. Victims and the Costs Associated with Victimization 123 b. Future Increases 125 IV. Physical Methods of Identity Theft 126 a. Mail Theft 126 b. Dumpster Diving 127 c. Theft of Computers 128 d. Bag Operations 129 e. Child Identity Theft 130 f. Insiders 131 g. Fraudulent or Fictitious Companies 131 h. Card Skimming, ATM Manipulation, and Fraudulent Machines 132 V. Virtual or Internet-Facilitated Methods 132 a. Phishing 133 b. Spyware and Crimeware 135 Contents ix c. Keyloggers and Password Stealers 136 d. Trojans 137 VI. Crimes Facilitated by Identity Theft/Fraud 138 a. Insurance and Loan Fraud 139 b. Immigration Fraud and Border Crossings 139 VII. Conclusions and Recommendations 141 Discussion Questions 143 Recommended Reading 143 Web Resources 144 Endnotes 144 Chapter 6 terrorIsm and organIzed CrIme 146 I. Terrorism 147 a. Defining Terrorism 148 b. Classification Through Motivation 149 c. Roots of Contemporary Terrorism 150 d. Terrorism as a Stage 151 e. Cyberterrorism as a Concept 152 II. Terror Online 153 a. Propaganda, Information Dissemination, Recruiting, and Fundraising 154 b. Training 156 c. Research and Planning 157 d. Communication 158 e. Attack Mechanism 159 III. Terrorism and Crime 164 a. Criminal Activities 164 b. Criminalizing Terrorist Acts 164 c. Government Efforts 165 d. Conclusions 165 IV. Organized Crime 167 a. Defining Organized Crime 167 b. Distinguishing Organized Crime from Cybergangs 172 V. Organized Crime and Technology 174 a. Extortion 175 b. Cargo Heists and Armed Robbery 175 c. Fraud 176 d. Money Laundering 177 e. The Sex Trade 177 f. Confidence Scams 178 g. Fencing of Stolen Property 179 h. Data Piracy and Counterfeit Goods 179 i. Human Smuggling 181 VI. Confronting Contemporary Organized Crime 182 VII. The Intersection of Organized Crime and Terrorism 182 Discussion Questions 184 Recommended Reading 184 Web Resources 185 Endnotes 185

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.