ebook img

Encyclopedia of cybercrime PDF

233 Pages·2008·0.98 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Encyclopedia of cybercrime

ENCYCLOPEDIA OF CYBERCRIME Edited by Samuel C. McQuade, III GREENWOOD PRESS Westport, Connecticut • London LibraryofCongressCataloging-in-PublicationData Encyclopediaofcybercrime/editedbySamuelC.McQuade,III. p.cm. Includesbibliographicalreferencesandindex. ISBN978-0-313-33974-5(alk.paper) 1.Computercrimes—Encyclopedias.2.Internetfraud—Encyclopedias.3.Computersecurity— Encyclopedias.4.Internetfraud—Prevention—Encyclopedias.5.Computercrimes—UnitedStates— Encyclopedias.6.Internetfraud—UnitedStates—Encyclopedias.7.Computersecurity—UnitedStates —Encyclopedias.8.Internetfraud—UnitedStates—Prevention—Encyclopedias.I.McQuade, SamuelC. HV6773.E532009 364.16´803—dc22 2008028523 BritishLibraryCataloguinginPublicationDataisavailable. Copyright©2009bySamuelC.McQuade,III Allrightsreserved.Noportionofthisbookmaybe reproduced,byanyprocessortechnique,withoutthe expresswrittenconsentofthepublisher. LibraryofCongressCatalogCardNumber:2008028523 ISBN:978-0-313-33974-5 Firstpublishedin2009 GreenwoodPress,88PostRoadWest,Westport,CT06881 AnimprintofGreenwoodPublishingGroup,Inc. www.greenwood.com PrintedintheUnitedStatesofAmerica Thepaperusedinthisbookcomplieswiththe PermanentPaperStandardissuedbytheNational InformationStandardsOrganization(Z39.48-1984). 10 9 8 7 6 5 4 3 2 1 CONTENTS Listof Entries vii Preface ix Acknowledgments xi Introduction xiii Chronology of Selected Cybercrime-RelatedEvents xv TheEncyclopedia 1 Resource Guide 195 Index 201 Aboutthe Editorand Contributors 205 This page intentionally left blank LIST OF ENTRIES Academic Misconduct Cyber Safety andEthics Initiatives Addiction, Online Cyberspace Adult Entertainment and Pornography Cybersquatting ARPANET Cyberterrorism AttackVectors Cyber Whimsy Banking Online Dedicated Cybercrime Investigation Botnets,Zombies,andRemoteControl and Prosecution Units Attacks Denial of ServiceAttacks Careers in Investigating and Preventing Digital Youth Culture and Social Cybercrime Networking Certifications Election and Voting Fraud CertifiedInformationSystems Security Electronic Frontier Foundation Professional Standard Ethical Use of Computers ChildPornography FraudulentSchemes andTheft Online ComputerCrime andIntellectual Gaming Online Property Section Government Intelligence Gathering ComputerEmergency Response Team Hacking and theHackerSubculture ComputerForensics Identity Theft Computerization InformationAssurance CopyrightInfringement InformationSystems Security CorporateEspionage Association Councilof Europe Convention on Intellectual Property Cybercrime International Cybercrime Lawsand CriticalInformation Infrastructure Agreements Cryptographyand Encryption Internet Cyber Bullying, Threats,Harassment, Interpol and Stalking Laws, Children Online Cybercrime Laws, IllegalUse of Computers andIT Cybercrime Attacks Devices Cybercriminals Laws, Information Security Cybercriminals, Famous Requirements Cyber/Internet Culture Laws, Privacy Protections VIII LISTOFENTRIES LawsThatFacilitate or Limit Privacy Cybercrime Investigations Regulatory Agencies with Cybercrime Leetspeak Oversight Responsibilities Malware Research on Cybercrime Malware Incidents Scientific and Professional Misconduct Meeting and Falling in Love Online— Security ManagementResponsibilities Be Careful! Social and EconomicImpacts of MGMet al. v.Grokster Ltd. et al. Cybercrime Napster Social Engineering National Center forMissing and Spam ExploitedChildren Technologies Commonly Used for National White Collar CrimeCenter Cybercrime Network Centric Warfare Theories of Cybercrime OrganizedCybercrime Theory ofTechnology-Enabled Crime, Phishing Policing, and Security Phreaking UnitedStates v.LaMacchia Piracy Victimization Preventing Cybercrime Wardriving and Wardialing Prevention Education Warez Groups PREFACE Therearetodaynomorecompellingsetsofcrimeandsecuritythreatsfacingnations, communities, organizations, groups, families, and individuals than those encom- passedbycybercrime.Forover50yearscrimeenabledbycomputingandtelecommu- nications technologies has increasingly threatened societies as they have become relianton information systems for sustaining modernized living. Cybercrime is not a newphenomenon,butratheranevolvingonewithrespecttoadoptionofinformation technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad ways in which ITis abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. In other words, the nature of crime anditsimpactsonsocietyarechangingto theextenttheInternetandotherinforma- tionsystems,alongwithcomputersandothertypesofITsuchasmultipurposecellu- larphones andPDAs, are used forillicitpurposes. Understandingandpreventingcybercrimeinitsmanyformsrequiresbasicknowl- edgeaboutwaysinwhichtraditionalcrimesarebecomingincreasinglyhightechand complex. Fortunately, the Encyclopedia of Cybercrime provides nontechnical explana- tions about the most important cybercrime-related issues by using simple terms in straightforward ways. A person does not need any prior education in computer sci- ence, software engineering, or network administration to understand, enjoy, and use this reference work. Indeed, the Encyclopedia has been specifically written with the information needs and interests of high school and undergraduate college students inmind.However,thebookiswrittenasanauthoritativesourceofinformationinclu- siveofdiscussionsaboutallmajortypesofcybercrimeoffendingvictimizationsureto be of interest to parents, teachers, security professionals, managers of organizations, andpublic policyofficials. This work is the first comprehensive encyclopedia to address cybercrime. Topical articlesaddressallkeyareasofconcernandspecificallythosehavingtodowithtermi- nology,definitions,andsocialconstructsofcrime;nationalinfrastructuresecurityvul- nerabilities and capabilities; types of attacks to computers and information systems; computer abusers and cybercriminals; criminological, sociological, psychological, technological, and theoretical underpinnings of cybercrime; social and economic impactsofcrimeenabledwithinformationtechnologyinclusiveofharmsexperienced byvictimsofcybercrimesandcomputerabuse;emergingandcontroversialissuessuch X PREFACE as online pornography, social networking, the computer hacking subculture, and potential negative effects of electronic gaming and so-called ‘‘computer addiction’’; bodiesandspecificexamplesofU.S.federallawsandregulationsthathelptoprevent cybercrimes; examples and perspectives of law enforcement, regulatory and profes- sional member associations concerned about cybercrime and its impacts; and com- puter forensics as well as general investigation/prosecution of high tech crimes and attendant challenges within the United States and throughout the world. Boldface termswithin entries areused forcross-referencing purposes. Manyentriesincludeexamplesofrealcybercrimecases,includingsomethatreflect recent court rulings on major and controversial issues. Over 80 topical articles have been written by authors with many years of professional experience gained through graduate school research and employment while working in the public and private sectors.Theircombinedexperienceincludesdecadesofmanagingallaspectsofinfor- mation systems design and security while employed for prominent corporations and government agencies. As a group they hold advanced degrees and many of the most recognized technical professional certifications currently available from leading credentialinginstitutions.Asprofessionalstheycurrentlyprovideafullrangeofserv- icespertainingtotheunderstanding,prevention,anddeterrenceofinformationsecu- ritythreatsandcybercrime.Theyexemplifyreal-worldcareerpathsandopportunities inconstantly expandingand challenging areas of cybercrime. ACKNOWLEDGMENTS Many people helped bring this project to a successful conclusion after unavoidable periods of starts, stops, and delays. First is Suzanne Staszak-Silva, who served as Greenwood’s project manager and primary publishing advocate for the Encyclo- pedia of Cybercrime. In the beginning Suzanne was helpful in setting out the types of topical entries needed and suggested how the work should be structured. For many months she was extraordinarily patient in guiding me through the writing process while I was recovering from major health problems. And at the end of the project she extended considerable trust and flexibility for my submitting a very solid and complete manuscript. I will always owe her a professional debt of gratitude. IalsowishtoextendsincerethankstoEricWalterwhoformanymonthsservedas my project coordinator. As one of my graduate students, he worked with authors to keep things moving forward when Icould not, and he provided initial editing assis- tance to ensure topics being written about by authors were properly covered and appropriately explained. He often necessarily accomplished this and more by loyally working many hours without much guidance from me, and did so in an extremely professional and conscientious manner. In manyways he provided assistance compa- rableto an associateeditor,and Iwas blessed to have his assistance. My primary research assistant, Neel Sampat, also provided me with exceptional fact checking and writing assistance, especially as the project entered its final phases. Having grown up as a technologically savvy participant in Internet and digital youth cultures, and as an observer of the hacking subculture, Neel was able to provideimportant perspectives as well as original articles bound to be of spe- cial interest to younger readers of this Encyclopedia. His ability to use and help me use technology to research and write about cybercrime was nothing short of remarkable. Finally, Iwish to acknowledge and thank the authors, nearly all of whom I know personally. Traditionally, editors of encyclopedias like this one seek out contributing authors from far and wide to contribute their knowledge and expertise about the subject. In this case I deliberately chose a team of qualified individuals whose prior work and reputations I knew in advance. On the basis of these personal and

Description:
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened so
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.