Section I The Etiology of Digital Crime and Digital Terrorism Chapter 1 Introduction and Overview of Digital Crime and Digital Terrorism Re-organization of text throughout the chapter New material on recent changes to cyber victimization and the emergence of cyber terror New section on the costs of cybercrime Chapter 2 Digital Terrorism and Information Warfare Completely new section on Information Warfare with highlighted case examples involving Middle Eastern terrorist groups and organizations New material on Low-Level Cyber War involving use of the "Stuxnet" and "Flame" computer virus in Iran with discussion relating to reprisal attacks on U.S. interests New material on the use of the Internet for the Funding and Financing of Terrorist Groups New section on Russian and Chinese Perspectives on Information Warfare including in depth discussion on the 2013 Mandiant Report and Advance Persistent Threat One (APT1) as part of the Chinese Chapter 3 The Criminology of Computer Crime Updated theoretical research relating to computer crime Enhancement of content on Choice, Deterrence, Psychological, General Strain, Subcultural Social Learning, and Social Control theories Chapter 4 Hackers New material on who and what is a hacker and new material on the various categories of hackers Updated material on phone phreaking and blue boxing Completely new section on the "Cybercriminals and the Insider Threat" Updated material on the "Hacking Subculture" Chapter 5 Sophisticated Cyber Criminal Organizations Completely new chapter focusing on the evolution of digital crime from rogue individuals to sophisticated cyber criminal organizations. This new and fascinating chapter includes new material and discussion on : Espionage and the Theft of Intellectual Property, Sabotage, and Insider Fraud Individual criminal organizations or enterprises engaged in digital crime with highlighted case examples. Organized criminal enterprises discussed in the chapter include African Criminal Enterprises, Asian Criminal Enterprises, Russian Organized Crime (Vory v Zakone), La Cosa Nostra (LCN) Mafia, Middle Eastern Criminal Enterprises and Mexican and South American Drug Cartels The "Deep Web" or Tor Network Section II Digital Crime: Types, Nature, and Extent Chapter 6 White-Collar Crimes New data on major embezzlement cases in the United States Updated statistics on cases of industrial espionage New material on the rise of China as a source of national and industrial espionage Updated statistics on identity theft crimes Chapter 7 Viruses and Malicious Code New statistical information on trends relating to viruses and malicious code Updated material on viruses, worms, Trojan Horses, and other malware New discussion on viruses and malicious code attacks, with updated information regarding attack trends, vulnerability trends, malicious code trends, and spam trends Chapter 8 Sex Crimes, Victimization, and Obscenity on the World Wide Web New material in regard to the role of social media as a facilitator of cyber-stalking Updated studies on cyber-stalking victimization Updated material on laws and legislation protecting children on-line Chapter 9 Anarchy and Hate on the World Wide Web Updated discussion of right-wing hate groups new section on the reauthorized PATRIOT Act (2011) Section III Controlling Digital Crime: Legislation, Law Enforcement, and Investigation Chapter 10 Digital Laws and Legislation Modest update of this very stable and contemporary chapter New coverage of recent United States Supreme Court cases Chapter 11 Law Enforcement Roles and Responses New material and box item on electronic surveillance in the age of social networks New material and box item on the National Security Agency (NSA), counter-terrorism, and privacy rights New case example on Edward J. Snowden and the clandestine mass electronic surveillance data mining program operated by the NSA, known as PRISM) Chapter 12 The Investigation of Computer-Related Crime New material on cyber vigilantism, Anonymous, and other unique watch programs designed to identify child pornographers, pedophiles and other sexual predators online New material on recovering evidence from an active computer or device An updated section on the Federal Rules of Evidence regarding Business Records Chapter 13 Digital Forensics Minor update of this strong chapter focusing on the art and science of digital forensics with new material on digital forensics and mobile devices operating outside the Windows operating systems, such as mobile phones, PDAs, and tablet device Updated and new material on addressing mobile devices using Android OS, Apple''s iPhone OS, Windows Mobile and Blackberry operating systems. Section IV The Future of Digital Crime and Digital Terrorism: Prevention and Trends Chapter 14 Information Security and Infrastructure Protection New material on the Zeus Trojan (ZBot or "Eurograbber") attacks in 2013 New material on Deep Packet Inspection, DPI Firewalls, and RSA SecurID Updated and new material on preventing sophisticated attacks with a 2010 graphic from the FBI depicting a Typical Cyber Theft Ring Completely new section on the Evolution of Cyber Attacks discussing how cyberattacks have become more sophisticated, polymorphic, and multi-vector in their approach to defeating security, presenting challenges to both the home user as well as the advanced cybersecurity professional. Chapter 15 Digital Crime and Terrorism: A Forecast of Trends and Policy Implications Updated statistical information and new research regarding patterns and trends in computer crime Updated discussion on each of the forecasts to include current, relevant literature Updated discussion on increased electronic crime in the future.
Digital Crime and Digital Terrorism