adfh Digital Crime and Digital Terrorism

Similar documents
Forensic Psychology. Jack Kitaeff. Click here if your download doesn"t start automatically

The Oxford History Of Ancient Egypt Download Free (EPUB, PDF)

Privacy Policy. April 2018

Course Projection - subject to change and error; consult catalog and course schedule to confirm details

Recent advances in technology with cloud computing and big data have brought major. In their book Privacy in the Age of Big Data: Recognizing Threats,

Stalking, Questions and Answers

Contact Details. British Transport Police: (24 hours) Crimestoppers: In association with:

Book Review: Treatise of International Criminal Law, Vol. i: Foundations and General Part, Oxford University Press, Oxford, 2013, written by Kai Ambos

Course Projection subject to change and error; consult catalog and course schedule to confirm details. Program Advisor

Do we still need bibliographic standards in computer systems?

Plagiarism, Referencing and Reference Management

Stalking in Supervised Visitation

MLA Formatting Guideline

Welcome to Interface Aesthetics 2008! Interface Aesthetics 01/28/08

PHILOSOPHY. Grade: E D C B A. Mark range: The range and suitability of the work submitted

Responding to Stalking

Book Review: Archives for the Lay Person: A Guide to Managing Cultural Collections by Lois Hamill

Legal Research Refresher: Secondary Authority Guide

Nineteenth Century Theories Of Art California Studies In The History Of Art

Book Review: Challenges to Digital Forensic Evidence

*This list is subject to change*

The Psychology of Stalking Definitions p. 2 Incidence and Prevalence of Stalking p. 3 This Book p. 3 Current Findings p. 4 New and Controversial

How to Categorize Risk in IoT

How to Write a Paper for a Forensic Damages Journal

SOCIAL WORK An Overview of Sources

REPORT TO CONGRESS ON STALKING AND DOMESTIC VIOLENCE, 2005 THROUGH 2006

Via

AP MUSIC THEORY 2006 SCORING GUIDELINES. Question 7

Stalking in Supervised Visitation

ENG2D1 COMPARATIVE WRITING TASK

Classes may fill up fast so please obtain their signature a.s.a.p. *This list is subject to change*

THE ANGMERING SCHOOL CCTV POLICY. The Angmering School CCTV Code of Practice Version 1, 15/02/12, Created by Marc Ginnaw.

SAMPLE COLLECTION DEVELOPMENT POLICY

UNIVERSITY OF MALTA FACULTY OF LAWS

DECISION. The translation of the decision was made by Språkservice Sverige AB.

[PDF] The Elements Of Graphic Design

Grading Summary: Examination 1 45% Examination 2 45% Class participation 10% 100% Term paper (Optional)

From Research to Manuscript

BROADCASTING REFORM. Productivity Commission, Broadcasting Report No. 11, Aus Info, Canberra, Reviewed by Carolyn Lidgerwood.

Learning Objectives. Upon completing this section, students will understand the following concepts: The categories used to classify stalking cases.

TERMS AND CONDITIONS FOR USE OF MTN PROTECT SERVICE

How. Can Change Behavior

You Want Me To Research WHAT?! (Getting Background & Keeping Current) Jennifer Behrens April 7, 2008

WRITING A BACHELOR THESIS (B.SC.) AT THE ENDOWED CHAIR OF PROCUREMENT

Global Political Thinkers Series Editors:

Curriculum Development Project

ISO Digital Forensics- Video Analysis

Cable Rate Regulation Provisions

Examples of very short paragraph. As mentioned above, it can be useful to ask someone who has not seen your example to proof-read it for you..

ELA/Literacy Released Item Grade 7 Literary Analysis Task Point of View Comparison Sample Student Responses (with annotations)

Legal Analysis: The Fundamental Skill PDF

Court Filings 2000 Trial

Understanding Basic Electronics (Softcover) PDF

Policy on the syndication of BBC on-demand content

Download History And Historians (7th Edition) Books

The New European Left

Book Review: Digital Crime and Forensic Science in Cyberspace

Psychology. The Bachelor's Degree. Departmental Goals and Objectives. Admissions Requirements. Advising. Psychology 1

Internal assessment details SL and HL

Building blocks of a legal system. Comments on Summers Preadvies for the Vereniging voor Wijsbegeerte van het Recht

Works Cited at the end of the essay. Adequate development in a paragraph

writing paper money writing money term writings papers, make make

CHAPTER OBJECTIVES - STUDENTS SHOULD BE ABLE TO:

Unit 3: Multimodal Rhetoric Remix Assignment 5: Photo Essay & Rhetorical Analysis

Writing an Academic Essay

HIST 425/525 Economic History of Modern Europe European Industrialization

Submission Guidelines for HPNLU Law Review (HPNLULR)

thesis statement essay essay. human trafficking statement essay

William Shakespeare. Coriolanus, The Arden Shakespeare, Third. Series. Ed. Peter Holland. London: Bloomsbury Publishing, Christian Griffiths

Public Administration Review Information for Contributors

I. Introduction A. Overview of IT, DTV, and the Internet in Japan

FEMINIST LEGAL STUDIES: INSTRUCTIONS FOR AUTHORS May 2014

CHOICES LIST Updated 7/16/2018

OIB class of th grade LV1. 3 h. H-G Literature. 4 h. 2 h. (+2 h French) LV1 Literature. 11th grade. 2,5 h 4 h. 6,5 h.

Volume, pace, clarity and expression are appropriate. Tone of voice occasionally engages the audience

Critical Thinking 4.2 First steps in analysis Overcoming the natural attitude Acknowledging the limitations of perception

Somebody's watching you

IoT Evidence Acquisition Issues and Challenges

Writing a College Paper Step-by-Step: The Value of Outlining SEE BELOW FOR PROPER CITATION

Sentence Structure. This sentence structure helps by using the small sentence then going to the big sentence which explains the small sentence.

IMPLEMENTATION OF SIGNAL SPACING STANDARDS

Gardner's Art Through The Ages: The Western Perspective, Volume II PDF

THE PSYCHOLOGY STALKIN0

Introduction to the Sociology of Development

Licensing & Regulation #379

F5 Network Security for IoT

ABOUT CAMPUS Author Guidelines

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Postnarrativist Philosophy of Historiography

INFORMATION FOR AUTHORS

paragraphs academic paragraph paragraph, example writing academic writing

Collection Development Policy, Film

What counts as a convincing scientific argument? Are the standards for such evaluation

Texas Law Review Vol. 97

Future of TV. Features and Benefits

SUPREME COURT OF THE UNITED STATES

Guide for Authors Danish Journal of Management & Business

6Harmonics. 6Harmonics Inc. is pleased to submit the enclosed comments to Industry Canada s Gazette Notice SMSE

DOWNLOAD OR READ : WRITING WITH STYLE APA STYLE FOR SOCIAL WORK PDF EBOOK EPUB MOBI

Transcription:

JISSec 3(1) 2007 Journal of Information System Security www.jissec.org Book Review Digital Crime and Digital Terrorism Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, John Liederbach Pearson/Prentice Hall, 2006, 397 pages ISBN: 0-13-114137-6 Reviewed by: Michael Lapke Introduction The authors' intent in writing this book was to bridge the technical and knowledge gap that exists with many people in learning about computer/digital crime and digital terrorism. The reviewer's initial impression was that the authors not only achieved this goal but they did it in a clear yet thorough manner. This is a text that could be well utilized in an introductory computer crime course (whether the course is oriented towards a criminal justice (CJ) student or an information systems (IS) student). The book would also serve quite well as a reference guide for a CJ or IS practitioner. The content of the book is thorough enough to give a reader a firm starting point in virtually any component of digital crime. The book

65 does not go deeply into any of the specific technical aspects, either computer related or legal. For example, chapter six discusses viruses and malicious code. The chapter provides a good overview of the types of viruses, the differences between different viruses, the differences between viruses and worms/trojan horses, etc. The broad overview provided in the chapter should be very helpful for a reader to get a baseline understanding of this type of digital crime. The chapter does not however linger in the technical details. A reader, for example, will not acquire the skills to write the code for creating a virus by reading this chapter. Nor would a reader learn any specific state or federal laws or how specific crimes are prosecuted. The remainder of this review is divided into five sections. Four of the five sections discuss the four sections of the book. These discussions are critical in nature and judge the quality of each respective section. The first of these sections deals with "The Etiology of Digital Crime and Digital Terrorism." The second analyzes "Digital Crime - Types, Nature, and Extent." The third examines "Controlling Digital Crime: Legislation, Law Enforcement, and Investigation." The fourth investigates "The Future of Digital Crime and Digital Terrorism: Prevention and Trends." The final section of this review provides an overall judgment of the book. Section I: The Etiology of Digital Crime and Digital Terrorism (Research Paper) This section of the book is divided into four chapters: Introduction, Digital Terrorism, Criminology of Computer Crime, and Digital Criminals and Hackers. The term "etiology" refers to the assignment of a cause, an origin, or a reason for something. This section does just that: provides a probable cause for the existence of digital crime and digital terrorism. The first chapter does an adequate job of giving a broad overview and introduction to the content of the book. It covers new threats in the information age, the purpose of the book, definitions of digital crime and digital terrorism, and provides a taxonomy of different types of computer crime. As stated, the chapter does an adequate job in introducing the material. The one complaint is that it is written a little dryly. The authors do outline the chapter (and the remainder of the book for that matter) but do not provide any justification for the structure. Understanding why the chapter and book is organized the way it is would go a long way in helping the reader position him or herself to best understand the material.

66 adfh The second, third, and fourth chapters are the most captivating of the entire book. For a reader with little experience in digital terrorism, the theories behind digital crime, and the culture of hackers, these chapters will make for a fascinating read. While it is limited in depth, the second chapter, which discusses digital terrorism, is a very good primer. It clearly defines the concepts, describes the types of attacks, and gives a brief overview of the two major players in digital terrorism: Al Qaeda and China. Chapter three gives a comprehensive overview of four categories of theories behind the criminology of computer crime: psychological, social structure, social process, and political. This chapter is the most fundamental to the etiology of digital crime, from an academic point of view. The fourth and final chapter in the section, dealing with hacker culture, is the most enjoyable and intriguing portion of the book. The general populace tends to think of this subculture when they hear about computer security. The image of a grungy "evil genius" in the basement causing havoc around the world piques the public's interest. The authors do an incredible job painting a detailed and accurate picture of this subculture and pointing out that they're actually not the primary threat to the security of IS. Section II: Digital Crime - Types, Nature, and Extent (Research Paper) Though it still maintains a readable and interesting content, the book becomes slightly disjointed at this point. There is no transition from the first section to the second. Instead, the fourth chapter simply ends and the fifth chapter begins. Never-the-less, the chapters contained in this section will be singularly reviewed. The section of the book is divided into four chapters: White Collar Crimes, Viruses and Malicious Code, Exploitation, Stalking, and Obscenity on the WWW, and Anarchy and Hate on the WWW. As with the rest of the book, the fifth chapter does a good job giving a solid foundation in its content. The content, white collar crimes, is discussed in an easy to read and comprehensive manner. The chapter is divided into subsections discussing the taxonomy of white collar crime. These sections include embezzlement, corporate espionage, money laundering, identity theft, and internet fraud schemes. The same comments can be made of chapter 6, which covers viruses and malicious code. This chapter gives a solid foundation in an easy to read and comprehensive manner. Chapter 7, which covers exploitation, stalking

67 and obscenity on the World Wide Web, is also complete. The reviewer's main critique of these three chapters is that there is a lack of justification or structure. Why did the authors pick white collar crimes as the first "type" of digital crime? Are viruses a "type" of digital crime or a "nature" of digital crime? Chapter 8 covers anarchy and hate. While fascinating topics, the reviewer does not understand why these two constructs are grouped together, since they represent two different concepts. Another problem the reviewer had was that chapter 8 also is heavily focused on digital terrorism. Why is this area included under the "digital crime" arena of section II? Since the book itself makes the distinction between crime and terrorism, shouldn't the chapters within the book follow that same taxonomy? Furthermore, terrorism tends to span well beyond simple "hate" or "anarchism." It seems an awkward title for a chapter that focuses on digital terrorism. Section III: Controlling Digital Crime: Legislation, Law Enforcement, and Investigation (Research Paper) Fortunately, the book regains a good amount of cohesion that was absent in section two when it moves to the third section. The area being covered is clear and the chapters which make up the meat of the area make logical sense. There is still a missing transition between sections two and three but this is not as apparent as the previous section change. This section of the book is divided into four chapters: Digital Laws and Legislation, Law Enforcement Roles and Responses, The Investigation of Computer-Related Crime, and Digital Forensics. Given that the reviewer is not versed in laws or legislation (whether they be digitally oriented or otherwise), chapter 9 proved to be insightful. It gives an easy to read but thorough discussion of federally based laws and legislation. As an IS security practitioner, the information provided was essential. Chapter 10, which discusses law enforcement roles, is also astute. The agencies involved in digital crime go far beyond what the reviewer thought he knew. Chapter 11 discusses the investigation of computer-related crime. The reviewer was aware of most of the procedures discussed but the clear and concise writing style was refreshing. The technical orientation of chapter 12, which focuses on forensic analysis, was a welcome oasis for the reviewer. The previous three chapters are full of pertinent information but the reviewer felt at home reading about drive imaging, storage systems, and file systems.

68 adfh Section IV: The Future of Digital Crime and Digital Terrorism: Prevention and Trends This section receives a mixed review from the reviewer. The section is divided into two chapters: (1) Information Security and Infrastructure Protection and (2) Digital Crime and Terrorism: A Forecast of Trends and Policy Implications. The first of these two chapters, which deals with infrastructure protection, does not address any future issues in terms of information security. The topics covered, which include risk analysis and security technologies, are mature topics that have been extensively covered in other texts. The last chapter, which covers digital terrorism, is a good read though. The concept of terrorist forecasting is a pertinent and interesting issue. Conclusion As stated in the introduction, this book is a very good read for either a student or a practitioner. It is technical enough for either of these types of readers to have a background in IS yet it is legally thorough enough for those with a CJ background. The primary detriment to the book is the lack of structure of the second section. This section lacks the coherency and flow of the first and third sections. Also related to this is the lack of transition between sections. It is customary for books that have chapters within sections to recap the major points of each section and justify why they decided to group the chapters within a given section. All in all though, this book is a definite recommended read for practitioners of CJ or IS security. The content is solid and presented in a palatable manner.