Chapter 1
- The Pew Internet and American Life Project provides up-to-the moment research on trends in technology use among nationally representative samples of the US population.
- The Internet World Stats website provides detailed information on the rate of Internet connectivity by nation, as well as their use of certain websites.
- This piece provides an interesting analysis of the ways that the Internet enables the formation of subcultures around even the most obscure ideas.
- This article provides an overview of the ways youths' relationship to technology has changed as a function of the COVID19 pandemic in the US.
- This article from Slate provides an interesting discussion on the ways that cybercrimes are increasing, but are still undercounted by police agencies across the US.
- This overview from the cybersecurity firm Crowdstrike provides an overview of the Dark Web and its relationship to the other portions of the Internet.
- This piece provides a brief, but useful breakdown of the ways cybercrime has changed in the last few decades.
- Click to view external links.
Chapter 2
- The website for the Orange County, California Sheriff's Department provides an overview of one large local law enforcement agencies' response to cybercrime.
- The Michigan State Police Cyber Section has a range of services available for the investigation of cybercrime.
- This article provides an overview of the challenges inherent in using private investigators as digital forensic examiners.
- This site provides an excellent breakdown as to the Australian Federal Police and their structure for dealing wih various forms of cybercrime.
- This report details the perceived needs of local and state law enforcement agencies across the US in the late 1990s and early 2000s, and is an excellent background reader on policing cybercrime.
- The Internet Crime Complaint Center is the primary reporting resource for individuals experiencing cybercrime in the US.
- Click to view external links.
Chapter 3
- This article provides a discussion of a hacker who was able to essentially "hack" the equipment in a John Deere tractor. The hack demonstrates the degree to which any technology can be compromised.
- This video from the Defcon hacker conference provides a substantive overview of social engineering methods and tactics.
- This article provides an overview of a series of coordinated attacks against the New York Times newspaper, which originated from China and appear to correspond to nation-state sponsored hackers.
- This link provides information on the cybercrime investigative responsibilities of the US Federal Bureau of Investigation
- The 2600 is the premiere hacker quarterly publication which has been in operation since 1984. This site will give you a wealth of information on the hacker community in the words of its members over time.
- Hackthissite is a website that provides free training and information on how to develop your skills as a hacker. The resources provided here are essential to understanding the thought processes and techniques of hacking.
- This site provides daily updates on news stories involving either cybersecurity, criminal hacks, or threats to Internet-connected critical infrastructure.
- This article provides a brief overview on the role of ethical hacking in cybersecurity.
- Click to view external links.
Chapter 4
- This video provides a simple overview of botnets and their functionality.
- This video provides an overview of the ease with which ransomware can be purchased in online markets.
- This video by Symantec provides an overview of how the well known Zeus trojan works to acquire sensitive personal information.
- This video from the Defcon hacker conference archive shows the live release of BO2K by members of the Cult of the Dead Cow at the conference.
- The CAIDA website provides a detailed technical analysis of the operation and spread of the Code Red worm.
- The Forum of Incident Response and Security Teams (FIRST) is the international association for CERTs and related groups around the world. This page provides you with an alphabetical list of all groups that are a member of FIRST, and demonstrates the global distribution of response teams to malware and security incidents.
- The National Vulnerability Database (NVD) site provides a catalogue of virtually all known vulnerabilities that have been identified, scored based on their potential threat capabilities.
- This video provides an overview of the ways that the US Computer Emergency Response Team is evolving their response to various threats.
- Click to view external links.
Chapter 5
- This story provides an analysis of the ways that streaming services' decisions to add and remove content are likely to influence the content that pirates choose to seek out.
- In this interview with one of the three founders of The Pirate Bay, the premiere torrent site for pirated media and software, he discusses his opinions on piracy and politics.
- This report by the company Akamai provides an overview on the state of piracy from an industry perspective.
- The US National Intellectual Property Rights Coordination Center is a key resource for intellectual property owners to report complaints of piracy. They also support the Immigration and Customs Enforcement commercial fraud program which seizes pirated material and counterfeit goods.
- This news story provides a detailed overview of the attacks against the MPAA, RIAA, and other anti-piracy entities performed by the group Anonymous. These attacks demonstrate that piracy is perceived by some to be a right, rather than an illegal act.
- The Recording Industry Association of America provides protection and lobbying efforts for recording artists and companies in the US.
- This link contains the Berne Convention for the Protection of Literary and Artistic Works as it has been approved and drafted over time.
- The World Intellectual Property Organization provides guidance and direction for intellectual propery holders worldwide.
- This article provides an overview of one of the prominent FBI-led investigations of the piracy group "DrinkOrDie" in 2001. This case involved multiple law enforcement agencies and led to the arrest of several key individuals within the group.
- This article provides an overview of the prominence of China in various threats to intellectual property rights holders and the economic and military interests of the US and other nations.
- Click to view external links.
Chapter 6
- The Federal Trade Commission acts as a clearinghouse for information on identity theft and fraud within the US. It also acts as a repository for information on consumer protection in various contexts.
- This article provides an overview of one of the first law enforcement operations against carding markets, written by the Secret Service. The investigation, titled "Operation Firewall" took down members of the carding group the ShadowCrew who trafficked in over 1.4 million credit card numbers.
- 419eater is a website designed for individuals to report on their experiences with advance fee fraud emails, and in some cases discuss how they baited the scammer into wasting time and resources dealing with them. In essence, this group acts as a vigilante organization to reduce the number of successful fraud incidents that take place.
- The International AntiCounterfeiting Coalition is a not-for-profit group that operates to provide training and resources for law enforcement and intellectual property holders. They also provide estimates on the rate of counterfeiting and costs associated with this crime.
- The Anti-Phishing Working Group is a cross-industry group designed to help combat phishing by law enforcement, academia, and private industry.
- Action Fraud is the key resource within the UK to report fraud and internet-based crimes to the national police. They take complaints from victims and attempt to coordinate the response with local and national police agencies when appropriate.
- The US Secret Service plays a primary role in the investigation of financial cybercrimes.
- The Ponemon Institute publishes a yearly report on the scope of data breaches not only in the US, but in various countries around the globe each year.
- The Australian organization Scamwatch serves as a platform to report fraud victimization and educate the public on various fraud schemes operating at any time on and offline.
- Click to view external links.
Chapter 7
- This story provides an overview of the prosecution of the pornographer, Max Hardcore, under federal charges of the production and distrubtion of obscene content. This is an excellent example of the challenges that emerge when defining obscene content and why these cases are often difficult to prosecute.
- This article provides a brief overview of recent research by scholars at the Kinsey Institute involving the ways that technology is enabling and changing intimate connections between people.
- This article provides a discussion of the ways that dating applications are impacting sexual behavior and the challenges researchers have in trying to understand their real influences on intimacy.
- This story provides a discussion of the role of the free classified advertisement website Craigslist in the facilitation of prostitution in the US. Though the site operated an erotic services section, it was eventually removed after a lawsuit. The elimination of this section did not, however, stop sex workers from advertising via the site.
- This article presents an overview of the limited impact that the laws FOSTA and SESTA had on sex trafficking and sex work to date.
- Click to view external links.
Chapter 8
- The Internet Crimes Against Children Task Force program operates to provide enhanced investigative responses for local, state, and federal agencies across the US. There are now ICACs across the country, with multiple ICACs in some states depending on size and population density.
- The National Center for Missing and Exploited Children operates as the key resource for reporting incidents of abuse, exploitation and runaways/kidnappings in the US. They operate multiple tip-lines and coordinate responses with local, state, and federal law enforcement agencies.
- This piece by Interpol provides an overview of the ways that child sexual exploitation offending, victimization, and policing efforts have been affected by the COVID19 pandemic.
- The International Center for Missing and Exploited Children provides support for investigators dealing with child sexual exploitation cases and takes reports of potential abuse.
- The Office of Juvenile Justice and Delinquency Prevention provides an overview of the Department of Justice's strategies to combat sexual explotation of children.
- Click to view external links.
Chapter 9
- This article by the Washington Times discusses the debate within the Rhode Island state legislature on the need to develop laws against revenge porn websites. The hotbutton issue of revenge porn has developed as a result of the ability for individuals to create and send nude or sexual images voluntarily through email and text. The sender, however, has minimial control over what the recipient does with that content creating a legal dillema.
- The website Cyberbullying.us provides a summary of research conducted by two scholars, Hinduja and Patchin. These researchers have conducted a number of studies on the issue of cyberbullying, from the perspective of both victims and offenders and provide substantive information on the scope of this activity in the US. Their stie is comprehensive in addressing all manner of child related bullying and harassment.
- The US National Crime Prevention Council provides a detailed overview of cyberbullying, what parents can do if they think their kids are being bullied, along with resources for kids, parents, educators, and others who can help to deal with cyberbullying.
- This press release from the US Department of Justice details the successful prosecution and conviction of a man charged with cyberstalking a woman in North Carolina through rather extreme means, such as the use of LinkedIn to connect with the victim.
- This press release from the US Department of Justice provides a detailed discussion of the sentencing of a man who engaged in cyberstalking and sextortion of multiple victims, including one child who he sexually exploited.
- This archival report published by the Department of Justice details the initial perspectives of attorneys toward the problem of cyberstalking in the US.
- This article by the UK Mirror details the death of Hannah Smith who committed suicide after being cyberbullied on the website Ask.fm.
- This article provides an overview of recent research by Florida Atlantic University professors who argue that physicians should actively screen their patients for experiences with bullying on and offline, as well as their social media use to help provide better tailored services for both mental and physical health.
- Click to view external links.
Chapter 10
- This article discusses a mass website hacking tool and the dangers of Google dorks.
- This article discusses a mass website hacking tool to demonstrate how easy it is to compromise websites.
- Zone-H maintains an archive of web defacements reported by hackers to promote their actions in real-time. At the same time, this data provides a basis for researchers to understand the range of defacements that are motivated by political or ideological reasons.
- This article provides an overview of a series of new online magazines written by various jihadi-motivated extremist groups in an attempt to radicalize individuals online.
- This article provides an overview of the evolution of the hacker collective Anonymous, and the ways their targets and attack methods have changed over time.
- This article provides an overview of the overall landscape of extremist activities in online spaces.
- The Department of Homeland Security's Cybersecurity & Infrastructure Security Agency plays a critical role in the defense of the federal government, and coordinating national responses to cybersecurity incidents.
- Click to view external links.
Chapter 11
- This video provides an overview of the ways that the Stuxnet malware works in an actual computing environment.
- This video provides a short overview of the ways that Estonia rebuilt and manages its infrastructure in the wake of Russian cyberattacks in 2007.
- This series of articles, produced by the Carnegie Endowment for Inernational Peace, provides an up-to-date exploration of the use of cyberattacks in the Russia-Ukraine conflict.
- This series of articles written by researchers at the RAND Institute provides a series of thoughtful examinations of various aspects of cyberattacks in the context of war and international conflict.
- This blog post from Lawfare provides an interesting analysis of the development and implementation of the US Vulnerabilities Equities Process (VEP) withgovernment.
- The National Institute for the US National Institute of Standards and Technology provides definitions for computer network defense (CND) and other aspects of cyberwarfare.
- This article explains the US EINSTEIN program and its lack of success in defending the government from various cyberattacks.
- This article provides an exploration of the ways that Russia is utilizing disinformation and misinformation in the online spaces as a means to affect Ukraine.
- The US Department of Defense Cyber Command provides the offensive and defensive actions of the military in cyberspace.
- The UK Defense Cyber Protection Partnership is designed to protect industry and government from various cybercrime and nation-state threats to the overall technology supply chain.
- Click to view external links.
Chapter 12
- The TOR Project website provides an overview of the role of The Onion Project in anonymous online browsing, and provides links to download the software for personal use.
- This article, written by a security firm, provides an overview of the ways vendors marketed COVID19 related products during the pandemic.
- This article from Wired magazine presents the strange story of how an individual transitioned from a non-criminal life to become a well-known drug dealer on the dark web.
- This article provides a succint academic assessment of why individuals in New Zealand are increasingly using the Dark Web to buy drugs.
- This somewhat salacious article provides an explanation of Red rooms on the dark web and their potential legitimacy, which can be jarring for sensitve readers.
- This article provides an overview of the operations of an IRC based chat channel that was used to sell credit card numbers in the early 2000s.
- Click to view external links.
Chapter 13
- The International Journal of Cyber Criminology is an open-source criminological journal that provides a number of empirical tests of key theories using various forms of cybercrime offenses and victimization with distinct populations.
- This piece provides a simple overview of the ways certain criminological theories can be applied to cybercrime.
- This journal is focused on the application of criminology, sociology, computer science, and related disciplines to various forms of cybercrime and cybersecurity issues.
- The Journal of Cybersecurity is an open-source multidisciplinary scholarly journal focused on issues related to cybercrime and cybersecurity. The pieces cover all manner of issues, including public policy.
- Click to view external links.
Chapter 14
- Computer Forensics Training provides a brief, but valuable historical overview of the evolution of computer forensics, as well as details on the qualifications and certifications needed by forensic analysts to succeed in the workforce.
- The Scientific Working Group on Digital Evidence provides direction and commentary on the practices of forensic analysis and oversight to the field to ensure quality tools and techniques are employed.
- The US National Institute of Justice maintains detailed information for law enforcement on what constitutes digital evidence and the best practices for search and seizure.
- The NIJ Digital Evidence Policies and Procedures Manual provides a detailed overview of the ways that digital evidence processes should be implemented in law enforcement agencies.
- This article from PC World provides a comprehensive overview of the evolution of removable storage media for computers over the last 60 years. This history provides excellent detail on the dramatic transformation of technology.
- This blog post from the SANS Institute Digital Forensics and Incident Response Group provides a detailed overview of the process of digital evidence collection and the best techniques that can be applied to different devices.
- This blog post provides an easy-to-understand set of steps for the best strategies to employ in digital evidence handling.
- This NIJ-sponsored archive of information on digital handling provides a range of content related to best practices for all manner of evidence seizure, acquisition, and analysis.
- Click to view external links.
Chapter 15
- The US National Institute for Standards and Technology Law Enforcement Standards Office provides information on the tools and resources available for digital forensics to ensure high quality analysis of digital evidence.
- This publication from NIST details the best practices for the seizure and analysis of evidence from mobile phones and devices. It is a must read for anyone interested in this topic.
- This article explains what write blockers are, how they are used, and differences in software and hardware write blocking devices based on NIST standards.
- The Digital Intelligence website provides a catalogue of all the tools needed for digital forensic analysis, from write blockers to analysis software.
- The company opentext produces the software suite EnCase, and provides a comprehensive overview of their product line and its utilities.
- The company Exterro produces the Forensic Tool Kit (FTK) and provides a comprehensive overview of their product line.
- This article posted at HowStuffWorks provides an overview of encryption and the way that it works in simple terms.
- The company Quickcrypto offers a free steganography program that provides individuals with an easy to use tool and simple information on how and why people use steganography software.
- This article from Wired provides a detailed overview of steganography as it is being used by jihadi extremist groups to send and receive messages in a covert fashion online.
- This article provides an overview of the presentation of digital evidence in court in a UK context.
- This NIJ-written best practices guide provides an overview as to how to present digital evidence in courts. It is written to law enforcement and prosecutors, for best presentation to judges and juries.
- This issue of the US Attorneys' Bulletin provides multiple articles on the effective presentation of evidence and introduction of evidence during trials, as well as information on new and emerging trends. This work is invaluable to understanding how the process takes place in the field.
- This brief video by the State Bar of Wisconsin provides an overview of the issues of digital evidence presentation in court.
- Click to view external links.
Chapter 16
- This blog post by the Brennan Center For Justice provides an overview of issues related to the Fourth Amendment and digital evidence.
- This blog post by the SANS Institute provides an overview of the ways that the Fourth Amendment affects the legal search and seizure of digital evidence and materials.
- This blog post provides an overview of some of the primary challenges that occur regarding the handling of digital evidence.
- This blog post from TechDirt provides a good overview on the role of search warrants and fourth ammendment challenges in mobile phone forensics.
- This article provides a discussion on the ways in which US prosecutors should construct search warrants for digital evidence.
- This article from the Bar Association of Minnesota details challenges to the admissability of electronic evidence in courts.
- This website provides a comprehensive list of the 2023 US Federal Rules of Evidence, which is invaluable to understanding the process of legal admissions and challenges for the court.
- This article, published by the American Bar Association, provides a detailed overview on the need for careful handling and admission of electronic evidence in courts.
- The Electronic Frontier Foundation is a not-for-profit group that provides legal information and fights for digital civil liberties. They provide a range of position papers on digital evidence and rights.
- This blog post on the practice of law is the first in a series on how to evaluate digital forensic analysis reports, and the ways that they may be challenged using the Daubert standard of evidence. This series is well-written and communicates the issues in a clear fashion.
- This video provides an overview of key disclosure laws and the ways police agencies may circumvent them to acquire digital evidence.
- This article provides an overview of the challenges posed by encryption for law enforcement agencies in the US.
- Click to view external links.
Chapter 17
- This position piece provides an overview of the future threats posed by a range of cybercrimes written to inform policy makers moving forward.
- This article provides an assessment of the ways cybercrime is likely to change in the coming years with rise of AI and innovative malware.
- This article provides commentary on what they believe the state of cybersecurity could look like by 2030.
- This multi-authored article provides an interesting discussion of the ways that digital forensics may have to change in the near future in response to different challenges.
- This guide from the US Department of Homeland Security provides an easy to understand set of principles to secure Internet of Things (IoT) devices from cyberattacks.
- This report from the consulting firm Deloitte provides an overview of what they perceive to be the greatest cyberthreats to Europe over the next ten years.
- This article lays out a series of arguments as to what cybercrime and cybersecurity should look like in a post-COVID19 world.
- Click to view external links.