Encyclopedia of Cybercrime

Encyclopedia of Cybercrime

ENCYCLOPEDIA OF CYBERCRIME Edited by Samuel C. McQuade, III GREENWOOD PRESS Westport, Connecticut • London Library of Congress Cataloging-in-Publication Data Encyclopedia of cybercrime / edited by Samuel C. McQuade, III. p. cm. Includes bibliographical references and index. ISBN 978-0-313-33974-5 (alk. paper) 1. Computer crimes—Encyclopedias. 2. Internet fraud—Encyclopedias. 3. Computer security— Encyclopedias. 4. Internet fraud—Prevention—Encyclopedias. 5. Computer crimes—United States— Encyclopedias. 6. Internet fraud—United States—Encyclopedias. 7. Computer security—United States —Encyclopedias. 8. Internet fraud—United States—Prevention—Encyclopedias. I. McQuade, Samuel C. HV6773.E53 2009 364.16´803—dc22 2008028523 British Library Cataloguing in Publication Data is available. Copyright © 2009 by Samuel C. McQuade, III All rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2008028523 ISBN: 978-0-313-33974-5 First published in 2009 Greenwood Press, 88 Post Road West, Westport, CT 06881 An imprint of Greenwood Publishing Group, Inc. www.greenwood.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48-1984). 10987654321 CONTENTS List of Entries vii Preface ix Acknowledgments xi Introduction xiii Chronology of Selected Cybercrime-Related Events xv The Encyclopedia 1 Resource Guide 195 Index 201 About the Editor and Contributors 205 This page intentionally left blank LIST OF ENTRIES Academic Misconduct Cyber Safety and Ethics Initiatives Addiction, Online Cyberspace Adult Entertainment and Pornography Cybersquatting ARPANET Cyberterrorism Attack Vectors Cyber Whimsy Banking Online Dedicated Cybercrime Investigation Botnets, Zombies, and Remote Control and Prosecution Units Attacks Denial of Service Attacks Careers in Investigating and Preventing Digital Youth Culture and Social Cybercrime Networking Certifications Election and Voting Fraud Certified Information Systems Security Electronic Frontier Foundation Professional Standard Ethical Use of Computers Child Pornography Fraudulent Schemes and Theft Online Computer Crime and Intellectual Gaming Online Property Section Government Intelligence Gathering Computer Emergency Response Team Hacking and the Hacker Subculture Computer Forensics Identity Theft Computerization Information Assurance Copyright Infringement Information Systems Security Corporate Espionage Association Council of Europe Convention on Intellectual Property Cybercrime International Cybercrime Laws and Critical Information Infrastructure Agreements Cryptography and Encryption Internet Cyber Bullying, Threats, Harassment, Interpol and Stalking Laws, Children Online Cybercrime Laws, Illegal Use of Computers and IT Cybercrime Attacks Devices Cybercriminals Laws, Information Security Cybercriminals, Famous Requirements Cyber/Internet Culture Laws, Privacy Protections VIII LIST OF ENTRIES Laws That Facilitate or Limit Privacy Cybercrime Investigations Regulatory Agencies with Cybercrime Leetspeak Oversight Responsibilities Malware Research on Cybercrime Malware Incidents Scientific and Professional Misconduct Meeting and Falling in Love Online— Security Management Responsibilities Be Careful! Social and Economic Impacts of MGM et al. v. Grokster Ltd. et al. Cybercrime Napster Social Engineering National Center for Missing and Spam Exploited Children Technologies Commonly Used for National White Collar Crime Center Cybercrime Network Centric Warfare Theories of Cybercrime Organized Cybercrime Theory of Technology-Enabled Crime, Phishing Policing, and Security Phreaking United States v. LaMacchia Piracy Victimization Preventing Cybercrime Wardriving and Wardialing Prevention Education Warez Groups PREFACE There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families, and individuals than those encom- passed by cybercrime. For over 50 years crime enabled by computing and telecommu- nications technologies has increasingly threatened societies as they have become reliant on information systems for sustaining modernized living. Cybercrime is not a new phenomenon, but rather an evolving one with respect to adoption of information technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad ways in which IT is abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. In other words, the nature of crime and its impacts on society are changing to the extent the Internet and other informa- tion systems, along with computers and other types of IT such as multipurpose cellu- lar phones and PDAs, are used for illicit purposes. Understanding and preventing cybercrime in its many forms requires basic knowl- edge about ways in which traditional crimes are becoming increasingly high tech and complex. Fortunately, the Encyclopedia of Cybercrime provides nontechnical explana- tions about the most important cybercrime-related issues by using simple terms in straightforward ways. A person does not need any prior education in computer sci- ence, software engineering, or network administration to understand, enjoy, and use this reference work. Indeed, the Encyclopedia has been specifically written with the information needs and interests of high school and undergraduate college students in mind. However, the book is written as an authoritative source of information inclu- sive of discussions about all major types of cybercrime offending victimization sure to be of interest to parents, teachers, security professionals, managers of organizations, and public policy officials. This work is the first comprehensive encyclopedia to address cybercrime. Topical articles address all key areas of concern and specifically those having to do with termi- nology, definitions, and social constructs of crime; national infrastructure security vul- nerabilities and capabilities; types of attacks to computers and information systems; computer abusers and cybercriminals; criminological, sociological, psychological, technological, and theoretical underpinnings of cybercrime; social and economic impacts of crime enabled with information technology inclusive of harms experienced by victims of cybercrimes and computer abuse; emerging and controversial issues such X PREFACE as online pornography, social networking, the computer hacking subculture, and potential negative effects of electronic gaming and so-called ‘‘computer addiction’’; bodies and specific examples of U.S. federal laws and regulations that help to prevent cybercrimes; examples and perspectives of law enforcement, regulatory and profes- sional member associations concerned about cybercrime and its impacts; and com- puter forensics as well as general investigation/prosecution of high tech crimes and attendant challenges within the United States and throughout the world. Boldface terms within entries are used for cross-referencing purposes. Many entries include examples of real cybercrime cases, including some that reflect recent court rulings on major and controversial issues. Over 80 topical articles have been written by authors with many years of professional experience gained through graduate school research and employment while working in the public and private sectors. Their combined experience includes decades of managing all aspects of infor- mation systems design and security while employed for prominent corporations and government agencies. As a group they hold advanced degrees and many of the most recognized technical professional certifications currently available from leading credentialing institutions. As professionals they currently provide a full range of serv- ices pertaining to the understanding, prevention, and deterrence of information secu- rity threats and cybercrime. They exemplify real-world career paths and opportunities in constantly expanding and challenging areas of cybercrime. ACKNOWLEDGMENTS Many people helped bring this project to a successful conclusion after unavoidable periods of starts, stops, and delays. First is Suzanne Staszak-Silva, who served as Greenwood’s project manager and primary publishing advocate for the Encyclo- pedia of Cybercrime. In the beginning Suzanne was helpful in setting out the types of topical entries needed and suggested how the work should be structured. For many months she was extraordinarily patient in guiding me through the writing process while I was recovering from major health problems. And at the end of the project she extended considerable trust and flexibility for my submitting a very solid and complete manuscript. I will always owe her a professional debt of gratitude. I also wish to extend sincere thanks to Eric Walter who for many months served as my project coordinator. As one of my graduate students, he worked with authors to keep things moving forward when I could not, and he provided initial editing assis- tancetoensuretopicsbeingwrittenaboutbyauthorswereproperlycoveredand appropriately explained. He often necessarily accomplished this and more by loyally working many hours without much guidance from me, and did so in an extremely professional and conscientious manner. In many ways he provided assistance compa- rable to an associate editor, and I was blessed to have his assistance. My primary research assistant, Neel Sampat, also provided

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    233 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us