High-tech Crimes Revealed


Book Description

With a target audience of computer security and other information technology professionals, Branigan (president, CyanLine LLC) focuses on the people more than the technology in his discussion of cybercrime and its investigation. He describes cases he's been involved with, some as a law enforcement officer, in order to give professionals an idea of how criminals exploit computer weaknesses and what can be done to catch them. After describing such episodes as an attack on a telephone network, an attack on an ISP, and a case of identity theft, he proceeds to a more general discussion of cybercrime, exploring such questions as why hackers hack and the proper conduct of criminal investigation.




The Encyclopedia of High-tech Crime and Crime-fighting


Book Description

The history of crime in American has proven that criminals are often the first to seize upon opportunities presented by new technologies and use them for nefarious purposes. It has also demonstrated that law enforcement groups are quick to respond and use high-tech tools to defend the public safety. This is more true than ever




Thin Blue Lie


Book Description

A wide-ranging investigation of how supposedly transformative technologies adopted by law enforcement have actually made policing worse—lazier, more reckless, and more discriminatory American law enforcement is a system in crisis. After explosive protests responding to police brutality and discrimination in Baltimore, Ferguson, and a long list of other cities, the vexing question of how to reform the police and curb misconduct stokes tempers and fears on both the right and left. In the midst of this fierce debate, however, most of us have taken for granted that innovative new technologies can only help. During the early 90s, in the wake of the infamous Rodney King beating, police leaders began looking to corporations and new technologies for help. In the decades since, these technologies have—in theory—given police powerful, previously unthinkable faculties: the ability to incapacitate a suspect without firing a bullet (Tasers); the capacity to more efficiently assign officers to high-crime areas using computers (Compstat); and, with body cameras, a means of defending against accusations of misconduct. But in this vivid, deeply-reported book, Matt Stroud shows that these tools are overhyped and, in many cases, ineffective. Instead of wrestling with tough fundamental questions about their work, police leaders have looked to technology as a silver bullet and stood by as corporate interests have insinuated themselves ever deeper into the public institution of law enforcement. With a sweeping history of these changes, Thin Blue Lie is a must-read for anyone seeking to understand how policing became what it is today.




Fighting Computer Crime


Book Description

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals: * Who your greatest security threats really are (be prepared for some surprises!) * Why employees undergoing divorce can be your organization's greatest computer security risk * How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems. * Effective countermeasures for each threat covered in the book * How to neutralize even the most powerful cybercrime scheme attempts * Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized




Internet Predators


Book Description

Provides an overview of issues related to criminal and antisocial activity that occurs online, including history, terminology, biographical information on important individuals, and a complete annotated bibliography.




Fraud Exposed


Book Description

Long accepted as a cost of doing business, occupational fraud has recently proven to be much more dangerous to a company than previously thought. Enron, Global Crossing, and other high-profile cases have shown that the risks can be enormous. Fraud Exposed shows how traditional methods of dealing with occupational fraud are inadequate and how an organization's mindset must change if it is to be more effective in dealing with this problem. In-depth insights and practical advice show readers how to apply criminal and law enforcement response models to workplace fraud prevention and detection; analyze financial controls to prevent occupational fraud; as well as examine and improve current defenses to occupational fraud. Written by an expert in this field, Fraud Exposed provides organizations with a realistic approach to uncovering fraud and eliminating it before any damage is done. Joseph W. Koletar, PhD (Glen Rock, NJ), is a Principal and Service Line Leader in Ernst & Young's Forensic and Security Services Practice in New York. Prior to joining Ernst & Young, he was the director of the Forensic and Corporate Investigative Services practice of Deloitte & Touche LLP. Before joining the private sector, Dr. Koletar spent twenty-five years as a special agent in the FBI.




Forensic Computer Crime Investigation


Book Description

The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategi




High Tech Trash


Book Description

The Digital Age was expected to usher in an era of clean production, an alternative to smokestack industries and their pollutants. But as environmental journalist Elizabeth Grossman reveals in this penetrating analysis of high tech manufacture and disposal, digital may be sleek, but it's anything but clean. Deep within every electronic device lie toxic materials that make up the bits and bytes, a complex thicket of lead, mercury, cadmium, plastics, and a host of other often harmful ingredients. High Tech Trash is a wake-up call to the importance of the e-waste issue and the health hazards involved. Americans alone own more than two billion pieces of high tech electronics and discard five to seven million tons each year. As a result, electronic waste already makes up more than two-thirds of the heavy metals and 40 percent of the lead found in our landfills. But the problem goes far beyond American shores, most tragically to the cities in China and India where shiploads of discarded electronics arrive daily. There, they are "recycled"-picked apart by hand, exposing thousands of workers and community residents to toxics. As Grossman notes, "This is a story in which we all play a part, whether we know it or not. If you sit at a desk in an office, talk to friends on your cell phone, watch television, listen to music on headphones, are a child in Guangdong, or a native of the Arctic, you are part of this story." The answers lie in changing how we design, manufacture, and dispose of high tech electronics. Europe has led the way in regulating materials used in electronic devices and in e-waste recycling. But in the United States many have yet to recognize the persistent human health and environmental effects of the toxics in high tech devices. If Silent Spring brought national attention to the dangers of DDT and other pesticides, High Tech Trash could do the same for a new generation of technology's products.




Computerworld


Book Description

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.




The Digital Hand, Vol 3


Book Description

In The third volume of The Digital Hand, James W. Cortada completes his sweeping survey of the effect of computers on American industry, turning finally to the public sector, and examining how computers have fundamentally changed the nature of work in government and education. This book goes far beyond generalizations about the Information Age to the specifics of how industries have functioned, now function, and will function in the years to come. Cortada combines detailed analysis with narrative history to provide a broad overview of computings and telecommunications role in the entire public sector, including federal, state, and local governments, and in K-12 and higher education. Beginning in 1950, when commercial applications of digital technology began to appear, Cortada examines the unique ways different public sector industries adopted new technologies, showcasing the manner in which their innovative applications influenced other industries, as well as the U.S. economy as a whole. He builds on the surveys presented in the first volume of the series, which examined sixteen manufacturing, process, transportation, wholesale and retail industries, and the second volume, which examined over a dozen financial, telecommunications, media, and entertainment industries. With this third volume, The Digital Hand trilogy is complete, and forms the most comprehensive and rigorously researched history of computing in business since 1950, providing a detailed picture of what the infrastructure of the Information Age really looks like and how we got there. Managers, historians, economists, and those working in the public sector will appreciate Cortada's analysis of digital technology's many roles and future possibilities.