| Preface | xi |
1 | History and Types of Cybercrime | 1 |
| Basic Cybercrime Terms | 1 |
| Hacker and Cracker | 1 |
| Cybercrime | 2 |
| History of Cybercrime | 4 |
| The White Hats | 4 |
| The Black Hats | 7 |
| Emerging Fears about Cyberterrorism | 10 |
| Countering Cyberterrorists: The Homeland Security Act | 18 |
| 2003: Exacerbating Cyberterrorism Anxieties | 19 |
| Types of Cybercrime | 28 |
| Social Engineering | 28 |
| Categories of Cybercrime | 29 |
| Criminal Liability: Four Elements | 32 |
| Property Cybercrime | 36 |
| Cybercrimes against Persons | 39 |
| The Nonoffenses of Cybervigilantism and Hacktivism | 41 |
| Using Anonymity to Conceal Cybercrimes | 42 |
| Conclusion | 43 |
| References | 44 |
2 | Issues, Controversies, and Solutions | 49 |
| Computer System Intrusions | 50 |
| Recent Statistics on Computer Intrusions | 50 |
| Cracking | 53 |
| Flooding | 58 |
| Viruses and Worms | 61 |
| Spoofing | 65 |
| Phreaking | 70 |
| Piracy, Intellectual Property Rights, and Copyright | 71 |
| Two Controversial "Cases" of Cracking | 76 |
| Issues and Controversies Related to System Vulnerabilities | 78 |
| The National Strategy to Secure Cyberspace | 78 |
| Software | 79 |
| Challenges Faced by System Administrators | 84 |
| A Theoretical Study: A Possible Coordinated Terror Attack | 93 |
| Honeypots and Controversies Surrounding Them | 97 |
| Operating Systems-Are Some More Secure Than Others? | 100 |
| Legislative Countermeasures and Controversies | 102 |
| Conclusion | 104 |
| References | 105 |
3 | Chronology | 111 |
| Cybercrime Timeline | 111 |
| References | 135 |
4 | Biographical Sketches | 139 |
| Abene, Mark (a.k.a. Phiber Optik) (1972- ) | 139 |
| Byron, Ada (1815-1852) | 139 |
| Caffrey, Aaron (1982- ) | 140 |
| Cummings, Edward E. (a.k.a. Bernie S.) (1963- ) | 141 |
| Denning, Dorothy (1945- ) | 141 |
| Draper, John (a.k.a. Cap'n Crunch) (1945- ) | 142 |
| Gorman, Sean (1974- ) | 142 |
| Jobs, Steve (1955- ) | 143 |
| Levin, Vladimir (1971- ) | 143 |
| Mafiaboy (1985- ) | 144 |
| Mitnick, Kevin (a.k.a. Condor) (1963- ) | 144 |
| Morris, Robert (a.k.a. rtm) (1966- ) | 144 |
| Poulsen, Kevin (a.k.a. Dark Dante) (1966- ) | 145 |
| Raymond, Eric Steven (1957- ) | 145 |
| Ritchie, Dennis (a.k.a. dmr) (1941- ) | 146 |
| Shimomura, Tsutomu (1966- ) | 146 |
| Sklyarov, Dmitry (1947- ) | 147 |
| Stallman, Richard (1953- ) | 147 |
| Thompson, Ken (1943- ) | 148 |
| Wozniak, Steve (a.k.a. Oak Toebark, a.k.a. Woz) (1950- ) | 148 |
| References | 149 |
5 | Cybercrime Legal Cases | 151 |
| Summary of Legislation | 151 |
| Trends and Observations in Cybercrime | 155 |
| Cybercriminals Tend to Be Male | 155 |
| Cybercrime Could Move from Cyberspace to Outer Space | 156 |
| Computer Crime Cases | 156 |
| 1998 | 156 |
| 1999 | 158 |
| 2000 | 162 |
| 2001 | 164 |
| 2002 | 170 |
| 2003 | 181 |
| 2004 | 192 |
| References | 193 |
6 | Agencies and Organizations | 195 |
| Government Agencies | 195 |
| Independent Organizations | 197 |
| Suppliers of Products and Services | 201 |
| Security Training, Education, and Certification | 201 |
| Academic Degrees | 202 |
| Antivirus Software | 203 |
| Firewalls | 205 |
| Intrusion Detection Systems (IDS) | 207 |
7 | Print and Nonprint Resources | 209 |
| Books | 210 |
| Web Sites | 219 |
| Hacking Sites | 219 |
| Security Sites | 220 |
| Intrusion Detection Systems | 220 |
| U.S. Government and International Cybercrime Sites | 222 |
| Film | 222 |
| Glossary | 223 |
| Index | 231 |
| About the Authors | 247 |