Cybercrime: Investigating High-Technology Computer Crime, Second Edition, provides an introduction to a rapidly changing field of the criminal justice system. It discusses various aspects of high-technology crime, or cybercrime, for individuals with limited or no knowledge of computers and/or computer networking. The book is organized into three sections. The first section provides an introduction to cybercrime. The second section addresses issues associated with the investigation and prosecution of these crimes. The final section offers insights into the future of studies of high-technology crime, including the emerging field of cybercriminology. Each chapter ends with a series of review questions that highlight the important terminology and concepts discussed. Each chapter also contains reference to related books, articles, or court cases; a list of relevant websites that readers may visit; and a brief spotlight on a news story that addresses how the materials discussed in the chapter are used or encountered in practice. The book is written for university students and those working in the criminal justice field.

Key Features

  • Current events in the news are highlighted throughout the text, showing how issues are being encountered in actual practice.
  • References to further reading and online resources have been selected to provide interested readers with a means of continuing their education with related books, articles, and court cases.
  • A new chapter covers the new and exciting area of cybercriminology, in which scholars are working to gain a better understanding of what causes individuals to engage in the many cyber-related crimes discussed in this work.


Students and beginning professionals in the criminal justice field.

Table of Contents

Introduction Chapter 1 An Introduction to High-Technology Crime What Is High-Technology Crime? Computer Crimes Cybercrime Consolidating High-Technology Crimes How Serious Is the High-Technology Crime Problem? The Purpose of This Work The Criminal Acts Investigating High-Technology Crimes Introduction to Computer Forensics and the Future of Technology Crime In the News Review Questions Online Resources Chapter 2 Hackers, Crackers, and Phone Phreaks The Evolution of the Term Hacker The Introduction of Hacking to the Public Types of Hackers Black-Hat Hackers White-Hat Hackers Gray-Hat Hackers Script Kiddies Hactivists Cyberterrorists Hacker Technique and Modus Operandi Password Grabbers and Loggers Blue Boxing Programs War-Dialers Encryption Software Password Recovery Software BIOS Password Crackers Security Vulnerability to Scanners Packet Sniffers Operating System Password Crackers War-Driver Programs ( Wireless Network Scanners) Hacker Attack Techniques Data Manipulation Trojan Horses Computer Viruses Denial-of-Service Attacks IP Spoofing Web Spoofing Non-Software/Non-Network–Based Attacks The Crime of Phreaking How Phreakers Operate Cellular Phone Phreaking Calling Card Fraud Call Sell Services The Hacker/Phreaker Subculture The Hacker Ethic The Hacker Language Hacker Conferences Conclusion In the News Review Questions Further Reading Online Resources Chapter 3 Identity Theft: Tools and Techniques of 21st-Century Bandits How Serious Is the Identity Theft Problem?


No. of pages:
© 2011
Print ISBN:
Electronic ISBN: