Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet5/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   2   3   4   5   6   7   8   9   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

ANDREW STANIFORTH
Detective Inspector Andrew Staniforth has extensive operational counter-terrorism ex-
perience in the UK. As a qualified teacher he has designed national counter-terrorism 
exercise programmes and delivers training to police commanders from across the world 
at the UK College of Policing. He is the author of the Blackstone’s Counter-Terrorism 
Handbook
(Oxford University Press, 2013), the Blackstone’s Handbook of Ports and 
Borders Security
(Oxford University Press, 2013), the Routledge Companion to UK 
Counter-Terrorism
(Routledge, 2012) and Preventing Terrorism and Violent Extremism 
(Oxford University Press, 2014). Andrew is a Senior Research Fellow at the Centre 
of Excellence for Terrorism, Resilience, Intelligence and Organised Crime Research 
(CENTRIC), and a Visiting Fellow at the School of Law, University of Leeds. He cur-
rently leads a research team at West Yorkshire Police progressing multi-disciplinary 
international security projects.


xx
Author Biography
FRANCESCA BOSCO
Francesca Bosco earned a degree in International Law and joined UNICRI in 2006 
as a member of the Emerging Crimes Unit. In her role in this organization, Bosco is 
responsible for cybercrime prevention projects, and in conjunction with key strategic 
partners, has developed new methodologies and strategies for researching and coun-
tering computer-related crimes.
She has collaborated on different cybercrime-related projects such as the Hackers 
Profiling Project (HPP), SCADA (Supervisory Control and Data Acquisition) 
Security, a multi-level training program for ICT and security professionals, lawyers, 
and law enforcement agencies. Bosco has also participated as a speaker in various 
conferences and training seminars on the topic of child online pornography and has 
contributed to the development ITU Child Online Protection (COP) guidelines.
More recently, Bosco has been researching and developing technical assistance 
and capacity building programs to counter the involvement of organized crime in 
cybercrime, as well as on the legal implications and future scenarios of cyber ter-
rorism and cyber war. She is also researching and managing projects on hate speech 
online and on data protection issues related to automated profiling. Bosco is one of 
the founders of the Tech and Law Center and she is currently a PhD candidate at the 
University of Milan.


xxi
Foreword
It is a real privilege to be invited to write the Foreword for the 
Cyber Crime and 
Cyber Terrorism Investigators’ Handbook.
This new volume provides an authorita-
tive and accessible guide of substantial practical and operational value which, for 
the very first time, ensures all security practitioners have a trusted reference and 
resource to navigate them through the challenges and complexities of investigating 
cyber crime and cyber terrorism.
The growing role of cyberspace in society has opened up new threats as well as 
new opportunities. A growing number of individuals and groups are looking to use 
cyberspace to steal, compromise or destroy critical data, and the national security 
machinery of governments have no choice but to find ways to confront and overcome 
these threats if they are to flourish in an increasingly competitive and globalized 
world.
As citizens put more of their lives online, the safety of cyber space matters more 
and more. People want to be confident that the networks which support their nation’s 
security, their prosperity, and their own private lives as individuals, are both safe and 
resilient. The scale of citizen and state dependence on cyber space now means that 
our economic well-being, our key infrastructure, our places of work and our homes 
can all be directly affected.
There are, of course, crimes that only exist in the digital world, in particular those 
that target the integrity of computer networks and online services. But cyberspace is 
also being used as a platform for committing crimes such as fraud, and on an indus-
trial scale. Identity theft and fraud online now dwarf their offline equivalents. The 
internet has also provided new opportunities for those who seek the sexual exploita-
tion of children and the vulnerable.
Cyberspace allows criminals to target countries from other jurisdictions across 
the world, making it harder to enforce the law. Cyber criminals can operate from 
anywhere in the world, targeting large numbers of people or businesses across inter-
national boundaries, and there are challenges posed by the scale and volume of their 
crimes, the technical complexity of identifying the perpetrators as well as the need 
to work internationally to bring them to justice. The internet has unfortunately en-
abled aspiring criminals to commit offences, based on a belief that law enforcement 
struggles to operate in the online world.
The internet has also changed—and continues to change—the very nature of ter-
rorism. The internet is well suited to the nature of terrorism and the psyche of the ter-
rorist. In particular, the ability to remain anonymous makes the internet attractive to 
the terrorist plotter. Terrorists use the internet to propagate their ideologies, motives 
and grievances as well as mounting cyber attacks on critical infrastructures. Modern 
terrorism has rapidly evolved, becoming increasingly nonphysical, with vulnerable 
“home grown” citizens being recruited, radicalized, trained and tasked online in the 
virtual and ungoverned domain of cyber space.


xxii
Foreword
To support the emergence of cyber-based investigations, the 
Cyber Crime and 
Cyber Terrorism Investigators’ Handbook
is enriched with case studies, explanations 
of strategic responses and contextual information providing the theoretical underpin-
ning required to effectively tackle cyber crimes. This unique volume serves to ex-
plore and explain the responsibilities of law enforcement agencies to address online 
criminal and terrorist activity. Authored and edited by a multi-disciplinary team of 
experts from academia, law enforcement and private industry, this new volume shall 
be a welcome introduction to the resource library of cyber investigators.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish