Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Combatting cybercrime and cyberterrorism : challenges, trends and priorities
Akhgar B., Brewster B., Springer International Publishing, New York, NY, 2016. 306 pp. Type: Book (978-3-319389-29-5)
Date Reviewed: Oct 13 2016

Cybercrime investigations are different from traditional crime investigation, requiring in-depth technical expertise and large-scale cross-jurisdictional effort. In May 2016, a well-organized group of 100 in Tokyo used stolen South African credit cards to make 14,000 automated teller machine (ATM) withdrawals. In three hours, $18 million was netted with only fuzzy closed-circuit television (CCTV) footage left behind. In February 2016, cybercriminals attempted to steal $951 million from the central bank of Bangladesh by issuing fraudulent instructions via the SWIFT network to the New York Federal Reserve Bank. Although some transactions were rejected, $81 million was transferred to the Philippines to an account opened under a fictitious identity. A cybercriminal withdrew $58 million in Manila and then disappeared.

Banks and corporations aren’t the only targets. Cybercriminals affect individuals when personal information is stolen. Five hundred million users of Yahoo! were affected by a recent data breach, which was discovered when part of that personal data was put up for sale on the dark web in 2016.

Written by 42 authors, of which two are also editors, the book is composed of 16 chapters in three sections: “Approaching Cybercrime and Cyberterrorism Research”; “Legal, Ethical and Privacy Considerations”; and “Technologies, Scenarios and Best Practices.”

Seventy-five percent of the chapters received funding from EU grants (COURAGE, https://www.courage-project.eu/; Cyberroad, https://www.cyberroad-project.eu/; and CAMINO, http://www.fp7-camino.eu/). The EU’s Seventh Framework Programme for Research and Technological Development (FP7) funded all three projects.

It should be noted there is no commonly agreed-upon definition of either “cybercrime” (CC) or “cyberterrorism” (CT), and several chapters of the book use different definitions. Readers may find that reading the last chapter first is useful. Titled “Consolidated Taxonomy and Research Roadmap for CC and CT,” it provides definitions of the terms as defined by the ITU, a specialized United Nations agency on information and communication technologies, and the Budapest Convention on Cybercrime, which is foundational material. The Budapest treaty stems from an effort made in 2001. The international conference resulted in a treaty, which about 60 countries have ratified. The differences in definitions go to the highest levels in Europe. Different definitions create a debate and create challenges for law enforcement.

The output of these book chapters may be used by EU policy makers in multiple ways. Policy makers from the five nations without a national strategy may find the book more relevant than those who already have a published strategy.

Each chapter is a standalone research paper. Only the most dedicated policy analyst is likely to read the book from cover to cover. More likely, this book will be used as a supplement to the data available on the EU-funded project websites, with users most likely from the EU. The last chapter provides topics for future research across four dimensions: technical, human, organizational, and regulatory (THOR). It may be the most read because it provides an answer to the academic’s question: Where do we go from here?

Are there options available to readers who are looking for a book more focused on the US? Since the topics covered are so broad, the best place to begin to look is a bibliography published by the Congressional Research Service [1]. This report is intended to serve as a starting point for US congressional staff assigned to cover cybersecurity issues. Included are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources. Other resources are also available [2,3,4].

Perhaps it is an unintentional reinforcement of a real problem in fighting cybercrime--the fragmented approach by multiple parties, each with differing agendas: an index of authors is provided, but not a content index.

Reviewer:  Joy Gumz Review #: CR144840 (1702-0117)
1) Tehan, R. Cybersecurity: Overview reports and links to government, news, and related resources. Congressional Research Service Reports, 2016. https://www.fas.org/sgp/crs/misc/R44405.pdf.
2) Hayes, B.; Jeandesboz, J.; Ragazzi, F.; Simon, S.; and Mitsilegas, V. The law enforcement challenges of cybercrime: Are we really playing catch-up? Study for the LIBE Committee, 2015. http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536471/IPOL_STU(2015)536471_EN.pdf.
3) Zimmer, B. Web. New York Times Magazine, Nov. 14, 2010, MM34. http://www.nytimes.com/2010/11/14/magazine/14FOB-onlanguage-t.html.
4) Clark, D.; Berson, T.; Lin, H. S. (Eds.) At the nexus of cybersecurity and public policy: some basic concepts and issues. National Academies Press, Washington, DC, 2014.
Bookmark and Share
  Featured Reviewer  
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Security and Protection (K.6.5 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy