Cybercrime and Cybersecurity

Note: Please look through resources very carefully. This is a controversial issue so some sources may have bias. Check carefully for the expertise or background of the writer or contributor.

To LINK to any article, click on the titles in BLUE

Websites

Internet Crime Complaint Center - A partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). Alerts for consumers and easy-to-use reporting mechanism for fraud. Formerly the Internet Fraud Complaint Center.

  1. An Introduction to Internet Fraud - A introduction explaining many aspects of fraud on the internet.
  2. Antiscam.net - Information about avoiding scams involving Eastern European women, especially Russian ones.
  3. Carbuyingtips.com - Fraud Guide - Consumer guide to preventing and fighting eBay, escrow, auto, internet, cashiers check, and Nigerian scams. Tips on how to spot phony escrow companies and report the scammers.
  4. Computer Crime Research Center - Daily news about computer crime, internet fraud and cyber terrorism.
  5. Computerworld - Experts: Don't dismiss cyberattack warning - London-based fundamentalist Islamic cleric with ties to Osama bin Laden talks of plans to use the Internet to target the U.S., Israeli and the UK economies.
  6. Countering Cyber-Terrorism - a technical workshop at USC - Position Papers on Countering Cyber-Terrorism presented at USC Information Sciences Institute in June 1999
  7. Cyber Criminals Most Wanted - Overview of cyber criminal activity that includes safety, security, viruses, scams, filtering, encryption, hackers and government legislation.
  8. Cyber Criminals Most Wanted - Overview of cyber criminal activity that includes safety, security, viruses, scams, filtering, encryption, hackers and government legislation.
  9. Cybercrime - Computer Crime and Intellectual Property Section (CCIPS) of the Criminal Division of the U.S. Department of Justice. Includes press releases and manuals.
  10. Cybercrime - Computer crime section of the Department of Justice contains links relating to internet commerce, intellectual property crimes, cybercrimes and general information.
  11. Cyber-Crimes & Misdemeanors - Abstract on the Computer Fraud and Abuse Act in the United States. [PDF]
  12. Cyber-terrorists wield weapons of mass DISRUPTION - Feb 18, 2000 BBC coverage of US terrorism experts, who claim that terrorists are not just exploring weapons of mass destruction but also weapons of mass disruption. Media coverage of denial of service attacks.
  13. Digital Age Fraud - Central source of information about the Digital Age Cyprus MasterCard/Visa fraudulent charge.
  14. Dissertation on fighting Cyber-crime - A paper submitted by Cedric Magnin for his LLM at Santa Clara University on the 2001 Council of Europe Convention on Cyber-crime. [PDF]
  15. Federal Bureau of Investigation - Common Fraud Schemes - Describes scams to avoid, most of which are internet-related.
  16. Federal Guidelines for Searching and Seizing Computers - Text of guidelines for computer searching obtained by EPIC under the Freedom of Information Act (FOIA)in 1994.
  17. FraudWatchers.Org - An archive of various scams and fraudulent activities, plus a multilingual support forum.
  18. GPTBoycott.com - Identifies "Get-Paid-To" websites that don't live up to their promises.
  19. Hoaxes, Scams and Rip-offs - Basics on hoaxes, scams and rip-offs on the internet. How to spot them and where to report them. Useful links
  20. How to Avoid Internet Investment Scams - Securities and Exchange Commission information about investment fraud.
  21. Identity Theft - The U.S. government's central website for information about identity theft, the fastest growing Internet crime.
  22. Institute for Security Technology Studies (ISTS) - US national center for counter-terrorism technology research, development and assessment at Dartmouth College. Funded by the U.S. Justice Department
  23. Internet Fraud - Department of Justice site includes information defining Internet fraud, what to do about it, and where to go to get more information.
  24. Internet Safety Resources - Reprints of articles by lawyer Andrew Vachss on Internet crime and law enforcement issues.
  25. Internet ScamBusters - Extensive information on fraud, scams, hoaxes, urban legends and credit card fraud. Free e-zine and reports.
  26. Money Laundering Fraud - Tracks current fraudulent "money mule" operations operated through the Internet.
  27. National Fraud Information Center - Provides a page devoted to Internet fraud.
  28. PhishBucket - An archive of fraudulent and suspect emails, concentrating on bogus job offers and related topics.
  29. Romance Scams - Information about people who use dating sites or social networks to con victims out of money. Peer support for those who have been tricked.
  30. Scam Victims United - Information on scams and support from other victims.
  31. Tech Law Journal - News articles concerning regulation, litigation, and crime related legislation on the Internet. Has links to summaries of current and past trials regarding computers, technology and crime.
  32. The Anatomy of Clickbot.A - Provides a detailed case study of the architecture of the Clickbot.A botnet that attempted a low-noise click fraud attack against syndicated search engines. The botnet of over 100,000 machines was controlled using a HTTP-based botmaster.
  33. VMyths - Extensive resource for identifying and debunking computer virus hoaxes and myths.
  34. Web Host Scams - Outlines things one should watch out for when signing up with a web host.

Academic Search Premiere Articles

How to open articles. Click on the BLUE link under the citation information for each article. Articles are already in MLA format. Then enter the username and password for the article database

  1. Aransiola, Joshua Oyeniyi, and Suraj Olalekan Asindemade. "Understanding Cybercrime Perpetrators And The Strategies They Employ In Nigeria." Cyberpsychology, Behavior & Social Networking 14.12 (2011): 759-763. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=69897564&site=ehost-live
  2. Wolswijk, Hein. "Theft: Taking A Virtual Object In Runescape." Journal Of Criminal Law 76.6 (2012): 459-462. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=84385032&site=ehost-live
  3. Savage, Luiza Ch. "Fighting Cybercrime." Maclean's 125.51/52 (2013): 1. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=84328908&site=ehost-live
  4. Clayton, Mark. "Cybercrime takedown: Is it game over for Gozi trojan that stole millions?." Christian Science Monitor 24 Jan. 2013: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=85177879&site=ehost-live
  5. Stewart, Daniel M., and Eric J. Fritsch. "School And Law Enforcement Efforts To Combat Cyberbullying." Preventing School Failure 55.2 (2011): 79-87. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=58528246&site=ehost-live
  6. Clayton, Mark. "As cybercrime rises, so does a new – and successful – breed of cybercops." Christian Science Monitor 08 Feb. 2012: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=71346301&site=ehost-live
  7. "Firstbank Fights Against Cybercrime With Prevx Safeonline." Computer Security Update 12.4 (2011): 7-8. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=59647374&site=ehost-live
  8. Clayton, Mark. "The latest in cybercrime? Fully automated bank heists." Christian Science Monitor 29 June 2012: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=77422889&site=ehost-live
  9. Guinchard, Audrey. "Crime In Virtual Worlds: The Limits Of Criminal Law." International Review Of Law, Computers & Technology 24.2 (2010): 175-182. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=51376521&site=ehost-live
  10. "Seattle Is Riskiest City For Cybercrime, Report Says." American City & County 125.6 (2010): 16. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=51917712&site=ehost-live
  11. McMILLAN, ROBERT. "FBI Fights Cybercrime In E. Europe." Computerworld 44.6 (2010): 10. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=48921343&site=ehost-live
  12. Mark Clayton Staff, writer. "Cybercrime: Are mobsters planting hackers in big companies?." Christian Science Monitor 30 July 2010: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=52597861&site=ehost-live
  13. "Google and China: the new era of cybercrime." Christian Science Monitor 26 Jan. 2010: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=47727727&site=ehost-live
  14. STEPHENS, GENE. "Crime In The Year 2030." Futurist 47.1 (2013): 27-32. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=84022832&site=ehost-live
  15. Thibodeau, Patrick. "FBI: Cybercrime Crews Adopting Corporate Models." Computerworld 44.8 (2010): 6. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=54593130&site=ehost-live
  16. PRATT, MARY K. "Cyberumbrella." Computerworld 46.2 (2012): 24-25. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=73791965&site=ehost-live
  17. DeFranco, Joanna F. "Teaching Internet Security, Safety In Our Classrooms." Techniques: Connecting Education & Careers 86.5 (2011): 52-55. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=60584109&site=ehost-live
  18. Kaspersky, Eugene. "Cyberscary: 4 Digital Threats To Worry About." Foreign Policy 197 (2012): 78. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=83708642&site=ehost-live
  19. Ling, Justin. "The Thinning Blue Line." Maclean's 126.3 (2013): 1. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=85098838&site=ehost-live
  20. Geier, Eric. "2012 In Security: Rising Danger." PC World 29.12 (2011): 35-36. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=67285671&site=ehost-live
  21. Clayton, Mark. "Cyberwar: Who's been attacked? Who are attackers?." Christian Science Monitor 09 Jan. 2013: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=84745909&site=ehost-live
  22. ORECH, JON. "HOW IT's DONE: Incorporating Digital Citizenship Into Your Everyday Curriculum." Technology & Learning 33.1 (2012): 16-18. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=82590138&site=ehost-live
  23. Poeter, Damon. "FBI Looking For A Good Facebook-Snooping App." PC Magazine (2012): 1. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=82054803&site=ehost-live
  24. Poeter, Damon. "Senators Propose New Cybersecurity Bill, Update To FISMA." PC Magazine (2012): 1. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=82060969&site=ehost-live
  25. Talbot, David. "Global Gridlock On Cyber Crime." Technology Review 113.4 (2010): 62-63. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=53735081&site=ehost-live
  26. Arthur Bright, Correspondent. "Pwned: FBI infiltrates hacktivist group LulzSec." Christian Science Monitor 06 Mar. 2012: N.PAG. Academic Search Premier. Web. 4 Feb. 2013. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=72453392&site=ehost-live

Search engines include Open Directory, Wiki External, EBSCO, JSTOR and LAPL databases Page 4