Table Of ContentENCYCLOPEDIA OF
CYBERCRIME
Edited by
Samuel C. McQuade, III
GREENWOOD PRESS
Westport, Connecticut • London
LibraryofCongressCataloging-in-PublicationData
Encyclopediaofcybercrime/editedbySamuelC.McQuade,III.
p.cm.
Includesbibliographicalreferencesandindex.
ISBN978-0-313-33974-5(alk.paper)
1.Computercrimes—Encyclopedias.2.Internetfraud—Encyclopedias.3.Computersecurity—
Encyclopedias.4.Internetfraud—Prevention—Encyclopedias.5.Computercrimes—UnitedStates—
Encyclopedias.6.Internetfraud—UnitedStates—Encyclopedias.7.Computersecurity—UnitedStates
—Encyclopedias.8.Internetfraud—UnitedStates—Prevention—Encyclopedias.I.McQuade,
SamuelC.
HV6773.E532009
364.16´803—dc22 2008028523
BritishLibraryCataloguinginPublicationDataisavailable.
Copyright©2009bySamuelC.McQuade,III
Allrightsreserved.Noportionofthisbookmaybe
reproduced,byanyprocessortechnique,withoutthe
expresswrittenconsentofthepublisher.
LibraryofCongressCatalogCardNumber:2008028523
ISBN:978-0-313-33974-5
Firstpublishedin2009
GreenwoodPress,88PostRoadWest,Westport,CT06881
AnimprintofGreenwoodPublishingGroup,Inc.
www.greenwood.com
PrintedintheUnitedStatesofAmerica
Thepaperusedinthisbookcomplieswiththe
PermanentPaperStandardissuedbytheNational
InformationStandardsOrganization(Z39.48-1984).
10 9 8 7 6 5 4 3 2 1
CONTENTS
Listof Entries vii
Preface ix
Acknowledgments xi
Introduction xiii
Chronology of Selected Cybercrime-RelatedEvents xv
TheEncyclopedia 1
Resource Guide 195
Index 201
Aboutthe Editorand Contributors 205
This page intentionally left blank
LIST OF ENTRIES
Academic Misconduct Cyber Safety andEthics Initiatives
Addiction, Online Cyberspace
Adult Entertainment and Pornography Cybersquatting
ARPANET Cyberterrorism
AttackVectors Cyber Whimsy
Banking Online Dedicated Cybercrime Investigation
Botnets,Zombies,andRemoteControl and Prosecution Units
Attacks Denial of ServiceAttacks
Careers in Investigating and Preventing Digital Youth Culture and Social
Cybercrime Networking
Certifications Election and Voting Fraud
CertifiedInformationSystems Security Electronic Frontier Foundation
Professional Standard Ethical Use of Computers
ChildPornography FraudulentSchemes andTheft Online
ComputerCrime andIntellectual Gaming Online
Property Section Government Intelligence Gathering
ComputerEmergency Response Team Hacking and theHackerSubculture
ComputerForensics Identity Theft
Computerization InformationAssurance
CopyrightInfringement InformationSystems Security
CorporateEspionage Association
Councilof Europe Convention on Intellectual Property
Cybercrime International Cybercrime Lawsand
CriticalInformation Infrastructure Agreements
Cryptographyand Encryption Internet
Cyber Bullying, Threats,Harassment, Interpol
and Stalking Laws, Children Online
Cybercrime Laws, IllegalUse of Computers andIT
Cybercrime Attacks Devices
Cybercriminals Laws, Information Security
Cybercriminals, Famous Requirements
Cyber/Internet Culture Laws, Privacy Protections
VIII LISTOFENTRIES
LawsThatFacilitate or Limit Privacy
Cybercrime Investigations Regulatory Agencies with Cybercrime
Leetspeak Oversight Responsibilities
Malware Research on Cybercrime
Malware Incidents Scientific and Professional Misconduct
Meeting and Falling in Love Online— Security ManagementResponsibilities
Be Careful! Social and EconomicImpacts of
MGMet al. v.Grokster Ltd. et al. Cybercrime
Napster Social Engineering
National Center forMissing and Spam
ExploitedChildren Technologies Commonly Used for
National White Collar CrimeCenter Cybercrime
Network Centric Warfare Theories of Cybercrime
OrganizedCybercrime Theory ofTechnology-Enabled Crime,
Phishing Policing, and Security
Phreaking UnitedStates v.LaMacchia
Piracy Victimization
Preventing Cybercrime Wardriving and Wardialing
Prevention Education Warez Groups
PREFACE
Therearetodaynomorecompellingsetsofcrimeandsecuritythreatsfacingnations,
communities, organizations, groups, families, and individuals than those encom-
passedbycybercrime.Forover50yearscrimeenabledbycomputingandtelecommu-
nications technologies has increasingly threatened societies as they have become
relianton information systems for sustaining modernized living. Cybercrime is not a
newphenomenon,butratheranevolvingonewithrespecttoadoptionofinformation
technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad
ways in which ITis abused, it represents a technological shift in the nature of crime
rather than a new form of criminal behavior. In other words, the nature of crime
anditsimpactsonsocietyarechangingto theextenttheInternetandotherinforma-
tionsystems,alongwithcomputersandothertypesofITsuchasmultipurposecellu-
larphones andPDAs, are used forillicitpurposes.
Understandingandpreventingcybercrimeinitsmanyformsrequiresbasicknowl-
edgeaboutwaysinwhichtraditionalcrimesarebecomingincreasinglyhightechand
complex. Fortunately, the Encyclopedia of Cybercrime provides nontechnical explana-
tions about the most important cybercrime-related issues by using simple terms in
straightforward ways. A person does not need any prior education in computer sci-
ence, software engineering, or network administration to understand, enjoy, and use
this reference work. Indeed, the Encyclopedia has been specifically written with the
information needs and interests of high school and undergraduate college students
inmind.However,thebookiswrittenasanauthoritativesourceofinformationinclu-
siveofdiscussionsaboutallmajortypesofcybercrimeoffendingvictimizationsureto
be of interest to parents, teachers, security professionals, managers of organizations,
andpublic policyofficials.
This work is the first comprehensive encyclopedia to address cybercrime. Topical
articlesaddressallkeyareasofconcernandspecificallythosehavingtodowithtermi-
nology,definitions,andsocialconstructsofcrime;nationalinfrastructuresecurityvul-
nerabilities and capabilities; types of attacks to computers and information systems;
computer abusers and cybercriminals; criminological, sociological, psychological,
technological, and theoretical underpinnings of cybercrime; social and economic
impactsofcrimeenabledwithinformationtechnologyinclusiveofharmsexperienced
byvictimsofcybercrimesandcomputerabuse;emergingandcontroversialissuessuch
X PREFACE
as online pornography, social networking, the computer hacking subculture, and
potential negative effects of electronic gaming and so-called ‘‘computer addiction’’;
bodiesandspecificexamplesofU.S.federallawsandregulationsthathelptoprevent
cybercrimes; examples and perspectives of law enforcement, regulatory and profes-
sional member associations concerned about cybercrime and its impacts; and com-
puter forensics as well as general investigation/prosecution of high tech crimes and
attendant challenges within the United States and throughout the world. Boldface
termswithin entries areused forcross-referencing purposes.
Manyentriesincludeexamplesofrealcybercrimecases,includingsomethatreflect
recent court rulings on major and controversial issues. Over 80 topical articles have
been written by authors with many years of professional experience gained through
graduate school research and employment while working in the public and private
sectors.Theircombinedexperienceincludesdecadesofmanagingallaspectsofinfor-
mation systems design and security while employed for prominent corporations and
government agencies. As a group they hold advanced degrees and many of the most
recognized technical professional certifications currently available from leading
credentialinginstitutions.Asprofessionalstheycurrentlyprovideafullrangeofserv-
icespertainingtotheunderstanding,prevention,anddeterrenceofinformationsecu-
ritythreatsandcybercrime.Theyexemplifyreal-worldcareerpathsandopportunities
inconstantly expandingand challenging areas of cybercrime.
ACKNOWLEDGMENTS
Many people helped bring this project to a successful conclusion after unavoidable
periods of starts, stops, and delays. First is Suzanne Staszak-Silva, who served as
Greenwood’s project manager and primary publishing advocate for the Encyclo-
pedia of Cybercrime. In the beginning Suzanne was helpful in setting out the types
of topical entries needed and suggested how the work should be structured. For
many months she was extraordinarily patient in guiding me through the writing
process while I was recovering from major health problems. And at the end of
the project she extended considerable trust and flexibility for my submitting a very
solid and complete manuscript. I will always owe her a professional debt of
gratitude.
IalsowishtoextendsincerethankstoEricWalterwhoformanymonthsservedas
my project coordinator. As one of my graduate students, he worked with authors to
keep things moving forward when Icould not, and he provided initial editing assis-
tance to ensure topics being written about by authors were properly covered and
appropriately explained. He often necessarily accomplished this and more by loyally
working many hours without much guidance from me, and did so in an extremely
professional and conscientious manner. In manyways he provided assistance compa-
rableto an associateeditor,and Iwas blessed to have his assistance.
My primary research assistant, Neel Sampat, also provided me with exceptional
fact checking and writing assistance, especially as the project entered its final
phases. Having grown up as a technologically savvy participant in Internet and
digital youth cultures, and as an observer of the hacking subculture, Neel was
able to provideimportant perspectives as well as original articles bound to be of spe-
cial interest to younger readers of this Encyclopedia. His ability to use and help me
use technology to research and write about cybercrime was nothing short of
remarkable.
Finally, Iwish to acknowledge and thank the authors, nearly all of whom I know
personally. Traditionally, editors of encyclopedias like this one seek out contributing
authors from far and wide to contribute their knowledge and expertise about
the subject. In this case I deliberately chose a team of qualified individuals whose
prior work and reputations I knew in advance. On the basis of these personal and
Description:There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened so