Cyber Criminals

How Cyber Criminals Are Obtaining and Exploiting Our Data - And What We Can Do About It

with

G. Ryan MacFarlane

FBI Supervisory Special Agent, Cleveland Division

December 10, 2018

The following resources and titles provide an additional look at the topics of this month's talk for you to explore further. Enjoy!

Non-Fiction

  • Cybercrime And Digital Forensics : An Introduction by Thomas Holt (2018)
    • This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals.
  • Industry Of Anonymity : Inside The Business Of Cybercrime by Jonathan Lusthaus (2018)
    • Lusthaus (Univ. of Oxford) has written a thorough, easily readable history of cybercrime by analyzing the various segments of its execution, interviewing key players in an international context, and doing well to note some off-line aspects of cybercrime. Lusthaus brilliantly moves beyond the so-called anonymity of the encrypted, "hidden" criminal to the place-based aspects of the business. (Library Journal, excerpt)
  • Ethics And Cyber Warfare : The Quest For Responsible Security In The Age Of Digital Warfare by George Lucas (2017)
    • In Ethics and Cyber Warfare, internationally-respected ethicist George Lucas delves into the confounding realm of cyber conflict. Comparing "state-sponsored hacktivism" to the transformative impact of "irregular warfare" in conventional armed conflict, Lucas offers a critique of legal approaches to governance, and outlines a new approach to ethics and "just war" reasoning. Lucas draws upon the political philosophies of Alasdair MacIntyre, John Rawls, and Jürgen Habermas to provide a framework for understanding these newly-emerging standards for cyber conflict, and ultimately presents a professional code of ethics for a new generation of "cyber warriors." (Book summary, excerpt)
  • Personal Cybersecurity : How To Avoid And Recover From Cybercrime by Marvin Waschke (2017)
    • Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. (Book summary)
  • Cyber Threat : The Rise Of Information Geopolitics In U.S. National Security by Chris Bronk (2016)
    • How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. (Book summary, excerpt)
  • Cybercrime Risks And Responses : Eastern And Western Perspectives by Russell G. Smith, editor (2015)
    • This book examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The contributors show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and issues in cybercrime prevention and control.
  • Cyberphobia : Identity, Trust, Security And The Internet by Edward Lucas (2015)
    • Crossing the road, we look both ways. Riding a bicycle at night, we use lights. So why is our attitude towards online security so relaxed? Edward Lucas reveals the ways in which cyberspace is not the secure zone we may hope, how passwords provide no significant obstacle to anyone intent on getting past them, and how anonymity is easily accessible to anyone – malign or benign – willing to take a little time covering their tracks. (Book summary, excerpt)

Government Documents

  • The Cost of Malicious Cyber Activity to the U.S. Economy by Council of Economic Advisors (2018) (PDF link)
    • This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are ever-evolving and may come from sophisticated adversaries. Due to common vulnerabilities, instances of security breaches occur across firms and in patterns that are difficult to anticipate. Importantly, cyberattacks and cyber theft impose externalities that may lead to rational underinvestment in cybersecurity by the private sectorrelative to the socially optimal level of investment. Firms in critical infrastructure sectors may generate especially large negative spillover effects to the wider economy. Insufficient data may impair cybersecurity efforts. Successful protection against cyber threats requires cooperation across firms and between private and public sectors. (Executive Summary, excerpt)
  • Cyber Infrastructure Protection, Volume III, by Tarek Nazir Saadawi and John D. Colwell, editors (2017)
    • This volume (a follow-up on Volumes I and II, 2011 and 2013, respectively) from the US Army War College's Strategic Studies Institute "addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks."
  • Federal Trade Commission (FTC) Scam Watch and Online Security video series (YouTube links)
    • The FTC provides two series of videos on the dangers of online interactions and how to avoid them.
  • FBI Cyber Crime Division webpage
    • The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. The threat is incredibly serious—and growing. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. Our nation’s critical infrastructure, including both private and public sector networks, are targeted by adversaries. American companies are targeted for trade secrets and other sensitive corporate data, and universities for their cutting-edge research and development. Citizens are targeted by fraudsters and identity thieves, and children are targeted by online predators. This means enhancing the Cyber Division’s investigative capacity to sharpen its focus on intrusions into government and private computer networks.

Cleveland Public Library - Main Library - 325 Superior Ave - Cleveland, Ohio 44114 - 216-623-2800