Hello world!

Welcome to Pistoshost Sites. This is your first post. Edit or delete it, then start writing!

Status Update

Hello Everyone, After having worked in China for five and a half years my wife and I arrived in her native Singapore on July 3rd of 2011 and we will be rejoining life outside of NGO work there. I recently completed the comprehensive final exam for my Masters of Arts...

Forensics in the apprehension of serial bombers

This paper explores advances in forensic investigation of explosives and how application of forensics is able to aid in the development of serial bomber profiles or in linking serial bombers to scenes or scenes with other scenes. Since the topic of forensic...

The RIAA’s John and Jane Doe lawsuits

I was recently asked to write about the RIAA John Doe and Jane Doe lawsuits. While I may be against anonymity on the internet, I’m thoroughly opposed to John and Jane Doe lawsuits for a variety of reasons. “In 2004, the Recording Industry Association of America...

Patriot act and the online community

I was recently asked: “How has American life been affected by the US Patriot Act? Provide one example each of the Patriot Act’s impact on the online community, the technical industry and the law enforcement community. Explain whether the examples you used have had a...

The SKRAM model

Skills, knowledge, resources, authority, and motives (SKRAM) is one of the methods security professionals assess potential threats. The following are some controversial arguments I make concerning SKRAMS efficacy. Question 1: “Do you think the SKRAM model is useful...

Four types of computer crime

While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: CASE 1: My first case is a classic example of a salami attack (Samaha, 2008). A salami attack according to Samaha (2008) is when a...

Cyberstalking

I was recently asked this question: “Do you think it’s necessary to create new terms for “ordinary” crimes committed with more advanced tools? Is cyberstalking simply stalking using the internet?” To adequately answer a seemingly simple yet...

Societal Perceptions of Cyber Criminals

I was asked this interesting question in a recent cybercrime course: “What do you think society’s perception of cyber-criminals is?” If I were to sum up what I believe society’s perception of cybercriminals has become, I would surmise it in saying “the...

Software Counterfeiting

This essay was written for a Fall 2010 cybercrime course and outlines some of the problems faced as a result of software counterfeiting. Software Counterfeiting When the founding fathers created the Constitution, they made an odd inclusion; they included a provision...