Forensics in the apprehension of serial bombers

This paper explores advances in forensic investigation of explosives and how application of forensics is able to aid in the development of serial bomber profiles or in linking serial bombers to scenes or scenes with other scenes. Since the topic of forensic...

The SKRAM model

Skills, knowledge, resources, authority, and motives (SKRAM) is one of the methods security professionals assess potential threats. The following are some controversial arguments I make concerning SKRAMS efficacy. Question 1: “Do you think the SKRAM model is useful...

Four types of computer crime

While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: CASE 1: My first case is a classic example of a salami attack (Samaha, 2008). A salami attack according to Samaha (2008) is when a...

Cyberstalking

I was recently asked this question: “Do you think it’s necessary to create new terms for “ordinary” crimes committed with more advanced tools? Is cyberstalking simply stalking using the internet?” To adequately answer a seemingly simple yet...

Societal Perceptions of Cyber Criminals

I was asked this interesting question in a recent cybercrime course: “What do you think society’s perception of cyber-criminals is?” If I were to sum up what I believe society’s perception of cybercriminals has become, I would surmise it in saying “the...