The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals
Author | : | |
Rating | : | 4.21 (580 Votes) |
Asin | : | 1435457129 |
Format Type | : | paperback |
Number of Pages | : | 560 Pages |
Publish Date | : | 2013-09-02 |
Language | : | English |
DESCRIPTION:
"Technical Story Told Well" according to customer. In The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals, Steve Schroeder provides a clearly written, blow by blow account of how the FBI took down a Russian hacking operation.Schroeder begins the book by telling how he and his colleagues lured two Russian hackers into leaving their virtual immunity in Russia for the far less tolerant shores of the US. Of course, the case involved highly technical details, but the author breaks it down for readers in a way that is understandable to anyone with rudimentary computer or programming experience. This aspect of his writin. Prosecuting A Cyber Crime, Step By Laborious Step Bill Slocum Steve Schroeder's love for the tiniest detail helped make him an effective prosecutor in the emerging field of cybercrime at the dawn of the 21st century. But it also makes him a rather stodgy writer, and even less effective editor. This book makes you feel you are sitting on a very long trial in real time."The Lure" examines how two young Russian hackers were brought to justice by a system still working through an enormous learning curve. How to prove that their breaking into web servers of banks, online merchants, and other businesses boiled down to extortion and fraud? How to prove malicious intent using terms like "hash," "bash. Joanne M. Friedman said Textbook with Flair. I didn't check the author's bio before I read the introduction to The Lure, and my first reaction was that it sounded like it was written by a lawyer. Surprise! It was.This is a fascinating story of the inner workings of the Justice Department with all the detail a reader could possibly want. This cyber crime--the hacking of computer networks at several financial institutions and US corporate offices by a pair of Russians--received a lot of press at the time it occurred, but the specifics were, of course, kept quiet until the case was finalized in the courts. It is enlightening to learn how our system works behind the scenes to bri
There is, it seems, a dearth of real-world computer crime materials available for training. The states only have jurisdiction (legal authority) to compel evidence within their own borders. The story of the sting operation and subsequent trial is told for the first time here by the Department of Justice's attorney for the prosecution. Congress also enacted the Stored Communications Act in 1986, establishing privacy protections for email, nearly ten years before it was commonly used.Governments struggle to keep up with technology. Because it was such a new field, one who concentrated on it could quickly rise above the pack. In any event, computers do not recognize borders and computer crimes are commonly multi-jurisdictional. (It is now.) There are certainly still countries in the world where attacks on computers located somewhere else are not prosecuted.Even at the state level in this country there are barriers. It is commonplace to read in the news about the compromise of a large database of credit card transactions. In addition, the difficulty in obtaining evidence from other legally constituted government entities compounds the ultimate problem in computer crime cases--attribution. This book is an effort, among other things, to make much information available.: Your career as a prosecutor began before cybercrime became well known. So
A (not so) Brief Primer on National Security Investigations. Aftermath. 10. 8. 16. CTS (San Diego). 2. The Lure. 3. Speakeasy. 4. 6. 15. Introduction. eBay. In Custody. PayPal and eBay. 9. The Motion to Suppress and Preliminary Skirmishing. 11. 1. Victim Banks. Preparing for Trial. The Sting. 5. 13. 7. 14. Verio and webcom. The Trial. . The Investigation Begins
He was a member of the national working group that advises the Attorney General on computer crime issues, and is a frequent lecturer on computer crime and electronic evidence. Steve Schroeder was a trial attorney and an Assistant States Attorney for the Department of Justice from 1974 until his retirement in July 2002. He is currently an Adjunct Profes