Computer Crime Research Center
Computer Crime Articles 2004
- Dec 24 Russell G Smith Trends & issues in crime and criminal justice (Part II)
- Dec 13 Russell G Smith Trends & issues in crime and criminal justice
- Nov 23 2004: Year of the global malware epidemic - Top ten lessons
- Nov 22 Brian Krebs Phishing Feeds Internet Black Markets
- Nov 18 1 arrest in local burglaries
- Nov 15 How real is the threat of cyber terrorism?
- Nov 08 by James Jay Carafano, Ph.D., and Paul Rosenzweig Protecting Privacy and Providing Security: A Case of Sensible Outsourcing
- Nov 01 By Jim Kouri, CPP THE GLOBAL UNDERWORLD: Terrorists, Drug Traffickers and Organized Crime
- Oct 28 By Steven Branigan, Seth Fogie High-Tech Crimes Revealed: An Interview with Stephen Branigan
- Oct 26 Chris Goddard Rise up against globalisation of child porn
- Oct 12 Patrick Bellamy Interviewed by Patrick Bellamy
- Oct 11 Maya Babu, Mysore Grahakara Parishat What Is Cybercrime?
- Oct 09 Kathryn Kerr Putting cyberterrorism into context
- Oct 06 Robert B. Fried The Internet: A Breeding Ground for Online Pedophiles
- Oct 01 Andrey Belousov Significance of documentary evidence in cases of copyright and adjacent rights violations
- Sep 30 Vladimir Golubev Computer crimes in CIS countries
- Sep 30 Roberta Bragg Stopping Computer Crime, Part 2
- Sep 28 Dmitri Kramarenko Hackers or cyber-soldiers?
- Sep 28 Prepared Remarks of Attorney General John Ashcroft at the High Technology Crime Investigation Association 2004 International Training Conference
- Sep 27 Rajkumar Dubey India: Cyber Crimes “an unlawful act where in the computer is either a tool or a target or both” – In Indian Legal Perspective
- Sep 27 Louise I. Shelley Organized Crime, Terrorism and Cybercrime
- Sep 07 Victor Sabadash Planning and forecasting of the suppression of cybercrime
- Sep 01 Natalia Akhtyrskaya Ensuring the observance of civil rights while collecting of information using technical means
- Aug 31 Vladimir Golubev Cyberterrorism: concept, terms, counteraction
- Aug 30 Andrey Manoilo Methods of psychological warfare research
- Aug 21 Yvonne Gomez Singapore to implement national anti-terrorism strategy
- Aug 19 Denis Pankratov, Dmitri Kramarenko SMS spoofing - Q&A with CCRC staff
- Aug 13 Andrey Belousov Methods of evidence collecting and assigning in cases of copyright and adjacent rights violation
- Aug 05 Victor Sabadash Governmental Organizational Legal Measures to Protect Information Processes in Ukraine
- Aug 04 Eric Steven Raymond How To Become A Hacker
- Aug 02 Jonathan Peizer The Great Software Debate: Technology and Ideology
- Aug 02 Margaret A Healy Child pornography: an international perspective
- Jul 27 Natalya Aktyrskaya Technical and Legal Protection of Information
- Jul 20 Ben Wyld Cyberterrorism: fear factor
- Jul 20 Dmitri Kramarenko Phishing expedition
- Jul 19 Victor Sabadash Regulation of Social Information Legal Relations in Ukraine
- Jul 12 Andrey Belousov Definition of Computer Piracy, Carrying Out Expert Examination
- Jul 12 Vladimir Golubev Computer crime: threats and forecasts
- Jul 12 Patrick Bellamy JonBenet Ramsey - Exclusive Interview With Stephen Singular
- Jul 05 John Leyden Enforcement is key to fighting cybercrime
- Jul 03 Andrey Manoilo Psychological warfare management
- Jun 26 Natalya Akhtyrskaya Cryptographic Protection of Computer Information
- Jun 21 Gartner Group Inc. Phishing on the Rise
- Jun 16 Vladimir Golubev International Cooperation in Fighting Transnational Computer Crime
- Jun 09 Victor Sabadash Criminal Legal Description of Computer Crimes: Methods and Practice of Investigation
- Jun 09 John Blau, IDG News Service Viruses: From Russia, With Love?
- Jun 07 Dennis Fisher Fighting Back Against Cyber-Crime
- Jun 03 Andrey Manoilo State information-psychological warfare regulation
- Jun 01 Dennis Fisher Cyber-Cops Outgunned
- May 27 Natalya Akhtyrskaya Investigating Computer Crimes
- May 26 Peter McCutcheon Internet ushers in cyber crime age
- May 23 Andrey Belousov Organization of Information Security at Enterprises
- May 19 Brad Stone Soaking in Spam
- May 19 Vladimir Golubev E-Terrorism: problems of counteraction
- May 11 Andrey Manoilo Information psychological war
- May 07 What is a hacker?
- May 01 Victor Sabadash Subject of criminal activity in the sphere of computer technologies
- Apr 30 Lawrence Gordon, Robert Richardson Economics of Cybercrime
- Apr 27 Interview with the CCRC director
- Apr 26 The Council of Europe Cybercrime Convention
- Apr 23 Serge Krasavin, Ph.D. What is Cyber-terrorism?
- Apr 23 Natalya Akhtyrskaya Methods of proving guilt of suspects in cases of computer crimes
- Apr 19 Dr. Charles C. Palmer 'Hacking is a felony': Q&A with IBM's Charles Palmer
- Apr 19 Emmanuel Goldstein 'Hackers are necessary': Q&A with Emmanuel Goldstein of 2600: The Hacker's Quarterly
- Apr 19 Andrey Belousov Protection of Copyright and Adjacent Rights on the Net
- Apr 14 Vladimir Golubev, co-authored with M. Litvinov, S. Rogozin, E. Ryzhkov and others Activities of Criminal Investigative Units in the Sphere of Use of High Technologies: Organizational Tactical Basis
- Apr 13 Andrey Belousov Legal Control of Use of Internet Technologies
- Apr 09 Natalia Akhtyrskaya Collecting evidence while investigating computer crimes
- Apr 09 Robert Smith IT expert warns of cyber-crime threat
- Apr 08 Dr. Mudawi Mukhtar Elmusharaf Cyber Terrorism : The new kind of Terrorism
- Apr 07 Thomas Claburn Virtual Detective Tracks Scammers
- Apr 06 Victor Naumov Liability for computer crime in Russia
- Apr 06 George Negus Internet and crimes
- Apr 05 Victor Sabadash A Latency of Computer Crimes
- Apr 01 Michael Sasso Web Fraud Stings Couple
- Mar 18 Vladimir Golubev Criminalistic description of interference with work of computers without right
- Mar 16 Vladimir Golubev Problems of counteraction to computer crimes and cyber terrorism
- Mar 10 Judge Mohamed Chawki The Digital Evidence in the Information Era
- Mar 06 Victor Sabadash IT and organized crime
- Mar 04 Vladimir Golubev Criminal and Legal Aspects of Fighting Computer Crime
- Feb 16 John Thompson SYMANTEC CORP. On the record: John Thompson
- Feb 15 Vladimir Golubev Information protection in automated systems
- Feb 13 Victor Sabadash Criminalization of socially dangerous actions in high tech field
- Feb 12 Michael Smirnov Technology of counteraction to falsification of credit cards
- Feb 06 Guardian Unlimited Footprints on the disk
- Feb 02 Anna Mayorova 2003 year - the beginning of a new civil cyberwar
- Feb 02 James Thompson Cyber crime crackdown
- Jan 29 Vasili Polivanyuk Some aspects of international counteraction to crimes committed by using information technologies
- Jan 27 Andrey Belousov Problems of Software Market in Ukraine
- Jan 26 Looking at Cyberlaw
- Jan 25 Cyberterror: Clear and present danger or phantom menace?
- Jan 16 Victor Sabadash Criminalization of socially dangerous actions in high tech field
- Jan 16 Vladimir Golubev Computer Crime Typology
- Jan 15 Kim Tae-gyu Hackers Crack Cyberspace
- Jan 15 Maxim Serkov Swindlers caught red-handed suspected in stealing 0,5 million dollars
- Jan 12 Anna Mayorova 2003 year – the beginning of a new civil cyberwar
- Jan 09 Vladimir Golubev Computer Crime Typology
Copyright © 2001-2024 Computer Crime Research Center