
The Gary McKinnon case
Between 2001 and 2002, a British national gained unauthorized access to 97 U.S. military and NASA computers and other government networks, in search of UFO evidence and other conspiracy theories…
Between 2001 and 2002, a British national gained unauthorized access to 97 U.S. military and NASA computers and other government networks, in search of UFO evidence and other conspiracy theories…
In a previous article, we have seen how cybercrime is, by nature, difficult to define. However, criminologists have successfully categorized different generations of cybercriminals and constantly observe their evolution compared…
The defining characteristic of cybercrime is that the criminal activity rests upon Internet-connected technology. The Internet is, after all, a set of informational protocols enabling computers to communicate with each…
Kevin Mitnick is one of the most well-known figures in the history of hacking and cybersecurity. His life story reads like a cyber-thriller, and he influenced how the public and…
Last week, I attended a training session on link analysis with TXLEAN – the Texas Law Enforcement Agency Network. Link analysis is a valuable and powerful tool to fight traditional…
In January, I started attending police-led training on CDR analysis through the American Association of Crime Analysts. This topic is particularly fascinating for anyone with a background in working with…
Articles you can enjoy without specific knowledge
Start learning new topics from their basic concepts
Get into the nitty-gritty of things with advanced topics
Crack your knuckles and get ready on your terminal