Out of Print--Limited Availability.
Select delivery location
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Something went wrong. Please try your request again later.

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking 1st Edition

3.5 3.5 out of 5 stars 4 ratings

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.

Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?

After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.

Read more Read less

Books with Buzz
Discover the latest buzz-worthy books, from mysteries and romance to humor and nonfiction. Explore more

Product details

  • Publisher ‏ : ‎ Auerbach Publications; 1st edition (December 11, 2008)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 279 pages
  • ISBN-10 ‏ : ‎ 1420086936
  • ISBN-13 ‏ : ‎ 978-1420086935
  • Item Weight ‏ : ‎ 14.4 ounces
  • Dimensions ‏ : ‎ 6 x 0.75 x 9 inches
  • Customer Reviews:
    3.5 3.5 out of 5 stars 4 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Raoul Chiesa
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

3.5 out of 5 stars
3.5 out of 5
4 global ratings

Top reviews from the United States

Reviewed in the United States on May 7, 2012
I am a graduate student in cybersecurity and purchased this book for research about the psychological profiling of cyber intrusion actors in the Human Aspects of Cybersecurity course I was taking. So many reformed hackers have objected to the term, "hacker," being used across the board, so the politically correct term used today is "actor." Referring to actors in the nomenclature allows for a discussion of an intrusion without needing to prematurely address cybercriminal subtypes.

This book discusses a taxonomy for profiling intrusion actors. Historically, the psychological profiling of criminals was adapted for cybercrime. Psychological profiling is not well suited to theoretical concepts since it is a practical application of psychology and cannot encompass the entire range of human functioning. For instance, Costa and McCrae's Five Factor Theory includes numerous factors tethered to personality and properties reliant on it, however, certain aspects of criminal behavior such as modus operandi are excluded. Such limitations in differing approaches exacerbate the schism that exists in profiling cybercriminals.

This book relies on the research conducted during the Hacker's Profiling Project (HPP) (which is still ongoing) that seeks to add other dimension(s) to profiling. Promoters of the HPP assert that further exploration is needed in profiling actors since such an undertaking is more multifaceted than previous models reveal. Rather than use a taxonomy that segregates actors by skills, knowledge, and motive, HPP adds both deductive methods (crime "scene" observations) and inductive methods (compiling data from biographical, questionnaires) as well as interviews of both former and current actors.

I recommend this book to anyone who is seeking to learn more about the hurdles in profiling cyberspace intrusion actors.
3 people found this helpful
Report
Reviewed in the United States on January 9, 2018
Absolute unscientific tripe.
Reviewed in the United States on July 17, 2020
I am a cyber-security student working on a research paper and already had the 2009 version of this book.
The principal reason for this review is so others won't buy the kindle book thinking it has updated material from the 2009 paperback version. I bought the Kindle book thinking they updated it, but it seems to be the same 2009 version I already have. This book contains a lot of information derived from hackers, honey-pot networks, and profiling techniques to understand hackers. Despite being 11 years old, it still contains relevant information about a variety of hacker related topics. All traces from the HPP project have dried up on the Internet except for what is in the Internet archive; I hoped this kindle book contained updated material. If someone has additional information please update it here.
Reviewed in the United States on August 23, 2010
This book is an excellent guide to familiarize oneself with the issues of cyberspace. It not only provides an overview of the history, ethics, and types of hacking but outlines the different actors, differentiates their actions, and proposes a typology. It is therefore one of the few books on this topic that moves beyond the anecdotal and is an attempt at a more substantive, long-term approach to examine critical issues tied to cyberspace, notably the profiling of criminal hackers. Written by an insider yet accessible to novices it is particularly the systematic overview of techniques and actors that are a strength of this book and make it a good read.
2 people found this helpful
Report