podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
MSU Center For Cybercrime Investigation & Training
Shows
Crossing The Firewall
Illicit Markets, Drug Money & The Dark Web - Dr. Rasmus Munksgaard
The phrase "Dark Web" conjures images of shady websites, terrifying realities, and a criminal underground hidden away from the rest of the world. In some instances, this may be true. However, in most instances, the "Dark Web" is far from what Hollywood portrays. For example: can you really hire a hitman on the Dark Web? Probably not...those sites tend to be run by scammers or law enforcement agencies. On the other hand: Can you buy drugs on the Dark Web? Certainly...but you...
2025-07-30
57 min
Crossing The Firewall
The Incel Effect - Dr. Lisa Sugiura
Dr. Lisa Sugiura is an Associate Professor at the University of Portsmouth's School of Criminology and Criminal Justice. Dr. Sugiura's research expertise focuses on online gender-based violence and technology-facilitated sexual violence, specifically as it relates to women and girls. In this episode of Crossing the Firewall, Dr. Sugiura discusses the Incel subculture online and how it impacts relationships among the genders and the overlaps between the digital and physical worlds.----Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.edu
2025-07-17
1h 03
Crossing The Firewall
The Magic & Allure of Hacking - Dr. Max Kilger
The key to any good magic trick isn't the prop, it is the deception. To trick the audience into believing what they see and ignore what they don't. Much is the same with hacking, cybercrime...and concerningly cyber terror.Dr. Max Kilger joins the hosts of Crossing The Firewall to discuss how the magic and allure of hacking created the Hacker Community and how that is evolved - and in many ways lost its magic - into cybercrime.As the hacker community evolved into the cybercrime community overtime, something that the Crossing The Firewall hosts blame on the influx...
2025-07-02
46 min
Crossing The Firewall
Protect Your Business From Cyber Attacks - Dr. Tom Hyslip
Cybercrime continues to rapidly evolve, with law enforcement and cybersecurity experts racing to stay one step ahead of the latest emerging threats. Business owners and municipality managers often find themselves vulnerable to cyber attacks and are unsure of how best to protect their organizations. Oftentimes, budget constraints, lack of knowledge and training, and staffing limitations mean that cybercrime prevention rank low on the priority level for organizational leadership. None of them want to be victims of a cyber attack, but running an organization takes a lot of time and effort, leaving little time to think of these potential risks...
2025-06-18
1h 00
Crossing The Firewall
Persuasion, Deception & Data Security - Dr. Kevin Steinmetz
What does dressing like a janitor, carrying a ladder into a movie theater, and cybercrime all have in common? We can be easily deceived and persuaded into believing just about anything with relative ease.This phenomenon is called Social Engineering. Social Engineering is the use of deception and persuasion to convince individuals to give up information or be used to gain access to areas not generally available to the public.Some instances of Social Engineering may be harmless. You have likely seen the videos on YouTube, Instagram, or TikTok of pranksters carrying a ladder into a movie theater and...
2025-06-05
51 min
Crossing The Firewall
The Dark Side of Online Gaming - Dr. Asier Moneva
You're playing Call of Duty mobile, or maybe even Fortnite. You are crushing it, definitely the best you have played in a while...and then the dreaded happens...your internet starts lagging. Game over.Nothing is more frustrating than your game lagging, right Think again. In this episode of Crossing the Firewall, we speak with Dr. Asier Moneva to explore the murky waters where online gaming and cybercrime meet.From DDoS attacks, "Booting," and beyond. We discuss how online gaming has become fertile grounds for digital mischief...
2025-05-14
45 min
Crossing The Firewall
From Classroom to Crisis: Educating Cybersecurity - Dr. Nathan Fisk
How do we teach cybersecurity practitioners? How do we define cybersecurity education? We dive deep into why cybersecurity isn't just technical—it’s cultural, and why building hackers means building communities. From chaotic summer camps and Discord-powered learning hubs to the dangers of Cocomelon and algorithmic media, this episode tackles how education must evolve to meet a digital world that’s moving fast. Our guest, Dr. Nathan Fisk, is an Assistant Professor at the University of South Florida and Community and Outreach Liaison for Cyber Florida.Whether you're...
2025-05-01
53 min
Crossing The Firewall
Inside the Hacker Mind - Dr. Rutger Leukfeldt
You click the link in the email you received. It seems legit - from a former co-worker - you're just going to sign the documents and then get back to your day. Your computer shuts down. You can't click on the pop-up that is now covering your entire screen. It says that you have to pay $1,000 to unlock your computer, only payable in Bitcoin. You have until the end of the week. You realize you fell victim to a ransomware attack. Who would do this? Why would someone do this?You're not alone...
2025-04-16
44 min
Crossing The Firewall
Protect Your Online Identity - Dr. Jin Lee
Identity Theft isn't just a movie with Jason Bateman and Melissa McCarthy, it is a real issue people face every day...often with much less comedic and sentimental outcomes. Cybercriminals are always seeking new ways to gather enough personal information about you to steal your identity. Motivations vary, but it often involves financial gain. So, how do we combat this crime? How do we best protect ourselves? What are some things we are doing that make us easy targets? What can law enforcement do when we fall victim?We sat...
2025-03-26
58 min
Crossing The Firewall
Sextortion & Revenge Porn - Dr. Karen Holt
Dr. Karen Holt is an Assistant Professor in the School of Criminal Justice at Michigan State University and an expert in sexual deviance and how it relates to digital mediums.Sextortion (the threat of sharing sexually explicit material of a victim unless money or other products are provided) is an increasing threat to people of all ages. Law enforcement is attempting to respond to this increased threat, but also acknowledge that they need more resources and training to successfully do so. Dr. Karen Holt joins our hosts for a...
2025-03-07
49 min
Cybercrimeology
Building the Basics: Preparing Officers for the Present and Researching Training for the Future
About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcement, pointing out disparities in how local agencies handle these crimes.He highlighted the challenges agencies face in responding to cyber-enabled and cyber-dependent crimes, particularly in rural areas.Dr. Holt discussed the development of training modules covering both basic digital evidence handling and specialized topics tailored to agency needs.The conversation underscored the importance of bridging resource gaps between rural and...
2024-12-01
25 min
STEMPositiveDisruptor - MIA conversation with
Part 3 Transforming Learning: Privacy and Security - MIA conversation with Guy Huntington
HAS SCIENCE FICTION MERGED WITH REALITY🤔 Criminals are using AI powered tools and techniques to conceal their identities and it is now proving very difficult to investigate and prosecute a cybercrime when there are no suspects or evidence. For the past eight years, Guy Huntington has been thinking, writing, and searching for new pieces with which to rethink both human and AI System/Bot legal identities. Guy has used this to create a new learning architecture. All built on privacy by design. In this Part 3: Transforming Learning - MIA Conversation with Guy focuses on security and privacy of Mary Doe...
2024-11-07
31 min
Cybercrimeology
Bridging realities: The Convergence of Ideology and Cybercrime
Episode Notes:Dr. Tom Holt discussed the nascent stages of cybercrime research during his doctoral studies, highlighting its evolution into a more recognized and competitive field.He emphasized the growth of cybercrime studies and the challenges of carving a niche within an expanding academic and professional landscape.Dr. Holt pointed out the potential of interdisciplinary collaboration between social sciences and computer science as crucial for advancing cybercrime research.The importance of online subcultures and ideological spaces in cybercrime dynamics was discussed, noting their influence on criminal activities and group formations.He delved into the realm of ideologically motivated...
2024-04-01
31 min
Cybercrimeology
Twenty 21
More about our GuestsDr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.https://cj.msu.edu/directory/holt-thomas.htmlDr Yi Ting Chua is a research associate at the Cambridge Cybercrime Centreat the Department of Computer Science and Technology, Cambridge University.https://www.cl.cam.ac.uk/~ytc36/Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences.
2021-01-01
18 min
Cybercrimeology
Cybercrime Futures: Sect Social, Seek Global, Act Local.
More about our GuestsDr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University. https://cj.msu.edu/directory/holt-thomas.htmlDr. Hyunwook Chun is a Deputy Director at the Korean Institute of Criminology and affiliated professor at Dongguk University https://eng.kic.re.kr/. Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences. https://www.nscr.nl/en/a...
2020-12-15
26 min
Cybercrimeology
Getting started with Cybercrime Theory
Find out more about the guest:Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University. https://cj.msu.edu/directory/holt-thomas.html~~~~Texts Mentioned in this show:Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168~~~~~~~Deterrence Theory https://www.sciencedirect.com/topics/computer-science/deterrence-theoryGeneral Theory - Self control https://www.oxfordbibliographies.com/view/docu...
2020-03-15
48 min
Cyber Work
How to become a penetration tester | Guest Dr. Wesley McGrew
It’s been a while since we’ve talked penetration testing and offense-oriented network security on the show, and I know some of you have been asking for it, so today’s your lucky day! On the show we have Dr. Wesley McGrew, the director of Cyber Operations for HORNE Cyber. We’re going to talk about going on the offense as a good defense, the current state of pentesting and the raw work of reverse engineering malicious software and vulnerability testing. If you’re looking for the type of job that gets you out on the cyb...
2020-03-09
47 min