The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
This week's episode of Crossing the Firewall examines the intersection of community policing, evidence-based policing, and cybercrime. With the internet being global, an international collaborative effort is required to combat the evolution…
This special episode of Crossing The Firewall features not one, not two, but four guests! Rutger and Jin return for their second episode, while Thomas and Cassandra join our hosts for their first appearance on the podcast.In this episode, t…
Dr. Mark Button is a Professor in the School of Criminology and Criminal Justice, University of Portsmouth. Dr. Button is also the Director of the Centre for Cybercrime and Economic Crime, which focuses on research, teaching and knowledge s…
The phrase "Dark Web" conjures images of shady websites, terrifying realities, and a criminal underground hidden away from the rest of the world. In some instances, this may be true. However, in most instances, the "Dark Web" is far from wh…
Dr. Lisa Sugiura is an Associate Professor at the University of Portsmouth's School of Criminology and Criminal Justice. Dr. Sugiura's research expertise focuses on online gender-based violence and technology-facilitated sexual violence, sp…
The key to any good magic trick isn't the prop, it is the deception. To trick the audience into believing what they see and ignore what they don't. Much is the same with hacking, cybercrime...and concerningly cyber terror.Dr. Max Kilger joi…
Cybercrime continues to rapidly evolve, with law enforcement and cybersecurity experts racing to stay one step ahead of the latest emerging threats. Business owners and municipality managers often find themselves vulnerable to cyber attacks…
What does dressing like a janitor, carrying a ladder into a movie theater, and cybercrime all have in common? We can be easily deceived and persuaded into believing just about anything with relative ease.This phenomenon is called Social Eng…
You're playing Call of Duty mobile, or maybe even Fortnite. You are crushing it, definitely the best you have played in a while...and then the dreaded happens...your internet starts lagging. Game over.Nothing is more frustrating than your g…
How do we teach cybersecurity practitioners? How do we define cybersecurity education? We dive deep into why cybersecurity isn't just technical—it’s cultural, and why building hackers means building communities. From chaotic summer camps an…
You click the link in the email you received. It seems legit - from a former co-worker - you're just going to sign the documents and then get back to your day. Your computer shuts down. You can't click on the pop-up that is now covering you…
Identity Theft isn't just a movie with Jason Bateman and Melissa McCarthy, it is a real issue people face every day...often with much less comedic and sentimental outcomes. Cybercriminals are always seeking new ways to gather enough persona…
Dr. Karen Holt is an Assistant Professor in the School of Criminal Justice at Michigan State University and an expert in sexual deviance and how it relates to digital mediums.Sextortion (the threat of sharing sexually explicit material of a…