Author Archives: Tom Holt

Dr. Thomas J. Holt is an Associate Professor in the School of Criminal Justice at Michigan State University specializing in cybercrime, cyberterror, and technology. His research focuses on computer hacking, malware, and the role that technology and the Internet play in facilitating all manner of crime and deviance. Dr. Holt has been published in a variety of academic journals, including Crime and Delinquency, Deviant Behavior and the Journal of Criminal Justice. He is also the editor of the book Crime On-line: Correlates, Causes, and Context (Carolina Academic Press), co-editor of Corporate Hacking and Technology Driven Crime (IGI-Global), and a co-author of the book Digital Crime and Digital Terror (Pearson). He is the project lead for the Spartan Devils Honeynet Project, a joint project of Michigan State University, Arizona State University, and private industry, and a member of the editorial board of the International Journal of Cyber Criminology. He received his Ph. D. in criminology and criminal justice from the University of Missouri-Saint Louis in 2005.

Examining Willingness to Attack Critical Infrastructure On and Off-line

The global adoption of technology over the last two decades has radically altered the way individuals, businesses, and governments communicate. Access to high speed wireless connectivity, tablet PCs, and smart phones enable individuals to be in constant contact with others in near-real time and access nearly any data source of interest. As a consequence, cyberspace […]

Posted in Analysis | Tagged , , , | Territories: , , , | : | Comments closed

The Intersections of Technology, Crime, and Terror

As technology plays an increasingly important role in everyday life, the Internet, computers, and telephony are increasingly co-opted by criminals, extremists, and terror organizations in order to operate more efficiently. In particular, extremist and terror groups have begun to use technology as a means for communications, fundraising, and information gathering due to the anonymity it […]

Posted in Analysis | Tagged , , , , | Territory: | : | Comments closed
  • Navigate to regional portals

    North America Middle East South Asia Europe
  • Latest analysis from our experts

    Paul Kamolnick · United States
  • Get our Extremism Tracker Email

    * indicates required