Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/33/71/87/33718735-87cb-4b10-4a8f-4075856dd261/mza_14396921831542162912.jpg/600x600bb.jpg
Crossing The Firewall
MSU Center for Cybercrime Investigation & Training
16 episodes
3 days ago
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
Show more...
True Crime
RSS
All content for Crossing The Firewall is the property of MSU Center for Cybercrime Investigation & Training and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
Show more...
True Crime
Episodes (16/16)
Crossing The Firewall
Ransomware, Crypto & AI - Ep. 16

You arrive to your desk after a tiring commute where at least three people cut you off on the freeway and the coffee shop got your order wrong (again). That's okay, though, you made it in and are ready to start your day.


The computer boots up, then flashes to a screen you haven't seen before. Now a message shows up on screen, "Access Denied." Panicked, you contact your IT Department. Your organization is the victim of a ransomware attack.


What do you do?


Dr. David Decary-Hetu, Professor at the School of Criminology at the University of Montreal and an expert in ransomware attacks, breaks down how these attacks happen on organizations and what the aftermath is.


Ransomware is not new. However, in the age of Cryptocurrencies and Artificial Intelligence, Ransomware-As-A-Service is emerging. This is causing organizations, researchers, and law enforcement to adapt and find new ways to combat this cybercrime.


----


Dr. Decary-Hetu is a Professor at the School of Criminology at the University of Montreal whose research focuses on criminal networks, criminal markets, cybercrime, and financial data theft.


Dr. Decary-Hetu is also the Chair of the ASC Division of Cybercrime.


Learn more: https://www.cicc-iccc.org/en/people/regular_researchers/david_decary_hetu


ASC Division of Cybercrime: https://ascdivisionofcybercrime.org/


----


Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.edu


Advance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation


----


Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn.


Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.


All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.


Show more...
1 week ago
45 minutes 42 seconds

Crossing The Firewall
Policing & Preventing Online Crimes Against Children

Children are interacting with digital devices younger than ever before. While there may be some benefits related to learning on digital devices, the risk of children being victimized online continues to rise.


Predatory behavior targeted at children online is a parent's worst nightmare. How do we protect children from online predators? How do we stop these predators from engaging with children in the first place? What can we do to stop this compared to what law enforcement can do?


Our guest this week, Dr. Kate Seigfried-Spellar (Professor in the MSU School of Criminal Justice) answers these questions based on her experience as a researcher and a practitioner.


----


Dr. Seigfried-Spellar is a Professor in the Michigan State University School of Criminal Justice. Her research interests and methods combine behavioral sciences, social sciences, artificial intelligence, biometrics, natural language processing, and digital forensics.


Learn more: https://cj.msu.edu/directory/seigfriedspellar-kate.html


----


Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.edu


Advance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation


----


Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn and Facebook.


Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.

Show more...
3 weeks ago
40 minutes 12 seconds

Crossing The Firewall
Human & Robot Factors in Data Protection - Dr. George Burruss

Concern about data privacy, security, and victimhood vary from person to person. How much we are willing to do to avoid being a victim of cybercrime also varies. Why?


The Protection Motivation Theory (PMT) describes this phenomenon well and provides some answers about why or why not people will protect themselves from a particular threat.


This week's guest Dr. George Burruss (Professor and Chair of the Department of Criminology at the University of South Florida) discusses how PMT can help researchers and practitioners understand data protection risks.


---


Learn more about Dr. George Burruss: https://www.usf.edu/cbcs/criminology/faculty-staff/g-burruss.aspx


---


Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
1 month ago
56 minutes 5 seconds

Crossing The Firewall
Policing Cybercrime: An International Effort - Michael Newman

This week's episode of Crossing the Firewall examines the intersection of community policing, evidence-based policing, and cybercrime. With the internet being global, an international collaborative effort is required to combat the evolution of cybercrime.Michael Newman is a Detective Chief Inspector with over 30 years policing experience. Mike is currently an Intelligence Operations Manager committed to working with police agencies across the globe to identify and investigate cybercrime.Learn more about the Michael and the Global Consortium Group: https://www.globalconsortiumgroup.com/----Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.


All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.


Show more...
1 month ago
36 minutes 23 seconds

Crossing The Firewall
The Cybercrime Power Hour

This special episode of Crossing The Firewall features not one, not two, but four guests! Rutger and Jin return for their second episode, while Thomas and Cassandra join our hosts for their first appearance on the podcast.


In this episode, the team discusses Nation State Cyberattacks, Age Verification Laws, and parenting in the internet age. You wont want to miss this wide ranging discussion!


----


Meet our guests!Rutger Leukfeldt is a Professor with Leiden University - https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1

Jin Lee is an alum of the MSU School of Criminal Justice and an Assistant Professor at George Mason University. - https://cls.gmu.edu/people/jlee331

Thomas Dearden is an Assistant Professor at Virginia Tech - https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html

Cassandra Cross is a Professor at the Queensland University of Technology - https://www.qut.edu.au/about/our-people/academic-profiles/ca.cross

----


Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on Facebook and LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.


All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.


Show more...
2 months ago
1 hour 18 minutes 38 seconds

Crossing The Firewall
Fraud In The Age of AI - Dr. Mark Button

Dr. Mark Button is a Professor in the School of Criminology and Criminal Justice, University of Portsmouth. Dr. Button is also the Director of the Centre for Cybercrime and Economic Crime, which focuses on research, teaching and knowledge services in counter fraud and related issues.Learn more about Dr. Button: https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/mark-buttonLearn more about the Centre: https://www.port.ac.uk/research/research-groups-and-centres/centre-for-cybercrime-and-economic-crime ----Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn and Facebook. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
2 months ago
57 minutes 50 seconds

Crossing The Firewall
Illicit Markets, Drug Money & The Dark Web - Dr. Rasmus Munksgaard

The phrase "Dark Web" conjures images of shady websites, terrifying realities, and a criminal underground hidden away from the rest of the world.


In some instances, this may be true. However, in most instances, the "Dark Web" is far from what Hollywood portrays.


For example: can you really hire a hitman on the Dark Web? Probably not...those sites tend to be run by scammers or law enforcement agencies.


On the other hand: Can you buy drugs on the Dark Web? Certainly...but you can also buy them on regular social media sites, too.


So, why do some individuals choose to sell through the dark web? How do these markets even form? How are these "businesses" run? Why do these websites look so professional, almost like an Amazon storefront? Dr. Rasmus Munksgaard joins us for this episode of Crossing The Firewall to answer all of your burning questions related to illicit markets on the Dark Web.


----

Dr. Rasmus Munksgaard is an Associate Professor in the Department of Sociology & Social Work at Aalborg University in Denmark. Dr. Munksgaard research focuses on illicit markets both online and offline.

Learn more about Dr. Rasmus Munksgaard: https://vbn.aau.dk/en/persons/ramuan

----

Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
3 months ago
57 minutes 4 seconds

Crossing The Firewall
The Incel Effect - Dr. Lisa Sugiura

Dr. Lisa Sugiura is an Associate Professor at the University of Portsmouth's School of Criminology and Criminal Justice. Dr. Sugiura's research expertise focuses on online gender-based violence and technology-facilitated sexual violence, specifically as it relates to women and girls.


In this episode of Crossing the Firewall, Dr. Sugiura discusses the Incel subculture online and how it impacts relationships among the genders and the overlaps between the digital and physical worlds.


----Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.edu


Advance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation


----


Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn.

Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.


All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
3 months ago
1 hour 3 minutes 16 seconds

Crossing The Firewall
The Magic & Allure of Hacking - Dr. Max Kilger

The key to any good magic trick isn't the prop, it is the deception. To trick the audience into believing what they see and ignore what they don't. Much is the same with hacking, cybercrime...and concerningly cyber terror.Dr. Max Kilger joins the hosts of Crossing The Firewall to discuss how the magic and allure of hacking created the Hacker Community and how that is evolved - and in many ways lost its magic - into cybercrime.As the hacker community evolved into the cybercrime community overtime, something that the Crossing The Firewall hosts blame on the influx of money into the hacking community, and what the cybercrime community may be evolving into next. Dr. Max Kilger: https://business.utsa.edu/faculty/profiles/kilger-max.html----Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
4 months ago
46 minutes 56 seconds

Crossing The Firewall
Protect Your Business From Cyber Attacks - Dr. Tom Hyslip

Cybercrime continues to rapidly evolve, with law enforcement and cybersecurity experts racing to stay one step ahead of the latest emerging threats. Business owners and municipality managers often find themselves vulnerable to cyber attacks and are unsure of how best to protect their organizations. Oftentimes, budget constraints, lack of knowledge and training, and staffing limitations mean that cybercrime prevention rank low on the priority level for organizational leadership. None of them want to be victims of a cyber attack, but running an organization takes a lot of time and effort, leaving little time to think of these potential risks. Dr. Tom Hyslip is former law enforcement and an Assistant Professor at the University of South Florida. In this episode, Dr. Hyslip discusses how he got involved in cybercrime prevention and how he now uses his experience in law enforcement to teach students, organizational leaders, and the community on how to protect themselves from becoming the next victim of a cyber attack. ----Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
4 months ago
1 hour 22 seconds

Crossing The Firewall
Persuasion, Deception & Data Security - Dr. Kevin Steinmetz

What does dressing like a janitor, carrying a ladder into a movie theater, and cybercrime all have in common? We can be easily deceived and persuaded into believing just about anything with relative ease.This phenomenon is called Social Engineering. Social Engineering is the use of deception and persuasion to convince individuals to give up information or be used to gain access to areas not generally available to the public.Some instances of Social Engineering may be harmless. You have likely seen the videos on YouTube, Instagram, or TikTok of pranksters carrying a ladder into a movie theater and no one questions them about where they are going or what they are doing. This works because when we see someone with a ladder, we assume they know what they are doing and are going to fix an issue.When we receive an email that we believe is from our boss asking us to move money into a different account or sign certain documents, we may do so without asking any questions. After all, it is our boss. However, some cybercriminals are using Social Engineering to their advantage. Posing as someone of authority and gaining access to private data. In this episode of Crossing the Firewall, Dr. Kevin Steinmetz joins us to discuss Social Engineering and how we can prevent ourselves from falling victim. ---Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
5 months ago
51 minutes 31 seconds

Crossing The Firewall
The Dark Side of Online Gaming - Dr. Asier Moneva

You're playing Call of Duty mobile, or maybe even Fortnite. You are crushing it, definitely the best you have played in a while...and then the dreaded happens...your internet starts lagging.

Game over.


Nothing is more frustrating than your game lagging, right Think again. In this episode of Crossing the Firewall, we speak with Dr. Asier Moneva to explore the murky waters where online gaming and cybercrime meet.


From DDoS attacks, "Booting," and beyond. We discuss how online gaming has become fertile grounds for digital mischief - and sometimes criminal careers.


Whether you're a gamer yourself, a parent, law enforcement, or are just curious about the dark side of the internet, this episode is for you.


---


Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn.

Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.

All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
5 months ago
45 minutes 30 seconds

Crossing The Firewall
From Classroom to Crisis: Educating Cybersecurity - Dr. Nathan Fisk

How do we teach cybersecurity practitioners? How do we define cybersecurity education?

We dive deep into why cybersecurity isn't just technical—it’s cultural, and why building hackers means building communities. From chaotic summer camps and Discord-powered learning hubs to the dangers of Cocomelon and algorithmic media, this episode tackles how education must evolve to meet a digital world that’s moving fast.

Our guest, Dr. Nathan Fisk, is an Assistant Professor at the University of South Florida and Community and Outreach Liaison for Cyber Florida.



Whether you're a parent, educator, student, or just a curious mind—this one’s for you. Hit play, embrace the chaos, and let’s reimagine what cybersecurity education should look like.

Show more...
6 months ago
53 minutes 54 seconds

Crossing The Firewall
Inside the Hacker Mind - Dr. Rutger Leukfeldt

You click the link in the email you received. It seems legit - from a former co-worker - you're just going to sign the documents and then get back to your day.

Your computer shuts down. You can't click on the pop-up that is now covering your entire screen. It says that you have to pay $1,000 to unlock your computer, only payable in Bitcoin. You have until the end of the week.

You realize you fell victim to a ransomware attack. Who would do this? Why would someone do this?

You're not alone in asking why. It is one of the fundamental question of criminologists and cybercrime researchers.


In this episode of Crossing the Firewall, we get inside the mind of hackers and cybercriminals with Dr. Rutger Leukfeldt. As one of the leading cybercrime researchers in the world, Rutger regularly works with the public to help us understand the motivations of hackers and how to protect ourselves from potential attacks.

Dr. Leukfeldt is a Professor at the Hague University of Applied Sciences (The Netherlands). His research primarily focuses on the human element of cybercrime, specifically the motivations and connections of hackers.


Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn.


Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas.


All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Show more...
6 months ago
44 minutes 58 seconds

Crossing The Firewall
Protect Your Online Identity - Dr. Jin Lee

Identity Theft isn't just a movie with Jason Bateman and Melissa McCarthy, it is a real issue people face every day...often with much less comedic and sentimental outcomes.

Cybercriminals are always seeking new ways to gather enough personal information about you to steal your identity. Motivations vary, but it often involves financial gain.

So, how do we combat this crime? How do we best protect ourselves? What are some things we are doing that make us easy targets? What can law enforcement do when we fall victim?


We sat down with Dr. Jin Lee, an Assistant Professor in the Department of Criminology, Law and Society at George Mason University. Dr. Lee's research focuses on a range of topics within cybercrime and cybersecurity, including law enforcement competencies and perceptions of online crime; computer hacking and the role of the Internet in facilitating criminal and deviant behaviors; online illicit market activities; ideologically motivated cyberattacks; and online interpersonal violence offending and victimization.


The Crossing the Firewall podcast is hosted and produced by the Michigan State University Center for Cybercrime Investigation & Training.


You can follow the Crossing the Firewall podcast on Instagram and Bluesky. The Center for Cybercrime Investigation & Training can be found on Instagram and LinkedIn.

Show more...
7 months ago
58 minutes 27 seconds

Crossing The Firewall
Sextortion & Revenge Porn - Dr. Karen Holt

Dr. Karen Holt is an Assistant Professor in the School of Criminal Justice at Michigan State University and an expert in sexual deviance and how it relates to digital mediums.


Sextortion (the threat of sharing sexually explicit material of a victim unless money or other products are provided) is an increasing threat to people of all ages. Law enforcement is attempting to respond to this increased threat, but also acknowledge that they need more resources and training to successfully do so.


Dr. Karen Holt joins our hosts for a discussion on Sextortion and Revenge Porn. In this episode, Dr. Holt shares ways that cyber-criminals are targeting potential victims and what we can do to protect ourselves from this increasing threat. The team also discusses what law enforcement officers need to know to help combat these crimes.



The Crossing the Firewall podcast is hosted and produced by the Michigan State University Center for Cybercrime Investigation & Training.

Show more...
8 months ago
49 minutes 14 seconds

Crossing The Firewall
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.