• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

Thomas Holt

Michigan State University
Thomas J. Holt is a professor in the School of Criminal Justice at Michigan State University whose research focuses on computer hacking, malware, and the role of the Internet in facilitating all manner of crime and deviance. His work has been published in various journals including Crime and Delinquency, Deviant Behavior, the Journal of Criminal Justice, and Youth and Society. He holds B.S., M.A., and Ph.D. degrees from the University of Missouri.

Thomas Holt

[email protected]
Google Scholar

Michigan State University

Investigator

  • Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service
  • CINA Distinguished Speaker Series: “Understanding the Organization and Economy of Underground Online Markets” with Tom Holt (full video)
  • Highlights – CINA Distinguished Speaker Series: “Understanding the Organization and Economy of Underground Online Markets” with Tom Holt
  • CINA Research Findings with Tom Holt: “Understanding Cryptomixing Services in Context of the Open and Dark Web”
  • CINA Research Findings: “Understanding Booter and Stresser Services To Engage in Cybercrime”

Author

  • Open, Deep, and Dark: Differentiating the Parts of the Internet Used for Cybercrime
  • Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service
  • Counterfeit Identity Documents on the Open and Dark Web
  • A Glossary of Terms Used in Online Illicit Market Operations
  • An Assessment of Cryptomixing Services in Online Illicit Markets
  • A Crime Script Model of Dark Web Firearms Purchasing
  • An Assessment of the State of Firearm Sales on the Dark Web
  • Assessing the Practices of Online Counterfeit Currency Vendors
  • Exploring Risk Avoidance Practices Among On-Demand Cybercrime-as-Service Operations
  • A Crime Script Analysis of Counterfeit Identity Document Procurement Online
  • An Assessment of Hitmen and Contracted Violence Providers Operating Online

Research Areas:

  • Financial crime

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube