225-C18 - Cybercrime and Cyberdeviance Flashcards
Cybercrime
AKA…?
Illgeal activities carried out with a computer over a network (e.g. internet)
AKA computer crime
Name 2 examples of activities that constitute cybercrime:
- phishing
- ripping
- hacking
- luring
- stalking
- spamming
- skimming
- trafficking
- software piracy
- identity theft/fraud
- cyberterrorism
Phishing.
The use of misleading or counterfeit electronic transmissions, such as emails purportedly from credit card companies or other financial institutions, requesting sensitive personal information or password data, with the intention of compromising the victim’s banking or credit accounts.
e.g. “You are $284 dollars above credit. Please click here to learn more”
Ripping
The use of specially designed software or other methods of circumventing copyright protection for the purposes of downloading or copying original material from a protected media source (DVD, online video, etc.) to a hard disk, usually for the purpose of resale or redistribution.
Hacking
The attempt to remotely circumvent the security or privacy measures initiated by an Internet website, server, or database, for the purposes of either stealing information or interfering with operations and compromising data through distributed denial-of-service attacks, deployment of viruses, or other malicious actions.
Luring
the act of using an Internet connection to access social media, chat rooms, or other places of electronic assembly to make contact with a child or person under 16 for the purposes of counselling them to commit a sexual act or to meet at a physical location for sexual purposes. This is typically accomplished by the offender posing online as an underage person himself in order to conceal his real identity and intentions.
Stalking
The use of a computer or other network-enabled device to repeatedly make unwanted contact with a person using any number of means (e-mails, text messages, etc.), and doing so knowing that this behaviour is likely to cause fear or annoyance.
Spamming
The use of one or more computer networks and servers to send unsolicited and unwanted bulk messages to other users, often consisting of vexatious advertisements or pornographic content delivered either by e-mail or by pop-up windows in Internet browsers.
Skimming
The use of specific software and hardware to intercept e-transmissions containing sensitive financial data, usually related to credit card purchases. The stolen data enable the cloning or counterfeiting of specific financial instruments (credit cards, bank cards, etc.) for the purposes of theft and fraud.
Trafficking
Any use of a computer network to move illicit images (or other media), controlled substances, or people. In the context of cybercrime, trafficking can include examples like distributing child pornography; selling or distributing drugs via the portion of the “Deep Web” known as the “Dark Web”; or making contact with victims to “groom” them for human trafficking operations—essentially another version of luring but with different objectives and victims.
Software piracy
Software Piracy is the illegal approach of acquiring, sharing, copying, distributing, modifying, selling, or using the software which is legally protected by means of the Internet. This can also be done online (online software piracy) or offline (face-to-face software piracy). Software piracy is the equivalent of theft and is, therefore, a crime. Examples of both online and offline software piracy: an end-user installing a single-use license on multiple computers, a holidaymaker buying a pirated copy of a piece of software in the Far East where they engage in mass distribution of illegally obtained software.
Identity theft or identity fraud
are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In today’s advancements in technology, most of identity theft cases occurs online. Examples include stealing or exploiting personal information—such as your Social Security Number, bank account number, and credit card information etc for economic gain.
Cyberterrorism
Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government and the public in furtherance of political or social objectives. Examples include cyberterrorists targeting a water treatment plant, causing a regional power outage or disrupting a pipeline, oil refinery or fracking operation. Cyberterrorism is a type of cyber attack just like cyberespionage in which hackers attempt to gain access to sensitive or confidential data/information of a business or government entity for economic gain, competitive advantage or political reasons.
who defined cybercrime as “Any criminal offence or series of offences committed through the use of a computer and a computer network or Internet connection”?
Moore
Definition of Cyberterrorism according to Baranetsky
using a computer to orchestrate large-scale “attacks on information,” including government or critical infrastructure servers or any database of interest to national security
electronic crime
AKA…
Online crimes that are largely analogous to offline crimes of violence and sexual offending
AKA “e-crime”
what was the e-crime of Apr 2014 involving the CRA?
- heartbleed security bug got website
what was the e-crime of Dec 2013 involving Target?
hackers stole credit card info
what was the e-crime of may 2014 concerning five chinese military officers?
they comprimised the servers of US corporations to steal industrial secrets
what was the e-crime related to Feb 2015 with the Kaspesky Lab
long-term heist around the world
stole 1 billion dollars
critical infrastructure site
any location or asset, either physical or virtual, that is vital to the socio-economic and physical security of a nation or region
e.g.:
* treatment facilities
* telecommunications centres
* hospitals and health care facilities
* nuclear and other power-generating facilities
* airports and railway stations
* centres of major economic activity, such as stock and security exchanges.
cybercrime vs. cyberterrorism
cybercrime is a FORM of cyberterrorism
* more personal
* attacks individuals
explain how social media and computer access allows for antisocial online behaviours
- anonymity
- requires a broad understanding of the tech
deviant cybercommunities
- subcultural network
- people here want to exploit people in websites, social media, and other online tech
What are 4 kinds of digital paraphilia
- erotomania
- exhibitionism
- scopophilia
- scatalogia
erotomania in digital spaces
cyberstalking
exhibitionism in digital spaces
sexting
scopophilia in digital spaces
using smartphone to secretly record/photograph people
scatologia in digital spaces
cyberbullying, cybermobbing, and internet trolling
cyberbullying
definition
when people use tech to harass, threaten, or bully others
in KIDS, this is cyberbullying
in ADULTS, this is cyber-harassment
what is the difficulting in regulating cyberbullying?
- socially and politically charged ==> not easily defined in legislation
- need to be balanced with people’s privacy and freedom of expression.
name 2 causes of cyberbullying
- attention (likes, followers)
- transition from offline bullying
- anonymity
- emotional reason
- way to deal with boredom and access to tech
name 3 examples of cyberbullying
- abusive/threatening
- cyberstalking
- harmful rumours/gossips
- impersonation
- imitation/parodies
- harassment
- threats
- cyberteasing
- discriminatory communication
what are the four psychological impacts of cyberbullying?
what are some other effect of cyberbullying?
- suicide
- self-harm
- depression
- anxiety
- reduced self-worth
- fear of using online platforms
- feelings of anger and embarassment
how can we apply routine activities theory to online behaviour?
look at the routing activity (frequency of online visits), and arrange users in a continuum of risk tolerance by how online they are
what are some discriminatory forms of cyberbehaviour?
- homophobia
- sexism/misogyny
- religion
- race
T/F: men are more likely to be targets of cyberbullying/cyberharassment
FALSE. girls are more vulnerable to this