Chapter 3: Cybercrime: globalisation, power and harm in the new media age. BLOCK 1, BOOK 1 Flashcards
DIFFERENT TYPES OF CYBERCRIME AND HARMS.
DEVELOPMENT AND IMPACT OF ‘INFORMATION AND COMMUNICATION TECHNOLOGIES’ (ICT’s).
(CASTELLS, 2009)
- Development of information and computer technologies (ICT’s) impacts on areas of the social, cultural, economic, and political (CASTELLS, 2009)
- We live in in an information/knowledge society - i.e a digital world.
- The Information era - changes the nature and patterns of criminal behaviour
- The information era - also presents new challenges for CRIME PREVENTION and CRIME CONTROL.
- The internet brings perpetrators and victims into contact and makes it difficult for perpetrators of ‘ONLINE VICTIMISATION’ to be identified.
- So, people in their own ‘SAFE SPACE’ of home (LOCAL) are vulnerable to intrusion from people in other countries (GLOBAL).
GROWING DIMENSIONS OF CYBERCRIME.
Including statistics of COMPUTER ACCESS and PATTERNS OF COMPUTER USE (ITU, 2012)
- The internet is a global network - a ‘network of networks’ (CASTELLS, 2003)
- Information and computer technologies (ICT’s) are used in financial markets, military, governments, business and universities etc.
- UNEQUAL ACCESS of the internet follows lines of existing ‘SOCIAL EXCLUSION’ within individual countries.
- STATISTICS : (ITU, 2012)
a) EUROPE - 70% of households have access to the internet
b) AFRICA - 6% have access to the internet.
c) 2012 - 2.4 billion - 34.3% of the global population had access to internet.
FACTORS:
Employment/income/education/ethnicity/disability are reflected in ‘PATTERNS OF INTERNET USE’. In criminology this is important as it tells us about the potential of both cyber criminals and cyber victims.
MOST PEOPLE ONLINE PER 100 people:
a) Iceland - 97
b) Norway 95
c) Sweden - 95
d) Denmark - 95
UK in tenth position with 90.
DEFINITIONS OF CYBERCRIME
- Term ‘CYBERCRIME’ does not refer to a single activity of ILLEGAL ACTIVITY.
- It covers a ‘wide range of offences’ that are legally defined as crimes carried out using the internet through various devices.
- These crimes are carried out over social media platforms such as twitter, as well as email and instant messenger.
- CYBERCRIME - Illegal acts committed with the assistance of, or by means of, the internet.
DEBATES FOR CRIMINOLOGISTS AROUND CYBERCRIME.
- CRIMINOLOGISTS - consider if the growth of the internet has transformed ‘PATTERNS OF ILLEGAL ACTIVITY’
- They also debate if this has generated ‘NEW FORMS OF CRIME’ and created ‘NEW CHALLENGES FOR POLICING AND SECURITY (WALL, 2007).
- Some think that new and distinctive forms of criminal activity emerge in cyberspace and that new criminal vocabulary to describe this is required - for example SNYDER, 2011.
- Others - See CYBERCRIME as ‘familiar’ criminal activities pursued with the help of new tools and techniques, for example GRABOSKY, 2001.
CLASSIFICATIONS OF CYBERCRIMES - These are classified by and distinguished between by (WALL,2001):
WALL, 2001 distinguishes between:
- COMPUTER-INTEGRITY CRIMES
- COMPUTER-ASSISTED CRIMES
- COMPUTER-CONTENT CRIMES
.
- COMPUTER-INTEGRITY CRIMES (WALL,2001):
a) spreading MALWARE/viruses/worms,Trojans
b) Denial-of-service’ attacks
c) hacking
- COMPUTER-INTEGRITY CRIMES - aimed at both the network and hardware/software.
EXAMPLES include:
a) THE SPREADING OF MALWARE - i.e viruses, worms, Trojans to affect the operation of the devices.
b) DENIAL-OF-SERVICE attacks - to force the web-based services offline by flooding them with unmanageable communication requests.
c) HACKING - Unauthorised access to, and potential interference with a computer system.
POINTS:
A) Computer-integrity crimes generate new kind of victimisation targeting states,businesses and individual computer users
B) This form of CYBERCRIME both entrenches existing patterns of POWER, i.e) the states control over its citizens
and
enables the ‘powerless’ such as political protest movements and activist groups to use hacking to publicise their causes on a local and global scale.
- COMPUTER-ASSISTED CRIMES (WALL, 2001):
A) Online Theft
B) Online Fraud
C) Online Interpersonal victimisation
- COMPUTER-ASSISTED CRIMES - reworking various forms of theft, fraud, and interpersonal victimisation.
EXAMPLES of theft and fraud of include:
a) goods, services, money, finance and information (i.e, confidential data, personal data, bank details etc).
EXAMPLES of INTERPERSONAL VICTIMISATION include:
b) sexual harassment, virtual abuse, cyberstalking, cyberbullying, cybersexploitation, virtual child abuse, and online grooming.
Examples of ONLINE FRAUD include:
- Auction fraud
- Retail fraud
- Government official scams and online victimisation - elderly are the most victimised as they are the most trusting and are assumed to be more wealthy.
- Dating and Romance scams - the elderly, divorced and widows are the most victimised.
- Computer-assisted crimes such as theft can intersect with computer integrity crime such as hacking as theft is an important motive for hacking, both on an individual and collective basis (CHOO, 2008).
- COMPUTER-CONTENT CRIMES (WALL, 2001):
a) obscene and violent pornography
b) child sexual abuse (CSA) imagery
C) Terrorist DISCOURSE
d) Hate speech
- These centre on the ‘content’ of computerised communication itself.
- Communication that breaches legally defined limits on speech that are considered harmful to society.
EXAMPLES of this include:
a) OBSCENITY AND VIOLENT PORNOGRAPHY - The circulation of obscene and violent images.
b) CHILD SEXUAL ABUSE (CSA) IMAGERY - Sexualised images of children
c) TERRORIST DISCOURSE - Expressions that incite political violence such as terrorism
d) HATE SPEECH - against ethnic, religious, sexual, or other minorities.
HOW THE ‘REPACKAGING’ OF FAMILIAR CRIMES THROUGH ‘RELOCATION’ INTO CYBERSPACE TRANSFORMS THESE CRIMES IN SIGNIFICANT WAYS.
DEBATE: QUESTION TO CONSIDER:
Does ‘cybercrime’ just reproduce existing crimes, or does this mean that new crimes are produced as a result of cybercrime?
- Offenders can make their pitches electronically to millions of victims at the same time through spam emails, text messages, social media.
- Increasing use of ICT’s for financial transactions makes users vulnerable to theft of sensitive information, i.e credit card and bank account details.
- People are more vulnerable to bullying, abuse, and threats through electronic communication channels.
- Offences can be committed at a distance and does not have to come into contact with the victim.
- ‘PATTERNS OF ONLINE VICTIMISATION’ are complex. They reflect UNEQUAL POWER RELATIONS that exist offline. The elderly, children, young people, women, and ethnic and sexual minorities suffer disproportionate levels of harm.
- Networked communications allow content to be globally spread.
- Such communications grant perpetrators a degree of anonymity that makes them difficult to identify and prosecute.
THE INTERNET AND ITS IMPORTANT ROLE IN GLOBALISATION.
- Increasing ‘interconnectedness’ between societies means events in one part of the world affect societies in others (Bayliss and Smith, 1997).
- Internet plays a key role in the globalisation of economies, politics, culture, and crime.
- By crime - the internet connects perpetrators and victims across huge distances (AAS, 2007).
- Differences between laws and enforcement strategies across countries add to the challenges cybercrime presents.
THE INTERNET AND THE UK (THE LOCAL)
- The internet and ICT’s touch most areas of our daily lives, i.e mobile phones/smart phones.
- Most people in UK use internet to study,work, shopping, socialising, entertainment etc
- As a consequence - most people are affected to some degree by risk and harm associated to use of the internet, while at the same time enjoying its benefits.
- HOWEVER - not everyone has EQUAL ACCESS to the internet in the UK and this may leave some people feeling isolated from a range of opportunities others take for granted.
- ‘HACKING’ - A COMPUTER-INTEGRITY CRIME:
- Unauthorised access to, and potential interference with a computer system.
- HARMS resulting from hacking include:
a) causing websites to crash through ‘denial of service attacks’.
b) widespread distribution of viruses and malware
c) Exploitation through victimisation - unevenly distributed victimisation of the least experienced computer users, younger people, the elderly, those with poor educational levels. - HACKING: INDEPENDENT DEFINITION - Hacking generally refers to unauthorised intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system. Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes (REF - TECHNOPEDIA website)
;
EXAMPLES OF HACKING:
NOTE: - The availability of techniques for HACKING, INTRUSION, and DISRUPTION entrench EXISTING PATTERNS of POWER already evident within societies
and
enable the POWERLESS to engage in conflict with and resist POWERFUL STATES. They would not be able to do this otherwise, i.e ACTIVIST GROUPS.
- CYBER-WARFARE - state actors target other governments, foreign citizens, and members of their own population.
a) EXAMPLE - Nuclear facility in Iran realised its computer systems had been infected by malicious software called STUXNET (FARWELL, 2011).
b) and Edward Snowdon leaked documentation claiming mass surveillance by the NSA and GCHQ in the UK - CYBER-TERRORISM - attacks by terrorist groups with a political agenda could use internet to cripple nations electronic infrastructure (VERTON, 2003).
a) However, there are not many instances of cyber attacks by terrorists as they prefer to stick to more conventional methods of violence and intimidation.
b) However - many states have introduced laws to combat cyber-terrorism, spending lots of money to protect computer systems against cyber attacks. - ACTIVIST GROUPS - Social and political protest movements see ACTIVIST GROUPS using HACKING techniques to publicise their causes, such as resistance to oppression and injustice.
EXAMPLE - ‘ELECTRONIC DISTURBANCE THEATRE’ - A cyber activist group used ‘denial-of-service’ attacks to shut down Mexican government websites.
This was in support of a land rights movement that aimed to secure access to farmland for Mexico’s poor and marginalised rural groups (PICKERILL, 2006)
EXAMPOLE - WIKILEAKS - released classified intelligence documents than the rest of the world combined (WIKILEAKS, 2015).
SURVEILLANCE AND MONITORING OF COMPUTER USERS ONLINE ACTIVITIES: This refers to ‘POWER’.
QUESTION FOR DEBATE - Is there a need for STATE BODIES/GOVERNMENTS to have sweeping access to users online communications?
- These measures/laws are controversial as they involve intensive and extensive surveillance and monitoring of computer users online.
This places computer users ‘right to privacy’ in jeopardy
EXAMPLE - In UK, Conservatives proposed ‘DRAFT COMMUNICATIONS DATA BILL’ (dubbed THE SNOOPERS CHARTER) to collect and retain detailed records of users browsing activities, emails, and messages. This was met with huge resistance from civil rights campaigners and was rejected.
- ANSWER FOR DEBATE - A balance needs to be struck, as governments may need to access private records such as telephone or email data, for purposes of national security.
However- citizens have the right to expect that this access will not be unlimited, and will be subject to legal controls where there must be reasonable level of suspicion for access to be granted.
CHILD SEXUAL ABUSE (CSA) IMAGERY.
This is a COMPUTER-CONTENT crime.
- This is a computer-content crime.
- TAYLOR ET AL (2001) - created a tenfold typology of such images ranging from:
a) indicative - non-erotic images of children
b) nudist and erotic posing
c) extreme representations of sadistic violence/assault etc.
- Online trade in ‘CSA IMAGERY’ is worth $3 billion per annum (IFR, 2004)
- UNICEF estimates there are 4 million websites featuring CSA IMAGERY (WOLF, 2010)
- STUDY found USA half of reported paedophile websites were hosted in USA, whereby US citizens made up 32% of the global users (TELEFONO ACROBBALENO, 2004)