Cybercrime Flashcards
Understanding risks, impacts, justice, and solutions of the misuse of information and communication technologies (ICT), which enables criminal activities.
What treaty did the UN General Assembly adopt aimed at combating cybercrime?
First International Criminal Justice treaty to be adopted since 2004.
United Nations Convention against Cybercrime (2025)
Mishra, V. (2024)
This treaty is a landmark global agreement to strengthen international cooperation against cybercrime.
How long did the negotiation process for the Convention against Cybercrime take?
Five years
Mishra, V. (2024)
The treaty involved inputs from various sectors including civil society and academia.
Who welcomed the adoption of the Convention as a demonstration of successful multilateralism?
UN Secretary-General António Guterres
Mishra, V. (2024)
This marks the first international criminal justice treaty negotiated in over 20 years.
What does the Convention create for the exchange of evidence and victim protection?
An unprecedented platform for collaboration
Mishra, V. (2024)
It also focuses on preventing cybercrime while safeguarding human rights online.
What is one of the main goals of the Convention against Cybercrime?
To promote a safe cyberspace
Mishra, V. (2024)
The Secretary-General called for all States to join and implement the Convention.
What potential threats does the digital world pose according to Philémon Yang?
Increased potential threat of cybercrime
Mishra, V. (2024)
Information and communications technologies have enormous potential for societal development.
What was the method of adoption for the resolution containing the Convention?
Adopted without a vote
Mishra, V. (2024)
The General Assembly consists of 193 member states.
Who described the adoption of the treaty as a major victory for multilateralism?
Ghada Waly, Executive Director of the UNODC
Mishra, V. (2024)
She highlighted the treaty’s role in addressing various cybercrimes.
What type of crimes does the Convention against Cybercrime aim to address?
Online child sexual abuse, sophisticated online scams, money laundering
Mishra, V. (2024)
These are among the crimes mentioned in the context of the treaty.
What significant risks does the Convention against Cybercrime acknowledge?
Misuse of information and communications technologies (ICT)
Mishra, V. (2024)
This misuse enables criminal activities at an unprecedented scale and speed.
What adverse impacts are highlighted by the Convention against Cybercrime?
Impacts on States, enterprises, and the well-being of individuals and society
Mishra, V. (2024)
It emphasizes the need for protection from various offenses.
What does the Convention prioritize in terms of justice?
Justice for vulnerable groups
Mishra, V. (2024)
It recognizes the growing impact of cybercrime on victims.
What is necessary for the Convention against Cybercrime to enter into force?
Ratification by the 40th signatory
Mishra, V. (2024)
It will enter into force 90 days after this ratification.
When and where will the Convention against Cybercrime be opened for signature?
2025 in Hanoi, Viet Nam
Mishra, V. (2024)
This ceremony is significant for formalizing the treaty’s acceptance.
Fill in the blank: The Convention against Cybercrime highlights the need for _______.
Technical assistance, capacity-building, and collaboration among States
Mishra, V. (2024)
This is essential for effectively combating cybercrime.
Define cyberspace
The technical architecture that allows the global internet to function
Hollis, D. (2021, June 14)
What are some examples of current cyberthreats?
Phishing, ransomware, data breaches
Interpol, n.d.
These threats are prevalent in the digital landscape.
How do cybercriminals exploit new technologies?
By tailoring their attacks and cooperating in new ways
Interpol, n.d.
This adaptability makes them increasingly agile and organized.
True or False: Cybercrimes are limited to a single country.
False
Interpol, n.d.
Cybercrimes know no national borders and involve multiple jurisdictions.
What role does INTERPOL play in combating cybercrime?
Building cross-sector partnerships and enabling international law enforcement cooperation
Interpol, n.d.
INTERPOL has a global reach to assist in these efforts.
What is essential for addressing the challenges posed by cybercrime?
Close collaboration between public and private partners
Interpol, n.d.
This collaboration enhances the effectiveness of investigations and prosecutions.
Fill in the blank: Cybercrimes bring many challenges to _______.
investigations and prosecutions
Interpol, n.d.
The complexity of cybercrimes complicates legal processes.
What is one method INTERPOL uses to reduce cyber threats?
Coordinating law enforcement operations
Interpol, n.d.
This includes secure data sharing platforms and training.
What is the impact of cybercrime on governments, businesses, and individuals?
Massive economic and social impact
Interpol, n.d.
Cybercrime affects all sectors of society.
What is the main goal of increasing the capacity of member countries regarding cybercrime?
To prevent, detect, investigate, and disrupt cybercrimes
Interpol, n.d.
This aims to protect communities for a safer world.
Fill in the blank: Cybercriminals take advantage of _______ in online systems.
weaknesses
Interpol, n.d.
These weaknesses can be found in networks and infrastructure.
What is the main issue with accusations of bad state behaviour in cyberspace?
Accused states uniformly deny the accusations or decline to comment, without changing behaviour.
Finnemore, M. & Hollis, D. (2020)
What do accusations in cyberspace lack from the perspective of international law?
Accusers almost always fail to invoke international law.
Finnemore, M. & Hollis, D. (2020)
What broader concept is introduced to examine accusations in cyberspace?
The concept of ‘accusation’ as a social, political, and legal practice.
Finnemore, M. & Hollis, D. (2020)
What are the three discrete processes that comprise accusations?
- Attribution
- Exposure
- Condemnation
Finnemore, M. & Hollis, D. (2020)
What is the attribution problem in cyberspace?
The difficulty of identifying the perpetrator of cyber operations.
Finnemore, M. & Hollis, D. (2020)
Which states have been accused of conducting or supporting cyber operations?
- China
- Iran
- North Korea
- Russia
- United Kingdom
- United States
Finnemore, M. & Hollis, D. (2020)
What was the outcome of the 2015 understanding between the United States and China?
Prohibition of commercial cyber espionage.
Finnemore, M. & Hollis, D. (2020)
What is one of the main purposes of making accusations?
To seek to ‘name and shame’ an accused into conforming to certain behavioural expectations.
Finnemore, M. & Hollis, D. (2020)