Cybercrime Flashcards

1
Q

Castells (1998) Global Criminal Economy;

A

refers to how internet has facilitated the creation of vast criminal networks, it is an amplification device that has transformed traditional and created new crime types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pease (2001) discusses

A

“empowered small agents” - any intelligent person with an internet connection can commit cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

legal rationalisation…

A

is the process by which the law updates/forms new laws to respond to modern cybercrimes e.g. possession of obscene electronic online images - not physical photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybercrime differs from terrestrial crimes…

A

time and space are distanciated (Giddens, 1990), there is a lack of social/legal/political recognition, offenders are more likely to be educated and economically privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cybercrime offenders are most often…

A

educated males from economically privileged backgrounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

defining cybercrime is inherently complex because…

A

it takes many different forms and blurs the boundary between reality and virtual worlds, plus there is little agreement between regulatory parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wall (1988) describes 3 categories of cybercrime:

A

Facilitates existing criminal activity
New crimes recognised by existing laws
New ‘harms’ unrecognised by laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the problem with legal rationalisation and cybercrime?

A

is it a crime or a harm???
some laws such as hacking, are simple to adapt because of existing privacy laws, however the internet has created new crimes that have no existing terrestrial precedent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

4 key issues for apprehending cybercriminals

A

offender and victim do not have to share the same spatial-temporal location - could be anyone/anywhere.
Jurisdiction - cybercrime laws are not universal and relative to the country - who regulates where/what?
Struggle to regulate policing, if O&V are in different countries, or countries with poor working relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wall (1990) his typology (4)

A

Cybertrespass, Cybertheft, Cyber obscenity and Cyberviolence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber trespass is…

A

Hacking, Planting of viruses, Manipulation of data, Espionage, Terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyber theft is…

A
Appropriation of Intellectual Property, Online Fraud
Romance Scams (Whitty 2013) Identity or credit card theft,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Online Identity Theft is…

A

Duplication of digital information or the high-jacking of online accounts to commit fraud
Can use keystroke loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing is…

A

criminals pose as legit companies/banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spear Phishing -

A

targeted profiling of victims based on desires for goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pharming -

A

bypasses social engineering with software to automatically redirect webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

National Fraud Authority 2012: cost of Cybertheft to the UK economy every year is…

A

£1.2 billion per year

18
Q

In the UK between 2011-12, the number of phishing incidents rose by

A

130%

19
Q

Globally between 2012-13, phishing attacks rose by

A

87% (37 million attacks)

20
Q

Phishing incidents involve sites like…

A

banks, social media, google…

21
Q

Cyber Obscenity is…

A

sexual deviance, such as paedophile networks, illegal pornsites or those that exploit women or men sexually - cultural variance in what is acceptable (but never paedophilia)

22
Q

Cyber violence is…

A

Flaming/Trolling
Hate Speech
Stalking
‘Virtual Rape’ (Dibble 1993, Mackinnon 1997)

23
Q

online identity theft is now…

A

the #1 acquisitive crime in Europe

24
Q

In the UK, cybercrime prevalence is

A

growing! with up to 50% on corporations reporting some kind of unauthorised access (hacking) and 40% reporting malware infection

25
Q

BCS (2003) found that

A
75% anxious about credit card fraud
18% victims of virus attacks
2% victims of hacking
12% victims of email harassment
21% victims of obscenity related crimes
26
Q

risk of victimisation increases if users…

A

use public computers, regularly access chatrooms or auction sites

27
Q

victims can be ANYONE

A

individuals, governements, businesses, charities

28
Q

Offending Crime and Justice Survey (2003)

A

11% admitted to committing a technology crime
and 20% of males and 9% of females commit intellectual property theft - NOW MUCH HIGHER but not financially viable to prosecute everyone who downloads illegally

29
Q

Psychological harms of cyber harassment (stalking, hate speech, obscenity, theft ) include..

A

Anxiety, sleeplessness, concentration problems, avoidance, relationship breakdown

30
Q

Physical harms of cyber harassment include…

A

Online grooming, Cyber stalking, Hate crimes, cyber bullying and related violence
but are these just “virtual harms”?

31
Q

Detica/Cabinet Office says that cybercrime costs the UK economy…

A

£27 billion annually

transfer, anticipatory and reactive costs

32
Q

Cybercrime wastes £27 billion annually, what are the 3 kinds of costs involved?

A

Transfer costs (direct losses from online fraud from victim to fraudster and from legal to illegal economy)
Anticipatory costs:
defensive (e.g. virus & snooping software) and precautionary (e.g. avoiding ‘unsecure’ websites/services)
Reactive costs: criminal justice costs and civil costs

33
Q

Cybercrime is embedded within a dark figure

A

because it is inherently difficult to accurately measure, encompasses a broad spectrum of deviant behaviours and can happen without victims even knowing

34
Q

BCS 2003 included a cybercrime section for the first time but…

A

that data is now 12 years old and useless

35
Q

Routine Activities Theory (Cohen and Felson, 1979) adequately explains cybercrime…

A

supply of motivated offenders, with access to suitable targets in the absence of capable guardianship

36
Q

Deindividuation (Festinger, 1972) explains cyber harassement and trolling well …

A

Anonymity, Lack of public self awareness, Disinhibition

37
Q

Katz’ (1988) seductions of crime

A

criminals are thrill seeking and seduced by the entertainment that hacking and trolling can provide, or by the lucrative prospects of cybercrime (financial or status gain)

38
Q
Control theory Hirschi (1969)
Attachment
Commitent
Involvement
Belief
A

forming bonds with prosocial values, prosocial people, and prosocial institutions is how we learn to control our behaviour when we are tempted to engage in criminal or deviant acts.

39
Q

how much does the UK spend annually to protect our digital borders?

A

£800 million - more likely to attract the HQ’s of large corporations if our internet infrastructure is secure

40
Q

Thomas and Loader (2000) define Cybercrime as

A

“computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks”

41
Q

Governing bodies (such as the EU, UN, Interpol) refuse a set definition and argue it must be subjective so that…

A

each jurisdiction can apply its own definition based on existing laws