Cybercrime Flashcards
Castells (1998) Global Criminal Economy;
refers to how internet has facilitated the creation of vast criminal networks, it is an amplification device that has transformed traditional and created new crime types
Pease (2001) discusses
“empowered small agents” - any intelligent person with an internet connection can commit cybercrime
legal rationalisation…
is the process by which the law updates/forms new laws to respond to modern cybercrimes e.g. possession of obscene electronic online images - not physical photos
Cybercrime differs from terrestrial crimes…
time and space are distanciated (Giddens, 1990), there is a lack of social/legal/political recognition, offenders are more likely to be educated and economically privileged
cybercrime offenders are most often…
educated males from economically privileged backgrounds
defining cybercrime is inherently complex because…
it takes many different forms and blurs the boundary between reality and virtual worlds, plus there is little agreement between regulatory parties
Wall (1988) describes 3 categories of cybercrime:
Facilitates existing criminal activity
New crimes recognised by existing laws
New ‘harms’ unrecognised by laws
what is the problem with legal rationalisation and cybercrime?
is it a crime or a harm???
some laws such as hacking, are simple to adapt because of existing privacy laws, however the internet has created new crimes that have no existing terrestrial precedent.
4 key issues for apprehending cybercriminals
offender and victim do not have to share the same spatial-temporal location - could be anyone/anywhere.
Jurisdiction - cybercrime laws are not universal and relative to the country - who regulates where/what?
Struggle to regulate policing, if O&V are in different countries, or countries with poor working relationships
Wall (1990) his typology (4)
Cybertrespass, Cybertheft, Cyber obscenity and Cyberviolence
Cyber trespass is…
Hacking, Planting of viruses, Manipulation of data, Espionage, Terrorism
Cyber theft is…
Appropriation of Intellectual Property, Online Fraud Romance Scams (Whitty 2013) Identity or credit card theft,
Online Identity Theft is…
Duplication of digital information or the high-jacking of online accounts to commit fraud
Can use keystroke loggers
Phishing is…
criminals pose as legit companies/banks
Spear Phishing -
targeted profiling of victims based on desires for goods and services
Pharming -
bypasses social engineering with software to automatically redirect webpages