CYBERCRIME Flashcards
what is cyber crime?
- criminal groups target individuals, groups + large corporate networks to steal personal info
cyber crime against consumers
- phishing
- webcam manager
- file hijacker
- key logging
- screenshot manager
- ad clicker
cyber crime against business
- hacking
- distributed denial of service (DDOS) attacks
Holt et al (2015) - hacking
- not necessarily a crime
- can be applied in many ways depending on ethical perspective of actor
- modification/alteration of computer hardware/software to enable tech to be used in new way
Brenner (2008) - hacking
- most common targets —> individual computer users, private industry and governments
Holt et al. (2015) - phishing
attempts to obtain sensitive financial info from victims to engage in identity theft and fraud
Bergh + Junger (2018) - prevalence
- annual crime prevalence rates ranged from 1-6% for hacking
- estimates for being a victims of malware - 2-15%
- hard to estimate due to variation in methods and questioning between countries
crimes and offences
- antisocial behaviour (ASB)
- theft and fraud
- hate crime
- exploitation
- terrorism and hacking
EU commission
general policy on the fight against cyber crime
legislation relating to ICT crime
- computer misuse act 1990
- communications act 2003
- digital economy act 1959
- data protection act 1998
technology and policing - overarching issues
- question of balance - liberty vs. security
- current narratives mirror some historical concerns —> links between control of communication systems and exercise of power (Innish, 1950)
- surveillance discourse
technology and policing - listening, watching, sensing and tracking
- profound ability to monitor has been reluctant in claim that surveillance society has emerged (Lyon, 2007)
- full spectrum surveillance through digitization
methods employed by the state often similar in character to those employed by others such as:
- legitimate parties —> consumer surveillance (e.g. cookies)
- illegitimate parties —> individual offenders and serious organised crime (e.g. hacking, identity theft, fraud and trolls)
hot products targeted by theives are generally: (Clarke, 1999)
- Concealable
- Removable
- Available
- Valuable
- Enjoyable
- Disposable
Newman + Clarke (2003) - internet as a criminogenic environment
- Stealth
- Challenge
- Reconnaissance
- Escape
- Multiplicity