Lecture 8: Crime and Deviance on the Internet Flashcards
How have technologies changed the landscape of criminality?
We need to look beyond traditional approaches to understanding offenders and their decision making.
Cyberactivities
Computing activities that rely on internet connectivity (e-mail, online research, streaming media, gaming).
Is internet connectivity required for cyberactivities?
No.
Is a computer required for cyberactivities?
Yes.
Problem with the elements of crime in cyber activities.
Cannot prove actus reus.
Cybercrime includes…
- Phishing.
- Ripping.
- Hacking.
- Luring
- Stalking.
- Spamming.
- Skimming.
- Trafficking.
Phishing
E-mails asking you to click.
Ripping
Taking CD’s or software and passing them around.
Hacking
Distributed denial-of-service attacks.
Luring
Luring people to certain sites.
Stalking
Keeps watching for activity. Tries to get you engaged in conversation.
Spamming
Sending mass emails.
Skimming
Trying to lure targets to give up information.
Trafficking
Through the Deep Web. Covert web system. Only small number of people use it. Very limited chance you will be found. Prostitution, human trafficking, drug trafficking, assassinations.
Cybercrime
Any criminal offence or series of offences committed through the use of a computer and a computer network or internet connection.
Cyberterrorism
Using a computer to orchestrate large-scale “Attacks on information,” including government or critical infrastructure servers or any database of interest to national security.
Difference between cybercrime and e-Crime.
Cybercrime is analogous to real-life, offline crimes. Usually directed at individuals, rather than at systems. e-crimes are computer offences committed against financial institutions or the state.
What type of crime includes cyberespionage, cyberterrorosim, and target institutional targets rather than human ones?
e-Crime.
___ ___ email was hacked in October 2015 by a teenager.
CIA Directors’.
Governmental agencies have had to become more ___ as a result of cybercrime.
Flexible.
Recent cases reflect the vulnerability in the ___ ___.
Digital age.
Cyberterrorism has the potential to permanently disrupt…
The economic or environmental stability of entire nations or regions.
Network attacks against critical infrastructure sites are evident in…
Conductor-less trains.
The ___ malware was developed by the NSA and Israeli intelligence to destroy Iranian nuclear facilities.
Stuxnet.
Israeli agents forging passports was an example of how…
An incident can involve both online and offline “crime.”
How does social media become antisocial?
Becomes avenue for antisocial activities.
___ model of crime can be applied to cybercriminology.
Consensus.
How does the consensus model of crime apply to cybercirminology?
Determines where the line between crime and deviance is drawn in online communities.
Technological Determinism
Helps us understand how specific technologies drive cultural changes.
Determinism
Cause and effect factor. Usually a criticism saying you are jumping to a conclusion.
Paraphilia
Sexual offences.
Deviant Cybercommunities
Subcultures or counter-cultures who may never have met, who seek to circumvent the customary user experience of websites or social media,
Deviant cybercommunties seek to exploit weaknesses and vulnerabilities, known as…
“Soft targets.”
What is the paradox of deviant cybercommunities?
Cybercommunities serve a “social” purpose but also intensify deviant and antisocial impulses among some.
Cyberdeviant paraphilias include:
- Erotomania.
- Exhibitionism.
- Scopophilia (voyeurism).
- Scatologia.
Erotomania
Physical stalking of a person (offline) vs. cyberstalking (online).
Exhibitionism
Flashing (offline) vs. sexting (online).
Scopophilia (voyeurism)
Secretly watching others (offline) vs. use of a smartphone to secretly record or photograph people (online).
Scatologia
Obscene phone calls (offline) vs. cyberbullying, cybermobbing, and internet trolling (online).
Internet Trolling
People that get a kick from twisting from the purpose of the message to anger people.
Is criminology properly equipped to handle online offenders?
No.
Electronic manifestations of identified paraphilias have no clear offline reference. Therefore, they are more difficult to…
Define and legislate.
Routine activities theory explains that…
The amount of time you spend online and the nature of those virtual environments determines your risk of being victimized.
Risk increases on Whyte Avenue when you…
Step into a pub/club rather than just walking.
Research on cyberbullying and cybervictimology must include the assessment of ___.
Risk.
Routine activities theory says that those who spend ___ time online are at a higher risk of being victimized.
More.
Problem with online activity is how…
They become dependent on their online life for self-esteem or self-worth.
Digital media offer cyberbullies access to users who would…
Normally not have face-to-face contact with them.
Traditional barriers between ___ ___ are obscured, which leads to generational and demographic confusion.
Life stages.
Cybercrime brings about unforeseen online collisions between groups of people with different values. True or false?
True.
Bill C-30
Expand police powers to conduct online surveillance.
Bill C-13
Protecting Canadians from Online Crime Act.
Why was Bill C-30 withdrawn?
Expanding police powers clashed with privacy issues.
Under Bill C-13, police only require ___ ___ ___ ___ to get a warrant to obtain information about an internet user.
Reasonable grounds for suspicion.
Is the future of guardianship on the internet determined?
No.
When faced with an option of whether or not to grant a warrant, judges are more likely to…
Grant the warrant.