Lecture 8: Crime and Deviance on the Internet Flashcards
How have technologies changed the landscape of criminality?
We need to look beyond traditional approaches to understanding offenders and their decision making.
Cyberactivities
Computing activities that rely on internet connectivity (e-mail, online research, streaming media, gaming).
Is internet connectivity required for cyberactivities?
No.
Is a computer required for cyberactivities?
Yes.
Problem with the elements of crime in cyber activities.
Cannot prove actus reus.
Cybercrime includes…
- Phishing.
- Ripping.
- Hacking.
- Luring
- Stalking.
- Spamming.
- Skimming.
- Trafficking.
Phishing
E-mails asking you to click.
Ripping
Taking CD’s or software and passing them around.
Hacking
Distributed denial-of-service attacks.
Luring
Luring people to certain sites.
Stalking
Keeps watching for activity. Tries to get you engaged in conversation.
Spamming
Sending mass emails.
Skimming
Trying to lure targets to give up information.
Trafficking
Through the Deep Web. Covert web system. Only small number of people use it. Very limited chance you will be found. Prostitution, human trafficking, drug trafficking, assassinations.
Cybercrime
Any criminal offence or series of offences committed through the use of a computer and a computer network or internet connection.
Cyberterrorism
Using a computer to orchestrate large-scale “Attacks on information,” including government or critical infrastructure servers or any database of interest to national security.
Difference between cybercrime and e-Crime.
Cybercrime is analogous to real-life, offline crimes. Usually directed at individuals, rather than at systems. e-crimes are computer offences committed against financial institutions or the state.
What type of crime includes cyberespionage, cyberterrorosim, and target institutional targets rather than human ones?
e-Crime.
___ ___ email was hacked in October 2015 by a teenager.
CIA Directors’.
Governmental agencies have had to become more ___ as a result of cybercrime.
Flexible.
Recent cases reflect the vulnerability in the ___ ___.
Digital age.
Cyberterrorism has the potential to permanently disrupt…
The economic or environmental stability of entire nations or regions.