Offending and Victimisation Spring Part 4 cyber crime Flashcards
When did internet become domestic?
1996
Who invented the dark net?
America created the dark net to be able to hack information from other countries, however if a country had been hacked they would know who it is so to keep anonymity they made the dark net accessible to everyone
What did Pease (2011) mean about ‘empowering small agents’?
Pease meant that the internet empowered otherwise law-abiding citizens to commit crime due to the ease of it e.g. illegally downloading copyrighted material
What does ‘global criminal economy’ mean?
by the global scope of the internet it means criminal activities can happen across whole networks of criminality e.g. paedophile rings
What are the 3 distinguishing features of traditional crime vs cyber crime?
1) Static temporal and spatially vs. distantiated - time and space does not matter (RAT struggles to explain this)
2) Crime often has political, social and legal rationalisation vs. cyber crime lacks social, legal and political recognition
3) Offenders are usually socio-economically disadvantaged vs. offenders are usually socio-economically priviledged
There is little agreement on what cyber crime is… who are the big players in regulation? Who are the smaller players? Which of these parties did no give a description in the ‘Convention on cyber crime’ (2001)
Big players - UN, CoE and G8
Small players - Interpol/Europol, Organisation for economic cooperation and development (OECD)
No definition - CoE
There has been an increase in reporting and recording of cyber crime, who/what records this data?
- FBI and Computer Security Institute
- National high-tech crime unit and National opinion poll
- BCS/CSEW
- Department for business, innovation and skills
- Offending, crime and justice survey
- Oxford internet survey
Discuss the legal rationalisation of cyber crime
- Hacking, obscene content, online stalking, etc have all be met with legal rationalisation
- Although, crimes such as talking about bombs or online violence have been less understood by the law and are best to be considered as ‘harms’
Walls (1998) created 3 categories of cyber crime
1) Facilitating existing criminal activity
2) New crimes recognised by the existing laws
3) New ‘harms’ unrecognised by law
Walls (1998) made a typology of cyber crime, what is it? (4)
1) Cyber trespass
2) Cyber violence
3) Cyber theft
4) Cyber obscenity
What is, and give examples, of ‘cyber trespass’
- Hacking
- Planting of virus’
- Manipulation of data
- Espionage
- Terrorism
- Example: Conservative manifesto hacking
- Example: Cyber warfare North Korea hacking America
What is ‘cyber violence’?
- Trolling
- Flaming
- Hate speech
- Stalking
- ‘Virtual Rape’
What is ‘cyber obscenity’?
- Distinction between mainstream pornography and child pornography
- Cultural, moral and legal variations
- ECs Green paper ‘protection of minors and human dignity in audio-visual and information services’ (1998)
- Main regulatory focus is on paedophilia networks
What types of cyber theft are there and give examples?
- Appropriation of intellectual property e.g. duplicating dvds - victimises big corporations like sony
- Online Fraud e.g. romance scams
- Online Identity theft e.g. phishing
What is ‘phishing’?
Posing as a legitimate company