Offending and Victimisation Spring Part 4 cyber crime Flashcards
When did internet become domestic?
1996
Who invented the dark net?
America created the dark net to be able to hack information from other countries, however if a country had been hacked they would know who it is so to keep anonymity they made the dark net accessible to everyone
What did Pease (2011) mean about ‘empowering small agents’?
Pease meant that the internet empowered otherwise law-abiding citizens to commit crime due to the ease of it e.g. illegally downloading copyrighted material
What does ‘global criminal economy’ mean?
by the global scope of the internet it means criminal activities can happen across whole networks of criminality e.g. paedophile rings
What are the 3 distinguishing features of traditional crime vs cyber crime?
1) Static temporal and spatially vs. distantiated - time and space does not matter (RAT struggles to explain this)
2) Crime often has political, social and legal rationalisation vs. cyber crime lacks social, legal and political recognition
3) Offenders are usually socio-economically disadvantaged vs. offenders are usually socio-economically priviledged
There is little agreement on what cyber crime is… who are the big players in regulation? Who are the smaller players? Which of these parties did no give a description in the ‘Convention on cyber crime’ (2001)
Big players - UN, CoE and G8
Small players - Interpol/Europol, Organisation for economic cooperation and development (OECD)
No definition - CoE
There has been an increase in reporting and recording of cyber crime, who/what records this data?
- FBI and Computer Security Institute
- National high-tech crime unit and National opinion poll
- BCS/CSEW
- Department for business, innovation and skills
- Offending, crime and justice survey
- Oxford internet survey
Discuss the legal rationalisation of cyber crime
- Hacking, obscene content, online stalking, etc have all be met with legal rationalisation
- Although, crimes such as talking about bombs or online violence have been less understood by the law and are best to be considered as ‘harms’
Walls (1998) created 3 categories of cyber crime
1) Facilitating existing criminal activity
2) New crimes recognised by the existing laws
3) New ‘harms’ unrecognised by law
Walls (1998) made a typology of cyber crime, what is it? (4)
1) Cyber trespass
2) Cyber violence
3) Cyber theft
4) Cyber obscenity
What is, and give examples, of ‘cyber trespass’
- Hacking
- Planting of virus’
- Manipulation of data
- Espionage
- Terrorism
- Example: Conservative manifesto hacking
- Example: Cyber warfare North Korea hacking America
What is ‘cyber violence’?
- Trolling
- Flaming
- Hate speech
- Stalking
- ‘Virtual Rape’
What is ‘cyber obscenity’?
- Distinction between mainstream pornography and child pornography
- Cultural, moral and legal variations
- ECs Green paper ‘protection of minors and human dignity in audio-visual and information services’ (1998)
- Main regulatory focus is on paedophilia networks
What types of cyber theft are there and give examples?
- Appropriation of intellectual property e.g. duplicating dvds - victimises big corporations like sony
- Online Fraud e.g. romance scams
- Online Identity theft e.g. phishing
What is ‘phishing’?
Posing as a legitimate company
What is ‘spear phishing’?
Targeted profiling of victims based on desires for goods and services
What is ‘pharming’?
Bypasses social engineering with software to automatically redirect websites
What is ‘smishing’?
Using SMS text messages to target mobile users
What are ‘keystroke loggers’?
Record everything you write on your keyboard to gain identity information e.g. online banking details
What are ‘keystroke loggers’?
Record everything you write on your keyboard to gain identity information e.g. online banking details
The National Fraud Authority (NFA, 2012) estimate that identity theft costs ??? billion per year
1.2 billion annualy
UK annual number of phishing in 2012 was ??? which is a ??% increase since 2011
over 250,000 incidents
130% increase
Global phishing attacks rose by ??% (?? million attacks) between 2012-13
87%
37 million
Phishing attempts have been targeted at: Email and Search ??% Social media ??% Banks ??% Payment services ??%
30%
20%
12%
6%
Why can organised cyber crime be highly profitable with little risk of being caught?
Because cyber crime happens across borders it is hard to convict people and who prosecutes them? Organised cyber criminal networks can work from and too countries that have little/no laws around cyber crime as a developing countries with undeveloped cyber crime laws or between two countries with little/no communication
The BCS 2003 showed that: ??% are anxious about credit card fraud ??% have been a victim of a virus attack ??% victims of hacking ??% victims of email harassment ??% victims of obscene related crime
75% 18% 2% 12% 21%
What does the Euro-barometer cyber security survey of ID theft reveal about increased chance of victimisation?
More likely to be a victim if:
- Sell on online auctions
- Use university computers
- Use public computers
- Younger
- Poorer
- From a country with low internet penetration
Name some psychological harms that are caused by cyber crime e.g. online stalking, harassment, hate speech, obscenity, theft, etc
Sleepless nights anxiety Concentration problems Avoidance Relationship breakdown
Name what cyber crime migrations cause physical harm?
Online grooming
Cyber stalking
Hate crimes
Other related to violence
Detica/Cabinet office believe the cost of cyber crime annually is £?? billion
27 billion
Cyber crime has large costs because of… (3)
1) Transfer costs e.g. direct losses from fraud, transfer from victim to offender, transfer from legal to illegal economy
2) Anticipatory costs e.g. defensive (virus and snooping software) and precautionary (avoiding unsure websites)
3) Reactive costs e.g. criminal justice costs, civil costs
How would Hirschi’s (1969) control theory be applied to cyber crime?
Crime in online communities as there is lack of attachment, commitment, involvement and beliefs
How does deindividualisation account for cyber crime?
Festinger (1952)
Anonymity
Lack of public self-awareness
Disinhibtion
How would Katz (1988) explain cyber crime?
Seductions of crime - criminals make crime enticing as crime is thrill seeking
How can routine activity theory explain cyber crime?
- Cohen and Felston (1979)
- A suitable target is avaliable
- There is a lack of suitable guardian to prevent the crime from happening
- Likely and motivated offender is present