Offending and Victimisation Spring Part 4 cyber crime Flashcards

1
Q

When did internet become domestic?

A

1996

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who invented the dark net?

A

America created the dark net to be able to hack information from other countries, however if a country had been hacked they would know who it is so to keep anonymity they made the dark net accessible to everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What did Pease (2011) mean about ‘empowering small agents’?

A

Pease meant that the internet empowered otherwise law-abiding citizens to commit crime due to the ease of it e.g. illegally downloading copyrighted material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ‘global criminal economy’ mean?

A

by the global scope of the internet it means criminal activities can happen across whole networks of criminality e.g. paedophile rings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 distinguishing features of traditional crime vs cyber crime?

A

1) Static temporal and spatially vs. distantiated - time and space does not matter (RAT struggles to explain this)
2) Crime often has political, social and legal rationalisation vs. cyber crime lacks social, legal and political recognition
3) Offenders are usually socio-economically disadvantaged vs. offenders are usually socio-economically priviledged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

There is little agreement on what cyber crime is… who are the big players in regulation? Who are the smaller players? Which of these parties did no give a description in the ‘Convention on cyber crime’ (2001)

A

Big players - UN, CoE and G8
Small players - Interpol/Europol, Organisation for economic cooperation and development (OECD)
No definition - CoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There has been an increase in reporting and recording of cyber crime, who/what records this data?

A
  • FBI and Computer Security Institute
  • National high-tech crime unit and National opinion poll
  • BCS/CSEW
  • Department for business, innovation and skills
  • Offending, crime and justice survey
  • Oxford internet survey
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Discuss the legal rationalisation of cyber crime

A
  • Hacking, obscene content, online stalking, etc have all be met with legal rationalisation
  • Although, crimes such as talking about bombs or online violence have been less understood by the law and are best to be considered as ‘harms’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Walls (1998) created 3 categories of cyber crime

A

1) Facilitating existing criminal activity
2) New crimes recognised by the existing laws
3) New ‘harms’ unrecognised by law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Walls (1998) made a typology of cyber crime, what is it? (4)

A

1) Cyber trespass
2) Cyber violence
3) Cyber theft
4) Cyber obscenity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is, and give examples, of ‘cyber trespass’

A
  • Hacking
  • Planting of virus’
  • Manipulation of data
  • Espionage
  • Terrorism
  • Example: Conservative manifesto hacking
  • Example: Cyber warfare North Korea hacking America
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ‘cyber violence’?

A
  • Trolling
  • Flaming
  • Hate speech
  • Stalking
  • ‘Virtual Rape’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ‘cyber obscenity’?

A
  • Distinction between mainstream pornography and child pornography
  • Cultural, moral and legal variations
  • ECs Green paper ‘protection of minors and human dignity in audio-visual and information services’ (1998)
  • Main regulatory focus is on paedophilia networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of cyber theft are there and give examples?

A
  • Appropriation of intellectual property e.g. duplicating dvds - victimises big corporations like sony
  • Online Fraud e.g. romance scams
  • Online Identity theft e.g. phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘phishing’?

A

Posing as a legitimate company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ‘spear phishing’?

A

Targeted profiling of victims based on desires for goods and services

17
Q

What is ‘pharming’?

A

Bypasses social engineering with software to automatically redirect websites

18
Q

What is ‘smishing’?

A

Using SMS text messages to target mobile users

19
Q

What are ‘keystroke loggers’?

A

Record everything you write on your keyboard to gain identity information e.g. online banking details

20
Q

What are ‘keystroke loggers’?

A

Record everything you write on your keyboard to gain identity information e.g. online banking details

21
Q

The National Fraud Authority (NFA, 2012) estimate that identity theft costs ??? billion per year

A

1.2 billion annualy

22
Q

UK annual number of phishing in 2012 was ??? which is a ??% increase since 2011

A

over 250,000 incidents

130% increase

23
Q

Global phishing attacks rose by ??% (?? million attacks) between 2012-13

A

87%

37 million

24
Q
Phishing attempts have been targeted at:
Email and Search ??%
Social media ??%
Banks ??%
Payment services ??%
A

30%
20%
12%
6%

25
Q

Why can organised cyber crime be highly profitable with little risk of being caught?

A

Because cyber crime happens across borders it is hard to convict people and who prosecutes them? Organised cyber criminal networks can work from and too countries that have little/no laws around cyber crime as a developing countries with undeveloped cyber crime laws or between two countries with little/no communication

26
Q
The BCS 2003 showed that:
??% are anxious about credit card fraud
??% have been a victim of a virus attack
??% victims of hacking
??% victims of email harassment
??% victims of obscene related crime
A
75%
18%
2%
12%
21%
27
Q

What does the Euro-barometer cyber security survey of ID theft reveal about increased chance of victimisation?

A

More likely to be a victim if:

  • Sell on online auctions
  • Use university computers
  • Use public computers
  • Younger
  • Poorer
  • From a country with low internet penetration
28
Q

Name some psychological harms that are caused by cyber crime e.g. online stalking, harassment, hate speech, obscenity, theft, etc

A
Sleepless nights
anxiety
Concentration problems
Avoidance
Relationship breakdown
29
Q

Name what cyber crime migrations cause physical harm?

A

Online grooming
Cyber stalking
Hate crimes
Other related to violence

30
Q

Detica/Cabinet office believe the cost of cyber crime annually is £?? billion

A

27 billion

31
Q

Cyber crime has large costs because of… (3)

A

1) Transfer costs e.g. direct losses from fraud, transfer from victim to offender, transfer from legal to illegal economy
2) Anticipatory costs e.g. defensive (virus and snooping software) and precautionary (avoiding unsure websites)
3) Reactive costs e.g. criminal justice costs, civil costs

32
Q

How would Hirschi’s (1969) control theory be applied to cyber crime?

A

Crime in online communities as there is lack of attachment, commitment, involvement and beliefs

33
Q

How does deindividualisation account for cyber crime?

A

Festinger (1952)
Anonymity
Lack of public self-awareness
Disinhibtion

34
Q

How would Katz (1988) explain cyber crime?

A

Seductions of crime - criminals make crime enticing as crime is thrill seeking

35
Q

How can routine activity theory explain cyber crime?

A
  • Cohen and Felston (1979)
  • A suitable target is avaliable
  • There is a lack of suitable guardian to prevent the crime from happening
  • Likely and motivated offender is present