Crime Online Correlates Causes and Contexts Chapter One

  • Slides: 10
Download presentation
Crime Online: Correlates, Causes, and Contexts Chapter One Copyright © 2010, Thomas J. Holt,

Crime Online: Correlates, Causes, and Contexts Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved

Defining and Measuring Cybercrime �How does modern society cope with the threats caused by

Defining and Measuring Cybercrime �How does modern society cope with the threats caused by the ubiquity of technology? �Internet access and technology have affected all aspects of modern life �Communications �Finance and business �Medicine �Private entities �This has benefits but also results in costs Copyright © 2010, Thomas J. Holt, All Rights Reserved

Costs of growth of technology �Growth has spawned a range of deviant and criminal

Costs of growth of technology �Growth has spawned a range of deviant and criminal behaviors �Pose unique challenges to law enforcement and legal system �Massive numbers of victims with little effort �Attacks against nations/states �Little time or money invested �Allows for a significant degree of anonymity �Significant threat creates a strong need to identify and understand online criminality Copyright © 2010, Thomas J. Holt, All Rights Reserved

Defining and Measuring Cybercrime �Perpetrator uses special knowledge of cyberspace �Computer crime �Perpetrator uses

Defining and Measuring Cybercrime �Perpetrator uses special knowledge of cyberspace �Computer crime �Perpetrator uses special knowledge about computer technology �Various definitions �Among government agencies �National agencies Copyright © 2010, Thomas J. Holt, All Rights Reserved

Global Cyber Law Survey �Consensus crimes include �Unauthorized access �Computer-mediated espionage �Privacy violations �Damage

Global Cyber Law Survey �Consensus crimes include �Unauthorized access �Computer-mediated espionage �Privacy violations �Damage or theft of computer hardware �Illicit tampering of data or files �Computer or network sabotage �Use of information systems to commit fraud, forgery, and “traditional crimes” Copyright © 2010, Thomas J. Holt, All Rights Reserved

Definitional and Measurement Issues �Countries can agree on what behaviors constitutes cybercrime �Few nations

Definitional and Measurement Issues �Countries can agree on what behaviors constitutes cybercrime �Few nations define what cybercrime is �Affected by industrialization level �Significant undercounting of these crimes �Crimes go unreported �Confusion over how or where to file reports �Barriers to research �Lack of statistical measures, quality data Copyright © 2010, Thomas J. Holt, All Rights Reserved

Cybercrime Framework �Cyber-trespass �Cyber-deception/Theft �Cyber-porn/Obscenity �Cyber-violence Copyright © 2010, Thomas J. Holt, All Rights

Cybercrime Framework �Cyber-trespass �Cyber-deception/Theft �Cyber-porn/Obscenity �Cyber-violence Copyright © 2010, Thomas J. Holt, All Rights Reserved

Cyber-trespass �Crossing of invisible yet salient boundaries of ownership on-line �Most notable example of

Cyber-trespass �Crossing of invisible yet salient boundaries of ownership on-line �Most notable example of cyber trespass criminals are computer hackers �Hackers are individuals with desire to penetrate systems they do not own Copyright © 2010, Thomas J. Holt, All Rights Reserved

Cyber-trespass: Hackers �Individuals with a profound interest in computers and technology that have used

Cyber-trespass: Hackers �Individuals with a profound interest in computers and technology that have used their knowledge to access computer systems �Malicious or ethical purpose alike �More hackers are tied to criminal breaches of networks �Also responsible for malicious software programs or malware Copyright © 2010, Thomas J. Holt, All Rights Reserved

Computer Malware �Computer viruses, worms, Trojan horse programs �Alter functions within computer programs and

Computer Malware �Computer viruses, worms, Trojan horse programs �Alter functions within computer programs and files �Disrupt email and network operations �Access private files �Delete or corrupt computer software or hardware �Enable identity theft, fraud and loss of personal information �Pose significant threat to users around globe �Significant costs and losses Copyright © 2010, Thomas J. Holt, All Rights Reserved