chapter one copyright © 2010, thomas j. holt, all rights reserved

10
Chapter One Copyright © 2010, Thomas J. Holt, All Rights Reserved

Upload: reginald-webster

Post on 17-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Chapter One

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Defining and Measuring CybercrimeHow does modern society cope with the

threats caused by the ubiquity of technology? Internet access and technology have affected

all aspects of modern lifeCommunicationsFinance and businessMedicine Private entities

This has benefits but also results in costs

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Costs of growth of technologyGrowth has spawned a range of deviant and

criminal behaviorsPose unique challenges to law enforcement

and legal systemMassive numbers of victims with little effortAttacks against nations/states Little time or money invested Allows for a significant degree of anonymity

Significant threat creates a strong need to identify and understand online criminality

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Defining and Measuring Cybercrime Cybercrime

Perpetrator uses special knowledge of cyberspace

Computer crimePerpetrator uses special knowledge about

computer technologyVarious definitions

Among government agenciesNational agencies

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Global Cyber Law SurveyConsensus crimes include

Unauthorized accessComputer-mediated espionagePrivacy violationsDamage or theft of computer hardwareIllicit tampering of data or filesComputer or network sabotage Use of information systems to commit fraud,

forgery, and “traditional crimes”

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Definitional and Measurement IssuesCountries can agree on what behaviors

constitutes cybercrimeFew nations define what cybercrime is

Affected by industrialization level Significant undercounting of these crimes

Crimes go unreported Confusion over how or where to file reports

Barriers to research Lack of statistical measures, quality data

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Cybercrime FrameworkCyber-trespassCyber-deception/TheftCyber-porn/ObscenityCyber-violence

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Cyber-trespass Crossing of invisible yet salient boundaries of

ownership on-lineMost notable example of cyber trespass

criminals are computer hackersHackers are individuals with desire to

penetrate systems they do not own

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Cyber-trespass: Hackers Individuals with a profound interest in

computers and technology that have used their knowledge to access computer systems

Malicious or ethical purpose alike More hackers are tied to criminal breaches of

networksAlso responsible for malicious software

programs or malware

Copyright © 2010, Thomas J. Holt, All Rights Reserved

Computer MalwareComputer viruses, worms, Trojan horse programsAlter functions within computer programs and

filesDisrupt email and network operationsAccess private filesDelete or corrupt computer software or hardware

Enable identity theft, fraud and loss of personal information

Pose significant threat to users around globeSignificant costs and losses

Copyright © 2010, Thomas J. Holt, All Rights Reserved