Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 12:22 pm
Time: 12:22 pm
Results for internet crimes
169 results foundAuthor: Financial Action Task Force Title: Money Laundering and Terrorist Financing Vulnerabilities of Commercial Websites and Internet Payment Systems Summary: Criminals have shown adaptability and opportunism in finding new channels to launder the proceeds of their illegal activities and to finance terrorism. As the Internet becomes more and more a worldwide phenomenon, commercial websites and Internet payment systems are potentially subject to a wide range of risks and vulnerabilities that can be exploited by criminal organizations and terrorist groups. This study analyses money laundering and terrorist financing (ML/TF) risks with commercial websites and Internet payment systems with the focus on mediated customer-to-customer websites as the most vulnerable to abuse because of their popularity, accessibility to the public, and high volume of cross border transactions. The analysis also provides a number of case studies that illustrate how mediated customer-to-customer websites can be exploited for ML/TF purposes. Details: Paris: FATF, 2008. 39p. Source: Internet Resource Year: 2008 Country: International URL: Shelf Number: 118344 Keywords: Internet CrimesInternet SafetyMoney LaunderingOrganized CrimeTerrorist FinancingTerrorists |
Author: Byron, Tanya Title: Safer Children in a Digital World: The Report of the Byron Review Summary: - The internet and video games are very popular with children and young people and offer a range of opportunities for fun, learning and development. - But there are concerns over potentially inappropriate material, which range from content (e.g. violence) through to contact and conduct of children in the digital world. - Debates and research in this area can be highly polarised and charged with emotion. - Having considered the evidence I believe we need to move from a discussion about the media 'causing' harm to one which focuses on children and young people, what they bring to technology and how we can use our understanding of how they develop to empower them to manage risks and make the digital world safer. - There is a generational digital divide which means that parents do not necessarily feel equipped to help their children in this space - which can lead to fear and a sense of helplessness. This can be compounded by a risk-averse culture where we are inclined to keep our children 'indoors' despite their developmental needs to socialise and take risks. - While children are confident with the technology, they are still developing critical evaluation skills and need our help to make wise decisions. - In relation to the internet we need a shared culture of responsibility with families, industry, government and others in the public and third sectors all playing their part to reduce the availability of potentially harmful material, restrict access to it by children and to increase children's resilience. - I propose that we seek to achieve gains in these three areas by having a national strategy for child internet safety which involves better self-regulation and better provision of information and education for children and families. - In relation to video games, we need to improve on the systems already in place to help parents restrict children's access to games which are not suitable for their age. - I propose that we seek to do that by reforming the classification system and pooling the efforts of the games industry, retailers, advertisers, console manufacturers and online gaming providers to raise awareness of what is in games and enable better enforcement. - Children and young people need to be empowered to keep themselves safe - this isn't just about a top-down approach. Children will be children - pushing boundaries and taking risks. At a public swimming pool we have gates, put up signs, have lifeguards and shallow ends, but we also teach children how to swim. Details: Nottingham, UK: Department of Children, Schools and Families; Department of Culture, Media and Sport, 2008. 224p. Source: Internet Resource: Accessed April 24, 2018 at: http://childcentre.info/robert/extensions/robert/doc/6f4474a71e4794a8c119a0c8fb8ab8ef.pdf Year: 2008 Country: United Kingdom URL: Safer Children in a Digital World: The Report of the Byron Review Shelf Number: 115676 Keywords: Computer CrimesInternet CrimesInternet SafetyOnline GamingVideo Games |
Author: International Centre for Missing & Exploited Children Title: Child Pornography: Model Legislation & Global Review. Fifth Edition Summary: Research into national child pornography legislation began in November 2004. Primary sources of information included: LexisNexis; a survey of Member Countries previously conducted by Interpol regarding national child sexual exploitation legislation; government submissions to the U.N. Special Rapporteur on the Sale of Children, Child Prostitution, and Child Pornography in conjunction with a U.N. report on child pornography on the Internet; and direct contact with in-country nongovernmental organizations (NGOs), law enforcement agencies and officers, and attorneys. Sadly, the end results continue to shock. Of the 187 Interpol Member Countries, only 29 have legislation sufficient to combat child pornography offenses (5 Member Countries meet all of the criteria set forth above and 24 Member Countries meet all but the last criteria, pertaining to ISP reporting); and 93 have no legislation at all that specifically addresses child pornography. Of the remaining Interpol Member Countries that do have legislation specifically addressing child pornography: 54 do not define child pornography in national legislation; 24 do not provide for computer-facilitated offenses; and 36 do not criminalize possession of child pornography, regardless of the intent to distribute. Fundamental topics addressed in the model legislation portion of this report include: Defining “child” for the purposes of child pornography as anyone under the age of 18, regardless of the age of sexual consent; Defining “child pornography,” and ensuring that the definition includes computer- and Internet-specific terminology; Creating offenses specific to child pornography in the national penal code, including criminalizing the possession of child pornography, regardless of one’s intent to distribute, and including provisions specific to downloading or viewing images on the Internet; Ensuring criminal penalties for parents or legal guardians who acquiesce to their child’s participation in child pornography; Penalizing those who make known to others where to find child pornography; Including grooming provisions; Punishing attempt crimes; Establishing mandatory reporting requirements for healthcare and social service professionals, teachers, law enforcement officers, photo developers, information technology (IT) professionals, ISPs, credit card companies, and banks; Addressing the criminal liability of children involved in pornography; and Enhancing penalties for repeat offenders, organized crime participants, and other aggravated factors considered upon sentencing. Details: Alexandria, VA: International Centre for Missing & Exploited Children, 2008. 33p. Source: Internet Resource Year: 2008 Country: International URL: Shelf Number: 119545 Keywords: Child Pornography, Model LegislationChildren, Crimes AgainstInternet CrimesOrganized CrimeSex CrimesSex OffendersSexual Exploitation, Children |
Author: U.S. Department of Justice Title: The National Strategy for Child Prevention and Interdiction: A Report to Congress Summary: "The sexual abuse and exploitation of children rob the victims of their childhood, irrevocably interfering with their emotional and psychological development. Ensuring that all children come of age without being disturbed by sexual trauma or exploitation is more than a criminal justice issue, it is a societal issue. Despite efforts to date, the threat of child sexual exploitation remains very real, whether it takes place in the home, on the street, over the Internet, or in a foreign land. Because the sexual abuse and exploitation of children strikes at the very foundation of our society, it will take our entire society to combat this affront to the public welfare. Therefore, this National Strategy lays out a comprehensive response to protect the right of children to be free from sexual abuse and to protect society from the cost imposed by this crime. In the broadest terms, the goal of this National Strategy is to prevent child sexual exploitation from occurring in the first place, in order to protect every child’s opportunity and right to have a childhood that is free from sexual abuse, trauma, and exploitation so that they can become the adults they were meant to be. This Strategy will accomplish that goal by efficiently leveraging assets across the federal government in a coordinated manner. All entities with a stake in the fight against child exploitation—from federal agencies and investigators and prosecutors, to social service providers, educators, medical professionals, academics, non-governmental organizations, and members of industry, as well as parents, caregivers, and the threatened children themselves—are called upon to do their part to prevent these crimes, care for the victims, and rehabilitate the offenders." Details: Washington, DC: U.S. Department of Justice, 2010. 280p. Source: Internet Resource; Accessed August 10, 2010 at http://www.projectsafechildhood.gov/docs/natstrategyreport.pdf Year: 2010 Country: United States URL: http://www.projectsafechildhood.gov/docs/natstrategyreport.pdf Shelf Number: 119589 Keywords: Child PornographyChild ProstitutionChild ProtectionChild Sex TourismChild Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesInternet Safety |
Author: Livingstone, Sonia Title: EU Kids Online: Final Report Summary: With 75% of European children using the internet, some observers celebrate children’s youthful expertise while others worry that they are vulnerable to new forms of harm. Policies to balance the goals of maximising opportunities and minimising risks require an evidence-based approach. Children’s use of the internet continues to grow. Striking recent rises are evident among younger children, in countries which have recently entered the EU, and among parents. This last reverses the previous trend for teenagers especially to outstrip adults in internet use. Long-standing gender inequalities may be disappearing, though socio-economic inequalities persist in most countries. Across Europe, despite some cross-national variation, available findings suggest that for online teenagers, the rank ordering of risks experienced is fairly similar. Giving out personal information is the most common risky behaviour, followed by encountering pornography online, then by seeing violent or hateful content. Being bullied online comes fourth, followed by receiving unwanted sexual comments. Meeting an online contact offline appears the least common though arguably the most dangerous risk. Even though higher status parents are more likely than those of lower socio-economic status to provide their children with access to the internet, it seems that the children from lower status homes are more exposed to risk online. There are also gender differences in risk, with boys more likely to encounter (or create) conduct risks and with girls more affected by content and contact risks. Countries were classified by degree of children’s internet use and degree of risk online. The classification of countries as ‘high risk’ (ie, above the European average), ‘medium risk’ (ie, around the European average) or ‘low risk’ (ie, below the European average) is a relative judgement based on findings in the available studies reviewed. This suggests a positive correlation between use and risk: Northern European countries tend to be ‘high use, high risk’; Southern European countries tend to be ‘low use, low risk’; and Eastern European countries tend to be ‘new use, new risk’. Details: London: London School of Economics and Political Science, 2009. 52p. Source: Internet Resource: Accessed September 1, 2010 at: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20I/Reports/EUKidsOnlineFinalReport.pdf Year: 2009 Country: Europe URL: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20I/Reports/EUKidsOnlineFinalReport.pdf Shelf Number: 119718 Keywords: BullyingInternet CrimesInternet, Safety MeasuresOnline VictimizationPornography |
Author: Knake, Robert K. Title: Internet Governance in an Age of Cyber Insecurity Summary: This report briefly examines the technological decisions that have enabled both the Internet’s spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, it outlines an agenda that the United States can pursue in concert with its allies on the international stage. Details: Washington, DC: Council on Foreign Relations, 2010. 48p. Source: Internet Resource: Council Special Report No. 56: Accessed September 6, 2010 at: http://www.cfr.org/publication/22832/internet_governance_in_an_age_of_cyber_insecurity.html Year: 2010 Country: United States URL: http://www.cfr.org/publication/22832/internet_governance_in_an_age_of_cyber_insecurity.html Shelf Number: 119746 Keywords: Computer CrimesCyber SecurityCybercrimeCyberterrorismInternet Crimes |
Author: Bajaj, Kamlesh Title: The Cybersecurity Agenda: Mobilizing for International Action Summary: Cyberspace comprises IT networks, computer resources, and all the fixed and mobile devices connected to the global Internet. A nation’s cyberspace is part of the global cyberspace; it cannot be isolated to define its boundaries since cyberspace is borderless. This is what makes cyberspace unique. Unlike the physical world that is limited by geographical boundaries in space—land, sea, river waters, and air—cyberspace can and is continuing to expand. Increased Internet penetration is leading to growth of cyberspace, since its size is proportional to the activities that are carried through it. Cyberspace merges seamlessly with the physical world. So do cyber crimes. Cyber attackers can disrupt critical infrastructures such as financial and air traffic control systems, producing effects that are similar to terrorist attacks in the physical space They can also carry out identity theft and financial fraud; steal corporate information such as intellectual property; conduct espionage to steal state and military secrets; and recruit criminals and others to carry out physical terrorist activities. Anyone can exploit vulnerabilities in any system connected to the Internet and attack it from anywhere in the world without being identified. As the Internet and new technologies grow, so do their vulnerabilities. Knowledge about these vulnerabilities and how to exploit them are widely available on the Internet. During the development of the global digital Internet and communications technology (ICT) infrastructure, the key considerations were interoperability and efficiency, not security. The explosion of mobile devices continues to be based on these insecure systems of Internet protocols. It is increasingly cheap to launch cyber attacks, but security systems are getting more and more expensive. This growing asymmetry is a game changer. It has another dimension, too—individuals, terrorists, criminal gangs, or smaller nations can take on much bigger powers in cyberspace, and through it, in the physical world, as well. The effects of attacks on critical infrastructure such as electricity and water supplies are similar to those that would be caused by weapons of mass destruction, without the need for any physical attacks. Proving attribution in cyberspace is a great challenge. In most cases, it is extremely difficult to attribute cyber attacks to nation-states, collecting irrefutable evidence. The very nature of botnets and zombies makes it difficult to do so, leading to the conclusion that “the Internet is the perfect platform for plausible deniability.” Nations are developing cyber attack capabilities with a view to dominating cyberspace. However, unilateral dominance in cyberspace is not achievable by any country. But uncontrolled growth of cyber attack capabilities—in effect, cyber attack proliferation — is an increasingly troubling phenomenon. Yet another disturbing reality is that cyber attacks can be launched ever more easily, and propagated faster using the same broadband that nations are building for global e-commerce. Finally, the consequences of a cyber attack are more likely to be indirect and more uncertain than most scenarios currently envision; we may not always recognize the damage inflicted by cyber attackers. Cybersecurity is a global problem that has to be addressed globally by all governments jointly. No government can fight cybercrime or secure its cyberspace in isolation. Cybersecurity is not a technology problem that can be ‘solved’; it is a risk to be managed by a combination of defensive technology, astute analysis and information warfare, and traditional diplomacy. Cyber attacks constitute an instrument of national policy at the nexus of technology, policy, law, ethics, and national security. Such attacks should spur debate and discussion, without any secrecy, both inside and outside governments at national and international levels. This is all the more so because of the growing number of significant actors not tied to, or even loosely affiliated with, nation-states. Over the last few months, events in cyberspace such as the GhostNet attacks on governments and large multinational corporations, whether to steal intellectual property or attack free speech, bear this out. They are not restricted by geographical borders or national laws. There is an added dimension to this problem: the infrastructures are owned and operated by the private sector, and cyberspace passes through various legal jurisdictions all over the world. Each government has to engage in supporting its private sector for cybersecurity through effective public-private partnership (PPP) models, with clearly-defined roles for government and industry. Because cyberspace is relatively new, legal concepts for ‘standards of care’ do not exist. Should governments create incentives to generate collective action? For example, they could reduce liability in exchange for improved security, or introduce tax incentives, new regulatory requirements, and compliance mechanisms. Nations have to take appropriate steps in their respective jurisdictions to create necessary laws, promote the implementation of reasonable security practices, incident management, and information sharing mechanisms, and continuously educate both corporate and home users about cybersecurity. International cooperation is essential to securing cyberspace. When it comes to tracking cyber criminals, it is not only the laws dealing with cyber crimes that must exist in various countries, but the collection of appropriate cyber forensics data in various jurisdictions and their presentation in courts of law, which are essential to bring criminals to justice in sovereign countries. Details: Washington, DC: EastWest Institute, 2010. 24p. Source: Internet Resource: Accessed October 13, 2010 at: http://www.ewi.info/system/files/Bajaj_Web.pdf Year: 2010 Country: International URL: http://www.ewi.info/system/files/Bajaj_Web.pdf Shelf Number: 119942 Keywords: Computer CrimesCybercrimeCybersecurityInternet Crimes |
Author: Livingstone, Sonia Title: Risks and Safety on the Internet: The Perspective of European Children. Initial Findings from the EU Kinds Online Survey of 9-16 Year Olds and Their Parents Summary: The study provides important new evidence regarding European children’s and parents’ experiences and practices regarding risky and safer use of the internet and new online technologies. It will inform the promotion of a safer online environment across Europe, and be of broad interest to parents, policy makers, teachers, and all others involved in the care and support of children. Key themes covered by the initial report include: Children’s online usage and activities; Children’s exposure to online risks, including cyberbullying, pornography, sending or receiving sexual messages, and going to offline meetings with people first met online; Children’s perceptions of harm caused by online experiences; and Children’s coping skills. Details: London: London School of Economics and Political Science, 2010. 125p. Source: Internet Resource: Accessed October 26, 2010 at: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Initial_findings_report.pdf Year: 2010 Country: Europe URL: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Initial_findings_report.pdf Shelf Number: 120092 Keywords: CyberbullyingInternet CrimesOnline SafetySex Crimes |
Author: Livingstone, Sonia Title: Risks and Safety on the Internet: The Perspective of European Children. Initial Findings from the EU Kids Online Survey of 9-16 Year Olds and Their Parents. Summary: This report presents the initial findings from a new and unique survey designed and conducted according to rigorous standards by the EU Kids Online network. It was funded by the EC's Safer Internet Programme in order to strengthen the evidence base for policies regarding online safety. A random stratified sample of 23,420 children aged 9-16 who use the internet, plus one of their parents, was interviewed during Spring/Summer 2010 in 25 European countries. Findings reported here are based on 23 of these countries. The survey asked about these online risks: pornography, bullying, receiving sexual messages, contact with people not known face to face, offline meetings with online contacts, potentially harmful user-generated content and personal data misuse. Details: London: EU Kids Online, 2010. 127p. Source: Internet Resource: Accessed December 2, 2010 at: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Initial_findings_report.pdf Year: 2010 Country: Europe URL: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Initial_findings_report.pdf Shelf Number: 120357 Keywords: BullyingInternet CrimesInternet SafetyPornography |
Author: Grosskopf, Angelique Title: Online Interactions Involving Suspected Paedophiles Who Engage Male Children Summary: This paper summarises the results of a small-scale study into the online interactions of suspected paedophiles with undercover Australian police officers posing as male children. The study provides insight to an under-researched area of how persons with a sexual interest in male children interact with potential victims and whether these interactions differ from online engagements with female children. The findings provide an interesting and persuasive case to further examine online strategies used by persons wishing to exploit male children, as it highlights potential differences in approaches when compared with interactions between suspected offenders and female children. The differences include less aggressive online behaviour and language, with an emphasis on the male child’s sexuality and sexual experience. These strategies appear to assist the formation of an online friendship which precedes sexual topics, rather than the reverse as is largely reported in literature. These findings are likely to have implications for law enforcement and child protection initiatives. Details: Canberra: Australian Institute of Criminology, 2010. 6p. Source: Internet Resource: Trends & Issues in Crime and Criminal Justice, No. 403: Accessed December 15, 2010 at: http://www.aic.gov.au/documents/C/8/C/%7BC8C25B82-6F4A-4119-BC62-75840BA8D22A%7Dtandi403.pdf Year: 2010 Country: Australia URL: http://www.aic.gov.au/documents/C/8/C/%7BC8C25B82-6F4A-4119-BC62-75840BA8D22A%7Dtandi403.pdf Shelf Number: 120519 Keywords: Child ProtectionInternet CrimesOnline VictimizationPedophiliaSex Offenders (Australia)Sexual Exploitation, Male Victims |
Author: Schreier, Fred Title: Cyber Security: The Road Ahead Summary: The open Internet has been a boon for humanity. It has not only allowed scientists, companies and entities of all sorts to become more effective and efficient. It has also enabled an unprecedented exchange of ideas, information, and culture amongst previously unconnected individuals and groups. It has completely revolutionized on a global scale how we do business, interact and communicate. Cyberspace is defined by its ubiquitous connectivity. However, that same connectivity opens cyberspace to the greatest risks. As networks increase in size, reach, and function, their growth equally empowers law-abiding citizens and hostile actors. An adversary need only attack the weakest link in a network to gain a foothold and an advantage against the whole. Seemingly localized disruptions can cascade and magnify rapidly, threaten other entities and create systemic risk. However, vulnerabilities in cyberspace are real, significant and growing rapidly. Critical national infrastructure; intelligence; communications, command and control; commerce and financial transactions; logistics; consequence management; and emergency preparedness are wholly dependent on networked IT systems. Cyber security breaches, data and intellectual property theft know no limits. They affect everything from personal information to national secrets. This paper looks at the way these problems are likely to develop, as well as at some of the ways they may best be tackled at the national and international level. Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2011. 53p. Source: Internet Resource: DCAF Horizon 2015 Working Paper No. 4: Accessed February 14, 2011 at: http://www.dcaf.ch/Publications/Publication-Detail?lng=en&id=126370 Year: 2011 Country: International URL: http://www.dcaf.ch/Publications/Publication-Detail?lng=en&id=126370 Shelf Number: 120755 Keywords: Cyber SecurityCybercrimesInternet CrimesInternet Security |
Author: Davidson, Julia Title: Current Practice and Research into Internet Sex Offending Summary: This report seeks to explore the current and recent practice of Scottish, English, Welsh and international governments, organisations and agencies in assessing risk and managing and treating internet sex offenders. The research aims were addressed via a literature review, documentary analysis of key legislation, policy and practice documents and semi-structured interviews with a small number of key respondents with expertise in the area and representatives from criminal justice agencies (N=15). Details: Paisley, Scotland: Risk Management Authority, 2007. 88p. Source: Internet Resource: Accessed February 18, 2011 at: http://www.rmascotland.gov.uk/try/research-papers/ Year: 2007 Country: United Kingdom URL: http://www.rmascotland.gov.uk/try/research-papers/ Shelf Number: 120822 Keywords: Child Sexual AbuseInternet CrimesInternet SafetyOnline VictimizationSex Offenders |
Author: Choo, Kim-Kwang Raymond Title: Cyber Threat Landscape Faced by Financial and Insurance Industry Summary: Opportunities for criminals to engage in transnational activities have expanded with globalisation and advancements in information and communications technologies. Cyber criminal activities will increasingly affect the financial security of online business. It is widely accepted that the financial and insurance industry is the ‘target of choice’ for financially motivated cyber criminals. Yet there is a lack of understanding about the true magnitude of cyber crime and its impact on businesses. Drawing on data from a 2008 Australia-wide survey conducted by the Australian Institute of Criminology, this paper contributes to a better understanding of the threat landscape faced by the financial and insurance industry by assessing the top four risk areas reported by the survey respondents. The paper also examines whether the results from the financial and insurance industries differ from other industries and identifies ways in which industries (particularly the financial and insurance industry), can neutralise or reduce cyber crime opportunities. Details: Canberra: Australian Institute of Criminology, 2011. 6p. Source: Internet Resource: Trends & Issues in Crime and Criminal Justice, No. 408: Accessed February 22, 2011 at: http://www.aic.gov.au/documents/8/F/B/%7B8FB75BEB-DA4B-458B-A444-1EED76001EEE%7Dtandi408.pdf Year: 2011 Country: Australia URL: http://www.aic.gov.au/documents/8/F/B/%7B8FB75BEB-DA4B-458B-A444-1EED76001EEE%7Dtandi408.pdf Shelf Number: 120849 Keywords: CybercrimeFinancial CrimesInternet Crimes |
Author: Detica Title: The Cost of Cyber Crime. A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office Summary: "Few areas of our lives remain untouched by the digital revolution. Across the world, there are now nearly two billion internet users and over five billion mobile phone connections; every day, we send 294 billion emails and five billion SMS messages. Over 91 per cent of UK businesses and 73 per cent of UK households have internet access and £47.2 billion was spent online in the UK alone in 2009. Our society is now almost entirely dependent on the continued availability, accuracy and confidentiality of its Information and Communications Technology (ICT). We need it for our economic health, for the domestic machinery of government, for national defence and for our day-to-day social and cultural existence. As well as significant benefits, the technology has also enabled old crimes to be committed in new and more subtle ways. In its National Security Strategy, cyber threats are recognised by the Government as one of four ‘Tier One’ risks to the UK’s security. But estimates of the cost of cyber crime have until now not been able to provide a justifiable estimate of economic impact and have failed to address the breadth of the problem. Therefore, the Office of Cyber Security and Information Assurance (OCSIA) worked with Detica to look more closely at the cost of cyber crime in the UK and, in particular, to gain a better appreciation of the costs to the UK economy of Intellectual Property (IP) theft and industrial espionage. Further developments of cyber crime policy, strategies and detailed plans will thus benefit from this insight." Details: London: U.K. Cabinet Office, 2011. 32p. Source: Internet Resource: Accessed February 22, 2011 at: http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crime-full-report.pdf Year: 2011 Country: United Kingdom URL: http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crime-full-report.pdf Shelf Number: 120839 Keywords: Costs of CrimeCybercrimeExtortionIdentity TheftInternet CrimesInternet Safety |
Author: Prentky, Robert Title: A Multi-Prong Approach to Strengthening Internet Child Safety Summary: The Internet is a highly effective vehicle for engaging in a range of sexual crimes, including possession of and trafficking in child pornography, identifying, locating and grooming potential victims; sex-related entrepreneurial crime; and the dissemination of misogynistic material. It would be naïve to assume the Internet has only been used for offense-related purposes by those who have been caught and convicted of Internet-related crimes. It is reasonable to assume the “web” of actual or would-be offenders is substantially greater than the known offenders. Metaphorically, it is an “iceberg” problem, with many hands-on offenders and risk-prone individuals falling below the surface. As part of this three-year project, awarded by the U.S. Department of Justice’s Office of Juvenile Justice and Delinquency Prevention (OJJDP) to Justice Resource Institute, Boston College, Villanova University, and Fairleigh Dickinson University, we attempted to address this highly complex, multifaceted problem with a “multi-pronged” approach. To begin, we created an interdisciplinary Working Group comprised of seasoned professionals covering a range of perspectives about online child sexual victimization. The Working Group initially assisted in providing us with cases to help create and refine an Internet Offender Assessment dictionary, which later led to the development of self-report questionnaires used in data collection. The Working Group convened three times over the course of three years to discuss and brainstorm pertinent issues related to online child sexual victimization. This research project used a three-prong approach: The first prong elicited information from middle school and high school students regarding their Internet knowledge and practices, incidence of risk-taking behaviors while online, and experiences of being solicited or engaging in inappropriate sexual activity via a request from a person first met online. This task was aimed at improving Internet safety programs by better understanding how some children are victimized by Internet Sex Offenders while others are not. The results from this prong will inform and, it is hoped, improve Internet safety programs for school systems We added a large, diverse sample of college students drawn from across the county. We administered a selfreport questionnaire surveying their Internet use, experiences, and knowledge, as well as their exposure to pornographic images. This group of young adults is unique in that it is the first generation to have grown up with widely and readily available access to the Internet. We looked at age-related exposure to Internet pornography and a wide range of “content” of pornography and compared student’s reports to reports by the offender groups. The second prong targeted known offenders. Informing primary prevention and secondary intervention programs requires a much better understanding of the complexity of Internet Sex Offenders, their backgrounds, their criminal offenses, and the motives of Internet Sex Offenders. The objective was to help reduce victimization by identifying risk-relevant characteristics of Internet Sex Offenders, creating more effective safety programs based on the knowledge gleaned from offenders, and adding to the existing literature by differentiating among Internet Sex Offenders in an empirically informed way. To accomplish this we included, in addition to a sample of Internet-only Sex Offenders, a group of known hands-on sex offenders with no known Internet offenses, and a third group consisting of known hands-on sexual offenders with Internet sex offenses. The third prong of this project was intended to more fully understand the role, limitations, and importance of technology. Technology is not only important to law enforcement for apprehending offenders, but also critical in reducing victimization. We assembled a dataset to explore the feasibility of identifying “cyber DNA,” unique (signature) elements revealed in communications between adults and children and/or offenders and undercover law enforcement. The intent of such computer-forensic markers is to detect distinctive patterns distinguishing one offender from another or place an offender within a subset of offenders. The concern expressed by parents/guardians about offensive photographs currently available to children online warranted additional research to examine the effectiveness of filters (commercial programs designed to prevent unwanted materials from being viewed or downloaded). Thus, one of our third-prong-related tasks was a comparison of all widely used filters. By understanding the boundaries of technological sophistication among diverse samples, we can more effectively employ different types of filters. Details: Boston: Justice Resource Institute, 2010. 40p. Source: Internet Resource: Accessed February 28, 2011 at: http://www.missingkids.com/en_US/documents/law-enforcement-bulletin-4.pdf Year: 2010 Country: United States URL: http://www.missingkids.com/en_US/documents/law-enforcement-bulletin-4.pdf Shelf Number: 120884 Keywords: Children, Crimes AgainstComputer CrimesInternet CrimesInternet SafetySex Offenders |
Author: North Carolina Governor's Crime Commission, Criminal Justice Analysis Center Title: Computer Crime in North Carolina: Assessing the Needs of Local Law Enforcement Summary: Crimes with a cyber component once included acts such as hacking, financial fraud, theft of intellectual property and so on. Recently, crimes of this nature have evolved as citizens become more technology-savvy and gain easier access to computers. Many would agree that without proper investigative training and tools, successful prosecution of these crimes can never occur. While the primary purpose of this exploratory study is to assess investigative needs of law enforcement, the study also seeks to examine the prevalence of computer crime in North Carolina along with current procedures and activities surrounding it. An 18-item questionnaire was developed to measure the impact of cyber crime on investigations and to determine both the strengths and weaknesses of law enforcement in dealing with crimes containing a cyber component. Part one focused on the number and types of cyber crimes experienced while part two pertained specifically to computer-mediated crime. Open-ended questions throughout the survey provided respondents with the opportunity to suggest additional training initiatives and share additional comments on what steps can be taken to lessen the extent of crimes with a cyber component. Two distinct survey samples from police departments and sheriffs’ offices were randomly selected to receive a survey by mail. Samples excluded airport, college/university, hospital and state agencies. A total of 80 surveys were distributed to sheriffs’ offices and a total of 183 surveys were sent to police departments. This comprised 80 percent of all sheriffs’ offices and almost 53 percent of the total number of local police departments being surveyed. The combined jurisdictional resident population of surveyed agencies comprised over 71 percent of the state’s total resident population. A total of 127 surveys were completed and returned by law enforcement agencies equating to a 48.3 percent response rate. The combined jurisdictional resident population of responding agencies comprised over 46 percent of the state’s total resident population. Seventy-one counties were represented with at least one responding agency. In 2008, responding agencies indicated that roughly 6 percent of investigations contained a cyber component. Based on a linear projection, there were approximately 26,257 cases statewide containing a cyber component in 2008. This equates to 294.1 cases per 100,000 residents, a rate which is comparable to the rate of aggravated assaults and motor vehicle thefts reported in North Carolina. The three most frequently investigated computer crimes by an average reporting agency were fraud related (79.3%), criminal threatening (8.5%), and online enticement of minors/child pornography (4.9%). Cumulatively, respondents indicated that 198 (26.6%) of 745 investigators have received training, with the average agency reporting that one-third of their investigators had been trained. Fifty-two percent of agencies indicated that investigators had receiving local or inhouse training while 54 percent and 27 percent of agencies indicated training at the state and national levels respectively. Over 85 percent of respondents indicated that their agencies collect computer/electronic evidence during investigation. However, only about two-thirds of these agencies reported having standard protocols established for handling evidence of this nature. The inability to trace and monitor Internet communications and the lack of training were seen as the two largest investigative impediments for crimes with a cyber component. Another substantial concern by law enforcement is the public’s apathy and lack of awareness towards crimes with a cyber component. Respondents were either indifferent or minimally concerned about the lack of standard operating procedures, search warrant issues, jurisdictional issues, lack of information sharing, and lack of technical expertise due to staff turnover. At the time of survey, roughly four out of every 10 agencies actually conducted cyber crime prevention or awareness activities and just over 30 percent were involved in official partnerships with other agencies or private entities to combat cyber crime. Over two-thirds of agencies expressed that they were either totally unprepared or somewhat unprepared in terms of equipment. Similarly, over half of respondents felt unprepared in terms of training and about 60 percent believed they were unprepared in terms of personnel. Law enforcement responded more positively in regards to their coordination with other agencies. Although over one-third of agencies answered neutrally, almost 39 percent of agencies believed they were prepared. Computer-mediated crime was briefly examined as it is one of the newest types of crime involving computers and is likely to expand in coming years. For the purposes of this study, computer-mediated crimes are defined as those traditional types of crime (theft, robbery, rape, assault, etc.) that are furthered either by the use of a computer or electronic device. Many cases were mediated through means of the Internet with crimes ranging from robberies facilitated by Craigslist to statutory rape through meeting over MySpace to burglaries perpetrated after taking virtual tours of rental properties. As a whole, law enforcement slightly agreed that they lack the power to prevent or curtail computer-mediated crime. In fact, half of respondents agreed that they have little power to curtail these types of crime in comparison to only under one-fourth of agencies who disagreed. A much higher level of agreement was measured regarding the expected growth of computer-mediated crime. Overwhelmingly, agencies agreed that their jurisdiction will experience an increase in computer-mediated crime in the next five years. One-half of respondents agreed coupled with an additional one-third who strongly agreed that legislators should enhance penalties for traditional crimes mediated by a computer or electronic device. When surveyed about the adequacy of current North Carolina statutes for prosecuting cyber crime perpetrators, law enforcement responses were most commonly neutral. However, interestingly enough, no respondents strongly agreed and only 19 percent of respondents agreed that current statutes are adequate enough. Lastly, the survey measured opinions on whether introduction of a bill was needed in North Carolina to impede computerrelated victimization. New Jersey State Legislative Bill A2864/S1429 makes it a crime of the third degree if a person attempts, via electronic or any other means, to lure or entice a person into a motor vehicle, structure or isolated area, or to meet or appear at any place, with a purpose to commit a criminal offense with or against the person lured or enticed or against any other person. Over 87 percent of respondents believed introduction of a similar bill is needed in North Carolina. Study findings revealed several areas of concern related to the investigation of computer-related crime. According to remarks, it appears investigators and prosecutors are disconnected when dealing with crimes involving a cyber component. Funding consideration should be given to establish pilot sites for joint training sessions between detectives and prosecutors among neighboring judicial districts across the state. In addition, equipment, training and personnel must all be enhanced in hopes of curtailing cyber crimes including computer-mediated crimes. Details: Raleigh, NC: Governor's Crime Commission, 2010. 22p. Source: Internet Resource: Accessed March 8, 2011 at: http://www.ncgccd.org/pdfs/pubs/cybercrime.pdf Year: 2010 Country: United States URL: http://www.ncgccd.org/pdfs/pubs/cybercrime.pdf Shelf Number: 120890 Keywords: Computer Crimes (North Carolina)Criminal InvestigationCybercrimeInternet Crimes |
Author: Denning, Caroline Title: Internet Sweepstakes Cafes: A Survey of Law Enforcement Perceptions Summary: Gambling in the United States operates within a relatively strict framework of government regulation. Traditionally, these restrictions have applied primarily to brick and mortar gambling establishments, but according to Freese (2005) and Franklin (2001) the evolution of the Internet and technology has not only made gambling more accessible but also has provided a loophole for those involved in the gaming and video industry to elude government regulation. The U.S. Department of Justice has maintained under the 1961 Wire Act that Internet gambling is illegal in the United States (Cornell University Law School Legal Information Institute, 2010). Still, Internet gambling persists and has produced great concern among state and local law enforcement who have sought to prohibit and regulate these activities and operations. Despite the federal government’s willingness to prohibit and prosecute Internet gambling cases and operations, the continued prevalence of these activities demands exploration to provide clarification as how state and local law enforcement agencies should deal with the proliferation of recent gambling enterprises, known as Internet sweepstakes cafés, surfacing around the country which are posing challenges to current state gambling laws. As fairly recent developments, current definitions of gambling as presented through federal and state statutes do not adequately address these operations, presenting enforcement and prosecution challenges to many state officials and law enforcement. This report seeks to examine current federal and North Carolina state gambling laws as applied to Internet sweepstakes cafés and present the findings of a statewide survey of sheriffs and local police chiefs regarding their perceptions, attitudes and beliefs surrounding the proliferation of Internet cafés and sweepstakes operations. Additionally, the survey sought to gather data regarding the amount of reported and perceived criminal activity and nuisance complaints associated with these business types. Opinions were also sought regarding barriers to effective regulation and viewpoints on proposed legislation were solicited in an effort to portray how the state’s law enforcement executives perceive and respond to Internet sweepstakes cafés. Details: Raleigh, NC: North Carolina Criminal Justice Analysis Center, Governor's Crime Commission, 2010. 20p. Source: Internet Resource: Accessed March 8, 2011 at: http://www.ncgccd.org/pdfs/internet_cafe.pdf Year: 2010 Country: United States URL: http://www.ncgccd.org/pdfs/internet_cafe.pdf Shelf Number: 120891 Keywords: Computer CrimesGambling (North Carolina)Internet Crimes |
Author: Budd, Carolyn Title: Consumer Fraud in Australasia: Results of the Australasian Consumer Fraud Taskforce Online Australia Surveys 2008 and 2009. Summary: Those who perpetrate consumer scams use a wide range of deceptive practices and methods of communication. However, all aim to trick unsuspecting consumers into parting with money or information, often to criminals located overseas. Phishing attacks, lottery and prize scams, financial investment scams and advanced fee fraud are just a few of the more common scam varieties that are used in an attempt to gain either money or personal details that will eventually be used for financial gain by offenders. The increased use of electronic forms of communication and the ease of sending mass scam invitations via the Internet has also resulted in an increase in the number of scam requests disseminated globally. Scam invitations may appear benign to those who receive them and choose not to respond. This form of spam may be seen as an unfortunate consequence of using the Internet, however, scams can cause serious financial and other harms to those who are victimised, as well as to the wider community. Consumer fraud has been estimated to cost Australia almost $1b annually, although the full extent of the losses is unknown as many choose not to report their experiences officially. Although victims of scams can lose as little as $1, some send substantial amounts to criminals, occasionally exceeding many hundreds of thousands of dollars. Those who send such large amounts frequently feel ashamed of what they have done, or apprehensive that they might have acted illegally. Victims may also receive little sympathy for having being victimised and may be blamed for being gullible. These factors act to deter victims from formally reporting the scam to police. When the full circumstances of cases are known, however, the sophistication of the deception makes it clear that victims have been enticed by a serious and concerted campaign of trickery which preys on their weaknesses and vulnerabilities. The Australasian Consumer Fraud Taskforce (ACFT) includes 20 government regulatory agencies and departments in Australia and New Zealand that work alongside private sector, community and non-government partners to prevent fraud. In order to understand the dynamics of consumer fraud victimisation, the ACFT has conducted a range of fraud prevention and awareness-raising activities since 2006. One key activity of the ACFT is to hold an annual consumer fraud survey to obtain a snapshot of the public’s exposure to consumer scams, to assess their impact, to determine how victims respond and to identify any emerging typologies and issues. This report presents the results of surveys conducted in conjunction with the 2008 campaign that focused on Seduction and Deception Scams and the 2009 campaign that focused on sending the message— Scams Target You: Protect Yourself, Don’t Be a Victim of Scammers and Fight the Scammers. Don’t Respond. Overall, both surveys found that despite most respondents indicating that they had received a scam invitation over the specified 12 month period, the majority did not respond. Invitations sent by email remained the most common method of receiving an invitation, with lottery scams attracting the highest number of victims in 2008 whereas in 2009, work from home scams were the most common way respondents were scammed. Although the survey relies on self-reported data, it still provides a useful means of identifying the nature of victimisation and for identifying areas for further research into consumer fraud. The links identified between scam victimisation and factors such as age, income, reporting and jurisdiction could be used to develop more strategic consumer fraud awareness campaigns that focus on the groups more vulnerable to scam victimisation. The relationships between these variables and victimisation could then be explored more fully using representative samples of the population, or in-depth data collection techniques such as interviewing of those who have been defrauded. With a more extensive understanding of who is victimised and why, more effective scam prevention measures can be enacted. Details: Canberra: Australian Institute of Criminology, 2011. 74p. Source: Internet Resource: Technical and Background Paper No. 43: Accessed March 10, 2011 at: http://www.aic.gov.au/publications/current%20series/tbp/41-60/tbp043.aspx Year: 2011 Country: Australia URL: http://www.aic.gov.au/publications/current%20series/tbp/41-60/tbp043.aspx Shelf Number: 120967 Keywords: Consumer FraudConsumer ProtectionFinancial CrimesInternet CrimesScams |
Author: Shetret, Liat Title: Use of the Internet for Counter-Terrorist Purposes Summary: On 1 May 2010, Faisal Shahzad, a naturalized U.S. citizen, tried to detonate a car bomb in the heart of New York’s Times Square. Thanks to the vigilance of local witnesses and to technical shortcomings, the bomb was detected and failed to explode. The investigation surrounding Shahzad’s case, like other, more recent cases, shows that the Internet played an important role in his violent radicalization and the planning and execution of the attempted attack. For example, he drew spiritual inspiration from lectures and videos circulated online by Anwar al-Awlaki, a U.S.-Yemeni cleric, who helped to convince Shahzad to take up the cause of al-Qaida. Shahzad accessed Web sites for operational and planning purposes. He viewed “real-time video feeds of different areas of Times Square” to help determine which areas attract a large crowd and would result in a high casualty rate if attacked. Shahzad also used the Internet to discuss his plans with militants based in Pakistan. Terrorist operatives such as Shahzad often draw inspiration, reinforcement, support, and guidance from a variety of on- and off-line sources. Some clerics; experts; scholars, such as al-Awlaki; and virtual communities use the Internet to promote violent extremism on their blogs, social network pages, discussion forums, or through the streaming of videos on multimedia platforms such as YouTube. This brief provides an overview of challenges posed to stakeholders by the use of the Internet for terrorist purposes. It argues that the Internet is not the problem and that the online platform can be employed to counter terrorism efforts. Specifically, models of violent radicalization processes off-line offer an important and useful framework for the development and implementation of policies to counter online use of the Internet for terrorist purposes. The brief concludes by offering multilateral institutions, states, civil society organizations, the media, and the private sector examples of how they can use the Internet more effectively as a counterterrorism tool to prevent and counter the use of the Internet for violent radicalization. Four intervention points are suggested: (1) weaken cult personalities, (2) challenge the extremist doctrine, (3) dispel the glory of the “terrorist lifestyle,” and (4) offer a street-smart and locally developed and communicated counternarrative. Details: Washington, DC: Center on Global Counterterrorism Cooperation, 2011. 10p. Source: Internet Resource: Policy Brief: Accessed March 18, 2011 at: http://www.globalct.org/images/content/pdf/policybriefs/LS_policybrief_119.pdf Year: 2011 Country: International URL: http://www.globalct.org/images/content/pdf/policybriefs/LS_policybrief_119.pdf Shelf Number: 121073 Keywords: Computer CrimesCounter-TerrorismInternet CrimesTerrorismTerrorists |
Author: Theohary, Catherine A. Title: Terrorist Use of the Internet: Information Operations in Cyberspace Summary: The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting “propaganda” activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: • Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental roles and responsibilities, overclassification, competing equities, and poor information sharing between agencies hinder implementation of a national cybersecurity strategy. (See “Federal Government Efforts to Address Cyberterrorism.”) • Federal agencies have interpreted the United States Information and Educational Exchange Act of 1948 (22 U.S.C. § 1461), also known as the Smith-Mundt Act, as creating a “firewall” between foreign and domestic audiences, limiting U.S. government counterpropaganda activities on the Internet. (See “Institutional Constraints.”) • Some agencies favor monitoring and surveillance of potentially harmful websites, while others would shut them down entirely. (See “Intelligence Gain/Loss Calculus.”) • Different agency approaches to combating terrorists’ use of the Internet and different definitions and strategies for activities such as information operations (IO) and strategic communications (SC) create an oversight challenge for Congress. (See “Counterpropaganda: Strategic Communications, Public Diplomacy, and Information Operations.”) Cybersecurity proposals from the 111th Congress such as S. 3480, which contained controversial provisions labeled by the media as the Internet “Kill Switch,” are likely to be reintroduced in some form in the 112th Congress. (See “Congressional Activity.”) With growing interest in strategic communications and public diplomacy, there may also be an effort to revise the Smith- Mundt Act. Details: Washington, DC: Congressional Research Services, 2011. 19p. Source: Internet Resource: R41674: Accessed March 22, 2011 at: http://www.fas.org/sgp/crs/terror/R41674.pdf Year: 2011 Country: United States URL: http://www.fas.org/sgp/crs/terror/R41674.pdf Shelf Number: 121095 Keywords: CybercrimeCybersecurityInternet CrimesTerrorismTerrorists |
Author: Cross Border Crime Forum. Mass-Marketing Fraud Subgroup Title: Mass-Marketing Fraud A Report to the Minister of Public Safety of Canada and the Attorney General of the United States Summary: In April 1997, then-Prime Minister of Canada Jean Chrétien and then-President of the United States Bill Clinton directed the preparation of a joint study examining ways to counter the serious and growing problem of cross-border telemarketing fraud. In November 2007, a binational working group established for that purpose provided a report to the Prime Minister and the President that contains a detailed examination of the problem and a series of recommendations to improve both countries’ responses to the problem. Those recommendations included identification of telemarketing fraud as a serious crime; establishment of regional task forces to cooperate across the international border; coordination of strategies to control telemarketing fraud between both countries at agency, regional, and national levels; operation of an ongoing binational working group to provide overall coordination; and other recommendations to address information-gathering, evidence-sharing and mutual legal assistance, extradition, and public education and prevention. The 1997 Report became a general blueprint for coordinated binational actions against telemarketing fraud. In the ten years since the issuance of the 1997 Report, Canada and the United States have not only carried out all of the recommendations in that Report, but have made even greater strides in combating what is now termed mass-marketing fraud - i.e., fraud schemes that use mass communications methods, such as telemarketing, the Internet, and mass mailing to contact and communicate with large numbers of prospective victims and to obtain funds from victims. This Report has three purposes. First, it will describe the principal trends and developments since 2003 in four major types of crime associated with mass-marketing fraud (i.e., telemarketing fraud schemes, Internet fraud schemes, Nigerian fraud, and identity theft). Second, it will summarize the principal approaches that law enforcement in both countries have adopted since 2003 to combat mass-marketing fraud more effectively. Third, it will report on recommendations that this Subgroup made in 2003 as part of a binational action plan to combat mass-marketing fraud, and set out additional recommendations that address changes in the nature and types of mass-marketing fraud that have emerged since 2003. Details: Ottawa: Public Safety Canada, 2008. 47p. Source: Internet Resource: Accessed March 29, 2011 at: http://www.publicsafety.gc.ca/prg/le/oc/_fl/mass-marketing-fraud-2008-5-year-report-eng.pdf Year: 2008 Country: United States URL: http://www.publicsafety.gc.ca/prg/le/oc/_fl/mass-marketing-fraud-2008-5-year-report-eng.pdf Shelf Number: 121198 Keywords: Identity TheftInternet CrimesMass CommunicationsNigerian FraudTelemarketing Fraud (U.S. and Canada) |
Author: Loughlin, Jennifer Title: Child Luring Through the Internet Summary: The Internet is a virtual world filled with an abundance of information and endless sources of entertainment. While an extraordinary tool, the Internet comes with risks. For children these risks include the dangers of sexual exploitation, such as luring through the Internet. In 2002, the Canadian Criminal Code was amended to include new offences that would help combat the luring of individuals under the age of 18, by making it "illegal to communicate with children over the Internet for the purpose of committing a sexual offence". Accordingly, police services across Canada began collecting and reporting child luring incidents that come to their attention under this new legislative amendment. Presently, there is little data available on child luring. The information that does exist represents only those incidents that have been reported to the police. Therefore, it is difficult to quantify the full extent and nature of child luring offences in Canada. Nonetheless, using the first available police-reported data on child luring, this article presents a snapshot of the characteristics of this relatively new criminal offence and the people accused of committing it, as well as an examination of court cases and decisions for child luring offences. Details: Ottawa: Statistics Canada, 2009. 17p. Source: Internet Resource: Juristat, vol. 19, no. 1: Accessed April 1, 2011 at: http://www.statcan.gc.ca/pub/85-002-x/2009001/article/10783-eng.pdf Year: 2009 Country: Canada URL: http://www.statcan.gc.ca/pub/85-002-x/2009001/article/10783-eng.pdf Shelf Number: 121217 Keywords: Child Sexual AbuseComputer CrimesCrime StatisticsInternet CrimesSex Crimes (Canada)Sex Offenders |
Author: Saadawi, Tarek Title: Cyber Infrastructure Protection Summary: The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating largescale network failure, service interruption, or the total unavailability of service. Yet many security programs are based solely on reactive measures, such as the patching of software or the detection of attacks that have already occurred, instead of proactive measures that prevent attacks in the first place. Most of the network security configurations are performed manually and require experts to monitor, tune security devices, and recover from attacks. On the other hand, attacks are getting more sophisticated and highly automated, which gives the attackers an advantage in this technology race. A key contribution of this book is that it provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but it also covers social, legal, and technical aspects of cyber security as well. Details: Carlisle, PA: U.S. Army War College, Strategic Studies Institute, 2011. 324p. Source: Internet Resource: Accessed May 18, 2011 at: www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1067 Year: 2011 Country: United States URL: Shelf Number: 121739 Keywords: Communications SecurityComputer CrimesCyber SecurityCybercrimeInformation SecurityInternet Crimes |
Author: Cross, Emma-Jane Title: Virtual Violence: Protecting Children from Cyberbullying Summary: The latest figures from Beatbullying reveal that nearly one-in-three 11-16 year olds has been deliberately targeted, threatened or humiliated by an individual or group through the use of mobile phones or the internet. For a quarter of these the experience was ongoing, meaning that 1-in-13 children were persistently cyber bullied. What we mean by persistent cyberbullying is bullying that is happening day in, day out, over a period of months or sometimes years. It is continuous cyberbullying by the same person or group. As expected, children who were persistently cyber bullied experienced a longer duration of bullying. Around a third of those persistently bullied said it lasted a year or more, or else was still going on. Another fifth said it had lasted months. The consequences of cyberbullying are no less traumatic than those that follow face-to-face bullying. The media has picked up on a number of high profile cases in which children have committed suicide following relentless online hate campaigns waged on Bebo and Facebook. These are only the most extreme manifestations. Academic research is beginning to document the increased isolation, poor educational attainment and self-destructive behaviour that readily follow cyberbullying. Cyberspace has also made possible new forms of social interaction and bullying. One worrying aspect relates to ‘sexting’, in which children produce and circulate sexual content amongst themselves. A third of children have received an unwanted or nasty message and a quarter received an unwanted or “nasty” image on the subject of sex. While a small proportion of these ‘sexts’ were from an unknown source or were spam, the vast majority were identified as a peer of the young person. In certain cases, these sexts have acted as a catalyst for mass bullying and even statutory rape. Our survey of over 2,000 secondary school pupils shows that cyberbullying is of increased concern for certain ‘high risk’ groups of children. • Pupils with Special Educational Needs, (have a learning difficulty or disability) are 16% more likely to be persistently cyber bullied over a prolonged period of time. • Pupils receiving free school meals, (an agreed universal indicator of increased deprivation, limited/ing social mobility, poverty and educational under-achievement) are 13% more likely to be persistently cyber bullied over a prolonged period of time. • White non-British ethnic background all reported a higher incident of this intense form of cyberbullying. Critically, in terms of resourcing intervention and targeting behaviour change campaigns, girls experienced twice as much persistent cyberbullying as boys and some 48% of all young people admitted to having undertaken some sort of cyberbullying. In terms of the specific websites on which cyberbullying has being taking place, the MSN instant messenger service and the Bebo social networking site were the worst offenders. This was the case for both children who had been bullied and for children who had witnessed others being bullied. The video-sharing site YouTube was also identified as a common place where footage of bullying was proliferated. Details: London: Beatbullying, 2009. 61p. Source: Internet Resource: Accessed May 18, 2011 at: http://www2.beatbullying.org/pdfs/Virtual%20Violence%20-%20Protecting%20Children%20from%20Cyberbullying.pdf Year: 2009 Country: United Kingdom URL: http://www2.beatbullying.org/pdfs/Virtual%20Violence%20-%20Protecting%20Children%20from%20Cyberbullying.pdf Shelf Number: 121751 Keywords: BullyingCyberbullyingInternet CrimesInternet SafetySocial Networking |
Author: DeVoe, Jill Title: Student Reports of Bullying and Cyber-Bullying: Results From the 2007 School Crime Supplement to the National Crime Victimization Survey Summary: In school year 2006–07, some 8,166,000 U.S. students ages 12 through 18, or about 31.7 percent of all such students, reported they were bullied at school, and about 940,000, or about 3.7 percent, reported they were cyber-bullied anywhere (i.e., on or off school property). These Web Tables use data from the 2007 School Crime Supplement (SCS) to the National Crime Victimization Survey (NCVS) 1 to show the extent to which bullying and cyber-bullying are reported by students with different personal characteristics. Estimates are included for the following student characteristics: student sex, race/ethnicity, grade, and household income. In addition, appended data from the 2006–07 Common Core of Data (CCD) and the 2007–08 Private School Universe Survey (PSS) show the extent to which bullying and cyber-bullying are reported by students in schools with different characteristics. School characteristics examined are region; sector (public or private); locale; level; enrollment size; student-to-full-time-equivalent (FTE) teacher ratio; percentage of combined American Indian/Alaska Native, Asian/Pacific Islander, Black/African American, and Hispanic/Latino students; and percentage of students eligible for free or reduced-price lunch. Further, the tables use the SCS data to show the relationship between bullying and cyber-bullying victimization and other variables of interest such as the reported presence of gangs, guns, drugs, and alcohol at school; select school security measures; student criminal victimization; and personal fear, avoidance behaviors, fighting, and weapon-carrying at school. Details: Washington, DC: U.S. Department of Education, National Center for Education Statistics, 2011. 52p. Source: Internet Resource: NCES 2011 316: Accessed May 19, 2011 at: http://nces.ed.gov/pubs2011/2011316.pdf Year: 2011 Country: United States URL: http://nces.ed.gov/pubs2011/2011316.pdf Shelf Number: 121760 Keywords: CyberbullyingInternet CrimesSchool BullyingSchool CrimeSchool ViolenceVictimization Surveys |
Author: Europol - European Police Office Title: EU Organised Crime Threat Assessment (OCTA) 2011 Summary: This report’s key finding is that organised crime is changing, having become more diverse in its activities and impact on society over the last two years. Notable features of this development include greater levels of collaboration between criminal groups, greater mobility in and around the EU, a diversification of illicit activity, and a growing dependence on a dynamic infrastructure, anchored in key locations and facilitated by widespread use of the Internet, in particular. Building on the findings of the 2009 OCTA, this year’s report includes findings from three perspectives: criminal commodities, criminal groups, and their geographical areas of operation. It confirms the prevalence of five criminal hubs in the EU, highlighting the particular impact of the South-East hub and the Western Balkans region. In the drugs trade, cocaine poses an increasing threat across the EU, with new supply routes emerging, while in other criminal sectors also, especially in regard to fraud, illegal immigration, and the rapidly growing emergence of the Internet as a key facilitator for criminal activity, the changing face of organised crime carries a big impact on society. Already a key component of the European Criminal Intelligence Model (ECIM), the OCTA takes on added significance since the adoption of Council Conclusions on the creation and implementation of an EU policy cycle for organised and serious international crime. This policy cycle identifies the OCTA as the basis for the identification of EU crime priorities and, thereafter, a coherent EU response to address those priorities. Targeted law enforcement action is needed to tackle the most dangerous criminal groups operating in Europe. Details: The Hague: Europol, 2011. 38p. Source: Internet Resource: Accessed May 19, 2011 at: http://www.europol.europa.eu/publications/European_Organised_Crime_Threat_Assessment_(OCTA)/OCTA_2011.pdf Year: 2011 Country: Europe URL: http://www.europol.europa.eu/publications/European_Organised_Crime_Threat_Assessment_(OCTA)/OCTA_2011.pdf Shelf Number: 121765 Keywords: Drug TraffickingInternet CrimesOrganized Crime (Europe) |
Author: Reyns, Bradford W. Title: Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective Summary: The field of stalking has experienced a great deal of growth and refinement over the last decade, but its online counterpart is still little understood. The study of cyberstalking has been challenged by conceptual issues (e.g., defining cyberstalking), a lack of data, and other methodological concerns (e.g., small sample sizes, obtaining sampling frames). The extent of cyberstalking victimization is not currently known, but estimates range from 3.7% to 31% of study participants in the few studies that have attempted to estimate its scope. However, because of definitional inconsistencies and methodological deficiencies in past work, comparisons across studies are difficult. The issue is further complicated by studies that have measured cyberstalking as method of pursuit for spatial stalkers. The current study is an attempt to build upon and overcome the shortcomings of past work in the area. Accordingly, the purpose of this dissertation is threefold: (1) to estimate the extent of cyberstalking among a sample of undergraduate students at a large urban university in the Midwest, using a definition of cyberstalking based on legal statutes and previous research; (2) to utilize the lifestyle/routine activities theory perspective to better understand correlates of victimization; and (3) to determine whether this theoretical framework can be used to explain victimization in cyberspace. Findings indicate that the number of online social networks an individual owns, the number of daily updates to those networks, use of AOL Instant Messenger (AOL IM), allowing strangers to access personal information online (e.g., adding strangers as friends to social networking sites), using online services designed to monitor online network activity (i.e., profile trackers), engaging in online deviance, and low self-control are significant predictors of cyberstalking victimization, suggesting moderate support for lifestyle/routine activities theory in explaining cyberstalking. Possible methods for preventing cyberstalking are discussed. Details: Cincinnati, OH: University of Cincinnati, School of Criminal Justice, 2010. 186p. Source: Internet Resource: Dissertation: Accessed July 1, 2011 at: http://www.cech.uc.edu/criminaljustice/files/2010/05/reyns_dissertation.pdf Year: 2010 Country: United States URL: http://www.cech.uc.edu/criminaljustice/files/2010/05/reyns_dissertation.pdf Shelf Number: 121932 Keywords: Computer CrimesCyberstalkingHarassmentInternet CrimesStalkingVictimization |
Author: Organisation for Economic Co-Operation and Development (OECD) Title: The Protection of Children Online: Risks Faced by Children Online and Policies to Protect Them Summary: An increasing number of children are now using the Internet. They are starting at a younger age, using a variety of devices and spending more time online. The Internet can be a major channel for their education, creativity and self-expression. However, it also carries a spectrum of risks to which children are more vulnerable than adults. Addressing risks faced by children online is becoming a policy priority for an increasing number of governments. This means facing many complex policy challenges: How to mitigate risks without reducing the opportunities and benefits for children online? How to prevent risks while preserving fundamental values for all Internet users, including the children themselves? How to ensure that policies are proportionate to the problem and do not unsettle the framework conditions that have enabled the Internet economy to flourish? Governments are not alone in their efforts to protect children online. Parents, caregivers, educators, business and civil society can also help children to benefit from the Internet. They too have a responsibility to protect them against risks online. Although some of these issues emerged in the early days of the World Wide Web, they have recently gained policy attention. At the Seoul Ministerial Meeting on the Future of the Internet Economy in June 2008, Ministers called for a collaborative effort by governments, the private sector, civil society and the Internet technical community to build a common understanding of the impact of the Internet on minors and to enhance their protection and support when using the Internet. They also called for increased cross-border co-operation by governments and enforcement authorities with respect to the protection of minors. This report focuses on online risks for children and policies to protect them as Internet users. It examines direct and indirect policy measures available to OECD member and non-member countries to help mitigate risks for children online in order to: • Present and compare existing and planned policy approaches for the protection of children online; • Explore how international co-operation can enhance the protection of minors on the Internet. Three broad categories of online risks for children are considered in this report: i) content and contact risks, including exposure to pornography, cybergrooming and cyberbullying; ii) consumer risks related, for example, to online marketing and fraudulent transactions; and iii) privacy and security risks, including the use of social networks without sufficient understanding of potential long-term consequences. Statistical data about children’s use of the Internet and the prevalence of risks are limited. The data are often fragmented and non-representative and offer few possibilities for comparing studies and countries. In particular, definitions of risks often differ, and survey methodologies vary significantly, making it difficult to compare risk prevalence rates. While the same spectrum of risks is present in all countries, the available data suggest that prevalence rates vary. Moreover, because children’s activities, skills and resilience differ, their interactions with the online environment and the consequences differ as well. While children’s capabilities are likely to increase with age, so can their own risky behavior. Online risks faced by children are many and evolving. Addressing them requires a blend of approaches that include legislative, self- and co-regulatory, technical, awareness and educational measures, as well as positive content provision and child safety zones. In practice, each country operates its own policy mix of characteristics and priorities, which reflects its perception of priorities as well as its culture and style of government. Moreover, policy measures that address different risks and initiatives from various stakeholders at different levels co-exist. This creates policy complexity at national level and policy heterogeneity across countries. Government policies to protect children online are in their infancy. To enhance their efficiency and catch up with the rapid adoption of the Internet by children, governments face three main challenges: • Managing policy complexity through enhanced policy co-ordination, consistency and coherence; • Adopting an evidence-based policy-making approach; • Taking advantage of international co-operation to improve the efficiency of national policy frameworks and foster capacity-building. For policy to protect children online to operate effectively as the sum of its parts, governments should enhance the coherence of their policy measures and tools in collaboration with all stakeholders. Public-private partnerships, for instance, have been a successful way to encourage self- and co-regulation. Policies to protect children online would benefit from efforts to ensure consistency with other important policy objectives, such as the preservation of fundamental rights and maintenance of the framework conditions which have enabled the Internet to become a global open platform for innovation, economic growth and social progress. With some notable exceptions, the impact of national policy frameworks and individual policy measures for the protection of children online is not regularly assessed and performance evaluations are only exceptionally built into policy. A systematic approach to evidence-based policy making is essential to determine policy priorities and maximise the protection afforded by national policy. The policy-making process would benefit from official statistics on children’s use of the Internet and the prevalence of risk. This would require a more consistent approach to definitions, methodologies and indicators. Impact assessments would help address conflicting policy objectives and place greater emphasis on the quantification of benefits and costs. International and regional co-operation is another area for improvement. While international and regional intergovernmental organisations (including, in addition to the OECD, the Asia-Pacific Economic Co-operation, the Council of Europe, the International Telecommunication Union, the Internet Governance Forum and the European Commission) are already involved, co-ordinated international work by governments and other stakeholders to protect children online would also support efforts by governments at national level. Successful international co-operation relies on the involvement of all relevant international stakeholders. The report provides examples of international co-operation at the policy and operational levels. These include international strategic partnerships, capacity building and joint events (e.g. Safer Internet Day) as well as the sharing of successful educational and awareness raising campaigns. However, the organisation of a regular joint international event on child protection online, with the participation of national and international players, would be an effective way to co-ordinate efforts and take advantage of potential synergies. It would offer a way to share best practices among governments, business and civil society, including the research community, with a view to making the lessons learned from field experience available to policy makers. It would also help bridge communities such as policy makers and practitioners in the area of Internet policy, education, development and capacity building, law enforcement, and statistics. Another avenue for international co-operation is the development of more comparable statistics to enable comparisons across countries and to help governments better assess the efficiency of their frameworks. OECD model surveys could, for example, include a module on children’s access to and use of the Internet and on risk prevalence. Significant work would be needed to harmonise age ranges and define risks to determine data collection methodologies (e.g. survey of parents and educators versus survey of children). Details: Paris: OECD Publishing, 2011. 105p. Source: Internet Resource: OECD Economy Papers, No. 179: Accessed July 5, 2011 at: http://www.oecd-ilibrary.org/docserver/download/fulltext/5kgcjf71pl28.pdf?expires=1309871644&id=id&accname=guest&checksum=2F467BD4A26D25F5DA1D104555EDFDC4 Year: 2011 Country: International URL: http://www.oecd-ilibrary.org/docserver/download/fulltext/5kgcjf71pl28.pdf?expires=1309871644&id=id&accname=guest&checksum=2F467BD4A26D25F5DA1D104555EDFDC4 Shelf Number: 121968 Keywords: Computer CrimesCyberbullyingCybercrimesInternet CrimesOnline Victimization (Children)Pornography |
Author: Australia. Parliament. Joint Select Committee on Cyber-Safety Title: High-Wire Act: Cyber-Safety and the Young Summary: The online environment is an integral part of modern economic and social activities, and a vast resource of education, information, communication and entertainment. Further, the evolution of new technologies is diversifying the ways in which Australians connect with each other and the world. This report focuses on how young people can be empowered and connect to the Internet, and use new technologies with confidence, knowing that they can use them safely, ethically and with full awareness of risks and benefits. The facilitation of safer online environments requires government, industry and the broader community to work together to realise the benefits of the online environment while also protecting Australians from dangers and enabling them to use existing and emerging tools to mitigate risks. Details: Sydney: Australian Parliament, 2011. 601p. Source: Internet Resource: Accessed July 8, 2011 at: http://www.aph.gov.au/house/committee/jscc/report.htm Year: 2011 Country: Australia URL: http://www.aph.gov.au/house/committee/jscc/report.htm Shelf Number: 122009 Keywords: Computer CrimeCyber-StalkingCyberbullyingCybercrime (Australia)Internet CrimesInternet Safety |
Author: Shachtman, Noah Title: Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Summary: At the beginning of the 19th century, piracy was an ongoing threat and an accepted military tactic. By the end of the century, it was taboo, occurring solely off the shores of failed states and minor powers. The practice of hijacking did not vanish entirely, of course; it is flourishing now on the world’s computer networks, costing companies and consumers countless billions of dollars. Cybercrime today seems like a nearly insoluble problem, much like piracy was centuries ago. There are steps, however, that can be taken to curb cybercrime’s growth—and perhaps begin to marginalize the people behind it. Some of the methods used to sideline piracy provide a useful, if incomplete, template for how to get it done. Shutting down the markets for stolen treasure cut off the pirates’ financial lifeblood; similar pushes could be made against the companies that support online criminals. Piracy was eventually brought to heel when nations took responsibility for what went on within its borders. Based on this precedent, cybercrime will only begin to be curbed when greater authority — and accountability — is exercised over the networks that form the sea on which these modern pirates sail. In this new campaign, however, private companies, not governments, will have to play the central role, as Harvard’s Tyler Moore and others have suggested. After all, the Internet is not a network of governments; it is mostly an amalgam of businesses that rely almost exclusively on handshake agreements to carry data from one side of the planet to another. The vast majority of the Internet’s infrastructure is in the hands of these 5,000 or so Internet Service Providers (ISPs) and carrier networks, as is the ability to keep crooks off that infrastructure. If this relatively small group can be persuaded to move against online criminals, it will represent an enormous step towards turning these crooks into global pariahs. The most productive thing ISPs can do to curb crime is put pressure on the companies that support and abet these underground enterprises. Currently, registration companies sell criminals their domain names, like “thief.com.” Hosting firms provide the server space and Internet Protocol addresses needed to make malicious content online accessible. But without ISPs, no business, straight or crooked, gets online. A simple statistic underscores the ISPs’ role as a critical intermediary: just 10 ISPs account for around 30 percent of all the spam-spewing machines on the planet. ISPs are well aware of which hosting companies, for example, are the most friendly to criminals; lists of these firms are published constantly. But,currently, ISPs have little motivation to cut these criminal havens off from the rest of the Internet. There is no penalty for allowing illicit traffic to transit over their networks. If anything, there is a strong incentive for maintaining business-as-usual: the hosting company that caters to crooks also has legitimate customers, and both pay for Internet access. So ISPs often turn a blind eye, even though the worst criminal havens are well-known. That is where government could help. It could introduce new mechanisms to hold hosting companies liable for the damage done by their criminal clientele. It could allow ISPs to be held liable for their criminal hosts. It could encourage and regulate ISPs to share more information on the threats they find. Government could also encourage more private businesses to come clean when they are victimized. Today, just three in ten organizations surveyed by the security firm McAfee report all of their data breaches. That not only obscures the true scope of cybercrime; it prevents criminals and criminal trends from being caught earlier. Government can alter that equation by expanding the requirements to report data breaches. It could require its contractors to purchase network security insurance, forcing companies to take these breaches more seriously. And it can pour new resources into and craft new strategies for disrupting criminals’ support networks. These steps will serve as important signals that America will no longer tolerate thieves and con artists operating on its networks. After all, 20 of the 50 most crime-friendly hosts in the world are American, according to the security researchers at HostExploit. As the United States gets serious in curbing these criminals, it can ask more from — and work more closely with — other countries. China, for instance, sees itself as the world’s biggest victim of cybercrime, even as it remains a hotbed for illicit activity. Not coincidentally, China is also only partially connected to the global community of ISPs. Dialogues to bring the Chinese closer into the fold will not only make it easier to marginalize cybercriminals; it will build momentum for broader negotiations on all sorts of Internet security issues. Details: Washington, DC: John L. Thornton China Center at Brookings, 2011. 44p. Source: Internet Resource: Cyber Security #1: Accessed August 26, 2011 at: http://www.brookings.edu/~/media/Files/rc/papers/2011/0725_cybersecurity_shachtman/0725_cybersecurity_shachtman.pdf Year: 2011 Country: International URL: http://www.brookings.edu/~/media/Files/rc/papers/2011/0725_cybersecurity_shachtman/0725_cybersecurity_shachtman.pdf Shelf Number: 122561 Keywords: Computer CrimeCybercrimeCybersecurityInternet Crimes |
Author: U.S. White House Title: National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy Summary: A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses “Our digital infrastructure, therefore, is a strategic national asset, and protecting it — while safeguarding privacy and civil liberties is a national security priority” and an economic necessity. By addressing threats in this environment, we will help individuals protect themselves in cyberspace and enable both the private sector and government to offer more services online As a Nation, we are addressing many of the technical and policy shortcomings that have led to insecurity in cyberspace Among these shortcomings is the online authentication of people and devices: the President’s Cyberspace Policy Review established trusted identities as a cornerstone of improved cybersecurity. In the current online environment, individuals are asked to maintain dozens of different usernames and passwords, one for each website with which they interact The complexity of this approach is a burden to individuals, and it encourages behavior — like the reuse of passwords — that makes online fraud and identity theft easier At the same time, online businesses are faced with ever-increasing costs for managing customer accounts, the consequences of online fraud, and the loss of business that results from individuals’ unwillingness to create yet another account Moreover, both businesses and governments are unable to offer many services online, because they cannot effectively identify the individuals with whom they interact Spoofed websites, stolen passwords, and compromised accounts are all symptoms of inadequate authentication mechanisms Just as there is a need for methods to reliably authenticate individuals, there are many Internet transactions for which identification and authentication is not needed, or the information needed is limited. It is vital to maintain the capacity for anonymity and pseudonymity in Internet transactions in order to enhance individuals’ privacy and otherwise support civil liberties Nonetheless, individuals and businesses need to be able to check each other’s identity for certain types of sensitive transactions, such as online banking or accessing electronic health records The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy) charts a course for the public and private sectors to collaborate to raise the level of trust associated with the identities of individuals, organizations, networks, services, and devices involved in online transactions. Details: Washington, DC: The White House, 2011. 52p. Source: Internet Resource: Accessed September 3, 2011 at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf Year: 2011 Country: United States URL: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf Shelf Number: 121391 Keywords: CybercrimesIdentity Theft (U.S.)Internet CrimesOnline Fraud |
Author: Perreault, Samuel Title: Self-Reported Internet Victimization in Canada, 2009 Summary: Most Canadians use the Internet regularly (Middleton 2010). According to results from the 2010 Canadian Internet Use Survey, 8 out of 10 Canadian households had access to the Internet (Statistics Canada 2011). However, the advent of new information technologies is also creating new opportunities for crime and new risks of victimization (RCMP 2011; Public Safety 2011). In recent years, governments and institutions, as well as users, have identified the need to address the risk of victimization on the Internet (Kowalski 2002). However, to date, it remains difficult to measure the nature and extent of the issue. While police records provide some information, self-reported data show that only a small proportion of victimizations are reported to authorities (Perreault and Brennan 2010). In 2009, the General Social Survey (GSS) on Victimization was conducted on a sample of Canadians aged 15 years and older living in the provinces. For the first time, the GSS collected information from Canadians about their perceptions and experiences of victimization on the Internet, with a particular focus on cyber-bullying, Internet bank fraud and problems encountered with making online purchases. Drawing on the GSS data, this Juristat article presents information on Internet victimization as self-reported by Canadians. In particular, it examines the socio-demographic and economic characteristics (such as age, level of education and income status) and Internet use characteristics of those who have been victimized. This article also examines security concerns of Canadian Internet users as well as hate content found on the Internet. Details: Ottawa: Statistics Canada, 2011. 31p. Source: Internet Resource: Juristat: Accessed September 19, 2011 at: http://www.statcan.gc.ca/pub/85-002-x/2011001/article/11530-eng.pdf Year: 2011 Country: Canada URL: http://www.statcan.gc.ca/pub/85-002-x/2011001/article/11530-eng.pdf Shelf Number: 122779 Keywords: CyberbullyingCybercrimeInternet CrimesOnline VictimizationVictimization Surveys (Canada) |
Author: Ponemon Institute Title: Second Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies Summary: Sponsored by ArcSight, an HP company, this report presents the findings of the Second Annual Cost of Cyber Crime Study. This year’s study is based on a representative sample of 50 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For consistency purposes, our benchmark sample consists of only larger-sized organizations (i.e., more than 700 enterprise seats). Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions. Key takeaways from this report include: Cyber crimes can do serious harm to an organization’s bottom line. We found that the median annualized cost of cyber crime for 50 organizations in our study is $5.9 million per year, with a range of $1.5 million to $36.5 million each year per company. This represents an increase in median cost of 56 percent from our first cyber cost study published last year. Cyber attacks have become common occurrences. The companies in our study experienced 72 successful attacks per week and more than one successful attack per company per week. This represents an increase of 44 percent from last year’s successful attack experience. The most costly cyber crimes are those caused by malicious code, denial of service, stolen devices and web-based attacks. Mitigation of such attacks requires enabling technologies such as SIEM and enterprise governance, risk management and compliance (GRC) solutions. Similar to last year, the purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Recent well-publicized cyber attacks – for instance, Wikileaks, Epsilion, Sony, Citibank, Boeing, Google, and RSA – have affected private and public sector organizations. As described above, our goal is to be able to quantify with as much accuracy as possible the costs incurred by organizations when they have a cyber attack. In our experience, a traditional survey approach would not capture the necessary details required to extrapolate cyber crime costs. Therefore, we decided to pursue field-based research that involved interviewing senior-level personnel and collecting details about actual cyber crime incidents. Approximately nine months of effort was required to recruit companies, build an activity-based cost model, collect source information and analyze results. This research culminated with the completion of case studies involving 50 organizations. The focus of our project was the direct, indirect and opportunity costs that resulted from the loss or theft of information, disruption to business operations, revenue loss and destruction of property, plant and equipment. In addition to external consequences of the cyber crime, the analysis attempted to capture the total cost spent on detection, investigation, containment, recovery and after-the-fact or “ex-post” response. Details: Traverse City, MI: Ponemon Institute, 2011. 30p. Source: Internet Resource: Accessed September 20, 2011 at: http://www.arcsight.com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August.pdf Year: 2011 Country: United States URL: http://www.arcsight.com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August.pdf Shelf Number: 122797 Keywords: Crimes Against BusinessesCybercrimesCybersecurityInternet Crimes |
Author: Wei, Weixiao Title: Online Child Sexual Abuse Content: The Development of a Comprehensive, Transferable International Internet Notice and Takedown System Summary: This report establishes the value of an international ‘notice and takedown’ system, through the examination of the legislative and regulatory approaches in eight countries. The report found that there is compelling evidence that the ‘notice and takedown’ system already used in some countries is effective in removing child sexual abuse content at source, while still allowing law enforcement authorities to capture evidence for investigations aimed at prosecuting offenders and where possible, the rescue of child victims. The report makes recommendations on how these methods could be implemented internationally. Details: Cambridge, UK: Internet Watch Foundation, 2011. 131p. Source: Internet Resource: Accessed September 23, 2011 at: Year: 2011 Country: International URL: Shelf Number: 122886 Keywords: Child Sexual AbuseComputer CrimesInternet CrimesInternet SafetyOnline Victimization |
Author: Latonero, Mark Title: Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds Summary: This report presents a comprehensive examination of the role of social networking sites and online classified ads in facilitating human trafficking and delivers recommendations for developing technological innovations to monitor and combat trafficking. Human trafficking, a form of modern-day slavery, is a grim reality of the 21st-century global landscape in developed as well as developing countries. While traditional channels of trafficking remain in place, online technologies give traffickers the unprecedented ability to exploit a greater number of victims and advertise their services across geographic boundaries. Yet the extent to which online technologies are used in both sex and labor trafficking is unclear, and the current approach to the question is lacking. While online classified sites such as Craigslist have already been under intense scrutiny for being used by traffickers, little research is available on the role of online classified and social networking sites in human trafficking, and the issue has yet to be fully studied. Instead of singling out these technologies as a root cause of trafficking, this report poses the following question: Can online technologies be leveraged to provide actionable, data-driven information in real time to those positioned to help victims? This study forwards the hypothesis that tools such as data mining, mapping, and advanced analytics can be used by governmental and nongovernmental organizations, law enforcement, academia, and the private sector to further the anti-trafficking goals of prevention, protection, and prosecution. Adapting these technologies and methods requires careful consideration of potential implications for civil liberties, such as privacy and freedom of expression. This report applies detailed methods to understanding the relationship between domestic human trafficking and online technologies through literature reviews, field research, and interviews. In addition, the report presents preliminary results from primary research in developing tools to assist law enforcement and anti-trafficking efforts. The report concludes with a set of recommendations and guidelines to inform future research and technological interventions in human trafficking. The use of Internet technologies in people’s daily lives has dramatically increased in recent years. In 2010, the number of Internet users worldwide exceeded an estimated 2 billion. Hundreds of millions of individuals use social networking sites, and approximately half of all online adults in America have used online classified advertising sites. In contrast to the many social benefits that Internet technologies provide, a darker narrative also has emerged. Social networks and online classified sites are being used by traffickers to market, recruit, sell, and exploit for criminal purposes. Many of these sites are explicit in nature and some are underground. Yet, evidence from legal cases demonstrates that mainstream sites such as Craigslist, Backpage, and Myspace have already been used for trafficking. Facebook, Twitter, and other social networking sites are susceptible to similar uses. Because human trafficking is a crime recognized by international protocols and state laws, traffickers are traditionally forced to conduct their activities underground. But this report illustrates that online transactions leave behind traces of user activity, providing a rare window into criminal behavior, techniques, and patterns. Every online communication between traffickers, “johns,” and their victims reveals potentially actionable information for anti-trafficking investigators. Until now, there has been a lack of data on the role of online technologies in human trafficking. Yury Fedotov, executive director of the United Nations Office on Drugs and Crime, remarked: “We do not have an accurate picture of the scope and nature of [the misuse of technology] and cannot act as effectively as we should. Knowledge is essential for evidence-based policy, and we must fill the information gap.” The Annenberg Center on Communication Leadership & Policy (CCLP) at the University of Southern California launched an anti-trafficking initiative in response to a similar call for increased knowledge. The project began at a June 2010 meeting CCLP Director Geoffrey Cowan convened in Washington, D.C., at the urging of Alec Ross, Secretary of State Hillary Clinton’s senior adviser for innovation, and Ambassador Luis CdeBaca, head of the State Department’s Office to Monitor and Combat Trafficking in Persons. Representatives from the U.S. Agency for International Development, the Department of Justice, the Senate Foreign Relations Committee, and the United Nations joined leaders from the technology field, nongovernmental organizations, and academia to discuss the use of technology to address trafficking. The meeting set into motion research initiatives in the Mekong Subregion (including Thailand, Cambodia, and Vietnam), Haiti, and the United States. An absence of technological solutions for information sharing among antitrafficking organizations inspired further study into potential uses of technology in this field. A partnership between the USC Information Sciences Institute and CCLP developed prototype software designed to detect possible cases of online sex trafficking activity, particularly cases involving underage victims. Together, the group conducted advanced research on data mining, computational linguistics, and mapping tools to monitor trafficking on social networking and online classified sites. Feedback from the Federal Bureau of Investigation was integral to this process. This report indicates that immediate action is required to develop monitoring and prevention techniques to combat human trafficking online. The report recommends future research and proposes actions that stakeholders can undertake to address trafficking online. Comprehensive solutions to trafficking through online channels should involve proactive steps by governments to protect victims and support law enforcement in combating a new generation of tech-savvy traffickers. At the same time, this report urges private-sector technology firms to recognize the opportunity to address human trafficking on their networks and services. In addition, NGOs and academics bring needed expertise to technological interventions. This study also identifies technological innovations that can be used by actors and stakeholders involved in anti-trafficking efforts. To that end, the following principles are intended for those seeking to employ technology as a means to combat human trafficking. Details: Los Angeles: University of Southern California, Annenberg School for Communication and Journalism, Center on Communication Leadership and Policy, 2011. 56p. Source: Internet Resource: Accessed October 17, 2011 at: https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf Year: 2011 Country: United States URL: https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf Shelf Number: 123011 Keywords: Human TraffickingInternet CrimesInternet SafetyOnline VictimizationSex TraffickingSocial Networking |
Author: Chetty, Kasturi Title: Child Sex Tourism in South African Law Summary: Child sex tourism is tourism organised with the primary purpose of facilitating a commercial sexual relationship with a child. It involves a segment of the local child sex industry that is directly connected to both an international and domestic tourist market. The increase of tourism has brought with it complications in that tourism is being used as a means for sex tourists to initiate contact with children. Aside from child sex tourists who are paedophiles, there are those who engage in the opportunistic exploitation of children while travelling on business or for other reasons. There are a number of social and economic factors leading to child sex tourism and the effect is that child victims are exposed to immediate harm, irreversible damage and even death. As South Africa's tourism industry expands into one of the country’s top earners of foreign currency, it is unfortunate to note that its child sex tourist trade is also on the increase. Reports show that sex tours are as easily organised as wine route tours in Cape Town. Commercial sexual exploitation of children is prevalent in South Africa and has become more organised in recent years. A comprehensive response to the problem is essential to ensure that South Africa does not become a “safe haven” for child sex tourists. Effective laws at home and the extraterritorial application of these laws to prosecute South African nationals for crimes committed abroad are imperative. Significant steps are being taken both nationally and internationally to target child sex tourism. South Africa has ratified several international instruments on children’s rights, trafficking in persons, child labour, and discrimination against women and young girls, all of which relate to child sex tourism. In doing so, South Africa has made an international commitment to uphold the provisions of these instruments and give effect to them. South Africa is therefore under an international obligation to create the necessary structures and apply mechanisms and resources to combat child sex tourism. South Africa does not have legislation that specifically prohibits child sex tourism at present. The Sexual Offences Act and common law, however, cover a wide range of offences relating to sexual intercourse and sexually indecent acts as well as the various facets of prostitution such as solicitation, procurement of females as prostitutes and brothel-keeping. Although these legal measures are in many respects commendable there are still too many loopholes. There are situations that are not adequately provided for and others that are not provided for at all. It is expected that the new Sexual Offences Bill containing specific provisions on child sex tourism couched in gender-neutral terms which apply extraterritorially, will go a long way to improving the present system for child victims. The issue of child protection is covered by South Africa’s Constitution as well the provisions of the Child Care Act and Domestic Violence Act. These legal measures ensure that the direct involvement in the commercial exploitation of children is prohibited, the conduct of parents who ill-treat or allow their child to be ill-treated is covered and the abduction or removal of a child is an offence. Despite these positive aspects, there is nevertheless room for improvement. The legislative provisions of the Children’s Act, which has been assented to by the President but not yet promulgated, comprehensively address the problem areas. Once enforced the Children’s Act will go a long way in improving the present system of child protection by holistically addressing the needs of children in respect of prevention of abuse as well as their care and protection. Other pieces of legislation which apply to child sex tourism are the Prevention of Organised Crime Act; Immigration Act; Basic Conditions of Employment Act; Films and Publications Act and the Electronic Communications and Transactions Act. They allow for the prosecution of sex exploiters and traffickers for offences related to child sex tourism, child prostitution, child pornography and various other forms of sexual exploitation of children. Overall the impact of these miscellaneous pieces of legislation on child sex tourism is praiseworthy. However, they bring to light the fact that there are numerous statutes, each dealing with one aspect of child sex tourism as opposed to a single comprehensive statute to refer to in handling such cases. Therefore there is still room for improvement in this regard. Details: Port Elizabeth, South Africa: Nelson Mandela Metropolitan University, 2007. 139p. Source: Internet Resource: Accessed November 12, 2011 at: https://www.nmmu.ac.za/documents/theses/KChetty.pdf Year: 2007 Country: South Africa URL: https://www.nmmu.ac.za/documents/theses/KChetty.pdf Shelf Number: 123319 Keywords: Child ProstitutionChild ProtectionChild Sex Tourism (South Africa)Child Sexual ExploitationInternet CrimesOrganized Crime |
Author: Alkholt, Aimar Title: Nigerian Criminal Networks; A Comparative Analysis Summary: Why is an African federation the home to one of the more dominating criminal networks operating globally? Nigeria is not well known for its high level of Internet-infrastructure. Still, it is in a class of its own when it comes to e-fraud or 419 spam mails. It is also prominent within the drug trade and the African-European trafficking network. By comparatively analysing other forms of Organized Crime against the Nigerian Brand, the thesis has tried to find the particulars of Nigerian Criminal Networks. The thesis found two particular indicators that stood out in the analysis: Social Networking and the 419 industry. Also, by looking at the level of integration between Nigerian politics and Criminal Networks and the argumentation used by agents within the Criminal Networks and the dynamics of the Nigerian E-fraud, this thesis argues that the same socio-cultural dynamics stemming from before the colonial period of the "great scramble" to present time, is the very same driving force behind Nigerian Criminal Networks today, forming an "Internet Economy of Affection". A general trend points in the direction that individuals growing up in the Nigerian federation seem to have a higher potential for social networking since their weak state gives them little protection in economic, welfare, security and educational spheres. They have to rely on the informal sector instead: the sphere of social networking. This may be one facet and first step toward the complex explanation how the dynamics of e-fraud, trafficking and drug-trade in Nigerian Criminal Networks, works at present. Details: Bergen, Norway: University of Bergen, Department of Administration and Organization Theory, 2010. 112p. Source: Internet Resource: Master's Thesis: Year: 2010 Country: Nigeria URL: Shelf Number: 123356 Keywords: Criminal NetworksFraud and CorruptionInternet CrimesOrganized Crime (Nigeria) |
Author: Smyth, Sara M. Title: Measuring the Extent of Cyber-Fraud in Canada: A Discussion Paper on Potential Methods and Data Sources Summary: Central to developing and monitoring the progress of strategies for combating cyber crime is reliable information about crime volume, in terms of the number of incidents and offenders, the prevalence of cyberspace tools for the commission of crime, as well as the number of victims. This discussion paper assesses the potential for using innovative methodologies to estimate the scope of cyber-fraud, identifies existing data sources and gaps, and suggests novel sources of data that may help provide a more accurate picture of the degree of cyber-fraud in Canada. Further, possible ways to determine the proportions of cyber-fraud attributable to criminal networks rather than single individuals are discussed. This research is informed by a literature review and interviews with law enforcement and Information Technology (IT) personnel. The literature review and interviews show that the largest impediment to effectively managing the problem of cyber-fraud is the lack of reliable data. The Government of Canada primarily relies on police-reported data for information about cyber-fraud. Yet, there are a number of reasons why fraud incidents are not reported to police. For example, companies may prefer to handle such matters internally, or individuals may only report that they were defrauded to their financial institution. This research shows that current information about cyber-fraud is being funnelled to a variety of different organizations, including banks, regulatory agencies and various police agencies, or is simply not recorded. There is a clear shortage of data measuring the prevalence and costs of cyber-fraud in Canada and the available information is incomplete and fragmented. The lack of reporting of cyber-fraud incidents by individual and corporate/government victims means that many cases are not recorded or represented in official crime statistics This research demonstrates a strong need for the creation of a national centre to record and measure data relating to cyberfraud across Canada. A central databank of known cyber-fraud offenders and cases across the country could facilitate the identification and tracking of suspects in cyber-fraud cases and could further understanding regarding when one individual, or group of individuals, is committing fraud all over the country. Ultimately, a national databank on cyber-fraud incidents could give law enforcement officials a better understanding of the types of cyber-fraud being committed in Canada. Sophisticated technologies and the global distribution of computer networks also increase the difficulty of detecting and addressing cyber-fraud and hinder the ability to find and prosecute criminals operating online. In addition, there are operational challenges related to ensuring that law enforcement officials have the training and resources they need to adequately address the problem and able to identify perpetrators of cyber-frauds. Attempting to locate a perpetrator is problematic in many cases of cyber-fraud because skilled attackers cover their tracks by using proxies and other technical obfuscation methods. This research suggests that the best source for further information on cyber-fraud is offender populations. Offender interviews may help uncover the network structure of hidden populations and help the law enforcement community to identify key players within the group. Of the options available for hidden populations, a truncated Poisson model is suggested as the most effective model. Ideally, this research could help pave the way for data collection and analysis that would better inform law enforcement officials, investigators, and policy makers about the extent of cyber-fraud and cyber-criminal populations in Canada. This research may contribute toward the enhancement of prevention and suppression strategies, as well as the development of an empirical means for evaluating the effectiveness of initiatives, including elements of Canada’s Cyber Crime Strategy. Details: Ottawa: Public Safety Canada, 2011. 65p. Source: Internet Resource: Report No. 020, 2011: Accessed November 22, 2011 at: http://publications.gc.ca/collections/collection_2011/sp-ps/PS14-4-2011-eng.pdf Year: 2011 Country: Canada URL: http://publications.gc.ca/collections/collection_2011/sp-ps/PS14-4-2011-eng.pdf Shelf Number: 123422 Keywords: Computer CrimesCybercrime (Canada)FraudIdentity TheftInternet Crimes |
Author: Grauman, Brigid Title: Cyber-security: The Vexed Question of Global Rules Summary: This report is made up of a survey of some 250 leading authorities worldwide and of interviews carried out in late 2011 and early 2012 with over 80 cyber-security experts in government, companies, international organisations and academia. It offers a global snapshot of current thinking about the cyber-threat and the measures that should be taken to defend against it, and assesses the way ahead. It is aimed at the influential layperson, and deliberately avoids specialised language. For the moment, the “bad guys” have the upper hand – whether they are attacking systems for industrial or political espionage reasons, or simply to steal money - because the lack of international agreements allows them to operate swiftly and mostly with impunity. Protecting data and systems against cyber-attack has so far been about dousing the flames, although recently the focus has been shifting towards more assertive self-protection. The first part of this two-part report concentrates on the main issues that are slowing progress, starting with the absence of agreement on what we mean by terms like cyber-war or cyber-attack. It reflects sharp divisions over the rights of individuals and states in cyber-space. Most Western countries believe that freedom of access to the internet is a basic human right, and that he or she also has a right to privacy and security that should be protected by laws. UNESCO argues that the right to assemble in cyberspace comes under Article 19 of the Declaration of Human Rights. At the other end of the spectrum are those countries, like Russia and China, that favour a global treaty but nevertheless believe that access to the internet should be limited if it threatens regime stability, and that information can also be seen as a cyber-threat. For these countries, any state has the right to control content within its sovereign internet space. Linked to the rights and responsibilities of states is the thorny issue of attribution. There are those countries that say that attribution to a specific attacker is impossible, and that the focus has to be defence from attacks. Others argue that attribution is possible, but requires international cooperation, sharing of information and assistance from local authorities. Some states believe that cooperation is a threat to their sovereignty; others say they can’t be held responsible for the activities of individuals or private companies. And a number apparently fear openness because they don’t want to see restrictions on their political or military objectives. Some clear themes emerge from the report, and they are issues that need fairly urgent resolution. Among these is how and to what degree should a more proactive, some would say more bellicose, stance be developed both in the military and private arenas; the need for much greater international cooperation; introducing a more solid security architecture to the internet; and establishing cyber-confidence building measures as an easier alternative to any global treaty, or at least as a gapfiller until a treaty is agreed. The second part of this report are 21 country stress tests, complemented by findings from the global survey the SDA conducted in the autumn of 2011 among 250 top cyber-security specialists in 35 countries. They included government ministers, staff at international organisations, leading academics, think-tankers and IT specialists, and their views diverged widely on how to improve international cooperation in cyberspace, which over half of them now consider a global common like the sea or space. Details: Brussels, Belgium: Security & Defence Agenda, 2012. 108p. Source: Internet Resource: Accessed February 14, 2012 at: http://www.securitydefenceagenda.org/Portals/14/Documents/Publications/SDA_Cyber_report_FINAL.pdf Year: 2012 Country: International URL: http://www.securitydefenceagenda.org/Portals/14/Documents/Publications/SDA_Cyber_report_FINAL.pdf Shelf Number: 124133 Keywords: Computer CrimesCyber-SecurityCybercrimeInternet Crimes |
Author: Vettori, Barbara, ed. Title: Child Pornography on the Internet - Evaluating Preventive Measures in order to Improve their Effectiveness in the EU Member States - Final Report Summary: This Final Report presents the results of the Study Child Pornography on the Internet - Evaluating Preventive Measures in order to Improve their Effectiveness in the EU Member States, funded by the EU Commission under the DAPHNE Programme 2000-2003 (Contract 01/097/c) and carried out by Transcrime, Joint Research Centre on Transnational Crime, Universita degli Studi Trento- Universita Cattolica del Sacro Cuore di Milano, in cooperation with Unicf - Innocenti Research Centre, Firenze and Unisys Belgium. The aim of the Study was to evaluate the effectiveness of the preventive measures in place of EU Member States, in the field of child pornography on the Internet in order to contribute to their improvement. To achieve this aim, the Study set itself the following objectives: 1. to map the preventive measures in place in EU Member States against child pornography on the Internet; 2. to assess (where possible) the level of adherence to EU guidelines of the preventive measures against child pornography in place in EU Member States; 3. to assess the effectiveness of the preventive measures against the child pornography on the Internet in place of EU Member States; 4. to identify good practices in the field of preventive measures against child pornography on the Internet in place in EU Member States and to disseminate them; to identify ways and forms to improve the effectiveness of such measures. Details: Milan, Italy: Transcrime, 2007. 608p. Source: Transcrime Reports No. 15. Internet Resource: Accessed February 17, 2012 at http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/TR/15_Child_Pornography_on_the_Internet.pdf Year: 2007 Country: Europe URL: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/TR/15_Child_Pornography_on_the_Internet.pdf Shelf Number: 124152 Keywords: Child Pornography (Europe)CybercrimesInternet Crimes |
Author: European Network and Information Security Agency (ENISA) Title: Cyber-Bullying and online Grooming: helping to protect against the risks - A scenario on data mining/profiling of data available on the Internet Summary: Children are the most valuable part of every society, regardless of culture, religion and national origin. Given the rapidly increasing digitalisation of their lives, it seemed important to assess risks related to internet usage and, in particular, the risk of become a victim of online grooming and cyber bullying activities. A recent survey on the technology skills of children reveals that digital devices and the internet play a significant role in their lives. Today’s kids are living in an environment that is radically different from that of their parents; virtual environments are increasingly prevalent in private and education environments. This development is detrimental to their physical activities, social skills and the behavioural model that prevailed in previous generations. ENISA has formed a Working Group consisting of international experts in various disciplines related to the area of children’s online protection. Interdisciplinary knowledge and relevant experience in the area were the criteria of their engagement. During the selection phase of the scenario to be assessed, the expert group has identified cyber bullying and online grooming as an area that requires further elaboration. With this assessment we aim to demonstrate how attacks based on misuse of data (i.e. data mining and profiling) can affect minors. Although the issue of children’s exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors. To this extent, this document should not be considered as overlapping with existing national and international initiatives in the area of child online protection. Rather, it complements them by pointing out additional elements that might be interesting to look at in the future. On the other hand, although non-technical, the assessed risks are based on very detailed analysis down to technological elements. Security experts might find this analysis interesting and even worth reusing in their own work/considerations. Details: Heraklion, Greece: ENISA (European Network and Information Security Agency), 2011. Source: Internet Resource: Accessed February 18, 2012 at http://www.enisa.europa.eu/act/rm/emerging-and-future-risk/deliverables/Cyber-Bullying%20and%20Online%20Grooming/at_download/fullReport Year: 2011 Country: Europe URL: http://www.enisa.europa.eu/act/rm/emerging-and-future-risk/deliverables/Cyber-Bullying%20and%20Online%20Grooming/at_download/fullReport Shelf Number: 124168 Keywords: CyberbullyingInternet CrimesJuvenile Victims |
Author: Rogers, Audrey Title: From Peer-To-Peer Networks to Cloud Computing: How Technology is Redefining Child Pornography Laws Summary: Child pornography circulating in cyberspace has ballooned into the millions. To punish this flood, the law must accurately delineate culpable conduct. Technology such as peer-to-peer networks has erased the divisions among traders of child pornography, and, therefore, the differentials in punishment have lost their underpinnings. The current sentencing controversy surrounding child pornographers is merely the tip of the iceberg of the larger need to revamp the offenses themselves. This paper provides a framework for a normative critique of the offenses and their sentences. It suggests the law could better reflect technology by comporting with a refined harm rationale that rests on the fundamental injury to the victim’s dignity and privacy. Drawing on comparisons to diverse laws such as the Geneva Convention’s ban on photographs of prisoners of war, this paper states all traders in child pornography violate the rights of the children depicted and therefore inflict harm, albeit at different levels. Accordingly, the paper proposes three categories: producers, traders, and seekers of child pornography with base sentences varying accordingly. Starting at the same base level, the Sentencing Commission could then propose enhancements or departures to distinguish among the traders and their individual culpability. Details: Social Science Research Network, 2012. 41p. Source: Working Paper Series: Internet Resource: Accessed March 9, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2006664& Year: 2012 Country: United States URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2006664& Shelf Number: 124403 Keywords: Child PornographyCybercrimesInternet CrimesSentencingSentencing Reform |
Author: Smith, Kevin (ed.) Title: Hate Crime, Cyber Security and the Experience of Crime among Children: Findings from the 2010/11 British Crime Survey: Supplementary Volume 3 to Crime in England and Wales 2010/11 Summary: This bulletin covers three topic areas. These are: The extent of and perceptions towards hate crime -- This chapter contains analysis of figures from the 2009/10 and 2010/11 British Crime Surveys, including extent and reporting of hate crime, its effects on victims and victim satisfaction with the police. It also looks at a range of public perception measures relating to hate crime. Questions were asked of adults aged 16 or over in England and Wales. Use of the internet and cyber security -- This chapter contains information from the 2010/11 British Crime Survey on levels of internet use, concerns people may have about using the internet, and any measures taken to protect personal details when using the internet. Variations by age and sex are highlighted throughout the chapter. Questions were asked of adults aged 16 or over in England and Wales. Experimental statistics on the experience of crime among children aged 10 to 15 -- This chapter is based on data collected from 10 to 15 year olds who took part in the 2010/11 British Crime Survey. Questions were asked of children in England and Wales who had experienced a crime about the circumstances of the incident, any details on the offender(s) and their views of the incident. Experimental statistics is a designation for statistics still in a development phase. Details: London: Home Office, 2012. 84p. Source: Internet Resource: Home Office Statistical Bulletin: Accessed March 29, 2012 at: http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/crime-research/hosb0612/hosb0612?view=Binary Year: 2012 Country: United Kingdom URL: http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/crime-research/hosb0612/hosb0612?view=Binary Shelf Number: 124757 Keywords: Children, Crimes AgainstCrime Statistics (U.K.)CybercrimesHate CrimesInternet Crimes |
Author: Rantala, Ramona R. Title: Cybercrime against Businesses, 2005 Summary: Presents the nature and prevalence of computer security incidents among 7,818 businesses in 2005. This is the first report to provide data on monetary loss and system downtime resulting from cyber incidents. It examines details on types of offenders, reporting of incidents to law enforcement, reasons for not reporting incidents, types of systems affected, and the most common security vulnerabilities. The report also compares in-house security to outsourced security in terms of prevalence of cyber attacks. Details: Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2008. 20p. Source: Internet Resource: Bureau of Justice Statistics Special Report: Accessed April 11, 2012 at: http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf Year: 2008 Country: United States URL: http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf Shelf Number: 124921 Keywords: Business SecurityiComputer SecurityCrimes Against BusinessCybercrime (U.S.)Internet Crimes |
Author: Lansdown, Gerison Title: Child Safety Online: Global Challenges and Strategies Summary: Over the past twenty years the Internet has become an integral part of our lives. We have eagerly embraced its potential for communication, entertainment and information-seeking. For many of today’s children, the Internet, mobile phones and other technologies are a constant and familiar presence. For them, the distinction between online and offline has increasingly become meaningless, and they move seamlessly between both environments. An increasing number of children can scarcely imagine life without a social networking profile; videos and photographs shared online – often in real time – and online gaming. Indeed, young people are at the vanguard of technological change Their coming-of-age in this era of exponential innovation has widened the generational divide between them and their parents, their teachers and other caregivers. This gap, while becoming less stark in industrialized countries, is wider in lower income countries where caregivers arguably have fewer opportunities to access information and communication technology. But the situation is changing rapidly There is no doubt that the Internet yields numerous opportunities and benefits for children in terms of its impact on their educational attainment and social inclusion. However, it has also exposed children to dangers that defy age, geographic location and other boundaries that are more clearly delineated in the real world. This has resulted in risks to children and young people of having abusive images of them shared on the Internet; of being groomed or lured into sexual conversations or exploitation by adult offenders; of being bullied or harassed online. Bearing this in mind, the UNICEF Innocenti Research Centre has, in partnership with the Child Exploitation and Online Protection Centre in the United Kingdom, collaborated with a number of actors to undertake this study. The research explored children’s online behaviour, risks and vulnerability to harm, documenting existing preventive and protective measures to combat their online abuse and exploitation. The study draws on lessons from high- and middle-income countries, viewed through the lens of the dynamic that, given the speed of innovation, other countries may soon experience. What we have learned is that a singular approach to combating these crimes is not effective. What is required is a collective effort by policymakers, law enforcement agencies, social workers, teachers, parents and the private sector to systematically protect children. We have also discovered that many children are comfortable navigating the Internet and are able to avoid risks. They may see themselves as protectors of younger children and are themselves agents for change. Children should be allowed to express their views on how to mitigate risks, and they should be listened to and empowered to safely exploit the benefits of the Internet. However, we should not overestimate their ability to protect themselves. Ultimately, the onus lies with adults to put in place a framework that ensures children equal and equitable access to the Internet, along with a safer online environment. Access to knowledge, participation, leisure and play are fundamental rights of all children, as enshrined in the Convention on the Rights of the Child In today’s real and virtual worlds, it is our collective responsibility to ensure those rights for all children. Details: Florence, Italy: UNICEF Innocenti Research Centre, 2011. 32p., technical report. Source: Internet Resource: Accessed May 15, 2012 at: http://www.unicef-irc.org/article/825 Year: 2011 Country: International URL: http://www.unicef-irc.org/article/825 Shelf Number: 125276 Keywords: BullyingChild ProtectionChild Sexual ExploitationInternet CrimesInternet SafetyOnline CommunicationPornography |
Author: Robinson, Neil Title: Feasibility Study for a European Cybercrime Centre Summary: To advise the EC on the development of a European Cybercrime Centre, RAND Europe reviewed scholarly literature on the nature, extent, and impacts of cybercrime and collected empirical evidence on the capabilities of 15 EU member states' computer crime units in face to face visits. Findings from the literature and document review suggested a great deal of uncertainty between industry reported figures on the state of cybercrime and official recorded crimes. Nonetheless, the online criminal underground is evolving toward a service based economy. Aspects of forensic capability, investigations, intelligence sharing, training and information exchange were discussed. In addition, RAND Europe consulted Europol, Eurojust, Cepol, Interpol, and the European Network and Information Security Agency on their contribution to tackling cybercrime at the European level. A scenario based workshop was held in Brussels in November 2011 where a range of possible futures were described and considered by participants. The research team's report considers a number of options for the establishment of the ECC and evaluates their strengths and weaknesses according to a range of factors. These include its scope, activities, resources, risks, impacts and interoperability. The study considered a range of options including an ECC hosted by Europol, Eurojust, ENISA and a virtual ECC. The study considered that an ECC hosted by Europol would constitute the most appropriate way forward. The study laid out an implementation plan including expected activities for the first year of the ECC between January–December 2013. Details: Cambridge, UK: RAND Europe, 2012. 253p. Source: Internet Resource: Accessed June 26, 2012 at: http://ec.europa.eu/home-affairs/doc_centre/crime/docs/20120311_final_report_feasibility_study_for_a_european_cybercrime_centre.pdf Year: 2012 Country: Europe URL: http://ec.europa.eu/home-affairs/doc_centre/crime/docs/20120311_final_report_feasibility_study_for_a_european_cybercrime_centre.pdf Shelf Number: 125399 Keywords: Computer Crimes (Europe)Cybercrime (Europe)Information SecurityInternet Crimes |
Author: Davidson, Julia Title: Online Abuse: Literature Review and Policy Context Summary: The principal aim of this review is to examine the context of online abuse by providing an overview of the relevant policy, legislation and safety practice within the European Union, focusing on case studies within the UK, Norway, Belgium and Italy to outline different attempts to educate children and young people about Internet safety issues1. An illustrative brief comparison to legislation and policy outside the EU is also provided, particularly for the USA, Australia and New Zealand where progress has been made in this area. The purpose of the review is to provide background to a scoping exercise on the current knowledge of online grooming and EU online child safety practice. This review will then inform parallel work collecting data from stakeholders on current knowledge, practice and policy on internet grooming for the sexual abuse of children. This is the first stage of an EC Safer Internet Plus Programme project to undertake the first comprehensive study of online grooming, involving the UK, Norway, Belgium and Italy. The breadth and scope of a European wide study entailed some decisions about selection of literature for review. The first decision was to focus on the European Union as opposed to the broader European continent. However, due to the awareness of the lack of geographical boundaries that online behaviour encompasses, there was an acknowledged need to reference other research in progress, for example in Russia, that sheds more light on young people’s online safety within the EU. The timescale for the review covers a period over the last five to six years – the period in which most of the research on young people and internet use has taken place. Details: European Online Grooming Project, 2011. 52p. Source: Internet Resource: Accessed July 21, 2012 at: http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/EOGP-Literature-Review.pdf Year: 2011 Country: Europe URL: http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/EOGP-Literature-Review.pdf Shelf Number: 125714 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual Abuse |
Author: Webster, Stephen Title: Final Report (European Online Grooming Project) Summary: The sexual abuse of young people via the Internet is an international problem, a crime without geographical boundaries. Solutions both to perpetrators’ use of the Internet and to the safety of young people online must be sought and will necessarily involve agencies working to protect young people at local, national and international levels. Action of the Safer Internet Plus programme invited proposals for projects that aim to enhance the knowledge of the online sexual abuse of young people, with a particular focus on online grooming. • Online grooming is defined as the process by which a person befriends a young person1 online to facilitate online sexual contact and/or a physical meeting with them, with the goal of committing sexual abuse. The European Online Grooming Project research consortium is comprised of experts from across Europe and was tasked with meeting the following research objectives: o describe the behaviour of both offenders who groom and young people who are ‘groomed’, o describe how information, communication technology (ICT) may facilitate online grooming, o identify how young people are selected and prepared by online groomers for abuse online, o contribute to the development of prevention initiatives aimed at parents and young people. Methods • The project had three separate but interlinked phases. The first was a scoping project that involved a literature review, review of police case files and interviews with key stakeholders. Phase 2 of the research involved in-depth interviews with 33 male offenders convicted of online grooming in the UK, Belgium and Norway. Online groomers’ chat-logs were sourced from Italy. Phase 3 encompassed twelve focus groups with young people in the UK, Belgium and Italy. The aim of these groups was to understand young people’s online behaviour in the context of the groomers’ accounts, and explore young people’s view of online risks and current safety initiatives. In addition, seven dissemination events were held with teachers, parents and professionals in Belgium, Italy, Norway and the UK in order to promulgate the key findings from the project. • This report brings together findings from the main stages of the European Online Grooming Project - the in-depth interviews with online groomers, focus groups with young people, and dissemination events with key stakeholder groups. The scoping report and literature review have been published and are available for download at the project web-site. Details: European Online Grooming Project, 2012. 172p. Source: Internet Resource: Accessed July 23, 2012 at: http://www.natcen.ac.uk/media/843993/european-online-grooming-project-final-report.pdf Year: 2012 Country: Europe URL: http://www.natcen.ac.uk/media/843993/european-online-grooming-project-final-report.pdf Shelf Number: 125718 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual Abuse |
Author: Webster, Stephen Title: Scoping Report (European Online Grooming Project) Summary: The sexual abuse of young people via the Internet is an international problem, a crime without geographical boundaries. Solutions both to perpetrators’ use of the Internet and to the safety of young people online must be sought and will necessarily involve agencies working to protect young people at local, national and international levels. The police have suggested that an increasing number of online sex offenders are grooming young people online, using online social networks and internet chat rooms. Whilst a great deal is known about sex offender behaviour and there is an increasing body of pioneering work addressing those accessing indecent child images, little is known about online groomers and the way in which they select and engage victims. • To this end, Action 3.1 of the Safer Internet Plus programme invited proposals for projects that aim to enhance the knowledge of the online sexual abuse of young people, with a particular focus on online grooming. • Following a competitive tendering exercise, the European Online Grooming Project was commissioned. The research consortium is comprised of experts from across Europe, tasked with meeting the following overarching research objectives: • describe the behaviour of both offenders who groom and young people who are ‘groomed’ and explore differences (e.g. in demographics, behaviour or profiles) within each group and how these differences may have a bearing on offence outcome, • describe how information, communication technology (ICT) is used to facilitate the process of online grooming, • further the current low knowledge base about the way in which young people are selected and prepared by online groomers for abuse online, • make a significant contribution to the development of educational awareness and preventative initiatives aimed at parents and young people. The Project has three separate but interlinked phases. The first is a scoping project, the subject of this report. The second and third phases involve interviews with convicted online groomers across Europe and dissemination to professionals, parents, carers and young people respectively. • The scoping project contained three elements, all which had the aim of maximising the potential of phase 2 and 3 of the research. As such, the scoping phase contained a review of the literature and policy context1 and a review of convicted online groomers’ police case files. The scoping phase culminated with 19 in-depth interviews with stakeholders across Europe. These professionals all had expertise in the behaviour of online groomers from either an investigative, treatment, technological or young person’s perspective. • The review of police case files and interviews with key stakeholders resulted in the development of hypothetical model of online grooming. This model, drawn on case file and stakeholder accounts will then be used as a framework to ask questions of online groomers in the next stage of the research. It is important to note that the phases of the model presented here may be subsequent to significant change following the interviews with convicted online groomers. As such, the model in this report should be viewed as a hypothetical framework for subsequent appraisal. It should not be interpreted as the definitive presentation of the process of online grooming. • The hypothetical model has nine phases that encompass: vulnerability factors; grooming style; preparation and scanning; identity assumed 1; initial contact; identity assumed 2; desensitisation; offence maintenance and intensity; and finally, outcomes. • Evidence from stakeholder accounts suggests that some offenders may be engaging with 30 to 50 young people at different stages of the grooming process at any one time, and that offenders tend to refine their activities on the basis of what had ‘worked well’ in previous encounters with young people. Consequently, movement through different stages of the model of online grooming is neither unitary or linear, but rather, cyclical, involving a pattern of adoption, maintenance, relapse, and readoption over time. • It was also evident that the actual process of online grooming may take minutes, hours, days or months. As such, online groomers remain at different phases of the model for various lengths of time according to a dynamic inter-relationship between their goals and needs and the style or reactions of the young person. • In order to explain as well as describe online grooming, this report suggests that online grooming may be set within the context of three existing theories within forensic and social psychology. The first is Ward and Hudson’s (1998) self-regulation model of the sexual offence process. The central premise of Ward and Hudson’s theory is that different self-regulation styles, the internal and external processes that allow an individual to engage in goal-related behaviour, underpin the sexual offence process. The second is Suler’s (2004) theory of the online disinhibiton effect. This framework contains three dimensions that may also help develop understanding of online groomers’ behaviour: dissociative anonymity; invisibility and dissociative imaginationimagination. Finally, the theory of deindividuation (Zimbardo, 1969) proposes that factors such as anonymity, loss of individual responsibility, arousal and sensory overload contribute to a state of deindividuation and behavioral disinhibition where established norms of conduct may be violated. • It is important for all research to have an applied focus but even more so for this project, where the need for robust evidence is acute and the public safety message is clear. As such, stakeholders identified four core needs for the European Online Grooming Report. To provide strategies to aid detection and interviewing; further understanding regarding assessment and treatment needs; to raise awareness across the key groups outlined above; and finally, to avoid demonising the Internet per se. Details: European Online Grooming Project, 2010. 51p. Source: Internet Resource: Accessed July 23, 2012 at: http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/EOGP-Project-scoping-report.pdf Year: 2010 Country: Europe URL: http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/EOGP-Project-scoping-report.pdf Shelf Number: 125742 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual Abuse |
Author: Quayle, Ethel Title: Online Behaviour Related to Child Sexual Abuse: Interviews with affected Young People Summary: Most young people in Europe have access to the Internet. In a study by Livingstone et al. (2011), including 25 142 children between 9-16 years old in 25 countries in the European Union (EU), the average age for first time contact with the Internet was 9 years old. In this study 60% reported that they used the Internet on a daily basis and 33% that they used the Internet once or twice a week. Access to the Internet is not only increasing, but today many youth have their own mobile phones with internet access. In the study by Livingstone et al. (2011) 35% of the youth used their own PC, 24% their own laptop and 12% a handheld device (e.g. iPod Touch, I-phone and Blackberry) when going online. The most common activities online were doing schoolwork (85%) followed by online gaming (83%) and watching video clips (76%). Most young people are alone when using their mobile phone and the Internet (Medierådet, 2010). This differs from other media forms, e.g. watching television and playing games on the computer, that more often are done together with a friend or an adult. This means that young people most of the time are alone when surfing the net, without adults being able to supervise or to hinder the youth from possible risk taking online. Most young people seem though to be well aware of the fact that there are safe and risky behaviours connected with the use of Internet (Jonsson et al, 2009). When a child reaches adolescence it is developmentally normal to expand their social network, forming close relationships and experiencing sexuality. The Internet is accessible, anonymous and affordable (Cooper, 1998) which makes it natural to use it for sexual purposes. In a study by Daneback and Månsson (2009) nine out of ten Swedish young people, between 18-25 years old, used the Internet for romantic or sexual purposes. The most common online sexual activity was watching pornography among the boys and searching for information about sex among the girls. Many studies have shown that pornography use is greater for young males (Caroll et al, 2008; Luder et al., 2011; Svedin et al, 2011) but recent studies show that the gender differences are most apparent with older adolescents and that there are less differences between genders who are 12 years old and younger (Livingstone et al., 2011). However young people are not only passive consumers of sexual material. They also produce and distribute their own sexual material and find sexual contacts online. Online risk taking behaviour Offline risk taking behaviour such as use of drugs, smoking, not attending school and having unprotected sex are more common among adolescents than others (e.g. Benthin et al., 1993; Boyer, 2006; Steinberg, 2008). Studies indicate that young people who take risks offline also do so online (Mitchell et al, 2007a). However, different studies use varying definitions as to what online risk taking behaviour is. Baumgartner et al. (2010) limited their definition to include communication with unknown people and categorized the following behaviours as risky: - Searching online for someone to talk about sex - Searching online for someone to have sex - Sending intimate photos or videos to someone online - Disclosing personal information like telephone numbers and addresses to someone online. Most risk behaviour does not lead to any negative consequences and is more likely to be associated with positive outcomes, while other risk behaviours can result in abuse, be lifealtering or may, in extreme cases, even be a threat to life. Online risk taking behaviour has been shown to increase the likelihood of negative experiences, such as unwanted aggressive sexual solicitations online (Cooper et al., 2002; Mitchell et al., 2007b). Misuse of personal information by others is another negative consequence. Even if young people are well informed about the negative effects of, for example, taking drugs or having unprotected sex, some still go ahead. Likewise research studies, and results from clinical projects about online sexual abuse, have shown that young people often are well aware of the risks online but take them anyway (e.g. Jonsson et al., 2009; Wolak, 2007). This research addresses some of the major challenges in constructing preventative work to hinder young people from risk taking behaviours (see, for example, Denehy, 2000). There might be many explanations as to why young people take risks online. In the study by Baumgartner et al. (2010) young people’s engagement in online risky sexual behaviour was investigated in a cross-sectional study. The young people who took sexual risks online perceived that more friends were engaged in these behaviours, perceived fewer risks and more benefits from the risky sexual behaviour and felt personally less vulnerable to negative consequences than other young people. Probably most youth who take risks online estimate the risks to be less than the positive effects that might follow. Studies from clinical projects and research have shown that one primary function of online risk taking behaviour is to be seen and to receive affirmation (Jonsson et al., 2009; Jonsson & Svedin, 2012; Nigård, 2009). Details: Child Centre (The Expert Group for Cooperation on Children at Risk; ROBERT Project, EU Safer Internet Programme, 2012. 77p. Source: Internet Resource: Accessed July 23, 2012 at: http://www.childcentre.info/robert/public/Interview_analysis_PRELIMINARY.pdf Year: 2012 Country: Europe URL: http://www.childcentre.info/robert/public/Interview_analysis_PRELIMINARY.pdf Shelf Number: 125743 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual AbusePornographySocial Networking |
Author: Kolpakova, Olga, ed. Title: Online Behaviour Related to Child Sexual Abuse: Focus Groups' Findings Summary: Over the last two decades more than 200 studies have been made that focus on various aspects of child online sexual violence. The majority of the surveys highlighted the way children use Internet. According to one of the largest scale surveys – EU Kids Online survey – produced in 2010, 60% of European children aged 9 to 16 years old use the Internet on a daily basis, spending on average 88 minutes online. They do their homework, play games alone or against the computer, watch video clips online, use Internet interactively for communication (social networking, instant messaging etc.) and read/watch the news, play with others online, download films and music, share content peer-to-peer (eg, via webcam or message boards), visit chat rooms, share files, blog and spend time in a virtual world (Livingstone et al 2011). Internet accessibility, frequency and duration of use, and types of children's online activities have been the focus of studies in a number of other national surveys (Leicht & Sorensen 2011, Children… 2006, Medienpädagogischer… 2010a,b, Mainardi and Zgraggen 2010, Soldatova et al 2010, Levina et al 2011, Medierådet 2005, 2008, 2010). The more active our children are online, the greater the risks associated with Internet use. According to a number of studies, a significant number of children and young people practice behaviour which could potentially lead to negative repercussions, such as; seeking new friends online (Levina et al 2011), having contact online with someone they have never met face to face (Livingstone et al 2011), having people on “buddy lists” known only online (Ybarra et al 2007, Levina et al 2011), sending personal information to people they have never met face to face (Livingstone et al 2011, Levina et al 2011), posting personal information (Ybarra et al 2007) and sexualized images (Svedin & Priebe 2009, Daneback & Månsson 2009), posing nude (De Graaf & Vanweseenbeeck 2006) or masturbating (Svedin & Priebe 2009) in front of a web cam, sending personal information (Ybarra et al 2007, Levina et al 2011), sending or receiving sexual images (Lenhart 2009), accessing pornography (Svedin et al 2011, Wolak et al 2007, Sørensen & Kjørholt 2007, Sabina et al 2008), talking about sex online (Medieradet… 2010, Livingstone et al 2011, Ybarra et al 2007) and meeting people face to face offline who they initially made contact with on the Internet (ACPI/PROTEGELES 2002, Helweg-Larsen et al 2009, Livingstone et al 2011, Mainardi & Zgraggen 2010, Monteiro & Gomes 2009, Wojtasik 2004). In some cases such behaviour could be regarded as a form of adolescent age-appropriate social and sexual expression and curiosity, and may not always lead to negative repercussions. In other cases, however, children and adolescents have narrowly avoided danger in potentially threatening situations. Therefore, not all those interacting online with unknown people, sometimes discussing sex, have been exposed to unwanted sexual solicitations or other negative repercussions (Wolak et al 2008). Of those who reported having seen pornography online accidentally or purposefully, two of three were unaffected by the experience (Livingstone et al 2011). However, some children and young people do experience negative consequences from such behaviour. Children may feel cheated, disgusted or uncomfortable by what they have seen on pornographic websites (Livingstone et al 2011), young people may be highly distressed after incidents of solicitation (Mitchell et al 2001), in some cases children and adolescents could be pressured or threatened into having sex during offline meetings with their online acquaintances (Suseg et al 2008, Helweg-Larsen et al 2009, Levina et al 2011). Studies have shown that the Internet (Levina et al 2010), and in particular chat rooms (Briggs et al 2010, Wagner 2008) and social networking sites (Wise et al 2010), could be used by offenders who are interested either in engaging in cyber sex without any direct wish to meet in real life or in meeting offline for sex. In a number of studies individual risk factors that led to sexual abuse, were identified. Studies show that girls (Baumgartner et al 2010, Ellonen et al 2008, Mainardi and Zgraggen 2010, Mitchell et al 2007a, Wolak et al 2008), adolescents (Baumgartner et al 2010, Ellonen et al 2008, Livingstone et al 2011, Wolak et al 2004), youngsters with lower education (De Graaf and Vanwesenbeeck 2006), teenagers who identify themselves as homosexual or those with unclear sexual orientation (Wolak et al 2004) are at a higher risk of experiencing Internetrelated sexual abuse. Personal behavioural factors such as frequent Internet use (De Graaf & Vanwesenbeeck 2006, Mitchell et al 2001, Stahl and Fritz 2002, Wolak et al 2008, Ybarra et al 2004), online risk-taking behaviour (ACPI/PROTEGELES 2002, Mitchell et al 2001, Mitchell et al 2008, Stahl and Fritz 2002), and substance use (Ybarra et al 2004) may also increase the chance of a young person becoming a victim of Internet-related sexual abuse. Another group of individual risk factors is related to personal traumatic experiences and emotional situations. According to the research data, youth (especially girls) with a history of offline sexual or physical abuse (De Graaf & Vanwesenbeeck 2006, Mitchell et al 2007b, Wolak et al 2008) and youth suffering from depression (such as sadness, emptiness or concentration problems) (Ybarra et al 2004) are at greater risk of online sexual solicitation. Even though a number of researches (Kvam 2001, Sullivan & Knutson 2000, SISO & SUS 2007) have shown that children with disabilities are more often exposed to sexual abuse, it is still not clear if these children are at greater risk of online sexual violence. A group of environmental risk factors includes: single-parents or reconstituted families (e.g. Gallagher 2007), homelessness or runaways (e.g. Regional… 2008), higher household socio-economic status (Livingstone et al 2011, Mitchell et al 2003), the lack of close parental relationships (ICAA 2004, Sørensen 2007), as well as lower levels of parental control (De Graaf & Vanwesenbeeck 2006, Mitchell et al 2003). In a few studies, resilience in relation to young people’s online behaviour was specifically focused upon. It was found that young people could use a number of strategies to reduce the risks of negative repercussions when meeting online friends in real life. These included informing their parents (e.g. Livingstone et al 2011) or friends (Bauermeister et al 2010) about the meeting, arranging meetings in public places and trying to get to know an online friend better before meeting them offline (Bauermeister et al 2010). When negatively affected by online contact (sexual messages, bullying, sexual images), children could use the following strategies: hope that the problem would go away by itself, report the problem, change their filter/contact settings, delete any messages from the person or block the person, try to fix the problem, talk to someone about the problem or stop using the Internet temporarily (Livingstone at al 2011). In addition to the growing impact the role of the Internet is having on children’s lives, researchers are specifically discussing the problem of merged online/offline environments (e.g. Lansdown 2011, Levina et al 2011). The online environment provides young people with more opportunities for accessing information, self-expression, self-promotion, social role experimentation and communication. It has becoming an integral part of their life where the boundary between online and offline experiences is vanishing. At the same time, offline safety rules and behaviour patterns are not always applicable to the online environment, and children’s online activities are to a lesser extent controlled by parents. It may seems obvious that there is a need for online behaviour education; we have to teach our children safe and correct use of information and communication technologies and improve parent’s ability to effectively control the online activities of their children1. However, there are still some aspects of child online sexual violence that have not been studied sufficiently. In particular, we do not clearly understand the child’s role in establishing and developing online relations with people who may potentially harm them in the future. Do children take the initiative themselves? Do they actively seek new friends and contacts online? What is their response to unwanted approaches? How do young people identify individuals that pose a risk of online sexual violence? Do they think that they are at risk themselves? Which strategies do young people usually use to stay safe online? Do young people perceive their world as undivided or do borders between the online and offline world still exist? Are there any groups of young people who are at greater risk of online sexual violence then others (such as GLBT, young people with disabilities, young people in residential care etc.)? And if so are there any differences between these groups in how they establish agency in a virtual world, negotiate online relationships, identify risks, stay safe online and distinguish between the online and physical world? The project ROBERT, Risktaking Online Behaviour Empowerment through Research and Training, is one attempt to answer some of the above questions. This project intends to make online interaction safe for children and young people. This project is implemented from June 2010 to June 2012, and is funded by the European Commission Safer Internet Programme as a Knowledge Enhancement Project. It is managed and coordinated by the CBSS Expert Group for Cooperation on Children at risk, EGCC, in partnership with the University of Tartu (Estonia), Linköping University (Sweden), University of Edinburgh (United Kingdom), Save the Children Denmark, Save the Children Italia, Innocence in Danger (Germany), Stellit International (the Netherlands and Russia) and Kingston University (UK). As a part of the project, focus groups with young people, some of whom may be considered to be more at risk of online abuse (young people in residential care, young people that are gay, lesbian, bisexual or transgender and young people with some form of disability), as well as with young people from the general population were interviewed in 2011–2012 in Denmark, United Kingdom, Sweden, Estonia, Italy, Germany and Russia. The aim of the focus group interviews was to obtain qualitative information about adolescent’s online behaviour, their need to socialize, communicate and discover themselves and the world and particularly those behaviours that lead to risktaking and their possible links with sexual victimization, while examining the strategies they use to avoid victimization itself. The issues that were discussed with children and explored with focus groups could be summarized in three main thematic areas: 1) characteristics of Internet use; 2) characteristics of online communication and its impact on the life of young people; 3) staying safe online. The results obtained from the focus groups are presented in the report. The chapter “Methodological issues” includes a glossary and a brief overview of focus groups and framework analysis. Particular attention is paid to the issue of ensuring quality in qualitative research. Issues such as sampling, procedures and data analysis are described. In the chapter “Research results” five main themes which were identified across the focus groups are examined: Establishing agency in a virtual world; Negotiating online relationships; Distinguishing between in-groups and out-groups; Safety online; Delineating between merged realities. Details: Child Centre (The Expert Group for Cooperation on Children at Risk; ROBERT Project, EU Safer Internet Programme, 2012. 68p. Source: Internet Resource: Accessed july 23, 2012 at: http://www.childcentre.info/robert/public/ROBERT_Focus_grups_report_wr.pdf Year: 2012 Country: Europe URL: http://www.childcentre.info/robert/public/ROBERT_Focus_grups_report_wr.pdf Shelf Number: 125744 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual AbusePornographySocial Networking |
Author: Ainsaar, Mare Title: Online Behaviour Related to Child Sexual Abuse: Literature Report Summary: Young people today grow up in a technology-mediated world with almost unlimited access to games, music and film, not to mention the enormous array of contacts with other youth all over the world facilitated by the Internet. This opens tremendous possibilities that were unimaginable only half a generation ago. While such availability would uniformly be seen as positive, there are increasingly concerns about the problems access to technology might bring for young people. While the overwhelming majority of children and young people navigate safely through the Information and Communication Technologies, some children fall victim to abuse and to violence. While there is concern across different countries about online solicitation and grooming, there have been very few analyses to date that have explored how these contacts occur and what maintains these online relationships in the face of highly sexualised content. The ROBERT project intends to make online interaction safe for children and young people. This will be achieved by learning from experiences of online abuse processes and the factors that make young people vulnerable as well as those that offer protection. As part of the ROBERT project a systematic review of studies, with a specific focus on sexually abusive online experiences and offline sexual abuse that have started with an online contact or where the contacts between the perpetrator and the young person have relied heavily on information and communication technologies has been made. This report will cover also some issues of specific interest as we discuss young people who are at risk of sexual abuse in connection with information and communication technologies and seek answers questions as follows: I What patterns can be observed from the review on a European level that relate to areas of concern across different countries? II How do different data collection methods impact on the type and the quality of the data obtained? (For example, telephone interviews, paper based surveys responded to in class-room settings, online questionnaires etc). III When compared with other research on difficult and sensitive issues involving young persons, what is indicated in relation to disclosure and how does this compare with official statistics? IV Which behavioural patterns and risks seem to differentiate between specific groups of young people? (e.g. in relation to gender or sexual orientation). V Are there any reports that explore the perception of the young person with regard to the expression of their sexuality online and their interpretation of abusive practices? VI What studies have examined specific behavioural patterns that can be seen as leading from online contact to abusive experiences? VII How can we understand resilience in relation to young people’s online behaviour? VIII Do the reports indicate new emerging research needs as yet uncovered? IX What are the individual risk factors, or risks related to the environment, leading to sexually abusive experiences? X How have the complex ethical issues in involving children been negotiated across studies? Relevant publications were added to a publications database, set up as a part of the project. The emphasis of the work was on collecting information on publications related to online sexual abuse issues from 20 EU countries and Russia, but also publications from other parts of the world have been included if information was available to the project partners. The current report is the first analysis of literature collected by the ROBERT project in the database. The report consists of four major topics: 1. Methodological issues including regional and methodological coverage of online child sexual violence literature 2. Research evidence in to behavioural patterns which lead to becoming a victim of sexual abuse including risk factors of becoming a victim of sexual abuse 3. Behavioural patterns which lead to becoming a sexual abuser and sexually abusive behaviours including risk factors which lead to becoming a sexual abuser and sexually abusive behaviours 4. Specific behavioural patterns and risks of becoming a victim of abuse in relation to particular groups The database on Internet related child sexual abuse literature is available for public use on the Child Centre webpage www.childcentre.info/ROBERT. Details: Child Centre (The Expert Group for Cooperation on Children at Risk; ROBERT Project, EU Safer Internet Programme, 2012. 122p. Source: Internet Resource: Accessed July 24, 2012 at: http://www.childcentre.info/robert/public/Online_behaviour_related_to_sexual_abuse.pdf Year: 2012 Country: Europe URL: http://www.childcentre.info/robert/public/Online_behaviour_related_to_sexual_abuse.pdf Shelf Number: 125757 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual Abuse |
Author: Finklea, Kristin M. Title: Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement Summary: Twenty-first century criminals increasingly rely on the Internet and advanced technologies to further their criminal operations. These criminals can easily leverage the Internet to carry out traditional crimes such as distributing illicit drugs and sex trafficking. In addition, they exploit the digital world to facilitate crimes that are often technology driven, including identity theft, payment card fraud, and intellectual property theft. Cybercrimes have economic, public health, and national security implications, among others. For over three decades, Congress has been concerned about cybercrime and its related threats. Today, these concerns often arise among a larger discussion surrounding the federal government’s role in ensuring U.S. cyber security. Conceptualizing cybercrime involves a number of key elements and questions that include where do the criminal acts exist in the real and digital worlds (and what technologies are involved in carrying out the crimes), why are malicious activities initiated, and who is involved in carrying out the malicious acts? • One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world,” crimes if not for the incorporated element of virtual or cyberspace. In some instances, however, it may seem that law enforcement struggles to keep up with developments in the virtual world, which transform routine activities once driven by paper records in the real world. As a result, criminals are often prosecuted using laws intended to combat crimes in the real world. • The distinction between cybercrime and other malicious acts in the virtual realm is the actor’s motivation. Cyber criminals can exhibit a wide range of self interests, deriving profit, notoriety, and/or gratification from activities such as hacking, cyber stalking, and online child pornography. Without knowing the criminal intent or motivation, however, some activities of cyber criminals and other malicious actors may appear on the surface to be similar, causing confusion as to whether a particular action should be categorized as cybercrime or not. When referring to cybercrime incidents, terms such as cyber attack, cyber espionage, and cyber war are often loosely applied, and they may obscure the motives of the actors involved. • Criminal attribution is a key delineating factor between cybercrime and other cyber threats. When investigating a given threat, law enforcement is challenged with tracing the action to its source and determining whether the actor is a criminal or whether the actor may be a terrorist or state actor posing a potentially greater national security threat. This is highlighted by examining the online collective known as Anonymous. Some refer to Anonymous as a group of online activists, others see the collective as a group of criminal actors, and still others have likened it to online insurgents. The U.S. government does not appear to have an official definition of cybercrime that distinguishes it from crimes committed in what is considered the real world. Similarly, there is not a definition of cybercrime that distinguishes it from other forms of cyber threats, and the term is often used interchangeably with other Internet- or technology-linked malicious acts. Federal law enforcement agencies often define cybercrime based on their jurisdiction and the crimes they are charged with investigating. And, just as there is no overarching definition for cybercrime, there is no single agency that has been designated as the lead investigative agency for combating cybercrime. Congress may question whether it is necessary to have a clear definition of what constitutes cybercrime (e.g., S. 2105, S. 3414) and what delineates it from other real world and cyber threats. On one hand, if the purpose of defining cybercrime is for investigating and prosecuting any of the various crimes under the broader cybercrime umbrella, it may be less critical to create a definition of the umbrella term and more imperative to clearly define which specific activities constitute crimes—regardless of whether they are considered real world crimes or cybercrimes. On the other hand, a distinction between cybercrime and other malicious activities may be beneficial for creating specific policies on combating the ever-expanding range of cyber threats. If government agencies and private sector businesses design strategies and missions around combating cybercrime, it may be useful to communicate a clear definition of cybercrime to those individuals who may be involved in carrying out the strategies. The United States does not have a national strategy exclusively focused on combating cybercrime. Rather, there are other, broader strategies that have cybercrime components (a selection of which are presented in the Appendix). Policymakers may question whether there should be a distinct strategy for combating cybercrime or whether efforts to control these crimes are best addressed through more wide-ranging strategies such as those targeting cyber security or transnational organized crime. Congress may also question whether these broader strategies provide specific cybercrime-related objectives and clear means to achieve these goals. Comprehensive data on cybercrime incidents and their impact are not available, and without exact numbers on the current scope and prevalence of cybercrime, it is difficult to evaluate the magnitude of the threats posed by cyber criminals. There are a number of issues that have prevented the accurate measurement and tracking of cybercrime. For one, the lack of a clear sense of what constitutes cybercrime presents a barrier to tracking inclusive cybercrime data. Additionally, much of the available data on cybercrime is self-reported, and individuals or organizations may not realize a cybercrime has taken place or may elect—for a host of reasons— not to report it. Policymakers may debate whether to direct a thorough evaluation of the threats posed by cyber criminals. Details: Washington, DC: Congressional Research Service, 2012. 30p. Source: Internet Resource: R42547: Accessed August 3, 2012 at: http://www.fas.org/sgp/crs/misc/R42547.pdf Year: 2012 Country: United States URL: http://www.fas.org/sgp/crs/misc/R42547.pdf Shelf Number: 125858 Keywords: Computer CrimesCybercrimes (U.S.)Internet Crimes |
Author: Gendarmerie Nationale Title: Prospective Analysis on Trends in Cybercrime from 2011 to 2020 Summary: Cybercrime evolves and grows over time, as new information and communication technologies (ICT) are introduced. Everyone involved in the fight against cybercrime need to understand it in order to anticipate their actions. Twenty-two experts contributed to a prospective study on the decade from 2011 to 2020, based on an iterative process of electronic consultations, using the Delphi method and an open-ended questionnaire based on an ad hoc model. Their combined analyses made it possible to form a consensus on the trends and changes affecting cybercrime between now and 2020, through a discussion of the threats, attacks, authors, victims, and measures designed to keep information, government services, business and individual security and to provide a national defence in order to protect basic services, critical systems, and vital infrastructures. The dissemination of the results of the study is intended to encourage discussion on the strategies and resources to be implemented by decision-makers. For this purpose, it was presented during the 4th Upper Rhine Forum on Cyberthreats FRC2011, held at ENA (Ecole Nationale d’Administration) in Strasbourg, France, on 9th November 2011, on the topic "Cyberthreats at the horizon 2020", organized by the Région de Gendarmerie d'Alsace and the reserve officers (RC) of the Gendarmerie Nationale. Details: Santa Clara, CA: McAfee, 2011. 54p. Source: Internet Resource: Accessed September 11, 2012 at: http://www.mcafee.com/us/resources/white-papers/wp-trends-in-cybercrime-2011-2020.pdf Year: 2011 Country: International URL: http://www.mcafee.com/us/resources/white-papers/wp-trends-in-cybercrime-2011-2020.pdf Shelf Number: 126295 Keywords: Computer CrimesCybercrimeInternet Crimes |
Author: Global Agenda Council on Organized Crime Title: Organized Crime Enablers Summary: The Global Agenda Council on Organized Crime focused on the enablers of organized crime during the 2011-2012 term. This broad concept includes individuals, mechanisms and situations that play an important role in facilitating organized crime activities – whether intentionally or inadvertently – increasing its benefits and scale while reducing its risks. Organized crime exacts a multibillion cost on legitimate business, distorts markets and causes widespread ill-effects on society. Fuelled by the same forces of globalization that have expanded trade, communications and information worldwide, criminal syndicates now have unprecedented reach not only into the lives of ordinary people but into the affairs of multinational companies and governments worldwide. Although law enforcement has long focused on criminal gangs and illicit markets, only recently has it paid greater attention to those factors that enable such activities. This report focuses on the impact of enablers on three critical areas: cybercrime, money laundering and Free Trade Zones. In developing this report, the Council on Organized Crime took into account two main criteria: – continuity with its work in 2010-2011 on cybercrime and on money laundering in real estate – input received by Council on Organized Crime Members during virtual meetings and at the Summit on the Global Agenda in Abu Dhabi in October 2011 Details: Cologny/Geneva Switzerland: World Economic Forum, 2012. 27p. Source: Internet Resource: Accessed September 13, 2012 at: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/GAC_Organized_Crime_2307_light_july.pdf Year: 2012 Country: International URL: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/GAC_Organized_Crime_2307_light_july.pdf Shelf Number: 126325 Keywords: Computer CrimesCybercrimesInternet CrimesMoney LaunderingOrganized Crime |
Author: Rimer, Jonah Title: Literature Review - Responding to Child & Youth Victims of Sexual Exploitation on the Internet Summary: The sexual exploitation of children on the internet is a pertinent issue that has emerged to the forefront of society since the mainstream popularization of the internet in the mid 1990’s. Sexual exploitation on the internet is a concept encompassing three major forms of maltreatment against children: child pornography; child luring/unwanted sexual solicitation; and child prostitution/child sex tourism. When discussing these forms of abuse, as well as online sexual exploitation in general, there are many facets that must be taken into consideration. These include definitional issues of each form of abuse; characteristics of offenders and victims; the treatment of offenders; issues within law and law enforcement; advances in technology used by victims, perpetrators, and those combating online abuse; discoveries in scientific research that may increase the understanding of online abusers; an exploration of prevention efforts; a discussion of the relationship between child pornography, pedophilia, and contact offenses; and victim issues and responding to the needs of victims. These will be the significant themes and perspectives explored to summarize the key literature on the subject of the exploitation of children and youth on the internet. Details: Toronto: Boost Child Abuse Prevention & Intervention, 2007. 128p. Source: Internet Resource: Prepared for the “Responding to Child & Youth Victims of Sexual Exploitation on the Internet” Training Seminar. September 24th to 27th, 2007. Blue Mountain Resort, Collingwood, Ontario, Canada; Accessed October 9, 2012 at: http://www.boostforkids.org/LinkClick.aspx?fileticket=9o%2BhPW9lg6s%3D&tabid=166 Year: 2007 Country: International URL: http://www.boostforkids.org/LinkClick.aspx?fileticket=9o%2BhPW9lg6s%3D&tabid=166 Shelf Number: 126663 Keywords: Child PornographyChild ProstitutionChild Sex TourismChild Sexual ExploitationComputer CrimesInternet Crimes |
Author: Ospina, Maria Title: Sexual Exploitation of Children and Youth Over the Internet: A Rapid Review of the Scientific Literature Summary: The role of the Internet in the health and wellbeing of children and youth is just beginning to emerge as a priority topic in the public health research agenda. Public policy attention has recently focused on the impact of this medium on the attitudes, behaviour, and health of young people. Among the potential risks, the sexual exploitation and abuse of children and youth over the Internet is of substantial concern. Children and youth can be abused over the Internet in many ways: Internet-initiated grooming for purposes of sexual abuse (that is, online sexual solicitation), the possession, production, and distribution of Internet-based abuse images of children and youth, Internet-based receipt by children and youth of abuse images, and Internet-initiated incitement of or conspiracy to commit sexual abuse of children and youth through activities such as sex tourism and prostitution. These Internet-related sexual exploitation activities directly or indirectly result in offline situations of sexual abuse directed toward children. The need exists to identify the most vulnerable population of children and youth who are at risk of online sexual exploitation over the Internet, and to determine whether prevention and intervention programs for online sexual exploitation have been evaluated in the scientific literature. The objectives of this rapid review were: 1) to provide a descriptive overview and synthesis of information regarding the state of research on the frequency, effects, and risk factors for sexual exploitation of children and youth over the Internet; 2) to identify and evaluate the evidence available in the scientific literature on the assessment tools for children and youth who have been sexually exploited via the Internet; 3) to identify and evaluate the evidence available in the scientific literature on the safety, efficacy, effectiveness, economic, social, legal, or ethical aspects of prevention and therapeutic strategies for sexual exploitation of children and youth via the Internet; and 4) to map the health care, educational, and community resources available in Alberta and Canada regarding Internet safety and prevention of child and youth abuse and exploitation via the Internet. Details: Edmonton, AB, Canada: Institute of Health Economics, 2010. 84p. Source: Internet Resource: Accessed October 9, 2012 at: http://www.ihe.ca/documents/Online%20Sexual%20Exploitation.pdf Year: 2010 Country: International URL: http://www.ihe.ca/documents/Online%20Sexual%20Exploitation.pdf Shelf Number: 126666 Keywords: Child ProstitutionChild Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesPornographySex Tourism |
Author: Koleva, Desislava Title: Comprehensive Response to Child Pornography: Thematic Study on the System for Prevention of Online Sexual Abuse and Exploitation of Children in Bulgaria Summary: This study set out to explore the existing system and practices in Bulgaria and Eastern Europe for prevention and fighting child pornography. In the course of work the authors identified the need to provide an overview of the subject of online sexual exploitation and abuse of children and not just its manifestation in child pornography production and distribution. The Comprehensive Response to Child Pornography project is implemented by Save the Children Norway SEE Regional Office in cooperation with the Office of the State Coordinator for Anti-trafficking in Human Beings and Illegal Immigration in Bosnia and Herzegovina which invested financial and human resources in addressing this problem. The project is also financially supported by OAK Foundation. This study was conducted by the Centre for Inclusive Education which is partnering Save the Children in the first phase of the project with the main task to provide an overview of the situation in Bulgaria and identify and recommend good practices. The overarching goal of this study is to present a comprehensive perspective to the problem of sexual exploitation and abuse of children in cyberspace by outlining the main aspects and consequences of this crime, analyzing what has been achieved and what else can be done to improve the coordination of the fragmented approach taken so far. The specific objectives of the study were as following: - to study the existing system, procedures and capacities for prevention and fighting online sexual abuse and exploitation of children through child pornography in Bulgaria; - to understand and, if possible, suggest recommendations for addressing the challenges and improving the system; - to identify good practices that can be adopted and transferred by civil society organizations and public authorities in BiH. Why focusing on child pornography? The partners in this project have recognized that crimes against children are changing because of the advance in technology, particularly the Internet and information and communication technologies (ICTs). For the past decade most efforts have been focused on anti-child trafficking systems while also touching on other often accompanying manifestations of child sexual exploitation. Child trafficking for sexual purposes and prostitution are undoubtedly priority areas for prevention work in SEE countries. However, the spread of online sexual exploitation, including child pornography, through the advancement of ICTs which has been so far not in the spot light, should also be addressed as a priority in child protection policies. This research focuses on online sexual exploitation of children in its manifestation through child pornography materials but discusses also other ensuing aspects and dangers of the use of such materials in ‘grooming’ or enticing children over the Internet for sexually-oriented interactions that often spill over from cyberspace into real life. It attempts to present a more comprehensive picture of the harms involved in the exposure or involvement of children with child pornography. It argues that child pornography is not less harmful than physical violation. Child pornography is a fundamental abuse, not just a by-product of physical sexual abuse. Recent studies suggest that the use of children to make pornography ‘adds value’ to a commercial sexual exchange and assists in facilitating a child’s submission into other forms of commercial sex or sexual abuse. Early desktop study of official documents and research of secondary sources revealed a lack of up-todate data and scarce analysis materials regarding the situation and existing practices with regards to online sexual exploitation of children in Bulgaria. Despite these limitations, sufficient information was gathered to provide a broad overview of the situation in the country. The field research and round table discussion proved to be invaluable for analysis. They also served as a measure for validating information as different actors offered their perspective based on their practice. While the recommendations and main findings of this study are aimed primarily at Bulgarian and BiH civil society actors and decision makers, they will also be disseminated to relevant stakeholders and the broader public in order to achieve involvement and support of society in the fight against this form of child abuse. Details: Oslo: Centre for Exclusive Education & Save the Children Norway, 2009. 49p. Source: Internet Resource: Accessed october 11, 2012 at: http://resourcecentre.savethechildren.se/content/library/documents/comprehensive-response-child-pornography-thematic-study-system-prevention- Year: 2009 Country: Bulgaria URL: http://resourcecentre.savethechildren.se/content/library/documents/comprehensive-response-child-pornography-thematic-study-system-prevention- Shelf Number: 126679 Keywords: Child PornographyChild ProtectionChild Sexual AbuseChild Sexual Exploitation (Bulgaria)Computer CrimesInternet Crimes |
Author: Dooley, Julian J. Title: Review of Existing Australian and International Cyber-Safety Research Summary: This report provides a detailed overview of Australian and international research literature on cyber-safety risks. In general, there are several risks associated with using technology and exposure to these risks, when not properly addressed, is associated with negative consequences. However, the literature (scientific and non-scientific) suggests that some of the most troublesome online risks are strongly associated with offline risks and that these two worlds do not exist independently. Thus, in order to address online risks, it is crucial that offline behaviours also be considered. Finally, the research indicates that as young people increase their use of information and communication technologies, such as the Internet, they increase their risk of being exposed to negative online experiences. Details: Perth, Australia: Child Health Promotion Research Centre, Edith Cowan University, 2009. 276p. Source: Internet Resource: Accessed October 13, 2012 at http://www.dbcde.gov.au/__data/assets/pdf_file/0004/119416/ECU_Review_of_existing_Australian_and_international_cyber-safety_research.pdf Year: 2009 Country: Australia URL: http://www.dbcde.gov.au/__data/assets/pdf_file/0004/119416/ECU_Review_of_existing_Australian_and_international_cyber-safety_research.pdf Shelf Number: 126688 Keywords: Computer CrimeInternet Child Sexual AbuseInternet CrimesInternet SafetyJuvenile VictimsOnline GroomingOnline Sexual AbuseSocial Networking |
Author: Madsen, Sanne Title: Internet the Dangers and the Possibilities -- A Study about Swedish and Danish Teenagers’ Internet Habits Summary: When unknown things, (e.g. a new media) first emerge on the market it is often defined as a threat to the society’s values. This phenomenon is called moral panic and seems to be happening right now due to the diffusion of the Internet. Many times teenagers find themselves in the middle of disturbing situations. There are also concerns in the society that the Internet makes teenagers antisocial. Teenagers of today have been growing up with the Internet as a part of their daily life. Therefore we want to discover how this media affects them. We also want to find out if there are any differences and similarities in how Swedish and Danish teenagers use the Internet. In addition, we are interested to find out if there are any differences in how girls and boys use the media. We have done a quantitative research study where we used questionnaires. The questionnaires included 27 questions concerning Internet habits. The questionnaires were handed out to two schools, Bergaskolan in Sweden and Frederikssunds Private Realskole in Denmark. The students were in the age group 14 to 17 and went in grade 7, 8 and 9. We received 329 questionnaires and based our research on those answers. We didn’t find any major differences between the Swedish and the Danish students Internet habits. However, Swedish students seem to chat more than the Danish students. It is also common for both Swedish and Danish teenagers to have experienced something disturbing on Internet. In addition it is also common among the teenagers not to tell their parents about the incidents they frequently experiences while being online. We found some differences between the genders Internet habits. For example, the girls tend to use the Internet as an information tool whereas the boys use it as an entertainment provider. Details: Lund University Department of Sociology Media and Communication Studies, 2004. 61p. Source: Internet Resource: Accessed October 15, 2012 at: http://lup.lub.lu.se/luur/download?func=downloadFile&recordOId=1357519&fileOId=1357520 Year: 2004 Country: Europe URL: http://lup.lub.lu.se/luur/download?func=downloadFile&recordOId=1357519&fileOId=1357520 Shelf Number: 126732 Keywords: Computer CrimesInternet (Sweden, Denmark)Internet CrimesMediaMoral Panics |
Author: Dupont, Benoit Title: Skills and Trust: A Tour Inside the Hard Drives of Computer Hackers Summary: Stories of the exploits of computer hackers who have broken into supposedly secure government and corporate information systems appear almost daily on the front pages of newspapers and technology websites, yet we know very little about the individuals behind these headlines. Most media accounts and academic studies on hackers suffer from a number of biases that this research attempts to overcome. A case study based on the seized communication logs of ten confirmed co-offenders is used to expand our knowledge of the social norms and practices that govern interactions between malicious hackers. After presenting the data and how the material became available to the author, the remaining sections focus on the two variables that define this criminal network’s performance: skills and trust. The skills under consideration are the three different sets of cognitive and practical abilities that malicious hackers need in order to succeed financially. Monetization and social skills, in addition to technical skills, play key roles in profit-oriented malicious hacking and explain why earning a decent living in the computer underground remains a laborious endeavour, even for advanced hackers. Trust, which facilitates the diffusion of technical, monetization, and social skills and fosters collaboration, was found to be much lower in this network than is generally assumed in the literature. The need for monetization and social skills as well as the lack of trust between members may partly explain why hacker networks are so ephemeral and vulnerable to law enforcement disruption. Details: Montreal: School of Criminology, University of Montreal, 2012. 51p. Source: Internet Resource: Accessed October 15, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2154952 Year: 2012 Country: United States URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2154952 Shelf Number: 126746 Keywords: Computer CrimesHackersInternet CrimesOnline VictimizationSocial Network Analysis |
Author: Ponemon Institute Title: 2012 Cost of Cyber Crime Study: Germany Summary: This is the first year the study was conducted in Germany to better understand the economic impact a cyber attack can have on an organization. The benchmark study is based on a representative sample of 43 organizations in various industry sectors. The first Cost of Cyber Crime Study was conducted in the US in 2010 and is now in its third year. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. In Germany, theft of information and revenue losses create the highest costs for organizations following a cyber attack. Details: Traverse City, MI: Ponemon Institute, 2012. 30p. Source: Internet Resource: Accessed October 22, 2012 at http://www.hpenterprisesecurity.com/news/download/2012-cost-of-cyber-crime-study-germany Year: 2012 Country: United States URL: http://www.hpenterprisesecurity.com/news/download/2012-cost-of-cyber-crime-study-germany Shelf Number: 126774 Keywords: Costs of Crime (Germany)Cybercrimes (Germany)CybersecurityInternet Crimes |
Author: United Nations Office on Drugs and Crime Title: The Use of the Internet for Terrorist Purposes Summary: The use of the Internet for terrorist purposes is a rapidly growing phenomenon, requiring a proactive and coordinated response from Member States. The United Nations Office on Drugs and Crime (UNODC) plays a key role in providing assistance to Member States, in furtherance of its mandate to strengthen the capacity of national criminal justice systems to implement the provisions of the international legal instruments against terrorism, and does so in compliance with the principles of rule of law and international human rights standards. In particular, in 2011, the General Assembly, in its resolution 66/178, reaffirmed the mandate of UNODC to continue to develop specialized legal knowledge in the area of counter-terrorism and pertinent thematic areas, including the use of the Internet for terrorist purposes. Despite increasing international recognition of the threat posed by terrorists’ use of the Internet in recent years, there is currently no universal instrument specifically addressing this pervasive facet of terrorist activity. Moreover, there is limited specialized training available on the legal and practical aspects of the investigation and prosecution of terrorism cases involving the use of the Internet. The present publication complements the existing resources developed by UNODC in the areas of counter-terrorism, cybercrime and rule of law. It also addresses the importance of developing integrated, specialized knowledge to respond to the technical assistance needs of Member States in combating this continually evolving threat. UNODC is deeply grateful for the generous support of the Government of the United Kingdom of Great Britain and Northern Ireland, which made the publication of that work possible. The publication, which is intended for use both as a stand-alone resource and in support of the capacity-building initiatives of UNODC, is aimed at providing guidance regarding current legal frameworks and practice at the national and international levels relating to the criminalization, investigation and prosecution of terrorist cases involving the Internet. Terrorism, in all its manifestations, affects us all. The use of the Internet to further terrorist purposes disregards national borders, amplifying the potential impact on victims. By highlighting cases and best practices that respond to this unique challenge, the present publication has two aims: first, to promote a better understanding of the ways in which communications technologies may be misused in furtherance of acts of terrorism and, second, to increase collaboration among Member States, so that effective criminal justice responses to this transnational challenge can be developed. Details: Vienna: UNODC, 2012. 158p. Source: Internet Resource: Accessed October 25, 2012 at: http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf Year: 2012 Country: International URL: http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf Shelf Number: 126804 Keywords: Computer CrimesCounter-TerrorismInternet CrimesTerrorism |
Author: U.S. Government Accountability Office' Wilhausen, Gregory C. Title: Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented Summary: Cyber attacks could have a potentially devastating impact on the nation’s computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybersecurity of key government systems as well as the nation’s critical infrastructure. GAO has designated federal information security as a government-wide high-risk area since 1997, and in 2003 expanded it to include cyber critical infrastructure. GAO has issued numerous reports since that time making recommendations to address weaknesses in federal information security programs as well as efforts to improve critical infrastructure protection. Over that same period, the executive branch has issued strategy documents that have outlined a variety of approaches for dealing with persistent cybersecurity issues. GAO’s objectives were to (1) identify challenges faced by the federal government in addressing a strategic approach to cybersecurity, and (2) determine the extent to which the national cybersecurity strategy adheres to desirable characteristics for such a strategy. To address these objectives, GAO analyzed previous reports and updated information obtained from officials at federal agencies with key cybersecurity responsibilities. GAO also obtained the views of experts in information technology management and cybersecurity and conducted a survey of chief information officers at major federal agencies. Details: Washington, DC: GAO, 2013. 112p. Source: Internet Resource: GAO-13-187: Accessed February 16, 2013 at: http://www.gao.gov/assets/660/652170.pdf Year: 2013 Country: United States URL: http://www.gao.gov/assets/660/652170.pdf Shelf Number: 127647 Keywords: Computer CrimesComputer SecurityCritical Infrastructure SecurityCyber SecurityCybercrime (U.S.)Internet Crimes |
Author: Clemente, Dave Title: Epub: Cyber Security and Global Interdependence: What Is Critical? Summary: The evolution of interconnection between infrastructure sectors has been accelerated by the spread of cyberspace, which has become the 'nervous system' linking them. There is no avoiding the security implications emerging at the intersection of cyberspace and infrastructure. As countries become more dependent on infrastructure distributed around the world, the growing complexity of interconnections makes it harder for authorities to identify what infrastructure is 'critical'. Improving risk management relies on using rigorous definitions of what infrastructure is 'critical', which enables more effective prioritization and protection of nodes and connection points. In this context, the ever-rising importance of data makes distinctions between 'physical' and 'information' infrastructure increasingly irrelevant. Societal resilience can be just as important as infrastructure resilience, and policy-makers should consider closely what levels of societal dependency on digital technologies are appropriate. Building public confidence in the security and governance of the critical infrastructure ecosystem is essential to avoid policy-making driven by reactive or narrow interests. Meeting these security challenges requires better shared understanding of what is critical between those who protect an organization and those who set its strategic direction. Better understanding of the economic and political incentives that guide stakeholders also reveals the scope for potential cooperation. Details: London: Chatham House, 2013. 46p. Source: Internet Resource: Accessed march 7, 2013 at: http://www.chathamhouse.org/publications/papers/view/189679 Year: 2013 Country: International URL: http://www.chathamhouse.org/publications/papers/view/189679 Shelf Number: 127867 Keywords: Cyber SecurityCybercrimesInfrastructure ProtectionInternet CrimesRisk Management |
Author: Livingstone, Sonia Title: In Their Own Words: What Bothers Children Online? with the EU Kids Online Network Summary: Nearly 10,000 children told us about what upsets them and their friends online. Their responses were diverse, revealing a long list of concerns. Pornography (named by 22% of children who told us of risks) and violent content (18%) top children’s online concerns. Overall, boys appear more bothered by violence than girls, while girls are more concerned with contact-related risks. Violence receives less public attention than sexual material, but many children are concerned about violent, aggressive or gory online content. They reveal shock and disgust on seeing cruelty, killings, abuse of animals and even the news – since much is real rather than fictional violence, this adds to the depth of children’s reactions. As children told us, video-sharing websites are often associated with violent and pornographic content, along with a range of other contentrelated risks. Among the children who linked risks to specific internet platforms, 32% mentioned video-sharing sites such as YouTube, followed by websites (29%), social networking sites (13%) and games (10%). Children’s mention of risks rises markedly from nine to 12 years old. Younger children are more concerned about content and other risks. As they get older they become more concerned about conduct and contact risks. These are linked in many children’s minds to the use of social networking sites such as Facebook. Concern about risks is higher among children from ‘high use, high risk’ countries. Policy implications are identified and discussed. Details: London: London School of Economics, 2013. 20p. Source: Internet Resource: Accessed March 25, 2013 at: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/Intheirownwords020213.pdf Year: 2013 Country: United Kingdom URL: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/Intheirownwords020213.pdf Shelf Number: 128122 Keywords: Computer CrimesInternet CrimesInternet SafetyMedia ViolenceOnline SafetyOnline VideosPornography |
Author: Hasebrink, Uwe Title: Patterns of Risk and Safety Online: In-depth analyses from the EU Kids Online survey of 9- to 16-year-olds and their parents in 25 European countries Summary: - This report is the work of the EU Kids Online network, coordinated by the London School of Economics and Political Science (LSE), with research teams and stakeholder advisers in each of the 25 countries and an International Advisory Panel. The network has been funded by the European Commission's (EC) Safer Internet Programme in order to strengthen the evidence base for policies regarding online safety. - Countries included in EU Kids Online are Austria, Belgium, Bulgaria, Cyprus, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Lithuania, the Netherlands, Norway, Poland, Portugal, Romania, Slovenia, Spain, Sweden, Turkey and the UK. - The report is based on a new and unique survey of 25,000 children across Europe, and was designed and conducted according to rigorous standards by the EU Kids Online network. Top-line findings for the survey have already been reported in: Livingstone, S., Haddon, L., Gorzig, A. and Olafsson, K. (2011) Risks and safety on the internet: The perspective of European children. Full findings. - This report offers a further analysis of these survey findings, examining the patterns of use, activities, risks and safety within these 25 countries focusing on individual and group-level differences (age, gender, parental education, and so forth). - It is paired with a parallel report, published simultaneously (August 2011), Cross-national comparison of risks and safety on the internet, which examines cross-national differences in children's experiences of the internet in Europe, depending on the country they live in. - The intended audience for both reports includes researchers and research users. The reports include primary statistical analysis in order that the basis for the project's conclusions is clearly explained and accounted for. - To address policy stakeholders more widely, both reports will be followed, in September 2011, by a report discussing the policy implications of these individual and country-level comparisons of children's experiences. Details: London: London School of Economics and Political Science, 2011. 88p. Source: Internet Resource: Accessed March 25, 2013 at: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/D5%20Patterns%20of%20risk.pdf Year: 2011 Country: Europe URL: http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/D5%20Patterns%20of%20risk.pdf Shelf Number: 128123 Keywords: Computer CrimesInternet CrimesMediaOnline SafetyOnline Victimization |
Author: Green, Lelia Title: Risks and Safety for Australian Children on the Internet: Full findings from the AU Kids Online survey of 9-16 year olds and their parents Summary: This report presents initial findings from an Australian survey of children and their parents designed to provide a unique insight into the balance of opportunities and risks experienced by these children as a result of their internet use. A random stratified sample of 400 9-16 year olds who use the internet, and one of their parents/carers, was interviewed between November 2010 and February 2011. The ‘AU’ survey was conducted in parallel with a 25 nation survey carried out by EU Kids Online (see Annex 1) and funded by the EC’s Safer Internet Programme. The questionnaire was designed by the EU Kids Online network, coordinated by the London School of Economics and Political Science. Ipsos MORI and its international affiliates conducted the research in all 26 countries. In what follows, AU findings are compared with those from 25 other countries, all of which are European nations, although not all of which are members of the European Union. The results of this overarching European-level research in 25 nations, with 25,142 families each represented by a child aged 9-16, and the parent who knows most about the child’s internet use, are reported in Livingstone, S., Haddon, L., Görzig, A., and Ólafsson, K. (2011). Risks and safety on the internet: The perspective of European children. Full findings. LSE, London: EU Kids Online. See www.eukidsonline.net. Where reference is made in this report to EU Kids Online, or to ‘in Europe’, this entails reference to the findings based on the 25,142 children involved in the EU Kids Online research, not to European children as a whole, nor to the children of the European Union. The 25 nations involved in the EU Kids Online research are Austria (AT), Belgium (BE), Bulgaria (BG), Cyprus (CY), Czech Republic (CZ), Denmark (DK), Estonia (EE), Finland (FI), France (FR), Germany (DE), Greece (EL), Hungary (HU), Italy (IT), Ireland (IE), Lithuania (LT), Netherlands (NL), Norway (NO), Poland (PO), Portugal (PT), Romania (RO), Slovenia (SI), Spain (ES), Sweden (SE), Turkey (TU), and the United Kingdom (UK). Details: Kelvin Grove QLD, Australia: ARC Centre of Excellence for Creative Industries and Innovation, 2011. 75p. Source: Internet Resource: Accessed March 30, 2013 at: http://cultural-science.org/journal/index.php/culturalscience/article/viewFile/49/129 Year: 2011 Country: Australia URL: http://cultural-science.org/journal/index.php/culturalscience/article/viewFile/49/129 Shelf Number: 128170 Keywords: Computer SafetyCyberbullyingCybercrimeInternet CrimesInternet SafetyOnline Safety (Australia)Online Victimization |
Author: International Fund for Animal Welfare (IFAW) Title: Caught in the Web: Wildlife Trade on the Internet Summary: The Internet has revolutionised our lives and opened up huge opportunities for doing business and communicating. However, it also provides increased opportunities for the unscrupulous or the criminal to operate, taking advantage of the unregulated and impersonal nature of transactions. The trade, both legal and illegal, in live and dead animals (including body parts) is increasing and the Internet is coming to play a central role in the activities of illegal traders. This trade has devastating implications for both wildlife conservation and animal welfare. Whole species risk being wiped out by over-exploitation. Millions of animals caught up in the trade suffer immensely and many die, resulting in yet more being taken from the wild. For this report, IFAW UK monitored the nature and scale of wildlife trade on the Internet over several months. We found that, each week, thousands of animals and animal parts – from live primates to stuffed polar bears, from giant ivory tusks to tiny dried seahorses – are being offered for sale on the Internet. IFAW found a shocking array of species for sale in which all commercial trade is legally prohibited or strictly regulated. Within an intensive one week survey, we found over 9,000 wild animal products and specimens and live wild animals for sale, predominantly from species protected by law. A further 122 traders were identified, each advertising an unspecified number of items – often in sizeable quantities. Our survey was limited to certain species and products, so the figures cited here represent only the tip of the iceberg of Internet trade in protected species. Illegal wildlife trade is now an arrestable offence in the UK and some aspects of the trade are classified as serious and organised crime. However, the increasing use of the Internet to organise illegal wildlife trade poses new challenges to legislators and enforcement agencies. The Government, the intelligence service and other enforcement agencies in the UK have recognised the problem and have already devoted resources to tackling it, although these are insufficient to deal with the apparent scale of the trade. Even establishing the actual scale of wildlife crime is complicated by the lack of truly reliable data and this is particularly the case in relation to Internet trade. A series of reports have called for a better understanding of how much illegal trading is organised over the Internet to assist in taking concerted action to disrupt criminal activity. The legal framework that applies to Internet trade in wildlife, including live animals, spans national, regional and international legislation relating to endangered species, animal welfare and Internet trading. Contemporary international law has fallen behind in its consideration of commercial Internet activity. Specific laws to combat abuses are not yet well developed at the international level, although there is a recognition that concerted action is best taken globally. Some individuals are taking advantage of this situation to perpetrate illegal wildlife trade. Whether or not traders are aware that they are breaking the law, the negative impact on endangered species and on the welfare of individual animals is the same. However, it is also currently far too difficult for those buyers and sellers wishing to act within the law to check what can be legally sold or to report suspect items. The information that is available is often inadequate and difficult to access. Auction sites on which wildlife is traded have taken very limited voluntary action to inform users or to facilitate reporting of potentially illegal wildlife items. The lack of information available on auction sites may be in part a consequence of the lack of gravity accorded to wildlife crime in general. This situation must be remedied urgently through statutory regulation. Attempts have been made to address the use of the Internet to commit or facilitate other types of crime. This report considers options for regulation and enforcement that have been applied in the areas of child pornography, online pharmacies and defamation. These provide valuable models for more effective and relevant regulation of wildlife trade. Good cooperation between enforcement agencies, both nationally and internationally, has delivered notable successes. Explicit campaigns enabling and encouraging users to report instances of ‘suspect’ material posted allow enforcement authorities to gain a far wider reach. International organisations have identified the need for closer connections between international law and domestic laws to further a more effective response to the diverting of drugs via Internet pharmacies. Better inter-agency cooperation and a better coordinated response from legislators would be useful in the fight against illegal wildlife trade organised on the Internet. Details: London: IFAW, 2005. 41p. Source: Internet Resource: March 15, 2019 at: https://s3.amazonaws.com/ifaw-pantheon/sites/default/files/legacy/Report%202005%20Caught%20in%20the%20web%20UK.pdf Year: 2005 Country: International URL: https://s3.amazonaws.com/ifaw-pantheon/sites/default/files/legacy/Report%202005%20Caught%20in%20the%20web%20UK.pdf Shelf Number: 128198 Keywords: Illegal Wildlife TradeInternet CrimesWildlife Crimes |
Author: INTERPOL Environmental Crime Programme Title: Project Web: An Investigation Into the Ivory Trade Over the Internet Within the European Union Summary: INTERPOL’s Project Web was launched following studies by the International Fund for Animal Welfare (IFAW), which concluded that elephant ivory is the most widely traded wildlife product over the Internet. Project Web is intended to provide an initial snapshot and insight from a law enforcement perspective into the drivers, scale, nature, and involved entities of the illegal trade in ivory over the Internet. Over a period of two weeks, ten participating countries from the European Union (EU) conducted surveillance of their national auction sites to identify advertisements for ivory items. The details of 660 advertisements on 61 auction sites were analysed and estimated to have a total volume of around 4,500 kilograms of ivory and a total value of approximately EUR 1,450,000. Through analysis of its two week Internet surveillance data, Project Web found that ivory is predominantly sold by individuals residing in the country where they are selling the item, although a number of advertisements did have international links. Enforcement data from other sources was also analysed, but often could only provide a limited representative picture of the total volume of ivory illegally imported into the EU. In particular, Project Web identified through customs seizure analysis that the majority of ivory sold was in the form of worked items shipped from mainly four African countries. The ivory was predominantly traded through EU countries, with Asia as the destination. However, three EU countries and North America were also identified as common final destinations. The report also demonstrated that the enforcement of this electronic trade is in its infancy and presents new challenges. Few Internet companies have policies governing the sale of ivory, and those that do have weaknesses in enforcing their own regulations. Law enforcement participants also identified a lack of legislation as a weakness, specifically that governing the Internet trade of ivory and other wildlife products, and cited a lack of prioritisation at departmental and political levels. This can lead to the combination of a strongly profit driven illicit market with little risk of detection or prosecution. While Project Web demonstrates that the Internet is being used in the ivory trade, the extent to which the Internet is an important medium in the illegal trade cannot be conclusively determined with the existing legislation and available data. However, it is clear that specially adapted legislation and strong collaboration with customs is needed to further investigate this crime type, in order to determine the scale and nature of the illegal trade so that appropriate enforcement measures can be taken against it. To this end, the Project Web report also includes a number of recommendations to improve responses to the illegal trade of wildlife products online. Details: Washington, DC: International Fund for Animal Welfare, 2013. 36p. Source: Internet Resource: Accessed April 4, 2013 at: http://www.ifaw.org/sites/default/files/Project%20Web%20-%20PUBLIC.pdf Year: 2013 Country: International URL: http://www.ifaw.org/sites/default/files/Project%20Web%20-%20PUBLIC.pdf Shelf Number: 128207 Keywords: Computer CrimesElephantsIllegal Wildlife TradeInternet CrimesIvoryWildlife Crimes |
Author: Janson, Lara Title: “Our Great Hobby”: An Analysis of Online Networks for Buyers of Sex in Illinois Summary: When it comes to prostitution, the commercial sex industry, and sex trafficking, most discussions, reports, and research on the topics focus on “the prostitute,” ignoring the consumers of prostituted women, the “johns.” Focusing primarily on the women, who mostly constitute the supply side of the commercial sex industry, limits our understanding of the social relationships that characterize and fuel the commercial sex industry. This study focuses on the exchange of information among men who post on the USA Sex Guide in Illinois regarding what they call their “great hobby,” buying sex. Studying these online forums where men trade information with one another on buying sex with women sheds light on the attitudes of a segment of men who buy sex in Illinois as well as a broader community of sex purchasers. It offers a unique glimpse into a world that remains hidden and often inaccessible to researchers. Researching the online johns’ boards also contributes to a better understanding of the increasingly important role of the Internet in the lives of men who buy sex. This research is based on predominantly qualitative content analysis of posts made on the USA Sex Guide from June 1, 2010 to August 31, 2010 by men who buy sex in Illinois. We found that the USA Sex Guide serves as a community and an important resource for johns to inform themselves about buying sex throughout Illinois. The forums create a brotherhood among men who buy sex and reinforce men’s justifications for purchasing sex. The USA Sex Guide appears to be a source of strong bonding among the johns, who often use the forums to help buttress one another against perceived critics or threats. Postings on the USA Sex Guide indicate that men travel throughout Illinois to buy sex in a variety of venues, particularly throughout the Chicago suburbs. The geographic mobility of men who buy sex suggests that responses to the demand for commercial sex must be coordinated in order to be effective. The entries also reflect an ethos of male entitlement to sex that many johns use to rationalize their behavior. Additionally, the data indicate a common vision of a fantasy shared by many men on the forum—an ideal experience in which prostituted women provide an illusion of intimacy and authenticity in their sexual encounters with johns. This research confirms findings from other studies that indicate that the commercial sex industry in Illinois is harmful; some men who buy sex admit on the USA Sex Guide boards to being violent or aggressive toward women in prostitution, and many men on the forums reference the harm the commercial sex industry causes to women, communities, relationships, and themselves. Comments made by men on the USA Sex Guide about law enforcement and policy efforts to combat prostitution reveal the ineffectiveness, in terms of deterring men from buying more sex, of policies that target prostituted women or only men of color who buy sex. Conversely, when johns post on the boards about law enforcement raids that only target men who buy sex, it creates energetic discussions about the risks of their “great hobby.” Some men on the forums state that they will no longer take the risk of buying sex due to the increased risk of legal punishment. Details: Chicago: Chicago Alliance Against Sexual Exploitation, 2013. 112p. Source: Internet Resource: Accessed April 16, 2013 at: http://caase.org/demandreport Year: 2013 Country: United States URL: http://caase.org/demandreport Shelf Number: 128362 Keywords: Human TraffickingInternet CrimesProstitutesProstitution (Chicago, U.S.)Sex TraffickingSex WorkSexual Exploitation |
Author: Levin, Avner Title: Securing Cyberspace: A Comparative Review of Strategies Worldwide Summary: Several distinct cyber-blocs have formed with their unique cyber-security strategies and emphases. The Anglosphere, led by the US and the UK, emphasizes a leading private sector role, an educated workforce, and outreach and diplomacy. The EU, led by Germany, focuses on a robust legal and regulatory framework, and on the promotion of the Council of Europe (Budapest) Convention of Cybercrime as a blueprint for international cooperation and enforcement. The Baltic States are in tight cooperation with NATO in the development of their national cyber-security strategies. The post-Soviet CIS bloc, led by Russia with some degree of Chinese cooperation, focuses on internal threats, abhors extra-territorial judicial action, and promotes a corresponding international framework under the auspices of the UN. Most cyber-strategies, with the notable exceptions of Russia, China and their allies, are compatible with Canadian interests. Strategies generally differ on the roles that they allocate to the public and private sectors, and within those, on the roles allocated to policy, regulation, for-profit and not-for profit ventures as promoters of cyber-security. Strategies also direct a wide range of resources in a variety of ways. The majority of countries reviewed are in the process of developing and implementing their cyber-security strategies, and setting the focus of their efforts. These rapidly occurring changes in strategies and policy implementation add to the challenge of determining best practices for securing cyberspace while protecting civil liberties. Information on the origin and ultimate target of many cyber-threats is contradictory due to the difficulty of pinpointing sources and destinations with ultimate certainty solely by technological means. China, for example, the current “cyber-villain” may be suffering from cybercrime more than commonly acknowledged and open to collaboration. Leading Western countries, such as the US and Germany, may not only be the target of attacks but the ultimate source of cyber-criminal activity as well. In order for Canada to proceed with its strategy in an informed manner, accurate, verifiable cybercrime data must be collected and evaluated to determine the optimal countries for collaboration. As it develops its own cyber-strategy, Canada should look to global leaders and learn from the approaches of the US, UK and Germany, that emphasize education, diplomatic outreach, private sector involvement and a legal and regulatory framework that balances cyber-security and privacy. Details: Toronto: Privacy and Cyber Crime Institute, Ted Rogers School of Management, Ryerson University, 2013. 58p. Source: Internet Resource: Accessed May 8, 2013 at: http://www.ryerson.ca/content/dam/tedrogersschool/privacy/documents/Ryerson_cyber_crime_final_report.pdf Year: 2013 Country: Canada URL: http://www.ryerson.ca/content/dam/tedrogersschool/privacy/documents/Ryerson_cyber_crime_final_report.pdf Shelf Number: 128676 Keywords: Computer CrimesCyber-SecurityCybercrimes (Canada)Internet Crimes |
Author: Collins, Matthew L. Title: Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations Summary: This is the sixth entry in the Spotlight On series published by the CERT®Insider Threat Center. Each entry focuses on a specific area of threat to organizations from their current or former employees, contractors, or business partners and presents analysis based on hundreds of actual insider threat cases cataloged in the CERT insider threat database. This entry in the series focuses on insiders who stole intellectual property (IP), such as source code, scientific formulas, engineering drawings, strategic plans, or proposals, from their organizations to benefit a foreign entity. This technical note defines IP and insider theft of IP, explains the criteria used to select cases for this examination, gives a snapshot of the insiders involved in these cases, and summarizes some of the cases themselves. Finally, it provides recommendations for mitigating the risk of similar incidents of insider threat. Details: Pittsburgh, PA: Carnegie Mellon University, Software Engineering Institute, 2013. 18p. Source: Internet Resource: TECHNICAL NOTE CMU/SEI-2013-TN-009; Accessed May 28, 2013 at: http://www.sei.cmu.edu/reports/13tn009.pdf Year: 2013 Country: United States URL: http://www.sei.cmu.edu/reports/13tn009.pdf Shelf Number: 128834 Keywords: CybercrimeCybersecurityEspionageInformation SecurityInsider ThreatIntellectual PropertyInternet Crimes |
Author: Jones, Lisa M. Title: Evaluation of Internet Child Safety Materials Used by ICAC Task Forces in School and Community Settings, Final Report Summary: Research Goals and Objectives: This project involves content and process evaluations of current internet safety education (ISE) program materials and their use by law enforcement presenters and schools. Despite a proliferation of internet safety programs over the last decade, there is little information that can guide law enforcement, policy makers or the public in determining which materials or delivery methods are most likely to increase children’s online safety. The design of the proposed content and process evaluation is based on the perspective that, despite widespread dissemination, internet safety education is still in a formative stage. It is not clear that ISE messages have been formulated around a careful analysis of the risk and the ways that youth experience problems online, or that they have applied research-based prevention strategies. While outcome evaluation will be critical to determining the effectiveness of internet safety programs in the future, it is important to identify problems in ISE delivery and create guidelines for developing more promising programs. Research Design and Methodology: The study was divided into four subprojects. First, a systematic review or “meta-synthesis” was conducted to identify effective elements of prevention identified by the research across different youth problem areas such as drug abuse, sex education, smoking prevention, suicide, youth violence, and school failure. The process resulted in the development of a KEEP (Known Elements of Effective Prevention) Checklist. Second, a content analysis was conducted on four of the most well-developed and long-standing youth internet safety curricula: i-SAFE, iKeepSafe, Netsmartz, and Web Wise Kids. Third, we conducted a process evaluation to better understand how internet safety education programs are being implemented. The process evaluation was conducted via national surveys with three different groups of respondents: Internet Crimes Against Children (ICAC) Task Force commanders (N=43), ICAC Task Force presenters (N=91), and a sample of school professionals (N=139). Finally, we developed an internet safety education outcome survey focused on online harassment and digital citizenship. The intention for creating and piloting this survey was to provide the field with a research-based tool that can be used in future evaluation and program monitoring efforts. This tool, along with other research and evaluation information on internet safety will be placed in an Internet Safety Education Resource Center on the ICAC Task Force website. Research Results and Conclusions: The internet safety education (ISE) content and process evaluation results indicated that the educational approach and messages of current ISE fail to incorporate critical elements of effective prevention education, including: 1) research-based messages; 2) skill-based learning objectives; 3) opportunities for youth to practice new skills; and 4) sufficient time for learning. Our analyses indicate that the ISE field has been slow to include research-based information on internet predators and online harassment and there is no research to support the assumption that many of the popular educational slogans messages around privacy and digital reputation concerns (e.g., “Think Before You Click”) will lead to improved youth online behavior. The failure to define research-supported program logic means that most ISE is a highly speculative and experimental undertaking, whose success cannot be assumed. Recommendations are made for re-conceptualizing ISE and developing a more effective approach to helping protect youth. Details: Durham, NH: Crimes Against Children Research Center (CCRC), University of New Hampshire, 2012. 115p. Source: Internet Resource: Accessed June 1, 2013 at: https://www.ncjrs.gov/pdffiles1/nij/grants/242016.pdf Year: 2012 Country: United States URL: https://www.ncjrs.gov/pdffiles1/nij/grants/242016.pdf Shelf Number: 128899 Keywords: Computer CrimesInternet CrimesInternet SafetySex Offenders |
Author: Victoria Parliament. Law Reform Committee Title: Inquiry into Sexting Summary: During the course of the Inquiry the Committee received 60 written submissions and convened public hearings with 45 witnesses. The Committee also met with key individuals and organisations during overseas consultations. The report is the culmination of all of the evidence presented to the Committee. The report contains 14 recommendations that the Committee believes will protect people from the harms caused by non-consensual sexting. The report also recognises that some sexting between young people should not be treated as child pornography, and recommends that new defences to child pornography offences be introduced to Victorian legislation. Details: Melbourne: Victorian Government Printer, 2013. 252p. Source: Internet Resource: Parliamentary Paper No. 230, Session 2010-2013: Accessed June 1, 2013 at: http://www.parliament.vic.gov.au/images/stories/committees/lawrefrom/isexting/LRC_Sexting_Final_Report.pdf Year: 2013 Country: Australia URL: http://www.parliament.vic.gov.au/images/stories/committees/lawrefrom/isexting/LRC_Sexting_Final_Report.pdf Shelf Number: 128900 Keywords: Child PornographyComputer CrimesInternet CrimesSex CrimesSexting (Australia) |
Author: Tallon, Kelly Title: New Voices / New Laws: School-age young people in New South Wales speak out about the criminal laws that apply to their online behaviour Summary: This report provides a children’s rights-based analysis and evaluation of the current criminal laws that can apply to peer-to-peer sexting and cyber bullying among young people in New South Wales (NSW). The report is the outcome of New Voices/New Laws, a project undertaken by the National Children’s and Youth Law Centre (NCYLC) and Children’s Legal Service of Legal Aid NSW (CLS). It offers insight on sexting and cyber bullying that we have garnered from our work as youth legal educators and advocates; examines the criminal law framework that applies to these behaviours in NSW; explains the need to reform these laws; surveys the views of young people on sexting, cyber bullying and the law; reviews some of the law reform efforts undertaken in other Australian and overseas jurisdictions; and on these bases, makes recommendations for law and policy makers in NSW. The New Voices/New Laws project grew out of our concern that young people’s use of social media, mobile phones and the internet can lead to serious and often disproportionate criminal penalties—of which most young people (and many adults) are unaware. The project aimed to: • educate young people about the criminal laws that can apply to sexting and cyber bullying; • encourage young people to voice their opinions on these laws; • amplify the voices and opinions of young people; and • facilitate advocacy for reform of inappropriate criminal laws and penalties. In order to achieve these aims, we engaged directly with over 1,000 young people through school-based consultations. Between June and October 2012, we conducted 10 consultations at 8 schools in 7 regions—Wollongong, Dubbo, Sydney, Hunter, Tamworth, Broken Hill and Albury. The consultations generally consisted of a presentation on the laws and penalties that can apply to sexting and cyber bullying; a survey asking participants to share their knowledge and opinions of these laws and penalties; and a focus group discussion of the issues. The presentation and survey were also made available online. Details: Sydney: National Children’s and Youth Law Centre and Legal Aid NSW, 2012. 87p. Source: Internet Resource: Accessed June 26, 2013 at: http://www.lawstuff.org.au/__data/assets/pdf_file/0009/15030/New-Voices-Law-Reform-Report.pdf Year: 2012 Country: Australia URL: http://www.lawstuff.org.au/__data/assets/pdf_file/0009/15030/New-Voices-Law-Reform-Report.pdf Shelf Number: 129186 Keywords: CyberbullyingCybercrimesInternet CrimesOnline CommunicationsSexting (Australia) |
Author: McLean, Andrew Title: An Evolving Trade? Male Sex Work and the Internet Summary: This investigation into the online male sex trade in Melbourne explores the Internet's rise in popularity as a marketplace for male sex workers (MSWs). It examines the ways in which clients and workers engage with the Internet, as well as the effect(s) of this new domain upon workers and their professional encounters. The study finds that engaging in sex work is a common experience for young, attractive gay men, with many opting to offer their services (illegally) online in favour of more traditional sites (e.g. street, brothel/agency and print) due to a number of perceived advantages - such as anonymity, convenience and greater economic rewards. In turn, clients of MSWs also prefer to use the Internet for reasons pertaining to privacy and convenience. The marketing strategies employed by MSWs widely exploit stereotypes associated with (gay) masculinity in a market where visual representations of sexuality are of paramount importance. The study examines workers' perceptions of success. Many associate long-term success in the industry with an ability to self-monitor, allowing for the maintenance of a wealthy client base. Finally, the study investigates the key legislative and social issues that may complicate the working and personal lives of Internet-based male sex workers (IMSWs). Details: Melbourne: School of Global, Urban and Social Studies RMIT University,, 2013. 201p. Source: Internet Resource: Dissertation: Accessed July 3, 2013 at: http://researchbank.rmit.edu.au/eserv/rmit:160406/McLean.pdf Year: 2013 Country: Australia URL: http://researchbank.rmit.edu.au/eserv/rmit:160406/McLean.pdf Shelf Number: 129243 Keywords: Internet CrimesMale ProstitutesMale Sex Workers (Australia)Online CommunicationsProstitution |
Author: Poullet, Yves Title: Cloud Computing and Its Implications on Data Protection Summary: 1. The Council of Europe requested the CRID to prepare a preliminary report identifying the main privacy issues related to cloud computing and the questions to be addressed in the future, in particular in the light of Council of Europe data protection standards. As set by the contract, the work is to identify and underline the main cloud computing privacy issues. This first draft is definitively to be further elaborated and to be completed. It does not aim at giving answers which would have to be elaborated in the context of another mandate. 2. This report is structured as follows. It starts with a brief technical introduction illustrating the variety of services covered by the concept of “Cloud computing”. As defined by NIST1, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” 3. Cloud computing services include a large diversity of services going from those offered at the benefit of individuals as the services offered by social networks to those proposed at the benefit of companies in sharing a common software or by using shared information infrastructures. To establish a typology of cloud computing services is quite important since legal problems raised by each kind of computer services might be different to a certain extent. The second point is dedicated to the analysis of the adequacy of the CoE Convention 108 (referred hereinafter as ETS 108) definitions with the cloud computing reality. In particular, the status of the actors involved into the operations will be analyzed. Thereinafter, our report analyses the duties of the persons subscribing to the cloud computing services or offering these services. The crucial question of the security is then addressed. Finally, the report envisages the delicate questions of transborder data flows and international private law, which are inherent to most of the cloud computing services. Details: Strasbourg: Council of Europe, 2010. 28p. Source: Internet Resource: Discussion Paper: Accessed August 5, 2013 at: http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_reps_IF10_yvespoullet1b.pdf Year: 2010 Country: Europe URL: http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_reps_IF10_yvespoullet1b.pdf Shelf Number: 129533 Keywords: Cloud ComputingComputer CrimesComputer SecurityInternet Crimes |
Author: Lobe, Bojana Title: Cross-national comparison of risks and safety on the internet: initial analysis from the EU Kids Online survey of European children Summary: This report examines the cross-national differences between the 25 countries included in the EU Kids Online project. The core of the project is a rigorous and detailed in-home, face-to-face survey with 1,000 children aged 9-16 in each country. Top-line findings for the survey are reported in: Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K. (2011) Risks and safety on the internet: The perspective of European children. Full findings. This report offers a further analysis of these survey findings, focused on cross-country comparisons. It asks the following key questions: What are the main differences in children’s online use, activities, skills, risks and harm across the 25 countries surveyed? How far can these differences be accounted for by external country-level factors (such as broadband penetration, education, GDP, etc)? It is paired with a parallel report, published simultaneously (August 2011), Patterns of risk and safety online, which examines cross-national similarities among children’s experiences of the internet in Europe, focusing on individual and group-level differences (age, gender, parental education). The intended audience for both reports is researchers and research users. The reports include primary statistical analysis in order that the basis for the project’s conclusions is clearly explained and accounted for. To address policy stakeholders more widely, both reports will be followed, in September 2011, by a report discussing the policy implications of these individual and country-level comparisons of children’s experiences. Details: London: EU Kids Online Network, London School of Economics, 2011. 84p. Source: Internet Resource: Accessed August 19, 2013 at: http://eprints.lse.ac.uk/39608/1/Cross-national%20comparison%20of%20risks%20and%20safety%20on%20the%20internet%28lsero%29.pdf Year: 2011 Country: Europe URL: http://eprints.lse.ac.uk/39608/1/Cross-national%20comparison%20of%20risks%20and%20safety%20on%20the%20internet%28lsero%29.pdf Shelf Number: 129648 Keywords: BullyingInternet CrimesInternet, Safety MeasuresOnline VictimizationPornography |
Author: Internet Crime Complaint Center Title: Internet Crime Report: 2012 Summary: Now in its 13th year of operation, the Internet Crime Complaint Center (IC3) has firmly established its role as a valuable resource for both victims of Internet crime and the law enforcement agencies investigating and prosecuting these crimes. For the victims, the IC3 provides a convenient and easy-to-use reporting mechanism that alerts authorities to suspected criminal violations. For law enforcement agencies, the IC3 serves as a conduit to receive Internet-related complaints, to conduct research related to them and to develop analytical reports based on them for state, local, federal, tribal or international law enforcement and/or regulatory agencies. These agencies then develop investigations based on the forwarded information, as appropriate. In 2012, the IC3 received 289,874 consumer complaints with an adjusted dollar loss of $525,441,1101, which is an 8.3-percent increase in reported losses since 2011. In recognition of this increase, the IC3 expanded its efforts to inform the general public about online scams by publishing several public service announcements and providing additional tips for Internet consumers. Details: Washington, DC(?): Internet Crime Complaint Center, 2013. 44p. Source: Internet Resource: Accessed November 13, 2013 at: http://www.ic3.gov/media/annualreport/2012_IC3Report.pdf Year: 2013 Country: United States URL: http://www.ic3.gov/media/annualreport/2012_IC3Report.pdf Shelf Number: 131646 Keywords: Computer CrimesFraudInternet Crimes |
Author: Great Britain. House of Commons. Culture, Media and Sport Committee Title: Online Safety. Sixth Report of Session 2013-14 Summary: The internet has revolutionised communications and information sharing. It provides an ever increasingly important platform for creativity and economic growth. Online social media services are providing new ways of interacting and keeping in touch. Online communications enable expressions of human behaviour both positive and negative; sometimes downright criminal. Our inquiry has focused on three disparate aspects of online content and behaviour, all of which are of widespread concern: illegal content, especially images of child abuse; harmful adult content being made freely available to children; bullying and harassment on social media. Both the publication and possession of child abuse images are rightly illegal. While these offences are bad enough, it must not be forgotten that such images represent crime scenes, often of the most horrific kind. There is a clear need to ensure that the police have adequate resources to track down and arrest online paedophiles in sufficient numbers to act as a meaningful deterrent to others. If necessary, additional funding should be provided to recruit and train a sufficiently large number of police officers adequate to the task. The Child Exploitation and Online Protection (CEOP) Command, now part of the new National Crime Agency, has a well-deserved reputation as a lead body in tackling child abuse. It has been increasingly effective not least because it is not solely a criminal justice organisation: its education and social care work has also been very important in increasing public understanding of the problem of child abuse and in offering means of countering abusers. All three elements of its mission - education, social care and criminal justice - need to be actively pursued and publicised. The Internet Watch Foundation, too, has played a crucial role in removing and blocking child abuse images online. We very much welcome their new commitment to embark on proactive searching for online child abuse images. The sooner these can be found and removed, the better. However, we are concerned that the additional staff resources being allocated to this task could prove woefully insufficient to achieve substantial progress towards what must be an important intermediate goal: the eradication of child abuse images from the open internet. Tracing paedophiles who share images on peer-to-peer networks and the so-called hidden internet continues to challenge both the police and the internet service providers; it is a challenge that, by working together, they must overcome. Legal adult pornography is widely consumed. This includes explicit "hard core" material that attracts an R18 certificate from the British Board of Film Classification. Parents and carers clearly have a key role, not to mention interest, in preventing harmful material of this kind becoming available to children. However, they should have access to more information and help where and when they need it. In the off-line world, it is the newsagent, not the parent, who voluntarily places some adult magazines on a top shelf out of reach of children. It is the local authority, not the parent, which administers the licensing of sex shops selling R18 pornography to which children may not be admitted. Some level of analogous protection ought to be provided in relation to online material. At the moment, little is. Legal adult sites could restrict access by children in a number of ways. In general a robust age verification process should be in place; as part of this, sites could use a combination of the following: requiring payment by a credit card linked to an adult; shielding the content behind a warning page; attaching metadata to the website to make it easier for filters to operate and for search engines not to return the material when operating in a safe search mode. Filters may not be failsafe, but they continue to improve and are an important way of protecting children from harmful content. We very much welcome the introduction of whole home filtering solutions that prompt account holders with a choice to apply them. The main internet service providers should have contacted all their customers by the end of the year to offer this valuable service. We want to see all other ISPs following suit. Publishing adult pornography in a way that makes it readily available to children is likely to be an offence under the Obscene Publications Act 1959. We do not believe the police should be deterred from bringing to book publishers of adult pornography who make little attempt to shield children from their product. While acknowledging that the enforcement of obscenity legislation is fraught with difficulty, not least in the context of the internet, we believe there is scope for greater enforcement in this area to provide some deterrent effect. There may also be scope for blocking particularly harmful adult websites that make no serious attempt to hinder access by children. As part of its existing media literacy duties, Ofcom has an important role in monitoring internet content and advising the public on online safety. However, we are anxious to avoid suggesting a significant extension of formal content regulation of the internet . Among the unintended consequences this could have would be a stifling of the free flow of ideas that lies at the heart of internet communication. Rather, more needs to be done to signpost the advice and educational resources available to both parents and teachers. This is all the more pressing given the growing use of social media and its misuse by some - both adults and children. Today, one in five 12-16 year-olds think being bullied online is part of life. Social media providers should offer a range of prominently displayed options for, and routes to, reporting harmful content and communications. They should act on these reports expeditiously, keeping the complainant and-where appropriate-the subject of the complaints informed of outcomes and actions. Given that Facebook and Twitter are aware of the extent to which their services are accessed by younger children, thanks to age verification processes that are at best flimsy, we expect them to pay greater attention to factoring this into the services provided, the content allowed and the access to both. The same applies to other social media companies in a similar position. Some of the worst online bullies and trolls are being brought to book in the courts. Much of the abuse and bullying that takes place online is covered by existing laws, but these need to be clarified with guidance updated for the online space. Young people especially are distinguishing less and less between their lives on the internet and in the real world. Bullying that takes place in the playground can merge seamlessly with bullying on smart phones and tablets. Sometimes this ends with the tragedy of teenage suicide. It is just one reminder that staying safe off-line includes staying safe online too. Details: London: The Stationery Office, Limited, 2014. 166p. Source: Internet Resource: http://www.publications.parliament.uk/pa/cm201314/cmselect/cmcumeds/729/729.pdf Year: 2014 Country: United Kingdom URL: http://www.publications.parliament.uk/pa/cm201314/cmselect/cmcumeds/729/729.pdf Shelf Number: 132037 Keywords: BullyingChild AbuseChild PornographyChild ProtectionChild Sexual ExploitationComputer CrimesInternet CrimesOnline CommunicationsOnline SecurityOnline VictimizationPedophiliaPornography |
Author: Mitchell, Kimberly J. Title: Trends in Unwanted Online Experiences and Sexting: Final Report Summary: This bulletin summarizes findings from the Third Youth Internet Safety Survey (YISS]3). Topics include youth reports of unwanted sexual solicitations, online harassment, unwanted exposure to sexual material, and "sexting." Details: Durham, NH: University of New Hampshire, 2014. 57p. Source: Internet Resource: Accessed May 10, 2014 at: http://www.unh.edu/ccrc/pdf/Full%20Trends%20Report%20Feb%202014%20with%20tables.pdf Year: 2014 Country: United States URL: http://www.unh.edu/ccrc/pdf/Full%20Trends%20Report%20Feb%202014%20with%20tables.pdf Shelf Number: 147747 Keywords: Internet CrimesInternet SafetyOnline CommunicationsPornographySex CrimesSextingSexual Harassment |
Author: Marwick, Alice Title: Online Harassment, Defamation, and Hateful Speech: A Primer of the Legal Landscape Summary: Although online harassment and hateful speech is a significant problem, there are few legal remedies for victims. Section 230 of the Communications Decency Act provides internet service providers (including social media sites, blog hosting companies, etc.) with broad immunity from liability for user-generated content. Given limited resources, law enforcement personnel prioritize other cases over prosecuting internet-related issues. Similarly, there are often state jurisdictional issues which make successful prosecution difficult, as victim and perpetrator are often in different states, if not different countries. Internet speech is protected under the First Amendment. Thus, state laws regarding online speech are written to comply with First Amendment protections, requiring fighting words, true threats, or obscene speech (which are not protected). This generally means that most offensive or obnoxious online comments are protected speech. For an online statement to be defamatory, it must be provably false rather than a matter of opinion. This means that the specifics of language used in the case are extremely important. While there are state laws for harassment and defamation, few cases have resulted in successful prosecution. The most successful legal tactic from a practical standpoint has been using a defamation or harassment lawsuit to reveal the identities of anonymous perpetrators through a subpoena to ISPs then settling. During the course of our research, we were unable to find many published opinions in which perpetrators have faced criminal penalties, which suggests that the cases are not prosecuted, they are not appealed when they are prosecuted, or that the victim settles out of court with the perpetrator and stops pressing charges. As such, our case law research was effectively limited to civil cases. In offline contexts, hate speech laws seem to only be applied by courts as penalty enhancements; we could locate no online-specific hate speech laws. Given this landscape, the problem of online harassment and hateful speech is unlikely to be solved solely by victims using existing laws; law should be utilized in combination with other practical solutions. Details: New York: Center on Law and Information Policy, Fordham Law School, 2014. 75p. Source: Internet Resource: CLIP Report: Accessed June 19, 2014 at: http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1002&context=clip Year: 2014 Country: United States URL: http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1002&context=clip Shelf Number: 132508 Keywords: Bias-Motivated CrimesFirst AmendmentHarassmentHate CrimeInternet CrimesOnline Victimization |
Author: Lavorgna, Anita Title: Transit Crimes in the Internet Age: How new online criminal opportunities affect the organization of offline transit crimes Summary: There is a general consensus that the Internet has expanded possibilities for so-called transit crimes-i.e., traditional trafficking activities. However, the extent to which the Internet is exploited by offenders to carry out transit crimes and the way in which it has changed those offenders' behaviors and the criminal processes remains under-investigated. The aim of this thesis is to understand what kind of criminal opportunities the Internet offers for conducting transit crimes and how these opportunities affect the organization of transit crimes, as concerns both the carrying out of the criminal activity and the patterns of relations in and among criminal networks. In order to achieve this goal, a model of script analysis-a way to highlight the sequence of actions that are carried out for a determinate criminal activity to occur- was developed in order to classify the criminal opportunities that the Internet supplies for selected transit crimes (wildlife trafficking, trafficking in counterfeit medicines, sex trafficking, and trafficking in recreational drugs), to identify cyber-hotspots, and to allow a richer and deeper understanding of the dynamics of Internet-mediated transit crimes. The data were collected by means of case study research and semi-structured interviews to law enforcement officers and acknowledged experts. For each criminal activity considered, through the script framework it has been possible to identify different types of criminal opportunities provided by the Internet. The empirical evidence presented demonstrates that the criminal markets considered have become-even if to a different extent-hybrid markets which combine the traditional social and economic opportunity structures with the new one provided by the Internet. Among other findings, this research indicates that not only has the Internet opened the way for new criminal actors, but it also has reconfigured relations among suppliers, intermediaries, and buyers. Furthermore, results were compared across transit crimes to illustrate whether and to what extent Internet usage impacts them differently. The differences seem to depend primarily on the social perception of the seriousness of the criminal activity, on the place it fills in the law enforcement agenda, and on the characteristics of the actors involved. This study, albeit with limitations, provides an accurate description of the Internet as crime facilitator for transit crimes. It concludes by highlighting the possibilities of environmental criminology as a theoretical framework to investigate Internet-mediated transit crimes, offering some final observations on how relevant actors behave online, and suggesting new directions for research. Details: Trento, Italy: University of Trento, Doctoral School of International Studies, 2013. 212p. Source: Internet Resource: Dissertation: Accessed June 19, 2014 at: http://eprints-phd.biblio.unitn.it/1185/1/PhD_Dissertation_Lavorgna.pdf Year: 2013 Country: International URL: http://eprints-phd.biblio.unitn.it/1185/1/PhD_Dissertation_Lavorgna.pdf Shelf Number: 132532 Keywords: Computer CrimeCriminal NetworksDrug TraffickingInternet CrimesOrganized CrimeSex TraffickingWildlife Trafficking |
Author: Harris, Kamala D. Title: Gangs Beyond Borders: California and the Fight Against Transnational Organized Crime Summary: Gangs Beyond Borders: California and the Fight Against Transnational Organized Crime, addresses all three emerging pillars of transnational criminal activity: the trafficking of drugs, weapons and human beings; money laundering; and high-tech crimes, such as digital piracy, hacking and fraud. It is the result of extensive research and consultation with federal, state, and local law enforcement, non-governmental organizations, and academia. The report finds that while transnational organized crime is a significant problem, it is not insurmountable. In California, law enforcement at all levels of government have made major strides against these criminal groups, even in the face of declining resources. Law enforcement in foreign countries have made steady in-roads, as well, as demonstrated by the recent arrest in February 2014 of Joaqun "El Chapo" Guzman Loera, the reputed head of Mexico's notorious Sinaloa Federation cartel. The report describes the strategies that are working and sets forth recommendations to combat transnational organized crime. A call for sustained law enforcement funding and collaboration between federal, state, and local governments are at the center of these recommendations. Details: Sacramento: California Attorney General, 2014. 118p. Source: Internet Resource: Accessed June 20, 2014 at: https://oag.ca.gov/sites/all/files/agweb/pdfs/toc/report_2014.pdf Year: 2014 Country: United States URL: https://oag.ca.gov/sites/all/files/agweb/pdfs/toc/report_2014.pdf Shelf Number: 132534 Keywords: Computer CrimesDigital CrimesDrug TraffickingGun TraffickingHuman TraffickingInternet CrimesMoney LaunderingOrganized CrimeTransnational Crime |
Author: Terre des hommes Title: Webcam Child Sex Tourism. Becoming Sweetie: A novel approach to stopping the global rise in Webcam Child Sex Tourism Summary: Rising Internet usage rates and persistent poverty in the developing world have fostered the emergence of a rapidly growing new form of online child sexual exploitation. "Webcam Child Sex Tourism" (WCST) takes place when adults pay or offer other rewards in order to direct and view live streaming video footage of children in another country performing sexual acts in front of a webcam. WCST enables predators to sexually abuse children in other countries with ease and frequency using their Internet-connected personal computers. And despite the fact that WCST is prohibited by international laws and most national criminal codes, the enforcement of those laws has so far been lax. Terre des Hommes Netherlands works to end child exploitation and to assist victims around the world. In recent years, we have been overwhelmed by the surging number of child victims of WCST in the Philippines. The psychological damage that exploitation through WCST has on children is profound and permanent. We recognize that victim assistance alone cannot stop the expansion of such a rapidly growing form of child exploitation. That knowledge motivated us to undertake this study in search of a solution that governments around the world can apply to reduce the global demand for WCST. Key facts: The United Nations and the US Federal Bureau of Investigation estimate that there are 750,000 predators connected to the Internet at any moment. Those predators contribute to a vast global demand for WCST. Moreover, an estimate that tens of thousands of children in the Philippines alone are exploited through WCST, suggests that this form of long-distance child abuse appears to take place with great frequency. However, the alarming fact that only six predators have ever been convicted for engaging in WCST should inspire shame and immediate action by governments around the world. This is a problem that urgently needs the world's attention. Insight: The vast global demand for WCST provides incentives for criminals, impoverished parents, and vulnerable children in developing countries to capitalize on the opportunity to raise their income by increasing the "supply" of children who perform webcam sex shows for money or other rewards. Taking targeted action to reduce the global demand for WCST that is sustained by online predators will effectively reduce the growing number of child victims who constitute the "supply" side of the trade. Our research: What started as research into the WCST trade led us to a viable solution to this global problem. We began the research for this report by gathering information about the nature of the phenomenon of WCST: the physical and online environments in which it takes place, the global trends that have fostered its emergence, and the legal status of WCST in international law and in the national criminal and penal codes of 21 countries. We found that the legal framework prohibiting WCST widely exists, but governments are not adequately enforcing their own child protection laws when the victims are located outside of their borders. Highlighting that point is our finding that only six predators worldwide have been convicted for engaging as customers in WCST. That finding led us to wonder how often WCST actually takes place online. Four Terre des Hommes Netherlands researchers spent 10 weeks posing as prepubertal Filipino girls on 19 public chat rooms. During that short period, a total of 20,172 predators from 71 countries committed crimes by soliciting the researchers, whom the predators believed to be minors, for paid webcam sex performances. But 20,172 crimes in a sample of 19 chat rooms likely reflects only a small fraction of the number of crimes actually taking place every day when we consider the US Federal Bureau of Investigation's estimates that there are 40,000 online chat rooms on which predators lurk. Moreover, WCST takes place on social networking sites, adult webcam sites and online dating sites, in addition to chat rooms. It is likely that WCST takes place tens of thousands of times each day. The finding that WCST is such a common crime on public chat rooms led us to investigate whether law enforcement agencies are not adequately enforcing existing child protection laws because they are unable to identify predators engaging in WCST. We found that identifying predators seeking webcam sexual performances from children can be achieved through the use of a proactive investigation technique. During the 10 weeks spent collecting data, the four Terre des Hommes Netherlands researchers identified 1,000 predators seeking webcam sex performance from children on public chat rooms. They were identified using only information available in public online databases and data provided by predators. No computer hacking or illegal methods were applied. Instead, we just asked predators to provide identifying information under the fictional pretext-a technique known as "social hacking." The following report is the most comprehensive study on WCST undertaken to date. However, the findings of our research, while alarming, only provide a small glimpse into how vast the phenomenon of WCST actually is. While we cannot extrapolate conclusions about the global prevalence of WCST, we do prove that there is a very high incidence of predators seeking WCST on 19 public chat rooms in a 10-week period. Furthermore, based on our analysis of trends in technological developments and other forms of child sexual exploitation, we predict that the WCST trade will continue to grow and spread to other countries if governments around the world do not take immediate action. If action is not taken, we fear that WCST will spiral as far out of control as the online child pornography industry, which is now a multi-billion dollar international trade that law enforcement agencies cannot reign in. Call to action: Currently, law enforcement agencies are hobbled by reactive investigation policies-they investigate crimes against child victims of WCST only after children report the crimes. But, for a number of reasons, children do not report these crimes very often. We call on government agencies in charge of justice to immediately adopt proactive law enforcement policies that empower law enforcement agencies to patrol public online spaces known to be hotspots for WCST and to prosecute predators committing these crimes without waiting for children or parents to report them. Details: The Hague: Terre des Hommes, 2013. 113p. Source: Internet Resource: Accessed June 26, 2014 at: http://www.terredeshommes.org/wp-content/uploads/2013/11/Webcam-child-sex-tourism-terre-des-hommes-NL-nov-2013.pdf Year: 2013 Country: International URL: http://www.terredeshommes.org/wp-content/uploads/2013/11/Webcam-child-sex-tourism-terre-des-hommes-NL-nov-2013.pdf Shelf Number: 132541 Keywords: Child Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesSex Tourism |
Author: Chan, Jason Title: The Internet and Hate Crime: Offline Spillovers from Online Access Summary: ICTs such as the Internet have had profound effects, both positive and negative, on many aspects of our lives and thereby on the society we live in. As the Internet's use has expanded, the possibility of using this ICT for unlawful activity has grown as well. In this paper we investigate whether the Internet has affected the prevalence of racially-driven hate crime by giving extremists access to a broader set of potential audiences. In order to better understand the link, we study the extent to which broadband availability affected racial hate crimes in the U.S. from 2000 - 2008. We deploy a set of econometric techniques to account for biases that may be present in the estimations. After controlling for estimation biases, we find strong evidence across multiple specifications that Internet availability increases racial hate crimes. We also find that the results are stronger in areas with greater racial segregation and areas with greater levels of urbanization. Our analyses suggest that the Internet-induced increase in racial hate crime is not due to an increase in crime reporting levels facilitated by broadband growth. These results shed light on one of the many offline spillovers from increased online access. Details: New York: New York University - Leonard N. Stern School of Business, 2014. 46p. Source: Internet Resource: NET Institute Working Paper No. 13-02 : Accessed July 16, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2335637 Year: 2014 Country: United States URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2335637 Shelf Number: 132697 Keywords: Bias-Motivated CrimesComputer CrimesHate Crimes (U.S.)Internet CrimesRace |
Author: Lawrenson, Tim Title: Cyberattacks -The Significance of the Threat and the Resulting Impact on Strategic Security Summary: Cyberspace is now so intrinsic to a modern state's economy that it is vital to protect it as part of that state's national security. However certain features of cyberspace make it an increasingly attractive attack domain. Despite some rather hysterical press headlines, this analysis shows that cybercrime is the principal threat, rather than cyberterror or cyberwarfare; albeit the growing scale of state-sponsored cybercrime is a concern because it carries an inherent risk of escalation into cyber (or conventional) warfare. A comprehensive, layered cyber-security strategy is needed to overcome some of the more problematic attractions of cyberspace as an attack domain. This strategy must improve actual system security as well as enhancing people's confidence in the resilience of the cyber-enabled world. Details: London: Royal College of Defence Studies, 2011. 31p. Source: Internet Resource: Thesis: Seaford House Paper 2010/11: Accessed August 22, 2014 at: http://www.da.mod.uk/colleges/rcds/publications/seaford-house-papers/2011-seaford-house-papers/shp11lawrenson.pdf/view Year: 2011 Country: International URL: http://www.da.mod.uk/colleges/rcds/publications/seaford-house-papers/2011-seaford-house-papers/shp11lawrenson.pdf/view Shelf Number: 131353 Keywords: Computer SecurityCyber SecurityCybercrimeInternet Crimes |
Author: United Nations Office on Drugs and Crime (UNODC) Title: Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children Summary: This Study on the effects of new information technologies on the abuse and exploitation of children was prepared pursuant to Economic and Social Council resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children, in which the Council expressed concern that increasingly rapid technological advances have created new possibilities for the criminal misuse of new information and communication technologies. The study is based primarily on open source research and the outcomes of an informal expert group meeting on ICT facilitated abuse and exploitation of children, held in Vienna from 23 to 25 September. In accordance with Council resolution 2011/33, relevant information from the 2013 Comprehensive Study on Cybercrime prepared for the consideration of the open-ended intergovernmental expert group on cybercrime is also taken into account. The study is divided into four chapters and contains a glossary as an annex. Details: Vienna: UNODC, 2014. 72p. Source: Internet Resource: Accessed October 9, 2014 at: https://www.unodc.org/documents/commissions/CCPCJ/CCPCJ_Sessions/CCPCJ_23/E-CN15-2014-CRP1_E.pdf Year: 2014 Country: International URL: https://www.unodc.org/documents/commissions/CCPCJ/CCPCJ_Sessions/CCPCJ_23/E-CN15-2014-CRP1_E.pdf Shelf Number: 133926 Keywords: Child AbuseChild ProtectionChild Sexual ExploitationComputer CrimesCybercrime (International)Internet CrimesOnline CommunicationsOnline Victimization |
Author: Pew Research Center Title: Online Harassment Summary: Harassment-from garden-variety name calling to more threatening behavior- is a common part of online life that colors the experiences of many web users. Fully 73% of adult internet users have seen someone be harassed in some way online and 40% have personally experienced it, according to a new survey by the Pew Research Center. Pew Research asked respondents about six different forms of online harassment. Those who witnessed harassment said they had seen at least one of the following occur to others online: - 60% of internet users said they had witnessed someone being called offensive names - 53% had seen efforts to purposefully embarrass someone - 25% had seen someone being physically threatened - 24% witnessed someone being harassed for a sustained period of time - 19% said they witnessed someone being sexually harassed - 18% said they had seen someone be stalked Those who have personally experienced online harassment said they were the target of at least one of the following online: - 27% of internet users have been called offensive names - 22% have had someone try to purposefully embarrass them - 8% have been physically threatened - 8% have been stalked - 7% have been harassed for a sustained period - 6% have been sexually harassed In Pew Research Center's first survey devoted to the subject, two distinct but overlapping categories of online harassment occur to internet users. The first set of experiences is somewhat less severe: it includes name-calling and embarrassment. It is a layer of annoyance so common that those who see or experience it say they often ignore it. The second category of harassment targets a smaller segment of the online public, but involves more severe experiences such as being the target of physical threats, harassment over a sustained period of time, stalking, and sexual harassment. Of those who have been harassed online, 55% (or 22% of all internet users) have exclusively experienced the "less severe" kinds of harassment while 45% (or 18% of all internet users) have fallen victim to any of the "more severe" kinds of harassment Details: Washington, DC: Pew Research Center, 2014. 64p. Source: Internet Resource: Accessed October 23, 2014 at: http://www.pewinternet.org/files/2014/10/PI_OnlineHarassment_102214_pdf.pdf Year: 2014 Country: United States URL: http://www.pewinternet.org/files/2014/10/PI_OnlineHarassment_102214_pdf.pdf Shelf Number: 133808 Keywords: HarassmentInternet CrimesOnline VictimizationSexual HarassmentStalking |
Author: NetNames Title: Behind the Cyberlocker Door: A Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions Summary: Digital theft of copyrighted content, has surged as for-profit pirate sites continue making money by illegally distributing movies, music, TV shows and other content. Cyberlockers are among the most profitable content theft sites, but very little research has been conducted to determine how much money they are pocketing by illegally distributing the work of content creators. As a society, we can no longer shrug off content theft as the isolated activity of high school and college students who want to watch a movie or listen to music for free. Recent reports, this one by NetNames and one earlier this year by MediaLink, lay bare the truth that content theft is big business, raking in hundreds of millions of dollars a year - essentially bleeding the Internet for profit while making it less attractive for generations to come. Content theft harms not only creators whose products are stolen and legitimate distributors that are forced to compete with cyberlockers who pay nothing for the content that drives their business. It also hurts consumers who pay the price for "free" content in a reduction of quality choices as revenues are reduced, and may be subjected to identity theft and malware that cyberlockers are associated with. New research by NetNames has demonstrated that: - It's easy to profit on the Internet when you leverage other people's creative works. In fact, it is possible you could make millions of dollars doing so. - There is a compelling difference between the business models of rogue cyberlockers that peddle in content theft and legitimate cloud storage services. - Malware is a serious issue when it comes to content theft. - Major brands are victimized by content thieves who leverage these brands to make their own rogue sites seem legitimate. - That all it takes for bad operators to succeed is for the facilitators of commerce - payment processors and the advertising industry, among other stakeholders- to do nothing. In the NetNames research, for example, MasterCard and Visa could be used to buy subscriptions on almost all the cyberlockers. The question is what we do about it. It's going to take concerted action by the Internet and the payment processors, advertising industries, consumers, public interest groups, Internet safety organizations and responsible government officials to address this corrosive issue that threatens our basic trust in our online world. Details: London: Digital Citizens Alliance, 2014. 50p. Source: Internet Resource: Accessed October 30, 2014 at: http://www2.itif.org/2014-netnames-profitability.pdf Year: 2014 Country: International URL: http://www2.itif.org/2014-netnames-profitability.pdf Shelf Number: 133832 Keywords: Computer CrimesComputer SecurityCredit CardsCyber SecurityCybercrimesDigital PiracyIntellectual Property TheftInternet Crimes |
Author: Barrett, Nicole A. Title: Laws to Combat Sex Trafficking: An Overview of International, National, Provincial and Municipal Laws and their Enforcement Summary: This report examines current legislation, regulations and law enforcement issues relating to human trafficking for sexual exploitation at four levels: the international, national, state/provincial, and municipal. The report is part of on-going research for the Task Force on the Trafficking of Women and Girls in Canada, convened by the Canadian Women's Foundation (CWF). A previous research report to the Task Force discusses the incidence of sex trafficking in Canada as well as specific issues of trafficking for sexual exploitation in Canada and the impacts on women and girls in particular. The overall purpose of the research is to analyze Canada's legal framework for addressing sex trafficking, place Canada's current legislative responses to sex trafficking at federal, provincial and municipal levels in the context of international obligations and recent developments in other countries, and to examine possible responses and innovative practices for the law and law enforcement. The report is intended to aid the Task Force in formulating its programming and policy responses to the significant problem of sexual exploitation of women and girls in Canada. The report is divided into six main sections, which look at the context in which legislation should be considered, and examines the four levels of applicable law, including a brief discussion of internet regulation as it relates to sex trafficking. The six sections include: - An introduction, providing methodology and context - International protocols and obligations relating to sex trafficking and selected examples of foreign national and state/provincial legislation on human trafficking and prostitution - Canadian Federal legislation - Canadian Provincial legislation - Canadian Municipal regulation - Regulating the internet The final section of the report summarises the main issues arising from the research for further consideration by the Task Force. Summary charts on current international, Canadian Provincial and Municipal responses, and an overall matrix of legislative responses to trafficking for sexual exploitation are included as Appendices to the report (Appendices I-VII). Details: Toronto: Canadian Women's Foundation, 2013. 106p. Source: Internet Resource: Accessed October 30, 2014 at: http://canadianwomen.org/sites/canadianwomen.org/files//Laws%20to%20Combat%20Sex%20Trafficking_2.pdf Year: 2013 Country: International URL: http://canadianwomen.org/sites/canadianwomen.org/files//Laws%20to%20Combat%20Sex%20Trafficking_2.pdf Shelf Number: 133880 Keywords: Child ProstitutionChild Sexual ExploitationHuman TraffickingInternet CrimesLaw and LegislationProstitutionSex TraffickingSexual Exploitation |
Author: Ponemon Institute Title: The Impact of Cybercrime on Business. Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Summary: Cyber criminals today are increasingly leveraging malware, bots and other forms of sophisticated threats to attack organizations for various reasons, including financial gain, business disruption or political agendas. In many cases, cybercriminals often target multiple sites and organizations to increase the likelihood of an attack's initial success and viral spread. With new variants of malware being generated on a daily basis, many companies struggle to fight these threats separately and the majority of attacks are often left undetected or unreported. In addition, cybercriminals are no longer isolated amateurs. They belong to well-structured organizations with money, motivation and goals, often employing highly skilled hackers that execute targeted attacks. Such organizations can deploy considerable threat intelligence, time and resources in order to execute attacks that can cost cybercrime victims significant amounts of money. Unfortunately, this trend is only growing more complex as businesses experience a surge in Web 2.0 use, mobile computing and the cloud, creating more channels of communication and vulnerable entry points into the network. Conducted by Ponemon Institute and sponsored by Check Point Software Technologies, we are pleased to present the findings of The Impact of Cybercrime on Business. The purpose of the study is to better understand the likelihood, frequency and magnitude targeted threats have on organizations across all company sizes and industries, and to understand how IT practitioners are addressing the risk for future remediation and precautions. In this study we surveyed 2,618 highly experienced business leaders and IT security practitioners located in the United States, United Kingdom, Germany, Hong Kong and Brazil. Respondents were asked to focus on five of the most prevalent types of attacks: botnets, Advanced Persistent Threats (APTs), denial of service (DoS) attacks, viruses, worms and trojans and social engineering attacks to evaluate what impact they have on businesses, including their level of risk, motivations, types of information compromised and cost. As the study will show, there are significant differences in practices and perceptions among IT practitioners in all five countries. Details: Traverse City, MI: Ponemon Institute, 2012. 21p. Source: Internet Resource: Accessed November 12, 2014 at: http://www.ponemon.org/local/upload/file/Impact_of_Cybercrime_on_Business_FINAL.pdf Year: 2012 Country: International URL: http://www.ponemon.org/local/upload/file/Impact_of_Cybercrime_on_Business_FINAL.pdf Shelf Number: 134061 Keywords: Computer CrimesCrimes Against BusinessesCybercrimeCybersecurityInternet Crimes |
Author: Pritchard, Jeremy Title: Child exploitation material in the context of institutional child sexual abuse Summary: Child exploitation material (CEM) in the context of institutional child sexual abuse - University of Tasmania - This report provides a review of literature on child exploitation material (CEM) in the context of institutional child sexual abuse Compared to other areas of crime research, CEM research is relatively new and the current research base is limited. - There is no evidence to support a direct causal link between viewing CEM and committing contact offences, however, a significant percentage of CEM offenders appear to have committed contact offences. - The CEM market is experiencing unprecedented growth, particularly with the combined advent of the internet and cheap digital cameras. - Very little research has examined CEM in workplace contexts. - There is very limited evidence about the effectiveness of strategies to prevent CEM offences in institutions. Potential strategies include: - IT filters to block websites - protocols governing the use of computers, cameras, mobile phones etc. - monitoring staff internet use - workplace codes of conduct including Internet Use Policies. Details: Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse, 2014. 37p. Source: Internet Resource: Accessed February 3, 2015 at: http://www.childabuseroyalcommission.gov.au/documents/edited-report-final-version-cem-prichard-spiranovi.pdf Year: 2014 Country: Australia URL: http://www.childabuseroyalcommission.gov.au/documents/edited-report-final-version-cem-prichard-spiranovi.pdf Shelf Number: 134519 Keywords: Child PornographyChild Sexual Abuse (Australia)Child Sexual ExploitationInternet Crimes |
Author: Buxton, Julia Title: The Rise and Challenge of Dark Net Drug Markets Summary: Key Points - Recent years have seen a dramatic growth in the sale of a variety of illicit substances on Dark Net drug markets, with on line sales projected to increase exponentially due to expanding internet availability, evolving technologies and the profusion of social media. - This new form of retail market poses a major challenge to not only law enforcement agencies but also the UN international drug control system and related legal structures within which these agencies operate. - For vendors and purchasers who use the sophisticated, user friendly and increasingly secure Dark Net sites, hidden markets present a safer environment for drug transactions and they reduce the multiple risks (coercion, violence, arrest, exposure to other drugs) associated with 'street' sales. - Research demonstrates that anonymised user forums and online chat rooms encourage and facilitate information sharing about drug purchases and drug effects, representing a novel form of harm reduction for drug users and an entry point for drug support services. - Experience to date shows that enforcement efforts through surveillance, hacking and other forms of interdiction may be successful in closing down a particular site, but at the cost of proliferating hidden drug markets and incentivising technological innovation. - Given an acknowledged lack of technical capacity, legal constraints and poor international enforcement coordination, Dark Net interdiction efforts should prioritise high-end crimes such as child sexual exploitation, cyber terrorism and weapons trafficking, and work with self-regulating, 'ethical' drug sites to enhance understanding of high-level criminality on the Dark Net. - The 2016 UN General Assembly Session (UNGASS) on the World Drug Problem is a timely opportunity to discuss reform of the UN drug control treaty system to better deal with the challenges of the increasingly complex illicit drug market in the twenty-first century. Details: Swansea, UK: Global Drug Policy Observatory, Swansea University, 2015. 24p. Source: Internet Resource: Policy Brief 7: Accessed February 12, 2015 at: http://www.swansea.ac.uk/media/The%20Rise%20and%20Challenge%20of%20Dark%20Net%20Drug%20Markets.pdf Year: 2015 Country: International URL: http://www.swansea.ac.uk/media/The%20Rise%20and%20Challenge%20of%20Dark%20Net%20Drug%20Markets.pdf Shelf Number: 134609 Keywords: Computer CrimesDark NetDrug MarketsIllicit DrugsInternet Crimes |
Author: Alazab, Mamoun Title: Spam and Criminal Activity Summary: The Internet is a decentralized structure that offers speedy communication, has a global reach but also provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with the spread of the Internet, cybercrime has rapidly evolved but attacks via email (spam) remain one of the major vectors for the dissemination of malware and many predicate forms of cybercrime. Spam as 'social engineering' is probably the most popular means for spreading and injecting malware on computers and other digital devices. Unlike cybercrime that targets 'low volume-high value' victims such as banks but often requires advanced hacking capability, spam enables malware to reach 'high volume low value' targets, which are less likely to have effective anti-virus or other countermeasures in place. A typical example is the spreading of malicious emails, containing content that entices the recipient to click on a URL link to a malicious web site or download a malicious attachment. Deceptions achieved through the 'social engineering' of email messages are relatively well understood but less is known about advanced methods like 'spear phishing,' and whether different forms of social engineering are related to different types of malware and crime. Understanding the nature of spam activity, and the threat posed by malicious spam emails, especially the prevalence, frequency, duration and severity of these common forms of cybercrime is the key to prevention. Our research examines spam email attachments and URLs to profile and predict the types of spam that represent serious potential sources of malware infection. We describe the nature and trends in spam borne malware from our cross-disciplinary analysis of data. We argue that because the focus of IT security on perimeter-protection is becoming increasingly ineffective, there is a need to refocus crime prevention activities on the modus operandi of offenders. This research used real world' data sets provided by the Australian Communication and Media Authority (ACMA) spam intelligence dataset (SID). We processed 13,450,555 million spam emails: of the 492,978 found with attachments 21.4% were malicious, and of the 6,230,274 that contained a URL, 22.3% of the web links were malicious. Details: Canberra: Regulatory Institutions Network, Australian National University, 2014. 30p. Source: Internet Resource: RegNet Research Paper No. 2014/44: Accessed February 18, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2467423## Year: 2014 Country: International URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2467423## Shelf Number: 134637 Keywords: Computer CrimesCybercrimeInternet Crimes |
Author: Maple, Carsten Title: Cyberstalking in the United Kingdom: An Analysis of the ECHO Pilot Survey Summary: The problem of stalking has probably been around since the earliest communities gathered. Newspaper reports and television news channels have reported for many years cases in which stalking ultimately led to a fatality or serious injury, especially in cases where one of the parties was famous, or indeed infamous. However these reports were not initiated due to the concern of stalking behaviour, but rather the act that it resulted in, generally involving violence. It is only relatively recently that legislation has been introduced in the United Kingdom to address stalking and harassment, with the introduction of the Protection from Harassment Act 1997. In America the first stalking legislation was passed in California in 1990, and by 1999 every other state and the District of Columbia had passed laws that criminalised stalking. Network for Surviving Stalking is internationally recognised as the leading Registered Charity in the United Kingdom dedicated to supporting victims of stalking, free of cost or commercial gain. It aims to provide support to victims, potential victims and others affected by stalking or harassment throughout the UK, to raise awareness of the subject and to provide information about stalking and harassment to professionals, relevant agencies and the public. As we have moved into an age of electronic information and communication, stalkers have found new, more effective and efficient means to perpetrate their malicious acts; stalkers have become Cyberstalkers. Cyberstalking has become somewhat of an epidemic stretching across the globe. Network for Surviving Stalking began to notice that an increasing number of people searching for support were being stalked or harassed online, making the charity concerned as to the prevalence, nature and impact of cyberstalking. The charity commissioned a team of researchers and together developed an online questionnaire to establish answers to these questions. This report provides an analysis of the responses to the questionnaire. Details: Luton, Bedfordshire, UK: University of Bedfordshire, National Centre for Cyberstalking Research, 2011. 40p. Source: Internet Resource: Accessed March 20, 2015 at: http://paladinservice.co.uk/wp-content/uploads/2013/12/ECHO_Pilot_Final-Cyberstalking-in-the-UK-University-of-Bedfordshire.pdf Year: 2011 Country: United Kingdom URL: http://paladinservice.co.uk/wp-content/uploads/2013/12/ECHO_Pilot_Final-Cyberstalking-in-the-UK-University-of-Bedfordshire.pdf Shelf Number: 134985 Keywords: Cybercrime Cyberstalking (U.K.) Internet CrimesStalking |
Author: Moens, Alexander Title: Cybersecurity Challenges for Canada and the United States Summary: The Internet was designed not with security in mind, but rather openness and the free flow of information. The resulting globally connected Internet has brought unprecedented levels of information and commercial exchange, contributed enormous gains to individual prosperity, and promoted and expanded individual liberty. Only in recent years have governments, militaries, industries, firms, and individuals come to grips with how to protect legitimate activity in cyberspace without compromising the Internet's open character. Overemphasizing security can restrict freedom and stifle entrepreneurial potential. Conversely, liberty in cyberspace without an appreciation of cybersecurity presents rising commercial and governmental costs as well as unacceptable threats to national security. One study on the economic costs of cyberespionage and other forms of cyberattack estimates the global costs at between $375 billion and $575 billion annually, and a range of nation-states, state-linked groups, and non-state actors are exploiting cyberspace to conduct espionage, military operations, and large-scale theft of intellectual property. Although there have been calls for international norms of behaviour and rules of the road in cyberspace, treaties and arms control as developed and understood in the conventional, nuclear, and chemical realm are not easily transferred to the domain of cyberspace. Nevertheless, the rule of consequences and of self-interest is in play, as is the logic of cost-benefit in escalation. Still, cyberattacks continue, increasing in quantity and quality, which is why resilience is the watchword of cyberspace. As in other zones of commerce and theatres of operation, Canada and the United States are deeply integrated in cyber-space. Canada draws a clear net benefit from close cooperation with the United States in cyberspace because both the nature of the evolving threat and the nature and cost of countering this threat are increasingly more difficult for a state to address on its own. At the same time, as it cooperates with the United States and other close allies, the Canadian government faces the challenge of finding a balance between security and the Canadian definition of freedom. As the powers of Canadian government agencies expand and coordination with US agencies and other allied agencies increases, the task of providing cybersecurity should not be left to the specialized agencies without a layer of oversight by elected representatives. As Canada updates its ability to deal with threats in cyberspace, it needs to enhance the ability of its representative government to oversee this important work. Details: Calgary, AB, Canada: Fraser Institute, 2015. 54p. Source: Internet Resource: Accessed April 1, 2015 at: http://www.fraserinstitute.org/uploadedFiles/fraser-ca/Content/research-news/research/publications/cybersecurity-challenges-for-canada-and-the-united-states.pdf Year: 2015 Country: Canada URL: http://www.fraserinstitute.org/uploadedFiles/fraser-ca/Content/research-news/research/publications/cybersecurity-challenges-for-canada-and-the-united-states.pdf Shelf Number: 135115 Keywords: CybercrimesCybersecurityInternet CrimesNational Security |
Author: Tehan, Rita Title: Cybersecurity: Authoritative Reports and Resources, by Topic Summary: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: - Policy overview - National Strategy for Trusted Identities in Cyberspace (NSTIC) - Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) - Critical infrastructure - Cybercrime, data breaches, and data security - National security, cyber espionage, and cyberwar (including Stuxnet) - International efforts - Education/training/workforce - Research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions. Details: Washington, DC: Congressional Research Services, 2015. 129p. Source: Internet Resource: R42507: Accessed April 1, 2015 at: http://fas.org/sgp/crs/misc/R42507.pdf Year: 2015 Country: United States URL: http://fas.org/sgp/crs/misc/R42507.pdf Shelf Number: 135117 Keywords: Cloud ComputingCybercrimesCybersecurityInternet Crimes |
Author: Internet Watch Foundation Title: Emerging Patterns and Trends Report #1. Youth-Produced Sexual Content Summary: This Paper introduces the key findings of a quantitative study of youth-produced sexual content online ('the Study'). The Study took place over a three month period between September and November 2014 and used a combination of proactively sourced content from search engines, historic IWF data and leads from public reports to locate "youth-produced sexual content" depicting "young people". Where the content was assessed as meeting these criteria the content was analysed in accordance with IWF's standard procedures for actioning child sexual abuse content, capturing data about each image/video including image category, site type, commerciality, hosting location, device used to create the content and the assessed age and gender of the individuals depicted. During the course of the Study, 3,803 images and videos were assessed as meeting the research criteria. The key findings of the Study were as follows: - 17.5% of content depicted children aged 15 years or younger. - 85.9% of content depicting children aged 15 or younger was created using a webcam. - 93.1% of the content depicting children aged 15 or younger featured girls. - 46.9% of content depicting children aged 15 years or younger was Category A or B5 compared to 27.6% of content in the 16-20 years age range. - 89.9% of the total images and videos assessed as part of the Study had been harvested from the original upload location and were being redistributed on third party websites. The Study was carried out by Internet Watch Foundation (IWF) in partnership with Microsoft and was initially designed to expand upon an earlier study carried out by IWF in 2012 which provided a snapshot of the availability of self-generated sexual content featuring young people online and the extent to which control over that content is lost once it has appeared online. However, on analysis of the data it became apparent that the scope of the 2012 study and the definition of "self-generated sexual content" as used therein was inadequate in describing the observed trends. This was particularly the case in relation to methods of creation of the content and age of many of the individuals depicted. What emerged from the data in this Study is an increasing trend for the distribution of sexually explicit content produced by younger children using laptop webcams which, due to the nature of the technology used, they are aware is being shared with at least one other party. To reflect this finding, we instead propose a new definition of "youth-produced sexual content" as: "Nude or semi-nude images or videos produced by a young person of themselves engaging in erotic or sexual activity and intentionally shared by any electronic means." Details: Cambridge, UK: Internet Watch Foundation, 2015. 25p. Source: Internet Resource: Accessed April 2, 2015 at: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content.pdf Year: 2015 Country: United Kingdom URL: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content.pdf Shelf Number: 135150 Keywords: Child PornographyComputer CrimesInternet CrimesInternet PornographySex CrimesSexting |
Author: Afilipoaie, Alois Title: The Growing Industry of Darknet Marketing Summary: Tor's hidden services have allowed a new form of low-risk high-profit drug dealing to emerge and grow quickly over the last four years. Vendors of narcotics are utilising innovative marketing techniques that mirror those used by legal, 'real-world' and web-based businesses to promote and sell goods and services. These range from offers of free samples and discounts, to the use of banner adverts and brand management. Drug marketing is becoming increasingly sophisticated as more users and buyers flock to the Tor network and as hidden markets become more diversified and competitive. Details: Singleton Park, Swansea, UK: Global Drug Policy Observatory, 2015. 4p. Source: Internet Resource: Accessed April 6, 2015 at: http://www.swansea.ac.uk/media/GDPO%20SA%20Marketing.pdf Year: 2015 Country: International URL: http://www.swansea.ac.uk/media/GDPO%20SA%20Marketing.pdf Shelf Number: 135157 Keywords: Drug DealingDrug Markets Illegal DrugsInternet Crimes |
Author: Yu, Xiao Title: Moving Targets: Tracking Online Sales of Illegal Wildlife Products in China Summary: Transactions for illegal wildlife products, particularly ivory, are shifting away from online retailers and onto social media platforms according to TRAFFIC's research into the Chinese-language online retail community. This is a key finding of a new report, Moving targets: Tracking online sales of illegal wildlife products in China, which discloses the results of routine market monitoring of China's online retailers that began in 2006 and is released today, World Wildlife Day. At its peak in March 2012, more than 4,000 new advertisements per month for illegal wildlife products were appearing online on Chinese language online retail websites, finds the new report. More than half of the illegal products offered comprised ivory items. However, following advertisement removal and blocking of code words used to describe illegal products through regular exchange with e-commerce and enforcement agencies by TRAFFIC, this fell dramatically to around 1,500 from July 2012 and has remained around that level ever since. One change has been an increase in the number of code words used by sellers to conceal the identity of their goods, from 15 code words used in 2012 to 64 identified and monitored by TRAFFIC today. At least 22 code words exist for ivory, including terms such as "African materials, yellow materials, white plastic, jelly". All 64 code words are searched each month by TRAFFIC on 25 e-commerce and antique selling websites for eight wildlife products - ivory, rhino horn, Tiger bone, hawksbill shells, pangolin scales, leopard bones, Saiga horn and Hornbill casques. There has also been evidence of the move to social media, where dealers release photos and information about illegal wildlife products in order to attract and interact with potential customers. Some dealers also use "agents" to extend their audiences by re-posting the information about illegal wildlife products onto their own social media platform. Details: Cambridge, UK; TRAFFIC International, 2015. 10p. Source: Internet Resource: Traffic Briefing: Accessed April 15, 2015 at: http://www.traffic.org/storage/China-monitoring-report.pdf Year: 2015 Country: China URL: http://www.traffic.org/storage/China-monitoring-report.pdf Shelf Number: 135232 Keywords: Computer CrimesIllegal Wildlife TradeInternet CrimesSocial MediaWildlife Crime |
Author: Koops, Bert-Jaap Title: Cyberspace, the cloud, and cross-border criminal investigation. Cyberspace, the cloud, and cross-border criminal investigation Summary: With the rise of cloud computing (using scalable computing resources as a service via the Internet), computer data are increasingly stored remotely - 'in the cloud' - instead of on users' devices. Due to the distributed, dynamic, and redundant nature of cloud storage, a particular file can often be stored in multiple places simultaneously, while it may not be stored in any single place in its entirety. For speed-optimisation reasons, data may be stored in the server park closest to the user's normal location. Cloud computing can involve multiple providers in different layered constellations and data can be encrypted. The cloud thus has significant implications for criminal investigation, particularly in cases where digital evidence is sought. Local search and seizure by the police will yield less and less evidence as users use cloud services such as webmail and remote data storage. This reinforces existing challenges of cyber-investigation, which not only requires swift evidence-gathering due to the vulnerability of data loss, but also powers to gain access to data remotely. One particular challenge in cyber-investigation is that such remote evidence-gathering powers will quickly extend beyond national borders. Under the rules of international law, states must then resort to traditional procedures of mutual legal assistance. This is, broadly speaking, a challenging process in cyber-investigations. In addition to organisational limitations, such as lack of capacity or priority-setting, and some legal limitations, such as double criminality, mutual assistance procedures are viewed by those conducting on-line investigations as cumbersome or ineffective for seeking digital evidence. Despite efforts to streamline and facilitate mutual legal assistance in cyber-investigation, the procedures remain inadequate in situations in which there is a need for expeditious data gathering, or where (cyber)criminals move data around with high frequency, and also where the location of the data cannot, or only through time-consuming efforts, be identified, which may often be the case in cloud computing situations. Where mutual legal assistance procedures do not work sufficiently, the question arises whether and under what conditions cross-border investigations are allowed, which is relevant not only for cybercrimes but for all crimes where perpetrators communicate via email or smartphone apps or use cloud storage services. Although a number of efforts have been aimed at trying to move forward in the field of cross-border cyber-investigation, these efforts have not yet resulted in any tangible improvement. A key reason for this is that territorially-based national sovereignty forms the basis of the international order and as a result, international law is strict in prohibiting investigative activities on foreign territory without the consent of the state concerned. The situation is thus one of stalemate: cyber-investigation officials wish to move forward in cross-border investigation but cannot do so because of the current limitations of international law and because the specific challenges of cyber-investigation have so far not induced states to create new international rules in this area that put strict interpretations of sovereignty aside. It is against this background of a 21st-century cloud computing paradigm meeting with 20th-century-based procedures for mutual legal assistance in criminal matters that the central problem of this study takes shape. This report aims to advance the debate on cross-border cyber-investigation by combining the fields of cyber-investigation and international law. The central question addressed in this study is what limits and what possibilities exist within international law for cross-border cyber-investigations by law enforcement authorities. The focus is on cloud storage services, but the analysis applies more generally to Internet investigations, in particular in the form of remote searches and the contacting of foreign service providers to request data. In particular, the report focuses on questions of the legality of cross-border access to data under international law in terms of the core principles of territorial integrity and non-interference in domestic affairs rather than on questions of human rights. The research for this report is based on desk research of international and supranational law and policy and academic literature in the fields of cyber-investigation and of international law, and on an international expert meeting with twenty experts in criminal law, cybercrime, Internet, and international law. Details: Tilburg, NETH: TILT - Tilburg Institute for Law, Technology and Society, 2014. 101p. Source: Internet Resource: Accessed April 20, 2015 at: http://english.wodc.nl/onderzoeksdatabase/2326-de-gevolgen-van-cloudcomputing-voor-de-opsporing-en-vervolging.aspx?cp=45&cs=6796 Year: 2014 Country: International URL: http://english.wodc.nl/onderzoeksdatabase/2326-de-gevolgen-van-cloudcomputing-voor-de-opsporing-en-vervolging.aspx?cp=45&cs=6796 Shelf Number: 135266 Keywords: Cloud ComputingComputer CrimesCybercrimeInternet CrimesPolice Investigations |
Author: Livingstone, Sonia Title: Towards a better internet for children Summary: This report presents new findings and further analysis of the EU Kids Online 25 country survey. It also brings together our previously published findings relevant to European Commission Vice President Kroes' CEO Coalition recent initiative to make the internet a better place for children. New results show that, of nine different kinds of parental worries about their child, online risks - being contacted by strangers (33% parents) or seeing inappropriate content (32% parents) - rank 5th and 6th. Will the Coalition's principles help manage online risk of harm, and so address parental concerns? Our evidence supports recommendations about initiatives that industry can take under four of the five headings considered by the CEO Coalition. Details: London: EU Kids Online, London School of Economics, 2012. 17p. Source: Internet Resource: Accessed May 1, 2015 at: http://www.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/EUKidsOnlinereportfortheCEOCoalition.pdf Year: 2012 Country: Europe URL: http://www.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/EUKidsOnlinereportfortheCEOCoalition.pdf Shelf Number: 135454 Keywords: Computer CrimesComputer SafetyInternet CrimesInternet SafetyOnline Victimization |
Author: Jeffray, Calum Title: Underground Web: The Cybercrime Challenge. Summary: The two papers in this Special Report examine the central role that cybercrime plays in modern society and how technological developments create new opportunities for criminals to exploit. Calum Jeffray's paper, Caught in the net: the law enforcement response to international cybercrime, surveys the strategic cybercrime landscape and illustrates that, despite calls for law enforcement to 'do more' to prevent and investigate cybercrime, the agencies involved are often hampered in acting due to jurisdictional issues or the complexity of the investigations. Tobias Feakin's paper, Cryptomarkets - illicit goods in the darknet, examines the emergence of the 'darknet', where trading in illicit goods and services in online black markets has become increasingly commonplace and exacerbates the problems that law enforcement already faces - tracing and prosecuting illegal activities online. Details: Barton, ACT: AUS: Australian Strategic Policy Institute, International Cyber Policy Centre, 2015. 16p. Source: Internet Resource: Special Report: Accessed May 4, 2015 at: https://www.aspi.org.au/publications/underground-web-the-cybercrime-challenge/SR77_Underground_web_cybercrime.pdf Year: 2015 Country: International URL: https://www.aspi.org.au/publications/underground-web-the-cybercrime-challenge/SR77_Underground_web_cybercrime.pdf Shelf Number: 135504 Keywords: Black MarketsCyber SecurityCybercrimeIllegal TradingIllicit GoodsInternet Crimes |
Author: Australia. Attorney-General's Department Title: National Plan to Combat Cybercrime Summary: Australia is a highly connected country - technology and the internet are crucial to Australia's way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging as a key enabler for criminal activity. In Australia, the term 'cybercrime' is used to describe both: crimes directed at computers or other information communications technologies (ICTs) (such as hacking and denial of service attacks) and crimes where computers or ICTs are an integral part of an offence (such as online fraud, identity theft and the distribution of child exploitation material). Responsibility for combating the different forms of cybercrime in Australia is shared between Australian Government agencies state and territory agencies. All jurisdictions have criminal laws directed at the various forms of cybercrime. The Australian Attorney-General's Department has led the development of a National Plan to Combat Cybercrime, in consultation with Australian Government agencies, state and territory agencies. Details: Barton, ACT: Attorney-General's Department, 2013. 36p. Source: Internet Resource: Accessed June 3, 2015 at: http://apo.org.au/files/Resource/agd_nationalplantocombatcybercrime_jul_2013.pdf Year: 2013 Country: Australia URL: http://apo.org.au/files/Resource/agd_nationalplantocombatcybercrime_jul_2013.pdf Shelf Number: 139734 Keywords: Computer Crime Cybercrime Internet Crimes |
Author: Australian Crime Commission Title: Serious and Organised Investment Fraud in Australia Summary: Serious and organised investment fraudsters target Australian investors with promises of high investment returns, using 'cold call' techniques and backing up their claims with fraudulent websites to which the criminals can direct unsuspecting investors. This type of fraud involves the illegal and often aggressive selling of worthless or overpriced shares. It is generally highly organised, spans multiple jurisdictions and uses sophisticated technology. This type of fraud also involves non-compliance with share-listing requirements, making fraudulent statements to shareholders and using false identities. Serious and organised investment frauds place high pressure on people to take up the investment offer. Typically based off shore, these investment frauds use the internet to conduct their illegal operations. They are incredibly sophisticated and very difficult for even experienced investors to identify. Details: Canberra: Australian Institute of Criminology, 2012. 43p. Source: Internet Resource: Accessed August 3, 2015 at: https://www.crimecommission.gov.au/sites/default/files/SOIFA_Report_030812.pdf Year: 2012 Country: Australia URL: https://www.crimecommission.gov.au/sites/default/files/SOIFA_Report_030812.pdf Shelf Number: 136291 Keywords: Financial CrimesFraud and CorruptionInternet CrimesInvestment FraudOrganized Crime |
Author: Great Britain. Her Majesty's Inspectorate of Constabulary Title: Online and on the edge: Real risks in a virtual world. An inspection into how forces deal with the online sexual exploitation of children Summary: Taking, possessing and distributing indecent images of children or grooming them online, can result in the commission of serious crimes against the most vulnerable. These crimes are not necessarily confined to the online world. There is a risk that perpetrators are also committing sexual offences against children in person or may do so in the future. This report sets out the findings from fieldwork in Devon and Cornwall, Kent, Lancashire, North Wales, Northumbria and Staffordshire where HMIC inspectors reviewed a total of 124 cases selected at random, and conducted interviews with police officers and staff. Although we did not inspect every force, we anticipate that our findings and recommendations will be relevant in whole, or in part, for all police forces throughout England and Wales. The first part of this report sets the scene, looking at the reasons and background to why children are sexually exploited online. The second part sets out our findings on the police service's efforts to tackle online child sexual exploitation. Although this report does not specifically focus on the police's use of technology when dealing with this type of offending, in our annual assessment of policing in England and Wales, published in November 2014, we stressed the need for the police service to refresh and improve its capabilities on a regular basis. The police will need to make a major leap forward in capability to keep pace with the crime threat, and this is particularly true of crimes against children facilitated by online activity. In 2012, HMIC carried out fieldwork as part of an inspection on how police forces performed in their work to prevent online child sexual exploitation - facilitated and enabled by the internet. This fieldwork identified opportunities to undertake coordinated law enforcement activity to apprehend offenders across England and Wales. As a result, operation Notarise was established as a large scale police operation between the National Crime Agency and the police service. So far 745 people have been arrested, 900 premises searched, and nearly 10,000 devices capable of storing indecent images of children have been seized. Over 500 children have been identified and safeguarded as a result of this activity. From time to time, in the course of our inspection work, we come across live police operations. We do not make public any material that might compromise current operations or pending criminal trials. Details: London: HMIC, 2015. 78p. Source: Internet Resource: Accessed August 3, 2015 at: http://www.justiceinspectorates.gov.uk/hmic/wp-content/uploads/online-and-on-the-edge.pdf Year: 2015 Country: United Kingdom URL: http://www.justiceinspectorates.gov.uk/hmic/wp-content/uploads/online-and-on-the-edge.pdf Shelf Number: 136301 Keywords: Child PornographyChild ProtectionChild Sexual AbuseChild Sexual ExploitationInternet CrimesOnline Victimization |
Author: Gotsis, Tom Title: Revenge pornography, privacy and the law Summary: Privacy issues are currently on the agenda of public debate, largely as a consequence of technological developments which have created new avenues for the invasion of privacy. On 24 June 2015 the Legislative Council agreed to a Motion by Mick Veitch MLC for the Standing Committee on Law and Justice to inquire into remedies for the serious invasion of privacy in NSW. The terms of reference of the Inquiry are: (a) the adequacy of existing remedies for serious invasions of privacy, including the equitable action of breach of confidence; (b) whether a statutory cause of action for serious invasions of privacy should be introduced; and (c) any other related matter. In a media release issued by the Standing Committee on Law and Justice, the Committee Chair, Natasha Maclaren-Jones MLC, made reference to the issue of revenge pornography, stating: The proliferation of social media has meant that invasions of privacy through online forums, such as the alarming trend of jilted lovers posting sexually explicit photographs of ex-partners on the internet, has immediate and vast reaching repercussions. It is in this context that this paper considers: - The role of the criminal law in respect to revenge pornography, particularly in light of new offences against revenge pornography introduced in South Australia, Victoria and the United Kingdom. - The adequacy of existing civil law remedies for serious invasions of privacy by means of revenge pornography, including the equitable action of breach of confidence. Details: Sydney: New South Wales Parliamentary Research Service, 2015. 23p. Source: Internet Resource: e-brief Issue 7/2015: Accessed August 17, 2015 at: http://www.parliament.nsw.gov.au/Prod/parlment/publications.nsf/0/7E4E6390E36EEB86CA257E990004CE77/$File/revenge+pornography+privacy+and+the+law.pdf Year: 2015 Country: Australia URL: http://www.parliament.nsw.gov.au/Prod/parlment/publications.nsf/0/7E4E6390E36EEB86CA257E990004CE77/$File/revenge+pornography+privacy+and+the+law.pdf Shelf Number: 136440 Keywords: Internet CrimesInvasion of PrivacyPornographySocial Media |
Author: Australia. Auditor General Title: Cyber Attacks: Securing Agencies' ICT Systems Summary: 1. Governments, businesses and individuals increasingly rely on information and communications technology (ICT) in their day-to-day activities, with rapid advances continuing to be made in how people and organisations communicate, interact and transact business through ICT and the Internet. In the government sector, ICT is used to deliver services, store and process information, and enable communications, with a consequent need to protect the privacy, security and integrity of information maintained on government systems. 2. Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion. In the government sector, the Australian Signals Directorate (ASD) has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 were considered serious enough to warrant a Cyber Security Operations Centre response. 3. The protection of Australian Government systems and information from unauthorised access and use is a key responsibility of agencies, having regard to their business operations and specific risks. In the context of a national government, those risks can range from threats to national security through to the disclosure of sensitive personal information. Unauthorised access through electronic means, also known as cyber intrusions, can result from the actions of outside individuals or organisations. Individuals operating from within government may also misuse information which they are authorised to access, or may inappropriately access and use government information holdings. 4. For some years, the Australian Government has established both an overarching protective security policy framework, and promulgated specific ICT risk mitigation strategies and related controls, to inform the ICT security posture6 of agencies. In 2013, the Government mandated elements of the framework, in response to the rapid escalation, intensity and sophistication of cyber crime and other cyber security threats. Details: Canberra: Australian National Audit Office, 2014. 132p. Source: Internet Resource: Audit Report No. 50 2013-14: Accessed September 5, 2015 at: http://www.anao.gov.au/~/media/Files/Audit%20Reports/2013%202014/Audit%20Report%2050/AuditReport_2013-2014_50.pdf Year: 2014 Country: Australia URL: http://www.anao.gov.au/~/media/Files/Audit%20Reports/2013%202014/Audit%20Report%2050/AuditReport_2013-2014_50.pdf Shelf Number: 136699 Keywords: Cyber SecurityCybercrimeInternet CrimesInternet SecurityNational Security |
Author: Sutherland, Clare Title: The nature of online offending: Explored from Crown Prosecution Service case files Summary: Evidence regarding online offenders is limited and there are key gaps in knowledge around offender demographics, backgrounds and criminal careers. However, online offences and offenders are not easily identified through traditional data sources such as police recorded crime. This report therefore aims to help build understanding of online offenders and the nature of their offending by outlining findings from an analysis of case files held by the Crown Prosecution Service (CPS). The research involved analysis of offences prosecuted and convicted under the Computer Misuse Act 1990 (CMA); the Fraud Act 2006; s.127 of the Communications Act 2003 (CA); and the Malicious Communications Act 1998 (MCA). Random samples of cases were taken in December 2012 to explore: the proportion of cases that could retrospectively be identified as committed online; and the information that was held in those online cases regarding the characteristics of offenders and the nature of their offences. Details: London: Home Office, 2015. 26p. Source: Internet Resource: Research Report 82: Accessed October 15, 2015 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/468067/horr82.pdf Year: 2015 Country: United Kingdom URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/468067/horr82.pdf Shelf Number: 136988 Keywords: Computer CrimesCrime StatisticsInternet Crimes |
Author: European Parliament. Directorate-General for Internal Policies. Policy Department C: Citizzen's Rights and Constitutional Affairs Title: The Law Enforcement Challenges of Cybercrime: Are We Really Playing Catch-Up Summary: Cybercrime has become one of the key priorities for EU law enforcement agencies, as demonstrated by the establishment of the European Cybercrime Centre (EC3) in January 2013 and the development of specific European threat assessment reports in this field. High-profile criminal investigations such as the 'Silk Road' case, major data breaches or particularly nefarious hacks or malware attacks have been very much in the spotlight and widely reported in the media, prompting discussions and debates among policymakers and in law enforcement circles. Over the last few months, the cybercrime debate has specifically evolved around the issue of encryption and anonymisation. In this context, this Study argues that debates on the law enforcement challenge of cybercrime in the EU should steer clear both of doomsday scenarios that overstate the problem and scepticism that understates it, and that the key cybercrime concern for law enforcement is legal in nature rather than simply technical and technological. Indeed, the Study finds that the key challenge for law enforcement is the lack of an effective legal framework for operational activities that guarantees the fundamental rights principles enshrined in EU primary and secondary law. In order to address this core argument, this Study starts by analysing claims and controversies over the Internet 'going dark' on law enforcement (Section 2). It shows that these claims have been made for quite some time and should be considered as moral panics rather than accurate reflections of the challenges posed by cybercrime to law enforcement. Moreover, current controversies rehash older ones, conflating law enforcement concerns with intelligence-gathering and surveillance concerns. Without denying the fact that criminal activities do take place online, pose technical difficulties to law enforcement services and require the availability of specific capabilities, this section demonstrates that these difficulties do not impede criminal investigation to such an extent that exceptional means should be envisaged. While these technical aspects need to be considered, they raise issues related to policy and law rather than technology as such. The policy and law-related challenges are made greater by the fact that defining cybercrime is not an easy task. Very broad definitions have been adopted at the EU level, often leading to overlapping and sometimes conflicting mandates. Section 3 thus analyses the institutional architecture of EU cybercrime policy. It shows that the complexity of cybercrime measures and the expansive mandates and number of actors involved in their implementation make it difficult to ascertain and circumscribe the full scope of EU cybercrime policy. Whereas the Council of Europe (CoE) sought to codify cybercrime powers into an international convention, much of the EU's policy to fight cybercrime is based on non-legislative measures, including operational cooperation and ad hoc public-private partnerships. Furthermore, important distinctions and restrictions designed to ensure a 'separation of powers' between state agencies concerned with law enforcement (cyber-policing), civil protection (cybersecurity), national security (cyberespionage) and military force (offensive cyber capabilities) are harder to distinguish in the area of cybercrime, at both national and EU level. Section 3 underlines that, within this complex architecture, and with the blurring of the boundaries between those responsible for policing the Internet, for gathering intelligence from it, for conducting cyber-espionage against foreign targets, and for ensuring the safety of critical internet infrastructure, the European Parliament and civil society are largely excluded from policy development, impeding public scrutiny and accountability. This compounds the EP's existing problems in ensuring that fundamental rights and data protection are diligently protected in the area of justice and home affairs. In light of these gaps in oversight and accountability, Section 4 analyses in particular the challenge of jurisdiction, cooperation and fundamental rights safeguards. This section argues that operational challenges in cybercrime law enforcement do not change the obligation of EU institutions and Member States to ensure the safeguarding of EU fundamental rights in any operating framework of internal or transnational cooperation in law enforcement and criminal justice. Cybercrime law enforcement frequently cites the challenge of accessing and transferring data through existing Mutual Legal Assistance agreements. Yet practices taken outside of established legal channels cannot guarantee rights protections and run the risk of raising mistrust in the general public, the private sector and in transatlantic relations. Furthermore, across the spectrum of cybercrime prevention, investigation, and prosecution, the particular geography of the digital environment is said to complicate the traditional territorial foundations of law. Law enforcement bodies make continuous reference to the ways in which traditional legal structures stand in the way of operations. However, an updated legal framework designed to overcome these challenges should foreground fundamental rights concerns, which are essential to ensure due process and a necessary condition for the successful prosecution of cybercriminal offences. In light of these findings, the Study concludes with key recommendations for the European Parliament. In particular, to ensure that the Parliament is not marginalised altogether with respect to the implementation and review of EU cybercrime policies by the exercise of delegated powers, EU agency discretion and non-legislative decision-making bodies, further monitoring of EU council structures, Europol and international cooperation agreements is required (Recommendation 1). Moreover, the EP should ensure that the development of any cooperation/information-sharing framework guarantees the respect of fundamental rights (Recommendation 2). In light of the current discussions on a revised CoE Cybercrime Convention, the European Parliament should, further, ensure that the Convention's obligations are consistent with EU law and fundamental rights protections (Recommendation 3). The EP must also ensure that cybercrime is not used as a justification to undermine new information security protocols and the right to privacy in telecommunications, both of which are fundamental components of the functioning of the Internet (Recommendation 4). Finally, if European law enforcement agencies need to keep pace with technological change, it is imperative that training courses on cybercrime forensics and digital evidence include an applied fundamental rights component (Recommendation 5). Details: Brussels: European Parliament, 2015. 68p. Source: Internet Resource: Accessed November 17, 2015 at: http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536471/IPOL_STU(2015)536471_EN.pdf Year: 2015 Country: Europe URL: http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536471/IPOL_STU(2015)536471_EN.pdf Shelf Number: 137311 Keywords: CybercrimesCybersecurityInternet CrimesLaw EnforcementPolice Investigations |
Author: Palmer, Tink Title: Digital Dangers: The impact of technology on the sexual abuse and exploitation of children and young people Summary: The internet has transformed how we all live, learn, work and communicate. Over the last twenty years the ways in which we interact and engage have evolved beyond imagination; for many people, the world online is as real as the world offline. For children - at the forefront of the digital revolution - the internet has created myriad opportunities. But it has also created risks. For every new piece of technology that can change how children access information, communicate or find entertainment, a new danger may present itself in a way that children, families and society may not immediately understand. Barnardo's is the largest provider of support to at risk and sexually exploited children in the UK, and runs specialist services in 47 local areas across the country. In 2014-15, these services supported 3,175 children, a 49 per cent increase on the preceding year. Our project workers have witnessed first-hand how the internet has transformed the nature of abuse and sexual exploitation. The concerns that we raise in this report build upon evidence that started to emerge when Barnardo's published Just one click! in 2004. This was one of the first publications in the UK to address the growing concerns amongst professionals about the ways in which children and young people may be at risk of harm online. More than a decade later, and now that the true scale of sexual exploitation of children in the UK is finally beginning to be recognised, it is even more crucial that we better understand the risks posed by the internet, and how we can address them. What is clear from the report is that the ways in which children can be sexually exploited online do not always follow the models of sexual exploitation that we are familiar with. Children at risk may be younger than those referred to services for offline sexual exploitation, and may not fit into standard definitions of 'vulnerable'. What is also clear from the report is that the problem of online sexual abuse of children impacts on the work of Barnardo's across all projects. As communication becomes ever more private and personal, due to mobile devices and instant connectivity, it can become all the more difficult to identify who is at risk, how they are at risk and where they are at risk. It is vital that policy and practice recognises the particular vulnerabilities that children now face, and respond to them. Drawing on research conducted with our services, this report makes a number of recommendations relating to service provision; training for professionals; and policy change. The recommendations are wide-ranging and emphasise the part that we can all play in protecting our children online. Details: Barkingside, Ilford, UK: Barnardo's, 2016. 92p. Source: Internet Resource: Accessed January 13, 2016 at: http://www.barnardos.org.uk/onlineshop/pdf/digital_dangers_report.pdf Year: 2015 Country: United Kingdom URL: http://www.barnardos.org.uk/onlineshop/pdf/digital_dangers_report.pdf Shelf Number: 137575 Keywords: Child Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesOnline CommunicationOnline VictimizationSocial Media |
Author: Levi, Michael Title: The Implications of Economic Cybercrime for Policing Summary: London, as one of the world's leading financial centres, had a daily turnover in the foreign exchange market of L2,626 billion in April 2013 - all dependent on a highly interconnected electronic infrastructure and supporting technology. Yet this same technology that underpins and enables these global transactions also opens up businesses and individuals to new risks, in particular relating to cybercrime. The introduction of sophisticated technology has brought about a step-change in the way economic crime is committed - enabling frauds to be perpetrated at scale, at great speed, and at a distance, with no physical contact necessary between criminal and victim. It can be much harder to identify the individuals initiating crime, and often the location will be outside UK jurisdiction. These factors have resulted in a sharp escalation of such activities in recent years, bringing new challenges for policing and industry in preventing and tackling such crime. The City of London Police is the National Policing Lead for Economic Crime, and is playing a key role in proactively addressing these challenges including developing a national strategy. One major challenge has been coordinating information about criminal activity where this can be geographically widely dispersed. In addition to investigating some of the most serious frauds in the country, the City of London Police hosts the national reporting database - Action Fraud. This current research piece undertakes new analysis of data held by Action Fraud and its partner unit, the National Fraud Intelligence Bureau (NFIB) also hosted by the City of London Police. It finds that between October and December 2014 alone there were 106,681 reported fraud cases, a third of which related to banking and credit industry frauds. The median amount lost to fraudsters across all fraud types ranged from L112 lost through misuse of contracts in the telecom industry, to 38,974 lost from pension fraud. However the annual 250,000 crime reports received present only a limited view of several million crimes that are taking place within the UK annually to the cost of some $30billion. Under-reporting presents a challenge both in terms of research and policy responses. City of London Police initiatives to reduce fraud include training both the private and public sector in specialist skills through their Economic Crime Academy, piloting a focused victim care unit in London - the Economic Crime Victim Care Unit - and working closely with law enforcement across the UK to share information and co-ordinate action. Most importantly they include the formation of new national police fraud and cyber strategies focused on prevention at a national and local level. This research report highlights the necessity of working in partnership, both around primary prevention and building in security protection, and working with other agencies to disrupt criminal activities and pursue and prosecute offenders. Details: London: City of London Corporation, 2015. 96p. Source: Internet Resource: Accessed February 8, 2016 at: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf Year: 2015 Country: United Kingdom URL: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf Shelf Number: 137785 Keywords: Computer CrimesComputer FraudCybercrimesEconomic CrimesFinancial CrimesInternet CrimesPolice Technology |
Author: Tasmania Law Reform Institute Title: Bullying Summary: The Tasmania Law Reform Institute has released Final Report No 22, Bullying. The Report considers what role the law should play in responding to all types of bullying behaviours including cyber-bullying and questions whether the current legal regime in Tasmania can provide appropriate redress for victims. The Report makes 15 recommendations. Together, the recommendations are designed to create a tiered response to bullying consisting of: a criminal justice response reserved for the most serious examples which extends the offence of stalking in the Criminal Code to cover common bullying behaviours. The Report also recommends changes to the Justices Act to facilitate applications for restraint orders on the grounds of bullying. a civil justice response which seeks solutions through mediation and restorative justice practices. The Report recommends incorporating a mediation procedure into the restraint order process, or extending the jurisdiction of the Anti-Discrimination Commissioner to deal with complaints of bullying. Recommendations are also made to ensure that all Tasmanian workers have access to workplace bullying complaint processes. the development of legislative requirements for schools to implement anti-bullying policies and procedures. Policies should address the best interests of all children involved, whether those children are involved as victims, participants or bystanders. Details: Hobart: Tasmania Law Reform Institute, 2016. 72p. Source: Internet Resource: Final Report no. 22: Accessed http://www.utas.edu.au/__data/assets/pdf_file/0011/789698/Bullying_FR_A4_Print.pdf Year: 2016 Country: Australia URL: http://www.utas.edu.au/__data/assets/pdf_file/0011/789698/Bullying_FR_A4_Print.pdf Shelf Number: 137799 Keywords: BullyingCyberbullyingCybercrimesInternet CrimesStalking |
Author: Mounteney, Jane Title: The internet and drug markets Summary: The last decade has seen the emergence of new internet technologies that have acted as important facilitators of online drug markets. The internet now hosts a range of virtual marketplaces (both on the surface and deep web) for selling and buying illicit substances, as well as representing a new arena for health and law enforcement interventions. This first EMCDDA investigation into the world of online drug markets brings together state-of-the-art input from over 20 experts - from academia, journalism and frontline practice - and contributes to the knowledge base on this part of the supply chain. Details: Lisbon: European Monitoring Centre for Drugs and Drug Addiction, 2016. 136p. Source: Internet Resource: Insights no. 21: Accessed February 11, 2016 at: http://www.emcdda.europa.eu/system/files/publications/2155/TDXD16001ENN.pdf Year: 2016 Country: Europe URL: http://www.emcdda.europa.eu/system/files/publications/2155/TDXD16001ENN.pdf Shelf Number: 137844 Keywords: Computer CrimesDrug MarketsIllegal MarketsInternet Crimes |
Author: Simcox, Robin Title: "We Will Conquer Your Rome": A Study of Islamic State Terror Plots in the West Summary: The Islamic State (IS) presently controls significant amounts of land throughout Iraq and Syria. However, its ambitions are not restricted to this territory. Within days of announcing its 'Caliphat', the self-appointed 'Caliph Abu Bakr al-Baghdadi vowed that IS would eventually "conquer Rome". IS precursor groups and the individuals which have trained alongside them have displayed an interest in attacking the West for years. However, an audio message released on 21 September 2014, saw Abu Mohammed al-Adnani, an IS spokesman, attempt to ratchet up the threat. He instructed IS supporters to carry out attacks in the West - no matter how crude. There has subsequently been an increase in IS-linked plots that have emerged in the West. "We Will Conquer Your Rome:" A Study of Islamic State Terror Plots in the West by research fellow Robin Simcox studies all those that have been reported since the declaration of the 'Caliphate', and attempts to draw conclusions about any trends that may be developing. The report studies over a year's worth of Islamic State plots. It examines which countries were most commonly targeted; the age; nationality; background; terrorist training and combat experience of the perpetrators; relevance of the Internet; which sectors are most commonly targeted for attack; and assesses the extent to which the Islamic State directed, assisted or simply just inspired these plots. It concludes that since the declaration of IS's 'Caliphate', there have been, on average, over two plots related to IS that either are foiled or take place in the West every month. Details: London: The Henry Jackson Society, 2015. 59p. Source: Internet Resource: Accessed February 11, 2016 at: http://henryjacksonsociety.org/wp-content/uploads/2015/09/ISIS-brochure-Web.pdf Year: 2015 Country: International URL: http://henryjacksonsociety.org/wp-content/uploads/2015/09/ISIS-brochure-Web.pdf Shelf Number: 137847 Keywords: Cyber SecurityInternet CrimesIslamic StateTerrorismTerrorists |
Author: National Crime Agency (UK) Title: Emerging new threat in online dating. Initial trends in internet dating-initiated serious sexual assaults Summary: The National Crime Agency's Serious Crime Analysis Section (SCAS) has identified a significant increase in the number of reports to UK police forces about serious sexual assaults carried out by strangers that have been initiated through online dating. Reports indicate that these offences took place during the first face-to-face meeting between the victim and the offender after they initially met online. This emerging threat appears to be a result of the increasing popularity of online dating - including free and subscription services, dating websites, apps and 'hook up' services - combined with the behaviours and expectations fostered by an online environment. Early analysis indicates that the online dating phenomenon has produced a new type of sexual offender. These offenders are less likely to have criminal convictions, but instead exploit the ease of access and arm-chair approach to dating websites. This is aided by potential victims not thinking of them as strangers, but someone they have got to know. Details: London: National Crime Agency, 2016. 15p. Source: Internet Resource: Accessed February 24, 2016 at: http://www.nationalcrimeagency.gov.uk/publications/670-emerging-new-threat-in-online-dating-initial-trends-in-internet-dating-initiated-serious-sexual-assaults/file Year: 2016 Country: United Kingdom URL: http://www.nationalcrimeagency.gov.uk/publications/670-emerging-new-threat-in-online-dating-initial-trends-in-internet-dating-initiated-serious-sexual-assaults/file Shelf Number: 137948 Keywords: Computer CrimesInternet CrimesOnline DatingOnline VictimizationSexual AssaultsSocial Media |
Author: Great Britain. Home Office. Research, Information and Communications Unit Title: Serious and Organised Crime Protection: Public Interventions Model Summary: The public interventions model maps people's vulnerability to financial and cyber crime. The research identifies: - who is at risk from cyber, fraud and financial crime - what makes them vulnerable - how government, law enforcement and cross-sector partners can better protect them from becoming victims Details: London: Home Office, 2016. 74p. Source: Internet Resource: Accessed February 24, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/502960/Gov.uk_Serious_Organised_Crime_deck_vF.pdf Year: 2016 Country: United Kingdom URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/502960/Gov.uk_Serious_Organised_Crime_deck_vF.pdf Shelf Number: 137949 Keywords: CybercrimeFinancial CrimesFraudInternet CrimesOnline VictimizationOrganized CrimeSerious Crime |
Author: Connery, David Title: A Web of Harms: Serious and organised crime and its impact on Australian interests Summary: This special report examines transnational, serious and organised crime and the harms it causes to Australia's interests. The report aims to encourage a reinvigorated discussion among Australians about this critical matter. The harms include negative impacts upon individuals and the community and unfair competition for some legitimate businesses. Serious and organised crime - whether transnational or domestic - also imposes costs on Australian governments and denies them revenue. What's more, serious and organised crime groups acting overseas work against Australia's foreign policy interests and increase risks to Australians (and others) who live, invest and travel abroad. There's an urgent need for the Australian community to discuss the criminal threats facing it in a more deliberate and broader-reaching way. Thats because dealing with serious and organised crime is not a task for government alone: the Australian public and business have key roles. After all, consumer demand creates illicit markets that serious and organised crime seeks to supply. Additionally, the internet is increasing the speed, reach and depth of penetration by serious and organized crime into the lives of all Australian families and businesses. Simply put, you don't need to go to nightclubs in red-light districts to meet organised crime: you need go only as far as your computer. It's also worth examining better ways to increase the roles of non-law-enforcement agencies, business and the community in efforts to address serious and organised crime. We should bring the full range of social, education, regulatory and health instruments into the fight, and subdue the potential of internet-enabled financial crime to damage our current and future prosperity. International cooperation in this fight is essential, especially given the role of overseas actors in our crime challenge. Details: Barton, ACT, AUS: Australian Strategic Policy Initiative, 2015. Source: Internet Resource: Accessed march 9, 2016 at: https://www.aspi.org.au/publications/a-web-of-harms-serious-and-organised-crime-and-its-impact-on-australian-interests/SR81_Web_Harms.pdf Year: 2015 Country: Australia URL: https://www.aspi.org.au/publications/a-web-of-harms-serious-and-organised-crime-and-its-impact-on-australian-interests/SR81_Web_Harms.pdf Shelf Number: 138147 Keywords: Financial CrimesInternet CrimesMoney LaunderingOrganized Crime |
Author: Angus, Christopher Title: Cyberbullying of children Summary: The Internet, mobile phones, and other technological innovations have become entrenched in Australian life. These technologies create far-reaching benefits for youth. Nevertheless, these technologies have also introduced a tranche of online bullying behaviours known as cyberbullying, adding to the longstanding challenges associated with traditional school bullying. Cyberbullying has been an identified issue since at least the early 2000s; however, the issue has gained greater attention as more Australian children use social media and communication technologies more frequently. Cyberbullying can cause immense distress to young victims, including long term psychological and mental health damage, and in some cases suicide. Stopping this harmful behaviour has become a matter of high priority for authorities, and Australian schools in particular. While adults can be cyberbullied, or engage in cyberbullying, the focus of this e-brief is on children. The paper outlines cyberbullying's prevalence in Australia and its impact on individuals and schools. It discusses key government responses at the Commonwealth and State level, and international reviews of the effectiveness of anti-bullying programs. Details: Sydney: New South Wales Parliamentary Research Service, 2016. 22p. Source: Internet Resource: e-brief 2/2016: Accessed March 22, 2016 at: http://www.parliament.nsw.gov.au/prod/parlment/publications.nsf/key/Cyberbullyingofchildren/$File/Cyberbullying%20of%20Children.pdf Year: 2016 Country: Australia URL: http://www.parliament.nsw.gov.au/prod/parlment/publications.nsf/key/Cyberbullyingofchildren/$File/Cyberbullying%20of%20Children.pdf Shelf Number: 138369 Keywords: BullyingCyberbullyingInternet CrimesOnline VictimizationSocial Networks |
Author: Mitchell, Kimberly J. Title: Trends in Unwanted Exposure to Sexual Material: Findings from the Youth Internet Safety Studies Summary: There has been considerable and growing concern voiced by schools, parents and the public about what youth experience while using the Internet and other electronic technologies. The last decade saw significant and rapid changes in youth online activity: Internet use has now expanded to encompass almost all youth. Moreover, the nature of youth Internet use changed during this time with an increase in the use of cell‐ and smart‐phones, and the migration of adolescent social activity to social networking sites. However, this rapid expansion in technology use has occurred during a period of time in which child victimization has declined significantly. In 1999 and 2000, the first Youth Internet Safety Survey (YISS‐1) was conducted to address concerns about adults using the Internet to sexually solicit youth, young people encountering sexual material online and youth being threatened and harassed through the Internet. While YISS‐1 found that many youth who used the Internet encountered such episodes, most of these incidents were relatively mild and not very disturbing to youth. However, some were serious and distressing. We conducted the second Youth Internet Safety Survey (YISS‐2) in 2005 to reassess the extent to which young Internet users were encountering problems five years later, gauge whether the incidence and characteristics of these episodes had changed, explore new areas of interest, review emerging technologies, ascertain the effect those technologies have on the issue, and assess threats to youth. Compared to YISS‐1, the results of YISS‐2 showed that a smaller proportion of youth had received unwanted online sexual solicitations and a smaller proportion had interacted online with strangers. However, larger proportions of youth reported being exposed to pornography they did not want to see and were being harassed online. In 2010, the third Youth Internet Safety Survey (YISS‐3) was conducted to continue to track existing trends in the number and types of threats youth encounter using technology; assess risks of new behaviors and activities, including youth creating and distributing explicit images of themselves and/or peers; assess benefits and utilization of safety programs and technologies; and identify activities and behaviors most closely associated with risk. This document reviews key findings from YISS‐3. Details: Durham: University of New Hampshire, 2014. 10p. Source: Internet Resource: Accessed March 29, 2016 at: http://www.unh.edu/ccrc/pdf/Sexual%20Solicitation%201%20of%204%20YISS%20Bulletins%20Feb%202014.pdf Year: 2014 Country: United States URL: http://www.unh.edu/ccrc/pdf/Sexual%20Solicitation%201%20of%204%20YISS%20Bulletins%20Feb%202014.pdf Shelf Number: 138461 Keywords: Child Sexual ExploitationInternet CrimesInternet SafetyOnline VictimizationPornographySocial Media |
Author: Verleysen, Cindy Title: Cybercrime: a theoretical overview of the growing digital threat Summary: This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual world. This means the phenomenon covers a very wide scope of activities. This theoretical paper is written as an overview to help understand the definition of cybercrime and its forms. We concentrate on the variety of consequences as a result of the phenomenon. Moreover, this paper also has attention to the current European law and legislative actions against cybercrime. Details: Brussels: European Crime Prevention Network, 2015. 39p. Source: Internet Resource: EUCPN Theoretical Paper Series: Accessed May 19, 2016 at: http://eucpn.org/sites/default/files/content/download/files/theoretical_paper_cybercrime_.pdf Year: 2015 Country: Europe URL: http://eucpn.org/sites/default/files/content/download/files/theoretical_paper_cybercrime_.pdf Shelf Number: 139110 Keywords: Computer Crime Cybercrime Internet Crimes |
Author: Canada. Public Safety Canada Title: 2013-2014 Evaluation of the National Strategy for the Protection of Children from Sexual Exploitation on the Internet Summary: The National Strategy for the Protection of Children from Sexual Exploitation on the Internet (the National Strategy) is a horizontal initiative providing a comprehensive, coordinated approach to enhancing the protection of children on the Internet and pursuing those who use technology to prey on them. The evaluation covered the activities delivered under the National Strategy by Public Safety Canada, including: the Canadian Centre for Child Protection as a funding recipient for the management of the national tipline Cybertip.ca, the Royal Canadian Mounted Police (through NCECC-National Child Exploitation Coordination Centre, a national division of the Canadian Police Centre for Missing and Exploited Children/Behavioural Sciences Branch) and the Department of Justice. The evaluation included the Contribution Program to Combat Child Sexual Exploitation and Human Trafficking and its administration by Public Safety Canada. The scope of the evaluation covered the time period over the past five years (July 2008 to December 2013). There is a continued need to address the sexual exploitation of children on the Internet. Evidence shows increasing trends in the number of reported offences, the availability of material and the severity of these criminal acts. The increasing use of the Internet, mobile technologies and social media have facilitated the sexual exploitation of children. Concerns about child pornography have extended to the availability of material on peer-to-peer networks, the "dark Web" and through encrypted technologies. The problem extends well beyond Canada's borders. Law enforcement faces increasing challenges posed by transnational child sex offenders in addition to online child sexual exploitation offences in general. These types of international investigations are appropriately characterized as increasingly complex. The National Strategy remains relevant to ensure national collaboration and a consistent national approach, as well as cooperation with the international community. The evaluation points to a continued need for improved data collection, increased research efforts and enhanced information exchange at the national level in order to better understand the underpinnings and contributing factors surrounding online child sexual exploitation. There may be a need to revisit the current mandate as a number of areas of concern are expanding (e.g. transnational child sex offenders, self-peer exploitation or "sexting", cyberbullying, sextortion, sexualized child modelling) that were not originally envisioned by the National Strategy. Increased public reporting continues to put resourcing pressures on the law enforcement community. There is also evidence to indicate that there is still a need to increase knowledge and awareness about Internet child sexual exploitation and that the issue needs to be addressed through a multi-faceted approach (e.g. socially through education and prevention, and complemented by law enforcement efforts). The National Strategy aligns with federal priorities and the departmental mandates of the federal Strategy partners. The safety and security of children is central to the federal strategic priorities as reflected in numerous legislative initiatives, ministerial press releases, official documents and initiatives, and is consistent with the federal commitment made most recently in the 2013 Speech from the Throne. The National Strategy aligns with federal legislative roles and responsibilities of Strategy partners and the broad role of the federal government in the safety and security of Canadians. Investigations cross jurisdictions and require the collaboration and coordination of many stakeholders nationally and internationally. There is an opportunity for PS to provide greater leadership at the national level in areas of cooperation and in facilitating data collection, research and information sharing. The National Strategy also supports international commitments aimed at combating child sexual exploitation on the Internet. Evidence suggests that initiatives by other jurisdictions or non-profit organizations tend to complement the National Strategy. However, there may be opportunities for greater synergy and collaboration, especially between the federal government and provinces and territories in order to ensure that federal investments are targeted to areas of greatest need. In support of this, Strategy partners continue to develop partnerships with provinces, non-governmental organizations and private industry as well as participate in the Federal/Provincial/Territorial committees. From an enforcement perspective, the Strategy helps avoid duplication by providing a centralized coordinated approach and central point of contact for investigations that cross multiple jurisdictions nationally and internationally. Without a centralized coordinated approach, it was suggested that the system in Canada would be disparate. Despite the different organizations involved at various levels, efforts aimed at coordinating investigations internationally are seen as complementary rather than duplicative. Details: Ottawa: Public Safety Canada, 2015. 67p. Source: Internet Resource: 2015-05-27: Accessed July 25, 2016 at: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/vltn-prtctn-chldrn-2013-14/vltn-prtctn-chldrn-2013-14-eng.pdf Year: 2015 Country: Canada URL: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/vltn-prtctn-chldrn-2013-14/vltn-prtctn-chldrn-2013-14-eng.pdf Shelf Number: 139843 Keywords: Child PornographyChild ProtectionChild Sexual ExploitationInternet CrimesOnline VictimizationSexting |
Author: European Parliament. Directorate-General for Internal Policies. Policy Department C: Citizzen's Rights and Constitutional Affairs Title: Cyberbullying Among Young People Summary: his study provides an overview of the extent, scope and forms of cyberbullying in the EU taking into account the age and gender of victims and perpetrators as well as the medium used. Commissioned by the Policy Department for Citizens' Rights and Constitutional Affairs at the request of the LIBE Committee, the study illustrates the legal and policy measures on cyberbullying adopted at EU and international levels and delineates the EU role in this area. An analysis of legislation and policies aimed at preventing and fighting this phenomenon across the 28 EU Member States is also presented. The study outlines the variety of definitions of cyberbullying across EU Member States and the similarities and differences between cyberbullying, traditional bullying and cyber aggression. Moreover, it presents successful practices on how to prevent and combat cyberbullying in nine selected EU Member States and puts forward recommendations for improving the response at EU and Member State levels. Details: Brussels: European Parliament, 2016. 196p. Source: Internet Resource: Accessed September 7, 2016 at: http://www.europarl.europa.eu/RegData/etudes/STUD/2016/571367/IPOL_STU(2016)571367_EN.pdf Year: 2016 Country: Europe URL: http://www.europarl.europa.eu/RegData/etudes/STUD/2016/571367/IPOL_STU(2016)571367_EN.pdf Shelf Number: 147855 Keywords: BullyingComputer CrimesCyberbullyingCybercrimeInternet Crimes |
Author: Europol Title: IOCTA 2016: Internet Organised Crime Threat Assessment Summary: The 2016 Internet Organised Crime Threat Assessment (IOCTA) is a law enforcement-centric threat assessment intended to inform priority setting for the EMPACT Operational Action Plans in the three sub-priority areas of cybercrime (cyber attacks, child sexual exploitation online and payment fraud). The IOCTA also seeks to inform decision-makers at strategic, policy and tactical levels on how to fight cybercrime more effectively and to better protect online society against cyber threats. The 2016 IOCTA provides a view from the trenches, drawing primarily on the experiences of law enforcement within the EU Member States to highlight the threats visibly impacting on industry and private citizens within the EU. The IOCTA is a forward-looking assessment presenting analyses of future risks and emerging threats, providing recommendations to align and strengthen the joint efforts of EU law enforcement and its partners in preventing and fighting cybercrime. Details: Paris: EUROPOL, 2016. 72p. Source: Internet Resource: Accessed November 22, 2016 at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016 Year: 2016 Country: Europe URL: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016 Shelf Number: 147314 Keywords: Computer CrimesCybercrimeInternet CrimesOrganized Crime |
Author: Muskat-Gorska, Zuzanna Title: The Role of the Internet in Trafficking for Labour Exploitation Summary: The report examines what role the internet plays in trafficking in human beings for labour exploitation. It considers in particular methods of online job recruitment and looks at cases studies from several EU Member States – Czech Republic, UK, Ireland, and Romania – and discusses to what extent the internet plays a role and if so, how significant the role of the internet is in facilitating human trafficking. The report provides examples of potential solutions. Details: Brussels: International Trade Union Confederation, 2015. 28p. Source: Internet Resource: Accessed November 28, 2016 at: https://www.ituc-csi.org/IMG/pdf/internet_and_labour_trafficking.pdf Year: 2015 Country: Europe URL: https://www.ituc-csi.org/IMG/pdf/internet_and_labour_trafficking.pdf Shelf Number: 147309 Keywords: Forced LaborHuman TraffickingInternet CrimesLabor Exploitation |
Author: Alazab, Mamoun Title: Spam and criminal activity Summary: The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale. In a sample of more than 13 million emails identified as spam, more than 100,000 contained malicious attachments; nearly 1.4 million contained malicious web links. If opened, these attachments and links could infect the recipients' devices with software that allows cybercriminals to remotely access them. This paper describes how crime groups increasingly adopt novel approaches to cybercrime. Increased law enforcement capacity, the cultivation of high-level coordination between industry, government and police, and the further development of machine learning techniques should be at the forefront of government initiatives in this area. Details: Canberra: Australian Institute of Criminology, 2016. 20p. Source: Internet Resource: Trends & issues in crime and criminal justice, no. 526: Accessed December 5, 2016 at: http://aic.gov.au/media_library/publications/tandi_pdf/tandi526.pdf Year: 2016 Country: Australia URL: http://aic.gov.au/media_library/publications/tandi_pdf/tandi526.pdf Shelf Number: 147867 Keywords: Computer CrimesCybercrimeInternet CrimesOnline VictimizationSpam |
Author: Jutte, Sonja Title: Online Child Sexual Abuse Images: Doing More to Tackle Demand and Supply Summary: The production and consumption of child abuse images online is creating a social emergency. Digital technology is making it ever easier for this abuse to proliferate, damaging the many children involved in this vile trade. But by each of us playing a part, and taking collective responsibility to keep our children safe, we can find solutions. Behind each and every child sexual abuse image, abuse has occurred in the "real" world. These children are victims every time their image is viewed, and worse still, the knowledge that the image or film can be repeatedly viewed, and may never be removed, causes on-going trauma that they are forced to live with. And, to further heighten the seriousness of this abuse, we know there have been cases where the viewing of child abuse images escalates into abuse in real life. This is an issue of considerable importance to the NSPCC. The challenge we are faced with is sizeable. There are many praiseworthy endeavours, and much valuable work already happening to try to keep our children safer online. It is almost universally agreed that this material is illegal and wrong. But more must and can be done. Better understanding of the scale, nature and urgency of the challenge is vital. Ensuring that everyone - industry, government, law enforcement and charities like the NSPCC - plays their part is crucial. And a greater public understanding of the problem and its effects on children is also needed. In this report, the NSPCC explores new evidence about size of the problem and presents real, tangible solutions to reduce both the supply of and demand for these images. Children must have the right to easily remove sexual images of themselves that are shared online. More treatment and support services are needed to stop potential perpetrators in their tracks. Most importantly we must continue to seek new preventive solutions to stop these crimes from happening in the first place. This report sheds light on where we should focus our collective effort. Details: London: NSPCC, 2016. 440. Source: Internet Resource: Accessed December 9, 2016 at: https://www.nspcc.org.uk/globalassets/documents/research-reports/online-child-sexual-abuse-images.pdf Year: 2016 Country: United Kingdom URL: https://www.nspcc.org.uk/globalassets/documents/research-reports/online-child-sexual-abuse-images.pdf Shelf Number: 145578 Keywords: Child PornographyChild ProtectionChild Sexual AbuseInternet CrimesOnline VictimizationSocial Media |
Author: Mitchell, Kimberly J. Title: The Role of Technology in Youth Harassment Victimization Summary: This bulletin summarizes the findings of the NIJ-sponsored Technology Harassment Victimization study, which is a follow-up study to the second National Survey of Children's Exposure to Violence sponsored by OJJDP. The study examined technology-involved harassment within the context of other types of youth victimization and risk factors. The data reveal that mixed-peer harassment-involving both in-person and technology-based elements - is the most traumatic for victims, especially those who have been victimized in multiple ways in the past and are facing numerous stressors in their present lives. Details: Washington, DC: U.S. National Institute of Justice, Office of Juvenile Justice and Delinquency Prevention, 2016. 12p. Source: Internet Resource: Accessed December 10, 2016 at: https://www.ncjrs.gov/pdffiles1/nij/250079.pdf Year: 2016 Country: United States URL: https://www.ncjrs.gov/pdffiles1/nij/250079.pdf Shelf Number: 146043 Keywords: BullyingHarassmentInternet CrimesInternet SafetySocial Media |
Author: Gagliardone, Iginio Title: Countering Online Hate Speech Summary: Hate speech online is situated at the intersection of multiple tensions: it is the expression of conflicts between different groups within and across societies; it is a vivid example of how technologies with a transformative potential such as the Internet bring with them both opportunities and challenges; and it implies complex balancing between fundamental rights and principles, including freedom of expression and the defence of human dignity. As the UN agency with a specific mandate to foster freedom of expression, and its corollaries, press freedom and freedom of information, UNESCO is actively working to promote mutual knowledge and understanding of peoples, through all means of mass communication, including the Internet in general, and social networking platforms in particular. The roots of the research presented in this current publication lie in UNESCO’s fulfilment of Resolution 52 of its 37th General Conference in November 2013, as agreed by the Organization’s 195 Member States. This resolution called for a comprehensive and consultative multistakeholder study, within the mandate of UNESCO, on Internet-related issues of access to information and knowledge, freedom of expression, privacy, and the ethical dimensions of the Information Society. The research into hate speech served as a contribution towards the wider study.1 The present report provides a global overview of the dynamics characterizing hate speech online and some of the measures that have been adopted to counteract and mitigate it, highlighting good practices that have emerged at the local and global levels. While the study offers a comprehensive analysis of the international, regional and national normative frameworks developed to address hate speech online, and their repercussions for freedom of expression, it places particular emphasis on social and non-regulatory mechanisms that can help to counter the production, dissemination and impact of hateful messages online. The findings of this study can be grouped around four main tensions: definition, jurisdiction, comprehension, and intervention. ● Definition. Hate speech is a broad and contested term. Multilateral treaties such as the International Covenant on Civil and Political Rights (ICCPR) have sought to define its contours. Multi-stakeholders processes (e.g. the Rabat Plan of Action) have been initiated to bring greater clarity and suggest mechanisms to identify hateful messages. And yet, hate speech continues largely to be used in everyday discourse as a generic term, mixing concrete threats to individuals’ and groups’ security with cases in which people may be simply venting their anger against authority. Internet intermediaries – organizations that mediate online communication such as Facebook, Twitter, and Google – have advanced their own definitions of hate speech that bind users to a set of rules and allow companies to limit certain forms of expression. National and regional bodies have sought to promote understandings of the term that are more rooted in local traditions. Against this backdrop, the possibility of reaching a universally shared definition seems unlikely, a shared interest to avoid violence and protect human dignity has made debates on hate speech a moment for different stakeholders to come together in original ways and seek locally relevant solutions. ● Jurisdiction. The Internet’s speed and reach makes it difficult for governments to enforce national legislation in the virtual world. Issues around hate speech online bring into clear relief the emergence of private spaces for expression that serve a public function (e.g. Facebook, Twitter), and the challenges that these spaces pose for regulators. Despite initial resistance, and following public pressure, some of the companies owning these spaces have become more responsive towards tackling the problem of hate speech online, although they have not (yet) been fully incorporated into global debates (e.g. the Rabat Plan of Action) about how to identify and respond to hate speech. ● Comprehension. The character of hate speech online and its relation to offline speech and action are poorly understood. These topics are widely talked about – by politicians, activists and academics – but the debates tend to be removed from systematic empirical evidence. The character of perceived hate speech and its possible consequences has led to placing much emphasis on the solutions to the problem and on how they should be grounded in international human rights norms. Yet this very focus has also limited deeper attempts to understand the causes underlying the phenomenon and the dynamics through which certain types of content emerge, diffuse and lead – or not – to actual discrimination, hostility or violence. This study offers various examples of research aimed at mapping the emergence and diffusion of speech online, but also highlights the lack of studies examining the links between hate speech online and other social phenomena, ranging from access to education to rising inequalities. Details: Paris: United Nations Educational, Scientific and Cultural Organization (UNESCO), 2015. 73p. Source: Internet Resource: Accessed December 14, 2016 at: http://unesdoc.unesco.org/images/0023/002332/233231e.pdf Year: 2015 Country: International URL: http://unesdoc.unesco.org/images/0023/002332/233231e.pdf Shelf Number: 144890 Keywords: Computer CrimesHate CrimesHate SpeechInternet CrimesOnline VictimizationSocial Media |
Author: Krone, Tony Title: Trajectories in online child sexual exploitation offending in Australia Summary: Although the full extent and nature of the sexual exploitation of children is only beginning to be recognised, it is a problem of global significance that requires strong and effective responses. The extent to which the viewing of child exploitation material (CEM) is linked to involvement in producing such material, sharing it and using it to groom and then assault children is a key concern. Most such material is held online, and it is important to understand how offenders use the internet to access CEM and to groom children for sexual exploitation. This exploratory study examines data relating to a sample of offenders convicted of online child sexual exploitation offences under Australian Commonwealth law, to determine how online forms of child sexual exploitation and offline child sexual exploitation, or contact offending, are related. The majority of offenders in this study appeared to commit only online offences, although in a minority of cases there was a connection between exploitative material, grooming and contact offending. This study is an important early step in improving our understanding of offenders and points to the need for further assessment of the nature of online child sexual exploitation and its relationship to other forms of sexual and violent offences. Details: Canberra: Australian Institute of Criminology, 2017. 13p. Source: Internet Resource: Trends & issues in crime and criminal justice no. 524: Accessed February 1, 2017 at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi524.pdf Year: 2017 Country: Australia URL: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi524.pdf Shelf Number: 145098 Keywords: Child PornographyChild Sexual ExploitationComputer Crimes Internet Crimes Online VictimizationSex Offenders |
Author: Ybarra, Michele Title: Intimate Partner Digital Abuse Summary: Digital tools are often an integral part of healthy romantic relationships. Romantic partners frequently use digital tools to connect with each other through text messages, photo-sharing, social media posts, and other online activities. These same digital tools can be used in unhealthy ways, facilitating negative behaviors such as monitoring, unwanted picture sharing, and abusive messages — both within the romantic relationship and after the relationship is over. Better understanding how often intimate partner digital abuse is happening, to whom, and in what ways are critical pieces to understanding the scope of the problem. This report, part of a series of research reports on digital harassment and abuse, examines the prevalence and impact of intimate partner digital abuse. Findings are based upon the results of a nationally representative survey of 3,002 Americans 15 years of age and older conducted from May 17th through July 31st, 2016. Respondents were surveyed on either their landline or cell phone. Interviews were conducted in either English or Spanish. Findings in this report refer to the 2,810 respondents who have ever been in a romantic relationship. 12% of respondents who have ever been in a romantic relationship have experienced intimate partner digital abuse In order to examine the types of intimate partner digital abuse that respondents have experienced, we asked about 10 different types of online harassment and abuse. Experiences included being monitored online or by phone, being purposefully embarrassed online, being called offensive names, and being stalked. Because they could be perpetrated by anyone, those who said they had these experiences were then asked who the perpetrator was. Respondents who said they were targeted by a current or former romantic partner are said to have experienced intimate partner digital abuse. Overall, one in eight (12%) respondents who have ever had a romantic partner have been digitally harassed by a romantic partner in at least one of the 10 ways we asked about. These experiences were more common among particular individuals: • Three times as many younger people (22%) as those who were 30 years or older (8%) reported being digitally harassed by a current or former romantic partner. • 38% of individuals who identified as LGB have experienced intimate partner digital abuse, compared with 10% of heterosexual individuals. • More than two times as many divorced/separated (19%) and never married (18%) adults were digitally abused by a current or former romantic partner than people who were married/living with their partner (7%). Men and women experience intimate partner digital abuse at equal rates 12% of men have been targeted by a current or former romantic partner, as have 12% of women. This similarity in rates for men and women holds true for each of the different types of abuse we asked about. More victims with a history of intimate partner digital abuse experience personal or professional harms as a result of the abuse, compared with victims who have been targeted by other types of perpetrators Although we do not know whether this was a direct result of the intimate partner digital abuse or other digital harassment experiences perpetrated by non-romantic partners, more people who were targeted online by current or former romantic partners at some point in their lives reported harms as a result of online abuse compared to victims who were targeted by other types of perpetrators (e.g. friends, family, or strangers). Compared to almost one quarter (23%) of victims who had non-romantic partner perpetrators, more than three-quarters (77%) of victims with a history of intimate partner digital abuse experienced a personal or professional harm as a result of the abuse. Additionally, more victims who were targeted by an intimate partner said their reputation had been damaged (28%) or they had to shut down an online account or profile (25%) as a result of their digital abuse experiences compared to victims who were targeted by other types of perpetrators (8% and 11%, respectively). 77% of victims of intimate partner digital abuse have used at least one protective strategy; one in six have gotten a restraining order or protection order as a result of their digital abuse experiences The vast majority (77%) of victims of intimate partner digital abuse have taken some sort of protective action in response to their abusive experiences online, such as changing their contact information; reaching out to friends, family, or official sources of support; or withdrawing from communication platforms altogether — although we cannot say for sure whether these actions were taken as a result of digital abuse from their romantic partner or due to harassment from some other perpetrator. The most common protective strategy used by victims of intimate partner digital abuse was changing their phone number or email address (41%). In terms of seeking external support or protection, 16% have gotten a protection order or restraining order Details: New York: Data & Society Research Institute; San Clemente, CA: Center for Innovative Public health Research, 2017. 26p. Source: Internet Resource: Report 01.18.17: Accessed March 3, 2017 at: https://datasociety.net/pubs/oh/Intimate_Partner_Digital_Abuse_2017.pdf Year: 2017 Country: United States URL: https://datasociety.net/pubs/oh/Intimate_Partner_Digital_Abuse_2017.pdf Shelf Number: 141321 Keywords: Dating ViolenceInternet CrimesIntimate Partner ViolenceOnline CommunicationsOnline VictimizationSocial Media |
Author: Pawlak, Patryk Title: Cybersecurity and cybercrime: Building more resilient and prosperous transatlantic societies Summary: Internet-based platforms are increasingly used for delivery of services, basic governance functions or communication. As such, open and secure access to the Internet constitutes a significant element in generating growth, prosperity and citizens' empowerment on both sides of the Atlantic. However, this potential is increasingly undermined by digital risks and vulnerabilities in cyberspace: online fraud, attacks on critical infrastructure or the use of new technologies by terrorist networks. According to several studies, Europe and the United States can still reap tremendous benefits from digitisation but, in order to secure the potential gains, they need to strengthen transatlantic cooperation in building more resilient systems and societies, as well as deliver on their commitment to enhancing ties between regulatory, law enforcement, policy and civil society actors. This briefing forms part of a broader research project on the perspectives on transatlantic cooperation in the US election year, requested by the Chair of the European Parliament's delegation for relations with the United States. Details: Brussels: European Parliamentary Research Service, 2016. 12p. Source: Internet Resource: Briefing: Perspectives on transatlantic cooperation: Accessed march 28, 2017 at: http://www.europarl.europa.eu/RegData/etudes/BRIE/2016/586612/EPRS_BRI(2016)586612_EN.pdf Year: 2016 Country: International URL: http://www.europarl.europa.eu/RegData/etudes/BRIE/2016/586612/EPRS_BRI(2016)586612_EN.pdf Shelf Number: 144605 Keywords: Cybercrimes Cybersecurity Internet Crimes |
Author: Moura, Giovane Cesar Moreira Title: Internet Bad Neighborhoods Summary: A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it occurs in most places, but it tends to be concentrated in certain areas. In the real world, high crime areas are usually labeled as "bad neighborhoods". The goal of this dissertation is to investigate Bad Neighborhoods on the Internet. The idea behind the Internet Bad Neighborhood concept is that the probability of a host in behaving badly increases if its neighboring hosts (i.e., hosts within the same subnetwork) also behave badly. This idea, in turn, can be exploited to improve current Internet security solutions, since it provides an indirect approach to predict new sources of attacks (neighboring hosts of malicious ones). In this context, the main contribution of this dissertation is to present the first systematic and multifaceted study on the concentration of malicious hosts on the Internet. We have organized our study according to two main research questions. In the first research question, we have focused on the intrinsic characteristics of the Internet Bad Neighborhoods, whereas in the second research question we have focused on how Bad Neighborhood blacklists can be employed to better protect networks against attacks. The approach employed to answer both questions consists in monitoring and analyzing network data (traces, blacklists, etc.) obtained from various real world production networks. One of the most important findings of this dissertation is the verification that Internet Bad Neighborhoods are a real phenomenon, which can be observed not only as network prefixes (e.g., /24, in CIDR notation), but also at different and coarser aggregation levels, such as Internet Service Providers (ISPs) and countries. For example, we found that 20 ISPs (out of 42,201 observed in our data sets) concentrated almost half of all spamming IP addresses. In addition, a single ISP was found having 62% of its IP addresses involved with spam. This suggests that ISP-based Bad Neighborhood security mechanisms can be employed when evaluating e-mail from unknown sources. This dissertation also shows that Bad Neighborhoods are mostly application specific and that they might be located in neighborhoods one would not immediately expect. For example, we found that phishing Bad Neighborhoods are mostly located in the United States and other developed nations - since these nations hosts the majority of data centers and cloud computing providers - while spam comes from mostly Southern Asia. This implies that Bad Neighborhood based security tools should be application-tailored. Another finding of this dissertation is that Internet Bad Neighborhoods are much less stealthy than individual hosts, since they are more likely to strike again a target previously attacked. We found that, in a one-week period, nearly 50% of the individual IP addresses attack only once a particular target, while up to 90% of the Bad Neighborhoods attacked more than once. Consequently, this implies that historical data of Bad Neighborhoods attacks can potentially be successfully employed to predict future attacks. Overall, we have put the Internet Bad Neighborhoods under scrutiny from the point of view of the network administrator. We expect that the findings provided in this dissertation can serve as a guide for the design of new algorithms and solutions to better secure networks. Details: Twente, NETH: University of Twente, 2013. 245p. Source: Internet Resource: Dissertation: Accessed April 11, 2017 at: http://doc.utwente.nl/84507/1/thesis_G_Moura.pdf Year: 2013 Country: International URL: http://doc.utwente.nl/84507/1/thesis_G_Moura.pdf Shelf Number: 144779 Keywords: Computer CrimeComputer SecurityInternet CrimesInternet SafetyInternet SecuritySpam |
Author: National Crime Agency (UK) Title: Pathways Into Cyber Crime Summary: The report, which is based on debriefs with offenders and those on the fringes of criminality, explores why young people assessed as unlikely to commit more traditional crimes get involved in cyber crime. The report emphasises that financial gain is not necessarily a priority for young offenders. Instead, the sense of accomplishment at completing a challenge, and proving oneself to peers in order to increase online reputations are the main motivations for those involved in cyber criminality. During his debrief, Subject 7, who was jailed for Computer Misuse Act and fraud offences, told officers, "..it made me popular, I enjoyed the feeling... I looked up to those users with the best reputations". The report identifies that some offenders begin by participating in gaming cheat websites and 'modding' (game modification) forums before progressing to criminal hacking forums. The assessment notes that off-the-shelf tools such as DDOS-for-hire services and Remote Access Trojans (RATs) are available with step by step tutorials at little to no cost to the user, making the skills barrier for entry into cyber crime lower than it has ever been. It also highlights that whilst there is no socio-demographic bias, with people across the country from different backgrounds among offenders, the average age of cyber criminals is significantly younger than other crime types. In 2015, the average age of suspects in NCA cyber crime investigations was 17 years old, compared to 37 in NCA drugs cases and 39 in NCA economic crime cases. Subject 1, a member of a hacking collective who sold DDoS tools and Botnet services, told officers that a warning from law enforcement would have made him stop his activities. The report also identifies education and opportunities to use skills positively as helpful in steering potential offenders towards a future career in cyber security. Details: London: NCA, 2017. 18p. Source: Internet Resource: Accessed April 28, 2017 at: http://www.nationalcrimeagency.gov.uk/publications/791-pathways-into-cyber-crime/f Year: 2017 Country: United Kingdom URL: http://www.nationalcrimeagency.gov.uk/publications/791-pathways-into-cyber-crime/f Shelf Number: 145184 Keywords: Computer CrimesComputer HackingCybercrimeCybersecurityInternet CrimesSocial Media |
Author: International Centre for Missing & Exploited Chidlren Title: Child Pornography: Model Legislation & Global Review. 7th edition Summary: Since this report was first released by the International Centre for Missing & Exploited Children (ICMEC) in April 2006, ICMEC has continued to update its research into the child pornography legislation currently in place in the nations of the world to gain a better understanding of existing legislation and to gauge where the issue stands on national political agendas.1 In particular, we are looking to see if national legislation: (1) exists with specific regard to child pornography; (2) provides a definition of child pornography; (3) criminalizes computer‐facilitated offenses; (4) criminalizes the knowing possession of child pornography, regardless of the intent to distribute; and (5) requires Internet Service Providers (ISPs) to report suspected child pornography to law enforcement or to some other mandated agency. In the summer of 2009, ICMEC conducted a thorough update of our research on existing child pornography legislation, expanding our review beyond the 187 Interpol member countries to include 196 countries. Our work included independent research as well as direct contact with Embassies in Washington, D.C. to ensure the accuracy of the report. A new review of the 196 countries began in the Spring of 2011. The process remained much the same; reviewing the existing legislation of each country in search of laws specifically focused on child pornography offenses and verifying the information through the Embassies in Washington, D.C., U.N. Permanent Missions in New York, and in‐country law enforcement contacts. However, the 7th edition report also contains several new sections including expanded information on online grooming, information on the new EU Directive on combating the sexual abuse and sexual exploitation of children and child pornography, a review of data retention and preservation policies, and a discussion of implementation. Results The 1st edition, published in 2006, returned shocking results: -- only 27 had legislation sufficient to combat child pornography offenses (5 countries met all of the criteria set forth above and 22 countries met all but the last criteria, pertaining to ISP reporting); and -- 95 Countries had no legislation at all that specifically addresses child pornography. Of the remaining 62 Countries that did have legislation specifically addressing child pornography:-- 54 Countries did not define child pornography in national legislation;-- 27 Countries did not provide for computer‐facilitated offenses; and-- 41 Countries did not criminalize possession of child pornography, regardless of the intent to distribute. The 6th edition, published in late 2010, revealed progress. Of the 196 countries reviewed:-- 45 Countries had legislation sufficient to combat child pornography offenses (8 countries met all of the criteria set forth above and 37 countries met all but the last criteria, pertaining to ISP reporting); and-- 89 Countries still had no legislation at all that specifically addresses child pornography. Of the remaining 62 countries that did have legislation specifically addressing child pornography:-- 52 did not define child pornography in national legislation;-- 18 did not provide for computer‐facilitated offenses; and-- 33 did not criminalize the knowing possession of child pornography, regardless of the intent to distribute. Forward movement continues to be visible in this edition, though much remains to be done. Our updated research shows that of the 196 countries reviewed:-- 69 Countries have legislation sufficient to combat child pornography offenses (11 countries met all of the criteria set forth above and 58 countries meet all but the last criteria, pertaining to ISP reporting); and-- 53 Countries still have no legislation at all that specifically addresses child pornography. Of the remaining 74 countries that do have legislation specifically addressing child pornography:-- 60 do not define child pornography in national legislation;-- 21 do not provide for computer‐facilitated offenses; and-- 47 do not criminalize the knowing possession of child pornography, regardless of the intent to distribute. Details: Alexandria, VA: The Centre, 2012. 52p. Source: Internet Resource: Accessed May 16, 2017 at: http://www.icmec.org/wp-content/uploads/2015/10/7th-Edition-EN.pdf Year: 2012 Country: International URL: http://www.icmec.org/wp-content/uploads/2015/10/7th-Edition-EN.pdf Shelf Number: 131374 Keywords: Child PornographyChild Sexual ExploitationChildren, Crimes AgainstInternet CrimesOnline GroomingOrganized CrimeSex CrimesSex Offenders |
Author: Krone, Tony Title: Online Child Sexual Exploitation Offenders: A Study of Australian Law Enforcement Data Summary: Children are among the most vulnerable members of our society and need our nurture, care and protection, yet too many children around the world experience some form of child abuse. The exploitation of children for sexual purposes, in which children are used as commodities for the sexual pleasure of adults, is particularly heinous. Child sexual exploitation (CSE) is a global problem that demands strong and effective responses. The full extent and nature of the problem, both historically and currently, is only now beginning to be recognised. The reality of child sexual exploitation within families, in institutions and elsewhere must be confronted. Evidence tells us that intrafamilial sexual exploitation of children has been, and remains, a major problem. The reality - of exploitation by offenders who are known to their child victims - runs counter to the perceived danger presented by strangers. The focus on the danger presented by strangers appears to have been part of a collective denial of the reality of exploitation committed by those entrusted with the care of children. A key concern for those working to address this problem is to determine how the viewing of child exploitation material (CEM) is linked to involvement in the production and sharing of such material, or its use in the grooming of children for sexual purposes or the commission of further sexual assaults on children. Most CEM is held online; it is therefore important to understand how offenders inhabit and use the internet to groom children for sexual purposes. This exploratory study examines data related to a sample of offenders convicted of online child sexual exploitation offences under Australian Commonwealth law, to determine the relationship between offline or contact offences and online CSE offending. In this sample, most CEM offenders appeared to commit only online offences, although there did appear to be a connection between CEM, grooming and contact offending in a minority of cases. This study is an important early step in improving our understanding of Commonwealth online CSE offenders. It points to the need to further assess the nature of online CSE and its relationship to other forms of sexual and violent offences. Details: Canberra: Criminology Research advisory Council, 2017. 78p. Source: Internet Resource: Accessed June 2, 2017 at: http://crg.aic.gov.au/reports/1617/58-1213-FinalReport.pdf Year: 2017 Country: Australia URL: http://crg.aic.gov.au/reports/1617/58-1213-FinalReport.pdf Shelf Number: 145903 Keywords: Child PornographyChild Sexual ExploitationComputer Crimes Internet Crimes Online GroomingOnline VictimizationSex Offenders |
Author: Police Executive Research Forum Title: The Utah Model: A Path Forward for Investigating and Building Resilience to Cyber Crime Summary: As new Internet-based technologies are introduced, cyber crime is growing exponentially, both in the proliferation of crimes and the associated impact on victims--i.e., financial loss, invasion of privacy, and even blackmail. Cyber crimes endanger our national security as well. To respond to this ever-changing threat, national and local police agencies across the globe continue to explore ways to coordinate resources with each other and attack the problem. In the United States, combating cyber crime has traditionally been perceived largely as an FBI responsibility, with less involvement by local police. However, as cyber crime victims increasingly report these crimes to their local police, those agencies are being driven to develop programs and partnerships with federal law enforcement agencies in order to understand the roles they can play to be most helpful in preventing and investigating cyber crime. Details: Washington, DC: United States Bureau of Justice Assistance and Police Executive Research Forum, 2017. 107p. Source: Internet Resource: Accessed June 24, 2017 at: http://www.iacpcybercenter.org/wp-content/uploads/2015/04/The-Utah-Model-A-Path-Forward-for-Investigating-and-Building-Resilience-to-Cybercrime.pdf Year: 2017 Country: United States URL: http://www.iacpcybercenter.org/wp-content/uploads/2015/04/The-Utah-Model-A-Path-Forward-for-Investigating-and-Building-Resilience-to-Cybercrime.pdf Shelf Number: 146363 Keywords: Computer Crime Crime Analysis Criminal Investigation Cybercrime Internet Crimes |
Author: Great Britain. National Audit Office Title: Online Fraud Summary: Growth in the use of the internet and advances in digital technologies mean that citizens and businesses can now do more online. For the UK, this means there are opportunities for greater innovation and economic growth, but also more opportunities for online crime. While traditional crimes such as vehicle offences and house burglary have declined substantially in recent years, fraud, more than half of which is committed online, is becoming more common and is a growing threat. Online criminals can target thousands of victims at the same time from anywhere in the world and so are hard to trace and prosecute. Online fraud can harm citizens financially and emotionally and harm businesses' finances and reputations. The true cost of online fraud is unknown, but is likely to be billions of pounds. One estimate was that individuals lost around L10 billion and the private sector around L144 billion to fraud in 2016. In the year ending 30 September 2016, the Office for National Statistics (ONS) estimated that there were 1.9 million estimated incidents of cyber-related fraud in England and Wales, or 16% of all estimated crime incidents. Online fraud includes criminals accessing citizens' and businesses' bank accounts, using their plastic card details, or tricking them into transferring money. The Home Office (the Department) is responsible for preventing and reducing crime, including online fraud. Many other bodies also play a role including the police, banks, the National Fraud Intelligence Bureau (NFIB), which records fraud offences and shares information with police forces, and Action Fraud, the national reporting centre for fraud. In 2016, the Department set up the Joint Fraud Taskforce to improve collaboration between government, industry and law enforcement in tackling online fraud. In the same year, the government published its National Cyber Security Strategy to 2021, which includes the government's plans for tackling cyber crime, including cyber-enabled fraud and data theft. Scope of this report This report focuses on the Department, which is responsible for preventing and reducing online fraud. We have examined how the Department works with other bodies to tackle the crime. We have not evaluated whether the Department is achieving value for money in tackling online fraud as the true scale of online fraud and the overall cost to the government is not known. In this report we sometimes refer just to fraud as often the government and other bodies, as well as data sources, do not distinguish between online and offline fraud. We have examined: - the nature and scale of the current threat (Part One); - how the Department and others have responded to the threat (Part Two); and - the challenges and opportunities the Department and others face in reducing and preventing online fraud (Part Three). The report does not cover fiscal fraud, such as benefit fraud, committed against the government. This was covered in a National Audit Office report in 2016. In addition, this report does not cover the major international cyber attack which occurred in May 2017 when we were finalising this report. The incident affected the NHS and other organisations in the UK and shows the serious risk and challenges that cyber crime presents to the UK government as well as citizens and businesses. Details: London: NAO, 2017. 50p. Source: Internet Resource: https://www.nao.org.uk/wp-content/uploads/2017/06/Online-Fraud.pdf Year: 2017 Country: United Kingdom URL: https://www.nao.org.uk/wp-content/uploads/2017/06/Online-Fraud.pdf Shelf Number: 146594 Keywords: Computer CrimesCybercrimeFraudInternet CrimesOnline FraudOnline Victimization |
Author: Hakmeh, Joyce Title: Cybercrime and the Digital Economy in the GCC Countries Summary: Online activity and the use of digital technology have grown rapidly in the Gulf Cooperation Council (GCC) states. Albeit with certain variations between countries, this has helped to boost prospects for a 'digital transformation' in which states and cities in the region could become international hubs for digital services. Such a shift offers a significant opportunity in the context of policy agendas to diversify the region's hydrocarbon-dependent economies. At the same time, however, digital growth has increased the GCC's vulnerability to cybercrime. While the incidence, spread and effects of cybercrime in the region are difficult to measure precisely, a number of trends and figures suggest that cybercrime is growing rapidly and that the region has become a magnet for such crime. The rise in cybercrime has occurred in spite of heavy investment by GCC states in cyber protection, and the adoption of various measures including legislation. Cybercrime threatens growth of the digital economy. It shakes trust in the foundations of digital commerce, and in the 'smart infrastructure' of interconnected devices, adaptive systems and other digital technologies which governments in the region are developing - and which they aspire to expand. A number of factors suggest that the incidence, scale and impact of cybercrime are likely to increase further in the future. The first is the prospect of rapid growth in the digital economy, reflecting the prominence of digital strategies in the plans of GCC governments. A second factor is the high speed of technology adoption, which makes it hard for policy to keep pace with rising cybercrime and evolving criminal methods. A third factor is the expected convergence of technologies as the 'Internet of Things' (IoT) expands and develops, potentially creating new risk exposures via huge numbers of networked devices. In short, the GCC region will likely find itself both continuing to grapple with the existing challenges of cybercrime and facing ever-evolving risks as a result of ongoing technological innovation. Cybercrime is pervasive and cannot be completely eradicated. However, governments can limit its impact by creating a resilient overall economy and robust institutions, and by investing in deterrent capacity. Legislative frameworks play an intrinsic role in this process. In this context, it is important to consider whether existing GCC countermeasures - including legislation - are fit for purpose, or whether an overhaul is needed. This research paper offers an overall picture of the state of the digital economy in the GCC, and of progress to date in the region's attempted digital transformation. It also seeks, in particular, to highlight shared regional cybercrime challenges and their impact. The paper surveys the extent and effectiveness of existing measures - including legal instruments - for countering cybercrime, and proposes improvements to the policy regime and areas for potential intergovernmental cooperation. Although the focus is mainly on the GCC in aggregate, the paper also takes into account variations between the six countries in terms of digital development, the prevalence of cybercrime, and the nature and extent of countermeasures available. Details: London: Chatham House, 2017. 20p. Source: Internet Resource: Accessed August 7, 2017 at: https://www.chathamhouse.org/sites/files/chathamhouse/publications/research/2017-06-30-cybercrime-digital-economy-gcc-hakmeh.pdf Year: 2017 Country: United Kingdom URL: https://www.chathamhouse.org/sites/files/chathamhouse/publications/research/2017-06-30-cybercrime-digital-economy-gcc-hakmeh.pdf Shelf Number: 146772 Keywords: Computer CrimesCybercrimeCybersecurityInternet Crimes |
Author: Parraguez Kobek, Luisa Title: The State of Cybersecurity in Mexico: An Overview Summary: The cost of cybercrime incidents in the world has gone from US$3 trillion in early 2015 to a projected US$6 trillion by 2021. Luis Almagro, the Secretary General of the OAS, acknowledged that information and communication technologies (ICTs) and its multiple uses continue to evolve at a rapid pace in the region and countries are highly vulnerable to potentially devastating cyberattacks. Mexico's economy and geostrategic location is an attractive target for illicit cyber activities. On the one hand, it is enjoying considerable Foreign Direct Investment (FDI) and a solid GDP growth and on the other, it is still relatively vulnerable in cybersecurity and cyber defense. Mexico ranks as the second country in Latin America with the most cyberattacks, with a 40% growth in the number of attacks between 2013 and 2014, and approximately 10 million victims in 2014. Cybersecurity, sustainability and resilience are not only necessary for Mexico's safekeeping but they are also important factors in its social and economic development. Mexico needs to engage with its national, regional and international partners to combine resources, multi-stakeholder initiatives and facilitate information sharing to ensure its security in cyberspace. Details: Washington, DC: Wilson Center, Mexico Institute, 2017. 23p. Source: Internet Resource: Accessed September 11, 2017 at: https://www.wilsoncenter.org/sites/default/files/cybersecurity_in_mexico_an_overview.pdf Year: 2017 Country: Mexico URL: https://www.wilsoncenter.org/sites/default/files/cybersecurity_in_mexico_an_overview.pdf Shelf Number: 147207 Keywords: Computer CrimesCosts of CrimeCybercrimeCybersecurityInternet Crimes |
Author: Great Britain. HM Government Title: National Cyber Security Strategy 2016-2021 Summary: The National Cyber Security Strategy 2016 to 2021 sets out the government's plan to make Britain secure and resilient in cyberspace. The UK is one of the world's leading digital nations. Much of our prosperity now depends on our ability to secure our technology, data and networks from the many threats we face. Yet cyber attacks are growing more frequent, sophisticated and damaging when they succeed. So we are taking decisive action to protect both our economy and the privacy of UK citizens. Our National Cyber Security Strategy sets out our plan to make Britain confident, capable and resilient in a fast-moving digital world. Over the lifetime of this five-year strategy, we will invest L1.9 billion in defending our systems and infrastructure, deterring our adversaries, and developing a wholesociety capability - from the biggest companies to the individual citizen. From the most basic cyber hygiene, to the most sophisticated deterrence, we need a comprehensive response. We will focus on raising the cost of mounting an attack against anyone in the UK, both through stronger defences and better cyber skills. This is no longer just an issue for the IT department but for the whole workforce. Cyber skills need to reach into every profession. The new National Cyber Security Centre will provide a hub of world-class, user-friendly expertise for businesses and individuals, as well as rapid response to major incidents. Government has a clear leadership role, but we will also foster a wider commercial ecosystem, recognising where industry can innovate faster than us. This includes a drive to get the best young minds into cyber security. The cyber threat impacts the whole of our society, so we want to make very clear that everyone has a part to play in our national response. It's why this strategy is an unprecedented exercise in transparency. We can no longer afford to have this discussion behind closed doors. Ultimately, this is a threat that cannot be completely eliminated. Digital technology works because it is open, and that openness brings with it risk. What we can do is reduce the threat to a level that ensures we remain at the vanguard of the digital revolution. This strategy sets out how. Details: London: HM Government, 2017. 80p. Source: Internet Resource: Accessed September 13, 2017 at: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021 Year: 2017 Country: United Kingdom URL: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021 Shelf Number: 147232 Keywords: Computer CrimeCybercrimeCybersecurityInternet CrimesNational Security |
Author: Europol Title: Internet Organised Crime Threat Assessment: 2017 Summary: The 2017 Internet Organised Crime Threat Assessment (IOCTA) reports how cybercrime continues to grow and evolve. While many aspects of cybercrime are firmly established, other areas of cybercrime have witnessed a striking upsurge in activity, including attacks on an unprecedented scale, as cybercrime continues to take new forms and new directions. A handful of cyber-attacks have caused widespread public concern but only represented a small sample of the wide array of cyber threats now faced. Details: The Hague: Europol, 2017. 80p. Source: Internet Resource: Accessed November 28, 2017 at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2017 Year: 2017 Country: Europe URL: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2017 Shelf Number: 148512 Keywords: Computer Crime Cybercrime Internet CrimesOrganized Crime |
Author: Wortley, Richard Title: Child Pornography on the Internet Summary: The guide begins by describing the problem and reviewing factors that increase the risks of Internet child pornography. It then identifies a series of questions that might assist you in analyzing your local Internet child pornography problem. Finally, it reviews responses to the problem and what is known about these from evaluative research and police practice. The treatment of children as sexual objects has existed through the ages, and so too has the production of erotic literature and drawings involving children. However, pornography in the modern sense began with the invention of the camera in the early nineteenth century. Almost immediately, sexualized images involving children were produced, traded, and collected. Even so, child pornography remained a restricted activity through most of the twentieth century. Images were usually locally produced, of poor quality, expensive, and difficult to obtain. The relaxation of censorship standards in the 1960s led to an increase in the availability of child pornography, and, by 1977, some 250 child pornography magazines were circulating in the United States, many imported from Europe. Despite concern about the extent of child pornography, law enforcement agencies had considerable success in stemming the trafficking of these traditional hard-copy forms. However, the advent of the Internet in the 1980s dramatically changed the scale and nature of the child pornography problem, and has required new approaches to investigation and control. Internet child pornography is unlike most crimes local police departments handle. Local citizens may access child pornography images that were produced and/or stored in another city or on another continent. Alternatively, they may produce or distribute images that are downloaded by people thousands of miles away. An investigation that begins in one police district will almost certainly cross jurisdictional boundaries. Therefore, most of the major investigations of Internet child pornography have involved cooperation among jurisdictions, often at an international level. However, within this broader scheme, local police departments have a crucial role to play. By concentrating on components of the problem that occur within their local jurisdictions, they may uncover evidence that initiates a wider investigation. Alternatively, they may receive information from other jurisdictions about offenders in their districts. Because of the increasing use of computers in society, most police departments are likely to encounter Internet child pornography crimes. Therefore, it is important that all police departments develop strategies for dealing with the problem. Larger departments or districts may have their own dedicated Internet child pornography teams, but most smaller ones do not, and the responsibility for day-to-day investigations will fall to general-duties officers. It would be a mistake to underestimate the importance of local police in detecting and preventing Internet child pornography offenses. One study found that 56 percent of arrests for Internet child pornography crimes originated from non-specialized law enforcement agencies. Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, Center for Problem-Oriented Policing, 2006. 102p. Source: Internet Resource: Problem-Oriented Guides for Police Problem-Specific Guides Series No. 41: Accessed January 31, 2018 at: http://www.popcenter.org/problems/pdfs/ChildPorn.pdf Year: 2006 Country: United States URL: http://www.popcenter.org/problems/pdfs/ChildPorn.pdf Shelf Number: 102306 Keywords: Child Pornography Child Protection Internet CrimesPornography |
Author: Hales, Gavin Title: A 'Sexting' Surge or a Conceptual Muddle? The challenges of analogue law and ambiguous crime recording Summary: 'Sexting' - the sending and receiving by children and young people of 'youth produced sexual imagery'1 - has emerged as a growing phenomenon in recent years, facilitated by the advent of near universal smart phone ownership.2 While it may often take place within the confines of consensual sexual relationships, in some cases 'sexting' has been associated with bullying, threats or exploitation, with significant consequences for the subjects of the images, particularly where those images are widely circulated without their consent. At times the police have been called on to act, whether by victims or for example their parents or schools. The response of police forces and the wider criminal justice system has periodically been called into question with allegations that children have been unduly criminalised, particularly following publicity given to individual cases (eg BBC, 2015). The National Police Chiefs' Council (NPCC) recently published new data on the nature of 'sexting' by children (under 18), as recorded by police forces in England and Wales, under the headline 'Police dealing with rising number [of] 'sexting' cases involving children' (NPCC, 2017). They reported that there has been a 'surge in children sharing or possessing sexual images of themselves or others' with recorded offences more than doubling in three years; that girls are recorded as victims three times as often as boys; and that girls and boys are equally likely to be recorded as suspects or perpetrators. This paper discusses whether a meaningful line can be drawn from the NPCC data to the nature and underlying social issues associated with 'sexting', including who is involved, how 'sexting' is changing over time, and how the police service is responding. In addressing those questions this paper identifies a conceptual muddle at the intersection of four factors that will be examined in some detail: - Antiquated law that did not anticipate digital technology, including children taking and distributing indecent images of themselves. - Complex and ambiguous police crime recording and counting rules and practices. - Attempts to avoid unnecessarily 'criminalising' children. - Crime data published with limited detail and without caveats. It concludes by asking if the law on 'indecent images of children' needs updating with some specific exemptions for children, to reflect the world as it is today and avoid logically counterproductive consequences, including the risk that children may be deterred from reporting victimisation. Details: London: Police Foundations, 2018. 12p. Source: Internet Resource: Perspectives on Policing: Paper 4: Accessed February 2, 2018 at: http://www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/perspectives_on_policing_sexting_FINAL.pdf Year: 2018 Country: United Kingdom URL: http://www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/perspectives_on_policing_sexting_FINAL.pdf Shelf Number: 148976 Keywords: Child PornographyChild Sexual ExploitationInternet CrimesSex CrimesSextingSocial Media |
Author: Perkins, Derek Title: Interventions for perpetrators of online child sexual exploitation: a scoping review and gap analysis Summary: Technology has become a primary medium for child sexual abuse and exploitation. Like offline behaviour, technology-facilitated abuse and exploitation can take many forms, such as the recording of the sexual assault of a child or communicating with a child via mobile devices. Online and offline spaces are not always clearly distinguishable: abuse and exploitation can start in one space and move to the other. In this report, we describe sexually abusive activities towards a child or young person as 'online child sexual abuse' (OCSA) - or, where there are gains beyond sexual gratification, 'online child sexual exploitation' (OCSE) - if they are carried out via technology. Various interventions for perpetrators of OCSA and OCSE are available, ranging from one-toone sessions to manualised treatment groups. Little is known about the effectiveness of existing interventions, and whether there are gaps in the current intervention response. To improve knowledge of treatment in these areas, this scoping review obtained information from three sources: - online searches - a literature review and enquiries to service providers in relation to existing interventions - an online survey of experts and stakeholders - in-depth interviews drawn from the survey participants. These yielded information about the different interventions currently provided for perpetrators of OCSA/E, their effectiveness (where known), gaps within current interventions, and forthcoming challenges in the field. Key messages from the research Lack of evaluation and research Law enforcement, offender management and child protection services have had to be responsive to the urgent and growing issue of OCSA/E, despite limited evidence on the underlying psychological models of OCSA/E behaviour. Responding to need has, understandably, outrun the collection of scientific evidence, and there has been a lack of systematic evaluation of interventions' effectiveness. Sense of being overwhelmed Whilst professionals involved in this area felt strongly about the positive impact of their work, they also communicated a sense of feeling overwhelmed with regard to the high numbers of OCSA/E perpetrators, the lack of funding available for their services, and the need for specific training for professionals involved in this area. Need to increase knowledge generation and exchange Professionals expressed a desire for enhanced knowledge generation and exchange, especially with regard to increasing the empirical knowledge base on the risks and needs presented by the perpetrators of OCSA/E, and the lack of professional tools to assist with decision-making regarding risk and treatment. Enhance existing intervention response Interventions for perpetrators of OCSA/E remain limited and are largely similar in their client focus, scope and funding approach. They predominantly focus on psychoeducation and addressing psychological markers of offending behaviour, are provided for adult males known to the criminal justice system, and are paid for by the client or as part of court-ordered or mandatory interventions. Early intervention focus The scoping review also identified a demand for a shift towards preventative approaches - to increase public awareness and targeted at young people through educational resources. Sex education, including internet safety and pornography use, was highlighted by professionals as needing to be an integral part of the school curriculum. Professionals also discussed the implications of providing interventions for OCSA/E perpetrators not known to the criminal justice system, and for non-offending individuals who may be concerned about their sexual interest. Characteristics of existing interventions Online offending has become a focus in interventions provided for people with a sexual conviction and their victims. This scoping review identified 48 services or agencies that contribute to interventions for OCSA/E offending by providing interventions themselves, commissioning or conducting relevant research, and providing knowledge exchange events for professionals. This included eight UK-based services that directly provide interventions for perpetrators of OCSA/E. Most interventions are focused on adult male perpetrators (predominantly those known to the criminal justice system), with limited support provided for adolescents, female perpetrators, or the perpetrator's support network such as family members or friends. The reviewed intervention services typically provide psychological assessments and individual or group treatment. A key difference between UK and some international providers is the ability of the latter to work with perpetrators without the requirement for statutory disclosure to the criminal justice system on matters that would require disclosure in the UK (for example in respect of specific information on past unprosecuted offences). Quality control in relation to the provided interventions is variable. The empirical research on which they are based is not always up to date or specific to the offender subgroup. Service evaluations mainly comprise qualitative feedback from service users rather than more multifaceted pre-post treatment assessments. Implications from the research The scoping review highlighted a number of areas for future development and professional practice: - Intervene earlier and more broadly. This includes offence-prevention strategies such as public education about the nature of OCSA/E and their legal classification, enhancing service provisions for nonoffending individuals attracted to children, and reducing access to sexually exploitative material of children and young people. - Enhance the treatment response for (known) offenders. This may include expanding the existing client target group, increasing accessibility of services and increasing staff support. It may also include staying up to date on emergent issues in the field, such as new opportunities for OCSA/E arising with novel technologies. - Generate and share knowledge. This may include OCSA/E-specific training for professionals working in the field, support for research engagement, and knowledge exchange and collaboration between professionals and partner agencies. A key research need is to conduct systematic intervention evaluations. Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 54p. Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 5: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%205%20-%20Interventions%20for%20perpetrators%20of%20online%20CSE.pdf Year: 2018 Country: International URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%205%20-%20Interventions%20for%20perpetrators%20of%20online%20CSE.pdf Shelf Number: 149208 Keywords: Child PornographyChild Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesIntervention ProgramsSex Offender TreatmentSex OffendersSocial Media |
Author: Walker, Kate Title: Characteristics and perspectives of adults who have sexually exploited children: Scoping research Summary: There is a lack of information about individuals who perpetrate child sexual exploitation (CSE) offences. This report describes one of three research projects commissioned by the Centre of expertise on child sexual abuse to build an evidence base about this population. The projects' aims were to: ‣ investigate the characteristics of those who commit CSE ‣ identify the nature and dynamics of their behaviours, their motivations and the way they target and exploit their victims. The report will be of interest to frontline practitioners, service providers, commissioners of services, policy makers, researchers and academics. Method Notes from police intelligence briefings with 27 perpetrators of CSE were analysed, using content analysis to extract demographic information about CSE perpetrators. Additionally, interviews were undertaken with 18 adults who had sexually offended against children; using the current (2017) Government definition of CSE for England, these 18 adults were classified as either CSE perpetrators (n = 11) or Non-CSE perpetrators (n = 7). Inductive thematic analysis was used to analyse the interview data, to identify common themes that captured the characteristics and motivations of CSE perpetrators. Key findings and gaps in research knowledge ‣ There has been little research to date that has specifically examined the characteristics, context and motivations of CSE perpetrators. ‣ It is difficult to identify CSE perpetrators, since most sexual offences are not specific to CSE and individuals who have committed CSE offences have not been categorised as such in the criminal justice system process. This makes it difficult to conduct research with this group. ‣ Adults in this sample who had committed CSE offences had experienced dysfunctional lives. They evidenced individual internal characteristics, such as mental health problems, low self-esteem and antisocial attributes. ‣ Many excessively used adult pornography and/or images that depicted children. ‣ Negative external influences were also present in their relationships and environments. These included chaotic intimate relationships, poor relationships with family members and peers, and violence and abusive relationships at home and school. ‣ Individuals believed that their offending was associated with a culmination of all the dysfunctional and negative experiences in their lives, including both internal and external influences. ‣ Individuals justified and 'explained' their offending behaviours, which enabled them to continue to offend. ‣ Motivation for offending was described as sexual gratification in this exploratory sample. ‣ An ecological framework can be used to understand the complexity and interplay between the individual, relationships, social, cultural and environmental factors associated with CSE. ‣ There are gaps in research knowledge as to whether the factors identified as associated with CSE perpetration are variable risk markers or fixed risk markers and whether these are casual risk factors that could be targeted in interventions. ‣ Little is known about the role and relevance of protective factors which can potentially mitigate perpetration. Implications and recommendations This is a difficult group to research, as they are largely 'hidden' in criminal justice system processes. A complex range of factors are associated with the commission of CSE, which means that there is no simple way of preventing individuals from perpetrating this type of offending. However, the evidence is still limited and we do not have a clear picture of the range of factors that lead to CSE offending, particularly across the wide range of offences that meet the definition of CSE. More research is therefore needed: for example, with a larger, national sample of individuals who have sexually exploited children and a wider range of CSE offences than has been captured in this exploratory study Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 36p. Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 3: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%203%20-%20Characteristics%20and%20perspectives%20of%20adults%20who%20have%20sexually%20exploited%20children.pdf Year: 2018 Country: International URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%203%20-%20Characteristics%20and%20perspectives%20of%20adults%20who%20have%20sexually%20exploited%20children.pdf Shelf Number: 149209 Keywords: Child Pornography Child Sexual Abuse Child Sexual Exploitation Computer Crimes Internet CrimesIntervention Programs Pornography Sex Offender Treatment Sex Offenders Social Media |
Author: Walker, Kate Title: Characteristics and motivations of perpetrators of child sexual exploitation: A rapid evidence assessment of research Summary: There is a lack of information about individuals who perpetrate child sexual exploitation (CSE) offences. This report describes one of three research projects to build an evidence base about this population. The project's aims were to: ‣ investigate the characteristics of those who commit CSE ‣ identify the nature and dynamics of their behaviours, their motivations and the way they target and exploit their victims. The report will be of interest to frontline practitioners, service providers, commissioners of services, policy makers, researchers and academics. Method A rapid review was conducted, finding 50 studies/reports where the offences met the definition of CSE and information could be extracted about perpetrators' characteristics, behaviours, motivations and methods of targeting/exploiting their victims. Key findings and gaps in research knowledge ‣ The majority of studies were conducted in the UK (19) and USA (18), with four conducted in Canada, three in New Zealand, two in France and one in each of Australia, Mexico, Germany and Sweden. It is important to note that some of these studies reviewed and/or combined the findings from a number of published studies, so each study's findings were not necessarily specific to its country of origin. ‣ The majority (37) of studies were of offenders who have committed exclusively online CSE offences, with only 10 examining non-online CSE offences and three covering both online and 'offline' offences; very limited knowledge was obtained regarding other types of CSE, such as CSE perpetrated within groups and gangs; offences such as human trafficking for, or resulting in, sexual exploitation; and the purchasing of sexual contact. This limits the extent to which the review's findings and observations can be generalised. ‣ Across the studies there were many methodological limitations such as inconsistencies in the definition of CSE, comparisons between groups of sexual offenders only (with a lack of other offender or non-offender control groups), lack of typical or normative data comparisons, and reliance on correlational data. These limit the potential to draw conclusions about causal influences. ‣ Perpetrators were generally identified as male, white and aged between 18 and 85 years (with the average age in individual studies ranging from 30 to 46 years); a high proportion were employed, with a large number of these in professional jobs. ‣ Mental health characteristics and psychological characteristics (personality traits) were examined only in relation to online CSE offences, and no research examined them in relation to other forms of CSE, e.g. CSE perpetrated in gangs or groups. ‣ In relation to online CSE, owing to methodological challenges and insufficient research it is impossible to isolate specific mental health or psychological characteristics that have a causal relationship with this type of offence. However, factors such as depression, anxiety, stress and suicidal ideation are most likely to be relevant. ‣ The evidence is weaker for psychological characteristics being associated with CSE; however, some attachment styles (e.g. not securely attached, fearful attachment) were associated with this group, and the formation of relationships appeared to be problematic. ‣ There was limited research that identified the motivations of CSE perpetrators; the studies that did so were generally those looking to develop typologies and categories of online offenders. The two key motivations found were sexual and financial. ‣ There was no research that specifically identified the way that perpetrators targeted/ exploited their victims, beyond explaining the context within which the exploitation occurred (i.e. online exploitation, gangs or trafficking/commercial dealings). It may be that such information could be located within the literature on victim-survivors, but including and analysing research on victim-survivors was beyond the scope of the current review. Implications and recommendations There is very little reliable information about the characteristics of individuals who perpetrate CSE offences, particularly those who do not commit offences in or using online environments. This significantly limits our ability to identify potential offenders and situations to target and design prevention strategies. More research is required to fully understand the characteristics and motivations of CSE perpetrators. That research will need to: ‣ have consistency and clarity regarding the definition of this type of offending and the different contexts within which it occurs ‣ use methodological research designs that allow differences and causal pathways to be reliably identified - for example, including appropriate non-offender control groups, longitudinal methods and large sample sizes (although this may be unrealistic, as studies are generally based on small, convicted samples by necessity) Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 40p. Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 2: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%202%20-%20Characteristics%20and%20motivations%20of%20perpetrators%20of%20CSE.pdf Year: 2018 Country: International URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%202%20-%20Characteristics%20and%20motivations%20of%20perpetrators%20of%20CSE.pdf Shelf Number: 149210 Keywords: Child Pornography Child Sexual Abuse Child Sexual Exploitation Computer Crimes Internet Crimes Intervention Programs Pornography Sex Offender Treatment Sex Offenders Social Media |
Author: Hackett, Simon Title: Young people who engage in child sexual exploitation behaviours: An exploratory study Summary: Despite increasing awareness of child sexual exploitation (CSE) across the UK in recent years, there remain gaps in current knowledge and understanding - including in relation to young people who perpetrate acts of CSE. In contrast to the wider research base for harmful sexual behaviour (HSB) in childhood and adolescence, which has developed significantly in recent years, there is little in the literature specifically on the topic of young people who engage in sexually exploitative behaviours. This report describes one of three research projects commissioned by the Centre of expertise on child sexual abuse to build an evidence base about perpetrators of CSE. The project aimed to investigate: - the backgrounds of young people identifi ed for CSE concerns as perpetrators - the nature and range of their sexual behaviours - the range of victims targeted - other off ending behaviours displayed by the young people. Method Anonymised data was obtained from electronic records held by a police-led, multiagency initiative which focuses on CSE and on missing children. Consisting of 14 cases, the data are a convenience and non-probability sample which represent a significant minority of the cases becoming known to this 'CSE team' over a 24- month period where an alleged perpetrator was under the age of 18 at the point of their harmful or exploitative sexual behaviours. This study therefore drew only on existing secondary data already available to the CSE team; it was beyond the study's scope to conduct interviews with professionals involved in the cases, or with the young people and their families directly. The electronic records contained considerable and detailed information compiled by a wide range of agencies over a substantial period of time. Key fi ndings Because of the small sample size and the reliance on official case records which may be partial and limited, the following findings should be regarded as at best indicative. - All young people in the sample were male and white British. - Their current age ranged between 14 and 21 years old, with the overwhelming majority aged over 16; this is an older sample than many reported in the literature on HSB. Their age at the point when concerning sexual behaviours fi rst emerged ranged from 7 to 18 years old; in contrast to other demographic studies of young people with HSB, which have indicated substantial early-onset trajectories, only one case indicated a pattern of pre-adolescent sexual behaviour problems. - Experiences of adversity were found in the developmental histories of 10 of the 14 young people. The most commonly reported factor was domestic violence, followed by physical and sexual abuse and neglect. Previous studies of young people with HSB have reported higher rates of previous victimisation. - Twelve of the young people had longstanding non-sexual off ending histories: theft, burglary, criminal damage and general antisocial behaviours were extensive and pervasive. All the young people appear to fi t the 'generalist' category of HSB off ender, whose sexual off ending appears to be more directed towards peers as part of a broader catalogue of deviance and non-sexual off ending trajectories. - A model proposed by Ward and Siegert (2002) describes fi ve primary developmental pathways leading into sexually abusive behaviours. Many of the young people in the sample appear to fi t into the antisocial thinking pathway, where an underlying propensity towards general deviance and antisocial behaviour becomes sexualised during puberty. - In all cases, the concerns about young people's sexual behaviours related to a young person off ending alone or to pairs of young people whose behaviours appeared interlinked and inter-infl uenced. There were no 'gang-related' or larger group incidents of HSB or CSE. - Whilst all 14 young people had targeted female victims, only one was known to have sexually off ended against a male (in addition to multiple female victims). HSB towards teenage peers was preceded in only three cases by sexual abuse of prepubescent children. Previous research into young people's HSB has identifi ed signifi cant proportions of male victims and victims aged 10 or below. - The young people were typically involved in multiple and in some cases escalating harmful sexual behaviours: nine engaged in exploitative or harmful sexual behaviours online or using social media, accompanied in most cases by contact sexual exploitation or sexual abuse. There was not strong evidence of a clear progression from online to offl ine HSB: it was just as likely for offl ine HSB to precede online behaviours. Implications and recommendations The impression gained from this pilot study is of young people who engage in CSE behaviours as a generally very deviant group whose sexual and non-sexual behaviours are disinhibited, chaotic and non-boundaried. The small scale of this study, and the use of data from one team with a particular focus and operating model, limits the conclusions that can be drawn; nevertheless, the study's tentative findings should be investigated in more detail. In some of the cases examined, it was possible to see a progression from sexual assaults or sexually abusive behaviour without overt elements of exchange towards more 'CSEtype' behaviours over time. It may be that CSE-type behaviours in adolescence, much more so than more general HSB, are more strongly related to general deviance than a history of sexual victimisation; if so, this has significant implications for both intervention approaches and prevention activities. However, it was difficult to separate the young people's behaviours meaningfully and neatly into categories of CSE and HSB. Whilst all cases fitted widely used definitions of HSB, the extent to which they are accompanied by overt elements of exchange (as would fit the definition of CSE) was much less clear in many cases. The sexual behaviours of all the young people in the sample required disruption, management and intervention - but it is unclear whether that should be undertaken by a CSE team or an HSB team. This perhaps reflects the present inadequacy of using distinct sets of language and concepts (CSE and HSB) and service frameworks to respond to the problem of transgressive sexual behaviour in adolescence. Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 24p. Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 1: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%201%20-%20Young%20people%20who%20engage%20in%20CSE%20behaviours.pdf Year: 2018 Country: International URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%201%20-%20Young%20people%20who%20engage%20in%20CSE%20behaviours.pdf Shelf Number: 149211 Keywords: Child PornographyChild Sex OffendersChild Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesIntervention ProgramsSex Offender TreatmentSex Offenders |
Author: Radford, Lorraine Title: A review of international survey methodology on child sexual abuse and child sexual exploitation Summary: This review was commissioned by the Centre of expertise on child sexual abuse to inform its work on improving data currently collected in England and Wales. Unlike previous reviews which have looked at findings on prevalence rates within and across different countries, this study looked at differences in self-report survey methodologies to research rates of victimisation and perpetration. The aims of the review were to: - identify methodologically different surveys undertaken in countries outside England and Wales that specifically focus on, or include, child sexual abuse (CSA) - identify questions used in surveys to assess the scale and nature of CSA - including any questions regarding child sexual exploitation (CSE), and those exploring abuse or grooming that takes place online - and comment on their relative effectiveness - explore the survey methods used, and identify what worked well in achieving a good response rate - explore the sampling strategies used, including any use of booster samples to reach underrepresented or identified vulnerable groups - identify questions, survey methods and sampling strategies used to explore potential and actual perpetration of CSA - discuss what identified good practice would be replicable in the UK context, and to what extent this would allow comparisons to be made across countries. Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 66p. Source: Internet Resource: Accessed February 22, 2018 at: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/ Year: 2018 Country: International URL: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/ Shelf Number: 149212 Keywords: Child Grooming Child Pornography Child Sex OffendersChild Sexual Abuse Child Sexual Exploitation Computer Crimes Internet Crimes Sex Offender Treatment Sex Offenders |
Author: Kaur, Kam Title: Local commissioning of services addressing child sexual abuse and exploitation in England Summary: On behalf of the Centre of expertise on child sexual abuse, Cordis Bright undertook an independent review in spring 2017 of how child sexual abuse and exploitation (CSA/CSE) services were commissioned in five local areas in England. The review sought to clarify local approaches developed through local authorities, health and wellbeing boards, Offices of the Police and Crime Commissioners (OPCCs), NHS England and clinical commissioning groups (CCGs). It aimed to identify challenges, weaknesses and strengths in current local commissioning which might be of broader interest. Commissioners' views were also sought on the support they were looking for, including how the Centre of expertise might help. Following a review of the literature, Cordis Bright conducted interviews with 30 commissioners, commissioning partners, service providers and local practitioner experts across the five local areas. In view of the link with CSA/CSE, harmful sexual behaviour (HSB) was included in the review as it progressed. Limitations The review was a rapid research exercise informed by evidence from five sites. Whilst these sites provide a degree of diversity, the findings will not fully reflect experiences in all locations in England, and do not incorporate experiences in Wales. The findings reflect a point in time (spring 2017) and should be considered with reference to emerging developments which may influence change, such as the impending release by the NHS of its strategy on sexual abuse. The review focused on local commissioning and does not provide direct insight into centralised commissioning processes. However, some of its findings may be useful to decision-makers in that context. Findings The findings, drawn from the interviews, are summarised thematically here. A key caveat to the findings is the fact that the fieldwork was limited to five local authority areas in England. A theme underpinning many of the findings, and reported in all five areas, is the impact of the current economic climate on local service provision. Stakeholders reported that local commissioners' budgets are diminishing, as is the independently generated income of voluntary and community sector (VCS) service providers. Commissioning challenges Local commissioners were said to face a number of common challenges: - The high profile accorded to CSE by central government has been beneficial, but has not yet been extended to CSA and HSB. - Whilst CSE service commissioning practice appear well-developed, CSA and HSB services are not commissioned (or delivered in-house) with the same transparency and robustness. - The use of short-term contracts (usually lasting three years) limits VCS partnership/investment opportunities. - Good commissioning partnerships (with other commissioners or the VCS) will require a significant amount of investment to develop and maintain. - Cuts to commissioning teams limit the scope and quality of commissioning activity. - There needs to be more detail on CSA/CSE and HSB, including online elements of abuse, in local population needs assessments. - Health bodies and schools are not always seen by others as engaged as full partners in the commissioning of local CSA/CSE and HSB services. - There is no quality assurance framework to ensure that schools have appropriate safeguarding care pathways or commissioned CSA/CSE/HSB response services. - There is no consensus on good outcomes measurement - in particular focusing on 'distance travelled' for an individual (emotional wellbeing, improvement in relationship with family and friends, access to positive alternative activities and engagement in learning) - for CSA/CSE and HSB services. Stakeholders wanted: - CSA and HSB to be included in CSE commissioning governance, reported as usually being overseen by the Director of Children's Services and a local safeguarding children board (LSCB) subgroup - mental health trusts to have in place governance and partnership arrangements focusing on CSA/ CSE recovery - more focus from the OPCCs on children and young people, including funding for the vital role of sexual assault referral centres (SARCs) - all areas to have an explicit, integrated CSA, CSE and HSB strategy - national CSA/CSE and HSB commissioning guidance which minimises contract-monitoring activity. Gaps in commissioned services Local areas expressed concerns including the following: - There has been a significant reduction in prevention services for CSE and HSB. More investment is required from schools, public health budgets and CCGs. - There has not been any CSA prevention work. - There has been a significant reduction in school nursing services. Nurses have been a key contact for identification/disclosure of CSA/CSE. - Responding to online abuse needs to be included in local CSA/CSE and HSB services. - The regionalisation of the SARCs may be supported on medical grounds, but has increased travel time for children and young people. Additionally, more follow-up counselling support sessions funded through SARCs are needed. - There is a significant shortfall in follow-up or recovery services for children who have experienced CSA/CSE and/or HSB. Where budgets are not protected for existing services, the services risk losing the flexibility needed for victims to disclose and recover. - Transition from children's to adults' services is difficult for survivors of CSA and CSE. - The volume of HSB is growing, but services are reducing. Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 56p. Source: Internet Resource: Accessed February 22, 2018 at: https://www.csacentre.org.uk/research-publications/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-england/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-england/ Year: 2018 Country: United Kingdom URL: https://www.csacentre.org.uk/research-publications/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-england/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-en Shelf Number: 149216 Keywords: Child PornographyChild Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesIntervention ProgramsSex Offender TreatmentSex OffendersSexual Assault |
Author: Wager, Nadia Title: Rapid Evidence Assessment Quantifying The Extent Of Online-Facilitated Child Sexual Abuse Summary: This rapid evidence assessment (REA) examines what is known about the scale of online-facilitated child sexual abuse (CSA). It was commissioned by the Independent Inquiry into Child Sexual Abuse (IICSA), which is investigating whether public bodies and other non-state institutions have taken seriously their duties to care for and protect children and young people from child sexual abuse and exploitation. This research informs IICSA's investigation into institutional responses to child sexual abuse and exploitation facilitated by the internet (referred to as the internet investigation). The specific objectives were: to identify and appraise the measures currently available in England and Wales, and internationally, that could contribute to quantifying the scale of online CSA to consider what each of these measures say about the scale of online CSA to identify and appraise the range of data sources that are available for quantifying the scale of online CSA to identify gaps in the existing literature. 3 A rapid evidence assessment is a structured way of searching for, assessing the appropriateness of, and synthesising a large body of evidence in a very short time frame. It is less rigorous than a full systematic review and therefore does not provide a fully comprehensive summary of the evidence base. This should be borne in mind when considering the findings. Additional challenges taken into account during the review of the 99 articles and reports covered were dealing with the breadth of definitions used, and the constant changes in technology. Details: Huddersfield, UK: University of Huddersfield, Secure Societies Institute, 2018. 184p. Source: Internet Resource: Accessed February 28, 2018 at: https://www.iicsa.org.uk/document/rapid-evidence-assessment-quantifying-extent-online-facilitated-child-sexual-abuse Year: 2018 Country: United Kingdom URL: https://www.iicsa.org.uk/document/rapid-evidence-assessment-quantifying-extent-online-facilitated-child-sexual-abuse Shelf Number: 149281 Keywords: Child PornographyChild Protection Child Sexual Abuse Child Sexual Exploitation Internet Crimes Online Victimization Social Media |
Author: Interpol Title: Towards a Global Indicator on Unidentified Victims in Child Sexual Exploitation Material: Technical Report Summary: This report presents the results of a two-part analysis of the multi-country data set contained in the International Child Sexual Exploitation (ICSE) Database housed at INTERPOL and of consultations with law enforcement personnel in relation to the identification of victims and offenders pictured in Child Sexual Abuse Material (CSAM) and Child Sexual Exploitation Material (CSEM) seized by law enforcement around the world. It forms one component of a larger programme of the ICSE Database enhancement activities financed by the European Union and carried out between 2016 and 2018 under the title International Child Sexual Exploitation (ICSE) database Connectivity and Awareness Raising Enhancements (I-CARE) Project. A ground-breaking cooperation between INTERPOL and ECPAT International, the study is broader in country coverage and possibly in other dimensions than any other previously analysed and publicly reported on. It responds to widespread recognition of the scarcity of reliable data and research on CSAM and CSEM to inform evidence-based policy and programmes to tackle the issue and protect children from online sexual exploitation and abuse across the world. It highlights the urgent need to develop representative international baselines of empirical data on the victimisation of children depicted in CSAM and CSEM, and to enhance the response by law enforcement agencies around the world to this problem. The analysis has been subject to a number of legal, institutional and ethical conditions, which have been duly and carefully considered, and which have been addressed in the exercise. Taken together, a comprehensive perspective on the overall database contents, and a mix of quantitative and qualitative findings from a selected sample of observations, has produced a broad range of findings, whose statistical validity has been confirmed by an expert reviewer. The study provides insight based on visual analysis of images and videos into the profile of unidentified child victims and their abusers, including age, gender, and type and severity of abuse, and further presents the results of analysis of case-related metadata for cases recorded as both identified and unidentified in the ICSE Database. It highlights the multi-faceted challenges presented to the law enforcement and child protection community by rapid evolutions in the means available for online child exploitation and abuse as a distinct subset of child sexual abuse and exploitation, and the increasingly complex role played by youth-produced sexual content in this landscape. Through analysis of confirmed and suspected locations of abuse as recorded in the ICSE Database, the study also considers the relationship between resource allocation for victim identification and rates of identification worldwide. The study acknowledges that there are qualitative limitations inherent in the multi-country and multi-user data set of the ICSE Database, but also highlights the unique nature of the data set resulting from this diverse user base. This in turn underlines the distinctive position and potential of the ICSE Database for further technological evolutions, country connections, and as a tool in victim identification efforts, and reinforces the usefulness the ICSE Database for further research and as focal point for future efforts to build a global indicator. Details: Bangkok: ECPAT, 2018. 104p. Source: Internet Resource: Accessed March 16, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/02/Technical-Report-TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL.pdf Year: 2018 Country: International URL: http://www.ecpat.org/wp-content/uploads/2018/02/Technical-Report-TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL.pdf Shelf Number: 149496 Keywords: Child PornographyChild ProstitutionChild ProtectionChild Sexual AbuseChild Sexual ExploitationComputer CrimesInternet CrimesOnline VictimizationSex Trafficking |
Author: ECPAT International Title: Regional Overview: Combating The Sexual Exploitation of Children in South Asia: Evolving Trends, Existing Responses and Future Priorities Summary: This report offers an overview of the sexual exploitation of children (SEC), including in its commercial forms (CSEC), as it emerges in the eight countries that form South Asia - Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan and Sri Lanka - and are members of SAARC, the South Asian Association for Regional Cooperation. A special focus is placed on three manifestations characterising the regional context, namely, online child sexual exploitation (OCSE), SEC in travel and tourism (SECTT) and SEC in child, early and forced marriage (CEFM). Research studies and regular data generation on issues relating to child sexual abuse and exploitation are scanty in the region because of the cultural sensitivity around the problem and lack of regular programme monitoring systems. This study seeks to offer an overview of the situation of children at risk or victims of SEC on the basis of existing evidence by - Exploring emerging socio-economic drivers compounding the problem; - Analysing the main manifestations of SEC in the specific regional context; - Reviewing the policy and legal responses that enable or, to the contrary, hinder child protection and safety, further calling attention to persisting gaps; and - Finally proposing a set of actions necessary to move forward in the fight against sexual violence against children in South Asia. In 2014, ECPAT had produced a similar document titled The Commercial Sexual Exploitation of Children in South Asia. Developments, Progress, Challenges and Recommended Strategies for Civil Society. The present situation analysis not only provides an update of the earlier study, but also a new perspective on the problem. It investigates the various issues relating to SEC from the point of view of a society taking a new development path and undergoing a phase of fast and profound transformation. The point of observation is that of a complex change encompassing substantial economic growth, rapid urbanisation and migration. Increased wealth and mobility, together with the fast penetration of information and communication technologies, are offering unprecedented opportunities to the young generations of South Asians and opening new windows on the rest of the world. The same transformations, however, also expose young people to the risks typically associated with modern living, lifestyles and worldviews. Section 1 of the report, the Introduction, seeks to sketch the backdrop against which SEC is occurring in South Asia as the new does not necessarily replace the old, but rather leads to a stratification of pre-existing and recent manifestations of sexual abuse, exploitation and violence. South Asia is a land of contrasts. As the region is poised to become, with the rest of Asia, the largest global market of the future, a sizeable portion of its population still lives in subsistence economies and traditional communities. The region ranks at the very top globally in a number of significant areas. Economically, South Asia is the fastest growing region worldwide; socially, it is leading the urbanisation of the planet (with the rest of Asia and Africa); and technologically, India alone is one of the three markets with the highest numbers of mobile accounts among young people in the South of the world. However, despite such impressive progress, globally the region still accounts for the largest concentration of people living in absolute poverty; displays some of the worst human development outcomes in areas such as healthcare, schooling and per capita expenditure or income; hosts the majority of modern slaves trapped in forced prostitution, forced marriage, forced labour and organ trafficking; is home to the largest number of child brides and child labourers; is responsible for the bulk of the out-of-school children (together with West Asia and sub-Saharan Africa); and, jointly with Sub-Saharan Africa, accounts for over three quarters of child deaths caused by climate change in recent decades. If history is any guide, the constantly growing size and speed of human and financial flows in the absence of adequate protection policies for vulnerable populations may lead to a hike in sexual violence against children in the future. Research activities in the realm of SEC will need to increasingly focus on such influential trends to analyse how systemic change may impact the safety and protection of children by transforming the root causes of child abuse. Within this backdrop, Section 2 analytically reviews several manifestations of SEC as these emerge in a number of settings such as - Information and communication technologies, whose penetration in South Asia has been growing at a substantially faster pace than other kinds of infrastructure and services necessary for human development, while also, in parallel, rapidly multiplying risks relating primarily to the creation and trade of child sexual abuse material by perpetrators displaying a sexual interest in children, and to sexual harassment and extortion of children online by perpetrators generally known to the victims; - Travel and tourism, in the context of rising trends in international tourist arrivals, matched with a steady increase in domestic travellers who can now reach out to children in novel settings such as homestays or childcare institutions; - Child, early and forced marriage (CEFM), which local cultures may view as a form of protection from sexual harassment for adolescent girls rather than as a condition that can expose girls and women to life-long systematic sexual violence; - Child trafficking still persisting in South Asian countries, despite efforts in this area having been more systematised and institutionalised than in others over time; - Sexual exploitation of children (SEC), continuing in the context of the traditional sex trade and now evolving in technology-facilitated forms; - Child labour, often unrecognised as a vast reservoir for sexual exploitation, but in fact being a major channel to SEC, especially in certain occupations, such as domestic labour, widespread across South Asia; and - Humanitarian crises, conflicts and environmental disasters, which dramatically exacerbate the pre-existing vulnerabilities of children and weaken the capacity of poor communities to protect their families. Section 3 reviews existing legal, policy and programme responses being implemented at local, national and regional levels to address SEC in the areas highlighted in the previous section, while also seeking to identify major gaps and challenges. All South Asian countries have ratified the UN Convention on the Rights of the Child and the Optional Protocol to the Convention on the sale of children, child prostitution and child pornography (OPSC), in addition to other important regional instruments (such as the SAARC Convention on Preventing and Combatting Trafficking in Women and Children for Prostitution, and the SAARC Convention on Regional Arrangements for the Promotion of Child Welfare in South Asia). However, the Palermo Protocol on Trafficking in Persons has been fully ratified by only Afghanistan, India, Maldives and Sri Lanka, while none of the SAARC countries has so far developed national legislation harmonised with the OPSC, specific laws addressing issues such as SECTT or OCSE, or substantive extraterritorial jurisdiction. Progressive policies have been designed in the areas of protection of children from sexual offences, trafficking, child labour and early marriage by most countries in the region, while initial attempts have been made to respond to online threats, mainly by setting up webbased portals aimed at spreading information on child trafficking, tracking down trafficked and missing children, and supporting confidential reporting. Lack of proper awareness, implementation and enforcement, however, emerges as the main challenge with regard to the implementation of policies and laws. In addition to efforts by governments, the growing South Asian private sector has also started contributing proactively, especially by adopting more stringent corporate social responsibility (CSR) guidelines. Its involvement in the realm of SEC, however, remains rather limited, especially with reference to the ICT and travel and tourism industries whose role in preventing harm by online and travelling child sex predators would be particularly relevant. Civil society organisations continue to play a key role in the fight against the various manifestations of SEC, although the scope of their interventions may be normally limited to the local level and not always receive adequate support or recognition by the government. Children's and young people's groups have become more active in combatting SEC, even though they need more opportunities to access sexuality education, enhance awareness about online and offline threats, and gain further agency. An important platform for coordination among the various partners involved is the South Asia Initiative to End Violence Against Children (SAIEVAC), a SAARC Apex body acting, since 2005, as an inter-governmental mechanism committed to promoting the rights and protection of children at the regional level. Especially relevant in the context of SEC has been the recent 4th SAIEVAC Ministerial Meeting, held from 9-11 May 2016 in New Delhi, which led to a joint commitment by SAARC Member States to frame a region-wide strategy with the aim of tackling the sexual of children, especially online, through trafficking, and in travel and tourism. Details: Bangkok: ECPAT, 2017. 168p. Source: Internet Resource: Accessed March 16, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/03/Regional-Overview_South-Asia.pdf Year: 2017 Country: Asia URL: http://www.ecpat.org/wp-content/uploads/2018/03/Regional-Overview_South-Asia.pdf Shelf Number: 149500 Keywords: Child Pornography Child Prostitution Child ProtectionChild Sex TourismChild Sexual Abuse Child Sexual Exploitation Computer Crimes Internet Crimes |
Author: Krone, Tony Title: Criminal misuse of the Domain Name System Summary: The DNS is a naming system for resources, such as personal computers or other devices, that connect to the internet via the World Wide Web. It coordinates internet addresses and domain names-the two kinds of unique identifiers that make internet connection possible. The study was funded by the auDA Foundation, which was established by the .au Domain Administration (auDA), the policy authority and industry self-regulatory body for the .au domain space in Australia. The aim was to support the objective of the Foundation by 'promoting and encouraging educational and research activities that will enhance the utility of the Internet for the benefit of the Australian community' (auDA Foundation 2015). Methodology Public source, non-technical literature was comprehensively reviewed to identify instances of DNS misuse, the risks that led to the commission of these instances, and the crime prevention and regulatory measures available to address the problem. The study was particularly focused on exploring existing legal and criminological frameworks that could be used to conceptualise the problem of DNS misuse and provide a framework for developing effective control strategies. The literature review was international and examined English-language resources including academic sources, legal databases and relevant policy documents. The review primarily focused on the risks of misuse of the DNS from an Australian perspective although, due to the global nature of the internet, all legitimate users would benefit in many ways from a more secure and trusted domain name system, both as domain name owners and consumers. Scope The results address current identified risks, but they could also inform further and more detailed cross-disciplinary research into the nature of the problem and appropriate solutions. The research was not intended to be an overly technical examination of the problem and does not address the architectural or programming features of particular examples of misuse. Rather, it explores the issue from a policy perspective that will be beneficial in devising appropriate legal and policy responses. Details: Canberra: Australian Institute of Criminology, 2018. 85p. Source: Internet Resource: Research Report 03: Accessed April 16, 2018 at: https://aic.gov.au/publications/rr/rr03 Year: 2018 Country: Australia URL: https://aic.gov.au/publications/rr/rr03 Shelf Number: 149807 Keywords: Computer Crime Cybercrime Internet Crimes |
Author: Children's Society Title: Safety Net: Cyberbullying's impact on young people's mental health: Inquiry report Summary: Key findings Under-age use of social media is commonplace - Despite most major social media companies - including Facebook, Twitter, Snapchat, YouTube and Instagram - specifying that users must be 13 years old to have an account, we found that 61% of young people had a first account at age 12 or under. Children and young people are using social media for longer periods and using multiple profiles - Our survey indicated that nearly half (44%) of children and young people spend more than three hours per day on social media, whilst almost 1 in 10 (9%) reported always using social media overnight between midnight and 6am. There is a connection between intensive social media use and mental ill health - Thirty eight percent of young people reported that social media has a negative impact on how they feel about themselves, compared to 23% who reported that it has a positive impact. This was exacerbated for girls, with 46% of girls stating that social media had a negative impact on their self-esteem. Cyberbullying - a new form of bullying - Although our inquiry found that offline bullying remains the most common form of bullying, it is clear that cyberbullying is distinct and potent, particularly due to its potential to be relentless. Children and young people are particularly vulnerable to the effects of cyberbullying - Children and young people who are currently experiencing a mental health problem are more than three times more likely to have been bullied online in the last year. The steps being taken by social media companies in response to cyberbullying are inconsistent and inadequate - Throughout the course of the inquiry, we heard a number of examples from social media companies about positive initiatives they have established to respond to abusive content online, such as cyberbullying, as well as promoting the mental health of their users. Young people concluded that social media companies' current responses to cyberbullying are inadequate - There is an appetite among young people for greater interventions to disrupt cyberbullying, with 83% of young people saying that social media companies should do more to tackle cyberbullying on their platforms. There is a perceived lack of consequences for those who engage in bullying behaviour - Young people told the inquiry that they feel as though the onus is on the person who is experiencing cyberbullying to act. They spoke of a perceived lack of consequences for those who engage in bullying behaviour online, in a way there is not in the offline world. Social media companies need to do more to promote positive mental health and well-being - Young people overwhelmingly told the inquiry that they wanted social media companies to do more to promote positive mental health and interactions on their platforms. - Eighty two percent of young people thought social media companies should do more to promote mental health. Details: London: Children's Society, 2018. 72p. Source: Internet Resource: Accessed May 7, 2018 at: https://www.childrenssociety.org.uk/sites/default/files/social-media-cyberbullying-inquiry-full-report_0.pdf Year: 2018 Country: United Kingdom URL: https://www.childrenssociety.org.uk/sites/default/files/social-media-cyberbullying-inquiry-full-report_0.pdf Shelf Number: 150089 Keywords: Child ProtectionComputer CrimesCyberbullyingCybercrimeCybersecurityInternet CrimesOnline VictimizationSocial Media |
Author: International Centre for Missing & Exploited Chidlren Title: Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review Summary: The grooming of children for sexual purposes through the Internet and related technologies is a growing problem worldwide, putting countless children at risk for sexual abuse and exploitation. Grooming is the process by which an adult establishes or builds a relationship with a child, either in person or through the use of the Internet and related technologies, to facilitate online or offline sexual contact with the child. Online grooming can be connected with a variety of different forms of sexual exploitation of children, such as the creation of child sexual abuse material and sexual assault. The National Society for the Prevention of Cruelty to Children (NSPCC) reported that in England and Wales the Internet was used to commit an average of eight sexual crimes against children, including rape, grooming, and live streaming of abuse, every day in 2015. Each year, Internet availability and accessibility continues to improve, and in turn the number of Internet users globally grows steadily - more than 50% of the world's population now actively uses Internet services. There are more than 3.8 billion Internet users worldwide today with 70% of the world's Internet users ages 15-2412 and an estimated 750,000 predators online at any given moment. Easy access to information and communication technologies (ICTs) together with a growing population of young people online makes apparent the need for comprehensive legislation and other tools to help protect children from the risk of sexual abuse Technology gives offenders access to children around the clock. A 2010 study found that US children between the ages of 8-18 spend an average of 7.5 hours each day on the Internet. An even earlier study of Swedish children's media habits found that 82% of children ages 9-11 and 95% of children ages 12-16 use the Internet; 28% and 54% of those same age groups respectively use the Internet daily.17 These reports demonstrate that children around the world have integrated the Internet into their lives in a way that may still be incomprehensible to many adults. Children today use the Internet every day not only to communicate with one another, but also to establish and maintain relationships with others, their social spheres often spanning both online and offline without any clear separation between the two. Some studies show that children who have experienced negative life events or maltreatment may be more vulnerable to online grooming. However, research from various industrialized countries shows that some children who have been victimized online "shared no apparent negative prior life circumstances and appeared to have been randomly targeted...," demonstrating that "there is no typical victim and the most striking thing about children abused online is their heterogeneity." Victims are most often between the ages of 13-15. Some groomers communicate with many children simultaneously as they develop relationships and, in 2012, the European Online Grooming Research Project found that "girls seem to be at greater risk than boys." Boys are shown to constitute a "substantial group of the victims," but are generally less willing to report instances of abuse. Thus, the gap in confirmed victimization between boys and girls may be smaller than some reports indicate. Online grooming occurs via email, instant messaging apps, social networking sites, chatrooms, online gaming sites, photo sharing sites, and dating apps, which can be accessed through personal computers and laptops, tablets, and mobile phones. A 2012 UK-based survey of 1,718 children aged 11-16 years old revealed that 42% received online attachments by email from strangers, 37% added a stranger to their instant messaging contacts, and 35% added a stranger to their social networking friends group. These technologies are not only popular amongst younger generations, but they also provide offenders with a platform to create a persona and, in some cases, to mask their true age and identity. In doing so, they are better able to connect with children and more easily gain their trust and cooperation, ultimately introducing a sexual element into the relationship. In particular, social networking sites are widely used for online grooming. Offenders can use the Internet and related technologies to find vulnerable children who meet their preferred sexual interests by scanning such sites to find a young person's personal information before contacting them. For example, offenders can use such sites to access profile pictures, demographic information, interests, and communications with others (i.e., news feed, status posts, comments on posts) to target victims. Offenders thus can identify the children in whom they are interested so they may contact and eventually sexually exploit them. Child Internet users are particularly open to interacting with strangers because they use social media and social networking sites as a way to meet new people, rather than solely as a way to keep in touch with people they already know. Given such openness with strangers, a cybercrime study conducted in the UK estimated that "850,000 cases of unwanted online sexual approaches were made in chat rooms during 2006 and that 238 offenses of meeting a child following sexual grooming were recorded." A 2005 US study showed that one in 25 children ages 10-17 had received aggressive sexual solicitations that included attempts to contact them offline, and one in 25 were solicited by an online offender to take sexual pictures of themselves. Just five years later, another study reported that one in 11 US children aged 10 to 17 reported receiving an unwanted sexual solicitation online. Over the last two decades, online gaming has similarly grown into a worldwide activity for adults and children alike. The functionality of online gaming platforms (computers, video game consoles, or hand-held gaming systems) has evolved and expanded to include Internet access, messaging platforms, and photo and video sharing, thus enabling people around the world to communicate and play games with each other in real-time. Sexual predators increasingly use online games as a means to easily gain access to and connect with children. Subsequently, as more and more children play video games online, the risk of children coming into contact with sexual predators has grown. The unique capabilities of video games often enable video and voice communications between a child and an offender. Online games automatically give the offender and child a common interest, bypassing some of the child's fears of establishing a relationship with a stranger. In addition, children often spend time on the gaming platforms with little or no adult supervision, thus increasing an offender's ability to build and progress a relationship. Once a trust-relationship has been established, the offender may encourage the child to communicate on other platforms like private chatrooms, instant messengers, and social media apps, further facilitating the exchange of sexual conversations and images/videos, and even live-streaming sexual acts. While the grooming process can occur in-person, online grooming often progresses more rapidly, and the offender may use a variety of techniques to persuade, pressure, and manipulate the child to cooperate, all while taking advantage of the anonymity the Internet provides. Online groomers can persuade a child to meet in less than half an hour and, according to the findings of a UK-based research team, in some cases it can take as little as 18 minutes to convince a child to meet. Likewise, a Middlesex University (London) study found that offenders, when chatting online with children, often introduce sexual topics after just three minutes, and a bond can be formed with a child after only eight minutes. The grooming process is complex and involves "trust-building, isolation and desensitization towards sexual behavior...a network of processes and strategies that do not follow always the same order." As there is no single method of grooming children, there is also no single profile of online groomers. Details: Alexandria, VA: The Centre, 2017. 67p. Source: Internet Resource: Accessed May 18, 2018 at: http://www.icmec.org/wp-content/uploads/2017/09/Online-Grooming-of-Children_FINAL_9-18-17.pdf Year: 2017 Country: International URL: http://www.icmec.org/wp-content/uploads/2017/09/Online-Grooming-of-Children_FINAL_9-18-17.pdf Shelf Number: 150267 Keywords: Computer CrimesInternet Child Sexual AbuseInternet CrimesInternet SafetyOnline GroomingOnline Sexual Abuse |
Author: Childnet Title: Young people's experiences of online sexual harassment. Project deSHAME Summary: For most young people the internet plays an essential role in their friendships and relationships, providing positive opportunities for communication, connection and self-expression. However, for many young people, online sexual harassment is embedded in their digital lives and to some extent normalised and expected. It emerges as part of the wider dynamic of their peer group and intimate relationships. In this report, online sexual harassment is defined as unwanted sexual conduct on any digital platform and it is recognised as a form of sexual violence. Online sexual harassment encompasses a wide range of behaviours that use digital content (images, videos, posts, messages, pages) on a variety of different platforms (private or public). It can make a person feel threatened, exploited, coerced, humiliated, upset, sexualised or discriminated against. This report specifically focuses on peer-topeer online sexual harassment taking place between young people. Such harassment takes place in a gendered context, with girls being more likely to be targeted than boys - particularly for some forms of online sexual harassment - and these incidents often resulting in more negative outcomes for girls. In this report online sexual harassment has been categorised in four main types. These different behaviours are often experienced simultaneously and can overlap with offline experiences of sexual harassment. Non-consensual sharing of intimate images and videos: A person's sexual images and videos being shared without their consent or taken without their consent. Exploitation, coercion and threats: A person receiving sexual threats, being coerced to participate in sexual behaviour online, or blackmailed with sexual content. Sexualised bullying: A person being targeted by, and systematically excluded from, a group or community with the use of sexual content that humiliates, upsets or discriminates against them. Unwanted sexualisation: A person receiving unwelcome sexual requests, comments and content. The findings of the survey, focus groups and case study analysis demonstrate the prevalence of these forms of online sexual harassment and the short and long term impact on mental health and well-being they can have on young people. The research provides an indication that the experience and impact of online sexual harassment is unique to the individual and dependent on numerous intersecting factors, including actual or perceived gender, gender identity, sexual orientation, race, religion, special educational need or disability. The report also highlights both the similarities and differences in the experiences of young people in Denmark, Hungary and the UK. Details: s.l.: Project deSHAME , 2017. 84p. Source: Internet Resource: accessed May 18, 2018 at: http://www.childnet.com/ufiles/Project_deSHAME_Dec_2017_Report.pdf Year: 2017 Country: Europe URL: http://www.childnet.com/ufiles/Project_deSHAME_Dec_2017_Report.pdf Shelf Number: 150268 Keywords: Computer CrimesInternet CrimesOnline VictimizationSexual ExploitationSexual HarassmentSexual Violence |
Author: Internet Watch Foundation Title: Trends in Online Child Sexual Exploitation: Examining the Distribution of Captures of Live-streamed Child Sexual Abuse Summary: This Paper introduces the key findings of a study of the distribution of captures of live-streamed child sexual abuse which were publicly available online during 3 months in 2017 ("the Study"). The Study was carried out by Internet Watch Foundation (IWF) and funded by Microsoft. Over a three-month period between August and October 2017, images and videos meeting the research criteria were identified using a combination of leads from existing IWF data and techniques employed by IWF analysts to proactively locate child sexual abuse imagery being distributed online. The images and videos were then assessed in accordance with IWF's standard procedures for processing child sexual abuse imagery. Data captured in each instance included image category, site type, commerciality, hosting location, and the assessed age and gender of the individuals depicted. During the Study, 2,082 images and videos were assessed as meeting the research criteria. Key findings were: - 96% depicted children on their own, typically in a home setting such as their own bedroom. - 98% of imagery depicted children assessed as 13 years or younger. - 96% of the imagery featured girls. - 40% of the imagery was Category A or B. - 100% of the imagery had been harvested from the original upload location and was being redistributed on third party websites. - 4% of the imagery was captured from mobile-only streaming apps. - 73% of the imagery appeared on 16 dedicated forums with the purpose of advertising paid downloads of videos of webcam child sexual abuse. Key recommendations are: - Recognition of the need for awareness raising programs aimed at educating children and those in a parental role about the risks of live-streaming services; - Wider implementation of tools to tackle online distribution of child sexual abuse imagery by service providers; - Development of new services including video hashing technology to detect duplicate captures of live streamed child sexual abuse which have been redistributed online; - Recognition of legal loopholes facilitating distribution of child sexual abuse imagery and elaboration of policy proposals that can influence positive change. This paper sets out the limitations on the Study and makes recommendations for further research which can be undertaken to expand upon and clarify the findings. It is hoped that by raising awareness of this issue, a multi-agency approach can be taken to help protect children from the immediate and long-term effects of the distribution of permanent records of their sexual abuse. Details: Cambridge, UK: IWF, 2018. 26p. Source: Internet Resource: Accessed May 30, 2018 at: https://www.iwf.org.uk/sites/default/files/inline-files/Distribution%20of%20Captures%20of%20Live-streamed%20Child%20Sexual%20Abuse%20FINAL.pdf Year: 2018 Country: United Kingdom URL: https://www.iwf.org.uk/sites/default/files/inline-files/Distribution%20of%20Captures%20of%20Live-streamed%20Child%20Sexual%20Abuse%20FINAL.pdf Shelf Number: 150409 Keywords: Child PornographyChild ProstitutionChild Sexual AbuseChild Sexual ExploitationInternet CrimesSexting |
Author: Bentley, Holly Title: How Safe are Our Children? The Most Comprehensive Overview of Child Protection in the UK: 2018 Summary: Technology is central to children's lives. In 2017, just over half of children aged 12 had at least one social media account, despite the minimum age requirements for many sites being 13. By age 13, that figure rises to nearly three-quarters. Today's children don't see the division between 'online' and 'offline' worlds. Social media is now a ubiquitous part of childhood, but alongside wonderful opportunities, it opens up an array of potential harms. For too long, social networks have been allowed to treat child safeguarding as an optional extra. We don't have the same protections in place online as offline, and the result is that children are exposed to unacceptable risks, in the spaces where they socialise, trust, and play. After a decade of inaction, the challenge we face is now immense, but not insurmountable. The scale and complexity of the online threat is growing. Most platforms have failed to integrate child safeguarding into their business models or the design of their platforms. Rapidly developing technology creates new opportunities to initiate, maintain and escalate abuse. As this year's How safe are our children? report makes clear, tackling these risks is now at the frontline in the fight for every childhood. What are the risks to children on social networks? Social media is part of the fabric of children's lives. Every moment, every experience is something to be captured online. Posts on social media aren't just a catalogue of 'real' life, they are an integral part of it. The ubiquity of social media carries many risks, from exposure to inappropriate and sexualised content, to the production and distribution of child abuse imagery, through to the growing scale of technology-facilitated grooming. Platforms provide new opportunities to initiate and facilitate abuse. With so many children using social networks, gaming and messaging sites, it means that today's children and young people are increasingly exposed to the threat of abuse or exploitation, from both adults and their peers Through the ease of access afforded by smartphones, groomers can target significant numbers of children, and quickly escalate and maintain their abuse. Groomers can readily move children into the shadows, moving children from well-known platforms to encrypted and hidden sites. New types of technology, notably livestreaming, provide new opportunities for abusers to control and coerce children into increasingly extreme forms of abuse. Self-generated imagery is a considerable issue, accounting for around a third of recent images removed by the Internet Watch Foundation (IWF). Although children do not perceive a difference between their online and offline worlds, evidence suggests that lowered inhibitions can mean that children comply with requests that they would not offline. Once a self-generated image has been taken, it opens the door for exploitation and blackmail (including to prevent disclosure). The impact of losing control over an image can be devastating, particularly when it is shared among peers' social networks, sent to family members, or shared much more widely.Social networks have consistently failed to address these problems - and it is clear that their unwillingness to do so has actively fuelled the scale and extent of the risks that children now face. Platforms have failed to build in adequate safeguarding protections, take steps to proactively tackle grooming, and to do enough to proactively tackle child sexual abuse imagery at source. Successive governments have also repeatedly failed to intervene, placing disproportionate weight on the claims made by industry. As a result, for over a decade, social networks have repeatedly failed to protect their child users. Details: London: NSPCC, 2018. 88p. Source: Internet Resource: Accessed June 21, 2018 at: https://www.nspcc.org.uk/globalassets/documents/research-reports/how-safe-children-2018-report.pdf?utm_source=Adestra&utm_medium=email&utm_content=How%20safe%20are%20our%20children%3F%20The%20most%20comprehensive%20overview%20of%20child%20protection%20in%20the%20UK.&utm_campaign=nitl-newsletter Year: 2018 Country: United Kingdom URL: https://www.nspcc.org.uk/globalassets/documents/research-reports/how-safe-children-2018-report.pdf?utm_source=Adestra&utm_medium=email&utm_content=How%20safe%20are%20our%20children%3F%20The%20most%20comprehensive%20overview%2 Shelf Number: 150628 Keywords: Child AbuseChild ExploitationChild GroomingChild ProtectionInternet CrimesOnline SafetyOnline VictimizationSocial Media |
Author: Hakmeh, Joyce Title: Cybercrime Legislation in the GCC Countries: Fit for Purpose? Summary: Summary - Most GCC countries have enacted or updated their cybercrime laws as part of their efforts to address the increasing threat of cybercrime. However, most of these focus on limiting freedom of expression and at the same time omit key elements needed to combat cybercrime as this would be understood under most legal frameworks. - GCC cybercrime legal frameworks depart from international practice on cybercrime legislation in both structure and content. - Regarding their structure, cybercrime legal frameworks in the GCC are focused on substantive criminal law that criminalizes offences considered to be cybercrimes. However, in prosecutions and investigations, most GCC countries still apply traditional texts to cybercrime cases that are mostly oblivious to the nature of these cases. This impedes the success of these efforts and therefore the overall impact of fighting cybercrime. - Regarding their content, all GCC countries, except for Bahrain, have introduced as part of their cybercrime laws provisions that criminalize a wide-spectrum of content, using vaguely worded provisions that create the potential for confusion and abuse. - The GCC countries have historically restricted traditional forms of speech, and have latterly sought to do the same with online speech as well. This was arguably accelerated by the events of the Arab uprisings and the 'cultural revolution' that was brought forward by social media. - Through their cybercrime laws, the GCC countries have sought to get a stronger grip on social media, and to stymie the potential for spillover via online platforms of political unrest from other Arab countries. - Several human rights defenders and activists, as well as other social media users, have been prosecuted under these laws, deported or jailed for online comments, for blogging or for posting pictures aimed at social, religious or political ends. Some people have been detained for publishing humorous and satirical online content. - Given their text and scope of application, most cybercrime laws of the GCC countries could put in jeopardy the right to free speech and are at odds with international human rights law, standards and safeguards. Furthermore, their current structure, combined with a lack in other laws that address the specificities of cybercrime, makes them an inadequate tool for fighting cybercrime. - Revision of these cybercrime laws is urgently required, and is essential for better security, for a better society and for better civil liberties. - GCC governments would benefit extensively from joining international forums on cybercrime - such as the Budapest Convention - as this would help them in harmonizing and updating their laws, in enhancing their cybercrime investigative techniques, and in increasing international cooperation between them and with other countries. Details: London: Chatham House, 2018. 26p. Source: Internet Resource: Accessed July 31, 2018 at: https://www.chathamhouse.org/sites/default/files/publications/research/2018-07-04-cybercrime-legislation-gcc-hakmeh.pdf Year: 2018 Country: Europe URL: https://www.chathamhouse.org/sites/default/files/publications/research/2018-07-04-cybercrime-legislation-gcc-hakmeh.pdf Shelf Number: 150986 Keywords: Computer Crimes Cybercrime Cybersecurity Internet Crimes |
Author: Conway, Maura Title: Violent Extremism and Terrorism Online in 2017: The Year in Review Summary: The use of the Internet, particularly social media, by violent extremists and terrorists and their supporters received an increasing amount of attention from policymakers, media, Internet companies, and civil society organisations in 2017. In addition to politicians stepping-up their rhetoric regarding the threat posed by consumption of and networking around violent extremist and terrorist online content, prominent and heavily trafficked social media platforms also took a stronger stand on the issue this year, which caused civil liberties organisations considerable disquiet. This report treats developments in the violent extremist and terrorist online scene(s) and responses to them in the 12-month period from 1 December 2016 to 30 November 2017.2 It is divided into two parts: Part I focuses on the online activities of both the so-called 'Islamic State' (hereafter IS) and the extreme right; Part II details the responses of major social media companies to this activity. Concerns surrounding freedom of expression are addressed throughout. Details: Dublin: VOX-Pol Network of Excellence (NoE), 2018. 23p. Source: Internet Resource: Accessed August 2, 2018 at: http://www.voxpol.eu/download/vox-pol_publication/YiR-2017_Web-Version.pdf Year: 2017 Country: International URL: http://www.voxpol.eu/download/vox-pol_publication/YiR-2017_Web-Version.pdf Shelf Number: 151007 Keywords: Internet CrimesIslamic State Social Media Terrorism Violent Extremism Violent Extremists |
Author: Europol Title: Internet Organised Crime Threat Assessment: 2018 Summary: For the fifth year in a row, Europol has produced the Internet Organised Crime Threat Assessment (IOCTA). The aim of this Assessment is to provide a comprehensive overview of the current, as well as anticipated future threats and trends of crimes conducted and/or facilitated online. While current events demonstrate how cybercrime continues to evolve, this year's IOCTA shows us how law enforcement has to battle both innovative as well as persistent forms of cybercrime. Many areas of the report therefore build upon previous editions, which emphasises the longevity of the many facets of cybercrime. It is also a testimony to an established cybercrime business model, where there is no need to change a successful modus operandi. The report also highlights the many challenges associated with the fight against cybercrime, both from a law enforcement and, where applicable, a private sector perspective. Details: The Hague: European Union Agency for Law Enforcement Cooperation, 2018. 72p. Source: Internet Resource: Accessed September 25, 2018 at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2018 Year: 2018 Country: Europe URL: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2018 Shelf Number: 151662 Keywords: Computer CrimesCybercrimeInternet CrimesOrganized Crime |
Author: Kruisbergen, Edwin W. Title: De digitalisering van georgansieerde criminaliteit Summary: Justitiele verkenningen (Judicial explorations) is published six times a year by the Research and Documentation Centre of the Dutch Ministry of Security and Justice in cooperation with Boom juridisch. Each issue focuses on a central theme related to judicial policy. The section Summaries contains abstracts of the internationally most relevant articles of each issue. The central theme of this issue (no. 5, 2018) is The digitalization of organized crime. The effect of the internet on the structure of organized cybercrime. Findings from an international empirical study Geralda Odinot, Christianne de Poot and Maite Verhoeven Worldwide, the digitalization of society is proceeding rapidly and this brings new forms of crime. The threats arising from different types of cybercrime are real and constantly evolving, as the internet with its anonymity and borderless reach, provides new opportunities for criminal activities. This article describes some results from an international empirical study aimed to gather more insight on the link between cybercrime and organized crime as well as on the question whether cybercrime is organized. It shows how cybercriminals cooperate with each other and what this organization structure looks like. Criminal money flows and IT. On innovative modi operandi, old certainties, and new bottlenecks Edwin Kruisbergen, Rutger Leukfeldt, Edward Kleemans and Robby Roks In this article we analyze how organized crime offenders use IT to handle their money flows. How and to what extent do offenders use IT-facilitated possibilities, such as bitcoin, to launder their money? The empirical data consist of thirty large-scale police investigations. These thirty cases are part of the Organized Crime Monitor, an ongoing research project into the nature of organized crime in the Netherlands. One of the most striking findings is the fact that cash is still king - even for online drug dealers who get paid in digital currencies. Summaries 119 Organized child pornography networks on the Dark Web Madeleine van der Bruggen The emergence of Dark Web child pornography forums and their availability to large offender communities has enabled a professional form of child pornography distribution as well as an increased exchange of criminal and social capital. Offenders have access to a new platform in which strong ties and long-lasting relationships with co-offenders are formed. Moreover they could be classified as organized crime, because child pornography Dark Web forums are characterized by a hierarchical order, a clear role division and illegal power structures that regulate the illegal activities. The implications from a law enforcement as well as from scientific perspective are discussed. The non-human (f)actor in cybercrime. Cybercriminal networks seen from a cyborg crime perspective Wytske van der Wagen and Frank Bernaards Botnets, banking malware and other high-tech crimes are increasingly analyzed by criminological scholars. Their distributed and automated nature poses however various theoretical challenges. This article presents an alternative approach, denoted as the 'cyborg crime' perspective, which adopts a more hybrid view of networks and also assigns an active role to technology. The value of this approach is demonstrated by reflecting on findings from earlier empirical work that analyzes conversations between cybercriminals involved in botnets and related activities. The research shows that technological nodes can take an important position in the organizational structure of cybercriminal networks and do not merely have a functional role. Viewing technology as an actor within a criminal network might offer new criminological insights in both the composition of these networks and how to disrupt them. Out of the shadow. Opportunities for researchers in studying dark markets Thijmen Verburgh, Eefje Smits and Rolf van Wegberg In this article the authors present the lessons learned from previous research efforts into dark markets. First the important features of dark markets are discussed, i.e. anonymity and trust, as well as the question how data on dark markets can be collected. Next, the authors illustrate 120 Justitiele verkenningen, jrg. 44, nr. 5, 2018 how this data can be used to study the phenomenon of dark markets itself as well as the impact of police interventions on dark markets. Befriending a criminal suspect on Facebook. Undercover powers on the Internet Jan-Jaap Oerlemans This article investigates which online undercover investigative methods are applied in practice and how they fit in the Dutch legal framework. In particular, the three special investigative powers of a pseudo purchase, systematic information gathering and infiltration are examined. Investigative powers cannot be applied unilaterally (across state borders). When law enforcement officials cannot reasonably determine the location of the suspect, the online unilateral application of undercover investigative powers is allowed. However, there is still a risk that diplomatic tensions arise with the involved state. States should agree in treaties under which circumstances cross-border online undercover operations are allowed. New investigative powers and the right to privacy. An analysis of the Dutch Cybercrime III Act Bart Custers In 2018 the Dutch parliament accepted new cybercrime legislation (the Cybercrime III Act) that creates several new online criminal offences and gives law enforcement agencies new investigative powers on the Internet. This article describes the background of Dutch cybercrime legislation and the contents of the Cybercrime III Act. The newly introduced cybercrimes are discussed as well as the new investigative competences. Particularly the legitimacy and the necessity of the investigative power of the police to hack computer systems of suspects may significantly interfere with the right to privacy. Details: The Hague: Netherlands Ministry of Justice, 2018. 120p. Source: Internet Resource: Accessed January 24, 2019 at: https://www.researchgate.net/publication/325966795_Georganiseerde_criminaliteit_en_ICT_-_Rapportage_in_het_kader_van_de_vijfde_ronde_van_de_Monitor_Georganiseerde_Criminaliteit/related Year: 2018 Country: Netherlands URL: https://www.researchgate.net/publication/325966795_Georganiseerde_criminaliteit_en_ICT_-_Rapportage_in_het_kader_van_de_vijfde_ronde_van_de_Monitor_Georganiseerde_Criminaliteit/related Shelf Number: 154396 Keywords: Child PornographyCybercrimeDark NetworksInternet CrimesOrganized CrimeUndercover Investigations |
Author: Conway, Maura Title: Violent Extremism and Terrorism Online in 2018: The Year in Review Summary: This report treats developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 December 2017 to 30 November 2018.1 It is divided into three parts: Part I focuses on the online activities of violent jihadis, particularly the so-called 'Islamic State' (hereafter IS); Part II supplies information on contemporary extreme right online activity; and Part III identifies issues in the violent extremism and terrorism online realm that bear watching in 2019. In terms of overarching trends, the focus of policymakers, internet companies, media, and thus also publics has, since 2014, been almost exclusively on IS's online activity. A growing concern with extreme right activity, both its online and offline variants, began to be apparent in 2017 however, especially in the wake of events in Charlottesville. This solidified in 2018 due to a number of factors, including a decrease in IS terrorist attacks in the West and an uptick in extreme right and hate attacks and terrorist events, a number of the latter of which appeared to have significant online components. Having said this, IS is still active on the ground in numerous locales globally and continues to produce and widely disseminate online content, as do a large number of other groups that share core tenets of its ideology. IS may be down therefore, but it is certainly not out. Details: Dublin: VOX-Pol Network of Excellence (NoE), 2019. 25p. Source: Internet Resource: Accessed February 22, 2019 at: https://www.voxpol.eu/download/vox-pol_publication/Year-in-Review-2018.pdf Year: 2019 Country: International URL: https://www.voxpol.eu/download/vox-pol_publication/Year-in-Review-2018.pdf Shelf Number: 154690 Keywords: Internet CrimesIslamic State Jihadism Social Media Terrorism Violent Extremism Violent Extremists |
Author: Maxim, Donald Title: Online Child Exploitation Material - Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children's eSafety Commissioner Summary: This report by the ANU Cybercrime Observatory provides an overview of three important areas for Child Exploitation Material (CEM): - The relationship between online and offline offending; - Horizon scanning - identifying emerging areas of CEM development; and - Current regulatory, educational and collaborative approaches to combatting CEM Each section provides an overview of the issue and further analysis of other key areas identified during the research phase. At the conclusion of each section, a brief annotated bibliography is available to provide insight into which sources may be useful for further investigation. Information for this report was derived from many and varied sources including but not limited to government agencies (national and international), non-governmental organisations, academic articles, law enforcement agencies, blogs, tech websites, product sites, online news articles and surveys. While investigating each area, the research team worked within the scope of online CEM and aimed to provide a substantial overview for each section by addressing some of the key points or emerging trends. However during the research phase several areas that were not initially considered for the report were later identified as key areas of development for online CEM (e.g. Virtual Reality and Applications). Accordingly these topics were also included in the report. The relationship between online and offline sexual offending is highly controversial and complex. It is clear that research is lacking in this area and current research presents insufficient evidence for establishing a causal relationship between online and offline offending. Apart from addressing some of the methodological limitations of research in this area, this section of the report also addresses how the internet or technological advances (e.g. Virtual Reality) may assist in the desistance of offending or exacerbate motivations to commit real life offenses. The second section presents several emerging issues in online CEM and aims to provide a brief but comprehensive insight into how these areas are developing. The various topics include live streaming, applications, online gaming, user-generated content, Darknet, hacking, phishing, emerging technology and Virtual Reality (VR). Some of these concepts are quite traditional (e.g. user-generated content) however it is the development of 'cyber' and 'technology', which frames them as emerging issues. Other topics (e.g. live streaming or VR) present new, unique challenges to combatting online CEM. Some topics include snapshots of current cases such as the Pokemon Go trend, the Australian schools online pornography website, and interactive VR brothels and their implications for CEM. The final section discusses trends and effectiveness of current regulatory, educational, and collaborative approaches to CEM. Regulatory methods include ISP and social media regulation, parental control tools, and the potential for app regulation is also briefly mentioned. Key educational approaches include online safety guides and training courses. Collaborative prevention measures include hotlines, the National Centre for Missing and Exploited Children (NCMEC), Child Rescue Coalition, and the Virtual Global Taskforce (VGT). While these CEM prevention methods have made notable differences in detection and removal of CEM the effectiveness of education of the public, generation of reports, self-reporting, and tracking of child predators remains empirically untested. Technology is continually evolving and it is difficult to predict or evaluate emerging issues. The research team found it challenging to identify substantial information that can be verified by current research. This was particularly the case when analysing cutting edge or new technology as well as evaluating the effectiveness of current prevention approaches. This report aims to provide a reference point for further analysis and research on the topics addressed. Challenges associated with the cyber sphere and the 'Internet of Everything' do not remain static. The degree of facilitation (e.g. Virtual Private Networks, digital currency) and convergence associated with online CEM are continuously evolving in step with changes in technology. The rapid rate of change is the key challenge for the development of effective prevention strategies. This was demonstrated while our research was underway. Innovation, usually an adaptation of existing software or technology that was not initially present was later identified as a key developing area in online CEM (e.g. Virtual Reality and software applications). The Pokemon Go craze, which quickly attracted malware and grooming is a good example of the misuse of a popular apps. The velocity and variety of new and emerging risks with potential impact on online CEM will require, as a priority, the means to monitor these developments. The increase and rapid distribution of user-generated content is especially concerning. One aspect, consensually shared or 'stolen' sexualized images has given rise to 'sextortion', which can be propagated with the development of 'apps' that can inadvertently enhance and facilitate online CEM. Equally concerning are the implications of Virtual Reality (VR). VR in combination with teledildonics (or 'cyberdildonics' products designed to realise remote sex) enables potential offenders to live out any of their sexual fantasies. The VR trend may motivate offenders to seek on-line or off-line victims. The effects of VR on the conduct of pedophiles remain unclear. We don't know whether VR will placate desires or erode social inhibitions. However, VR is likely to encourage some criminals to enhance their experience by incorporating live streaming of child sex abuse with the tactile experiences promised by such technologies. The prevention of online CEM depends entirely on knowing present and emerging risks. Effective counter-measures include deep web surveillance of CEM innovators, and the development of early warning systems, for example, SNS 'swarm' warning flags. Details: Canberra: Australian National University, Cybercrime Observatory, 2016. 105p. Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644 Year: 2016 Country: International URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644 Shelf Number: 154957 Keywords: Child GroomingChild PornographyChild Sexual AbuseChild Sexual ExploitationCybercrimeInternet CrimesOnline VictimizationPornographySex OffendingSextortion |
Author: International Centre for Missing & Exploited Children Title: Child Pornography: Model Legislation & Global Review. 9th ed. Summary: As global accessibility to technology platforms and the Internet has increased, so too has children's online presence. According to UNICEF, one in three Internet users worldwide is a child. And while the digital world offers countless benefits and opportunities, it also vastly multiplies the risks to children. As ICMEC enters its 20th year, we still believe that protecting children is a global imperative. We recognize the continued need for ever stronger laws, policies, and mechanisms; increased coordination across sectors; and the value of sharing ideas, perspectives, and best practices to positively influence child protection responses. We also celebrate the progress of recent years as organizations and institutions around the world have come together in collaborative initiatives such as the WePROTECT Global Alliance, utilizing tools like the Model National Response and the World Health Organization's INSPIRE Strategies to fulfill the UN Sustainable Development Goals and enhance support for children on all fronts. We are particularly excited that adoption of our Model Legislation has been included as a key recommendation of the recent Child Dignity Alliance Technology Working Group Report. Twelve years ago, in an effort to better understand the global legislative landscape as it related to child sexual abuse material (then referred to as "child pornography"), ICMEC launched an initiative that some have called our "Rule of Law" project. We developed model legislation, after careful consideration and consultation, to increase global understanding and concern, and enable governments around the world to adopt and enact appropriate legislation necessary to combat this crime and better protect children. Since we first published the Model Legislation report in 2006, 150 countries have refined or implemented new legislation combating child sexual abuse material. We have seen tremendous progress during the 9th Edition review period, nearly the most we have seen to date. This does not, however, mean that there is nothing left to do - rather, this is the time to be diligent, to persist and push forward to help bring the remaining countries into the fold. As always, it is important to note that the legislative review accompanying our model legislation is not a scorecard or a scold, but an effort to assess the current state and awareness of the problem. Realizing the importance of taking into consideration varying cultural, religious, socio-economic, and political norms, our model legislation continues to resemble a menu of concepts that can be applied universally, as opposed to actual statutory language. With this latest edition, we continue our efforts to improve the legislative landscape and strengthen child protection efforts by introducing new and updated sections in the model law, incorporating additional international and regional legal instruments, and featuring new initiatives related to implementation. Details: Alexandria, VA: The Centre, 2018. 68p. Source: Internet Resource: Accessed march 18, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/CSAM-Model-Law-9th-Ed-FINAL-12-3-18.pdf Year: 2018 Country: International URL: https://www.icmec.org/wp-content/uploads/2018/12/CSAM-Model-Law-9th-Ed-FINAL-12-3-18.pdf Shelf Number: 155029 Keywords: Child PornographyChild Sexual ExploitationChildren, Crimes AgainstInternet CrimesOnline GroomingOrganized CrimeSex CrimesSex Offenders |
Author: Hurel, Louise Marie Title: A Strategy for Cybersecurity Governance in Brazil Summary: This study explores the institutionalization of the cybersecurity agenda in Brazil and seeks to identify opportunities for multi-stakeholder cooperation. It analyzes the key moments and processes that marked the development of the country's current cybersecurity architecture, highlighting the tensions which arose with the introduction of the agenda as a national security priority. The description of the cybersecurity governance ecosystem in Brazil opens up new avenues for the identification of solid opportunities for cooperation between different sectors inherently involved in the construction of this agenda - as much in the technical field (cryptography and incident response) as in the elaboration of legislation, policies, and awareness campaigns. Details: Rio de Janeiro: IGARAPE INSTITUTE, 2018. 37p. Source: Internet Resource: Strategic Note 30: accessed July 16, 2019 at: https://igarape.org.br/wp-content/uploads/2019/01/A-Strategy-for-Cybersecurity-Governance-in-Brazil.pdf Year: 2018 Country: Brazil URL: https://igarape.org.br/wp-content/uploads/2019/01/A-Strategy-for-Cybersecurity-Governance-in-Brazil.pdf Shelf Number: 156902 Keywords: Computer Crime Cybercrime Cybersecurity Internet Crimes |