Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 19, 2024 Fri

Time: 12:20 pm

Results for cybercrimes

39 results found

Author: U.S. Department of Homeland Security. Office of Inspector General

Title: DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems

Summary: Cyber threats pose a significant risk to economic and national security. In response to these threats, the President, legislators, experts, and others have characterized cybersecurity, or measures taken to protect a computer or computer system against unauthorized access or attack, as a pressing national security issue. The National Cyber Security Division (NCSD) was established to serve as the national focal point for addressing cybersecurity issues in the public and private sectors. The United States Computer Emergency Readiness Team (US-CERT), created under NCSD, is responsible for compiling and analyzing information about cybersecurity incidents and providing timely technical assistance to operators of agency information systems regarding security incidents. The team provides response support and defense against cyber attacks for the federal civil executive branch; disseminates reasoned and actionable cybersecurity information to the public; and facilitates information sharing with state and local government, industry, and international partners. This audit focused on the security of the systems that US-CERT uses to accomplish its cybersecurity mission. Overall, NCSD has implemented adequate physical security and logical access controls over the cybersecurity program systems used to collect, process, and disseminate cyber threat and warning information to the public and private sectors. However, a significant effort is needed to address existing security issues in order to implement a robust program that will enhance the cybersecurity posture of the federal government. To ensure the confidentiality, integrity, and availability of its cybersecurity information, NCSD needs to focus on deploying timely system security patches to mitigate risks to its cybersecurity program systems, finalizing system security documentation, and ensuring adherence to departmental security policies and procedures. The report makes 10 recommendations to the Director, NCSD. NCSD has already begun to take the actions to implement them. National Protection and Programs Directorate (NPPD)’s response is summarized and evaluated in the body of this report and included, in its entirety, as Appendix B.

Details: Washington, DC: U.S. Department of Homeland Security, 2010. 30p.

Source: Internet Resource: Accessed September 14, 2010 at: http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf

Year: 2010

Country: United States

URL: http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf

Shelf Number: 119796

Keywords:
Computer Crimes
Cybercrimes
Cybersecurity
Homeland Security

Author: Warren, Ian

Title: Crime Risks of Three-Dimensional Virtual Environments

Summary: Three-dimensional virtual environments (3dves) are the new generation of digital multi-user social networking platforms. Their immersive character allows users to create a digital humanised representation or avatar, enabling a degree of virtual interaction not possible through conventional text-based internet technologies. As recent international experience demonstrates, in addition to the conventional range of cybercrimes (including economic fraud, the dissemination of child pornography and copyright violations), the 'virtual-reality' promoted by 3dves is the source of great speculation and concern over a range of specific and emerging forms of crime and harm to users. This paper provides some examples of the types of harm currently emerging in 3dves and suggests internal regulation by user groups, terms of service, or end-user licensing agreements, possibly linked to real-world criminological principles. This paper also provides some directions for future research aimed at understanding the role of Australian criminal law and the justice system more broadly in this emerging field.

Details: Canberra: Australian Institute of Criminology, 2010. 6p.

Source: Internet Resource: Trends and Issues in Crime and Criminal Justice, No. 388: Accessed November 3, 2010 at: http://www.aic.gov.au/documents/D/5/2/%7BD5233F02-F880-4EF1-BDC6-29B436DB1B19%7Dtandi388.pdf

Year: 2010

Country: International

URL: http://www.aic.gov.au/documents/D/5/2/%7BD5233F02-F880-4EF1-BDC6-29B436DB1B19%7Dtandi388.pdf

Shelf Number: 120174

Keywords:
Computer Crimes
Cybercrimes
Internet

Author: Schreier, Fred

Title: Cyber Security: The Road Ahead

Summary: The open Internet has been a boon for humanity. It has not only allowed scientists, companies and entities of all sorts to become more effective and efficient. It has also enabled an unprecedented exchange of ideas, information, and culture amongst previously unconnected individuals and groups. It has completely revolutionized on a global scale how we do business, interact and communicate. Cyberspace is defined by its ubiquitous connectivity. However, that same connectivity opens cyberspace to the greatest risks. As networks increase in size, reach, and function, their growth equally empowers law-abiding citizens and hostile actors. An adversary need only attack the weakest link in a network to gain a foothold and an advantage against the whole. Seemingly localized disruptions can cascade and magnify rapidly, threaten other entities and create systemic risk. However, vulnerabilities in cyberspace are real, significant and growing rapidly. Critical national infrastructure; intelligence; communications, command and control; commerce and financial transactions; logistics; consequence management; and emergency preparedness are wholly dependent on networked IT systems. Cyber security breaches, data and intellectual property theft know no limits. They affect everything from personal information to national secrets. This paper looks at the way these problems are likely to develop, as well as at some of the ways they may best be tackled at the national and international level.

Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2011. 53p.

Source: Internet Resource: DCAF Horizon 2015 Working Paper No. 4: Accessed February 14, 2011 at: http://www.dcaf.ch/Publications/Publication-Detail?lng=en&id=126370

Year: 2011

Country: International

URL: http://www.dcaf.ch/Publications/Publication-Detail?lng=en&id=126370

Shelf Number: 120755

Keywords:
Cyber Security
Cybercrimes
Internet Crimes
Internet Security

Author: U.S. Government Accountability Office

Title: Combating Child Pornography: Steps Are Needed to Ensure That Tips to Law Enforcement Are Useful and Forensic Examinations Are Cost Effective

Summary: The Department of Justice (DOJ) reports that online child pornography crime has increased. DOJ funds the National Center for Missing and Exploited Children (NCMEC), which maintains the CyberTipline to receive child pornography tips. The Providing Resources, Officers, and Technology To Eradicate Cyber Threats to Our Children Act of 2008 (the Act) contains provisions to facilitate these investigations and create a national strategy to prevent, among other things, child pornography. The Act directed GAO to report on actions to minimize duplication and enhance federal expenditures to address this crime. This report examines (1) the extent to which NCMEC determines the usefulness of tips; (2) mechanisms to help law enforcement coordination (i.e., deconfliction); and (3) the extent to which agencies are addressing factors that federal law enforcement reports may inhibit investigations. GAO analyzed the Act and spoke to law enforcement officials who investigate these crimes, selected to reflect geographic range, among other things. Although these interviews cannot be generalized, they provided insight into investigations. NCMEC takes steps to obtain feedback from law enforcement on the usefulness of CyberTipline reports; however, it does not systematically collect information on how useful individual reports are for initiating and advancing investigations or about information gaps that limit reports' usefulness. For instance, NCMEC solicits feedback via e-mail or in person quarterly from federal law enforcement liaisons at NCMEC about the overall usefulness of CyberTipline reports. However, according to many law enforcement officials GAO contacted, information in a CyberTipline report may not contain an image of apparent child pornography or may contain old data. NCMEC officials said that they are interested in obtaining additional feedback to enhance the usefulness of its reports and could explore additional methods to gather such information, such as creating a systematic process for obtaining feedback from federal law enforcement. Enhancing its processes for collecting feedback on the usefulness of CyberTipline reports could help NCMEC ensure that reports are as useful as possible to law enforcement. Existing deconfliction mechanisms generally prevent pursuit of the same suspects but are fragmented; DOJ is in the early stages of developing a system to address this fragmentation. Many law enforcement officials GAO contacted reported using various nonautomated (e.g., task forces) and automated (e.g., investigative systems) mechanisms to avoid duplication of effort in investigations. But these officials reported that there is not a single automated system that provides comprehensive case information and deconfliction, which can contribute to difficulties coordinating investigations. As mandated in the Act, DOJ is developing a national system to, among other things, provide law enforcement with a single deconfliction tool. Specifically, DOJ is conducting a needs assessment--which it plans to complete in 12 to 24 months--to use as a basis for system development. However, because DOJ is waiting on the results of the needs assessment to begin system development, it may be several years before the system is operational. Backlogs in the forensic analysis of digital evidence can delay or hinder online child pornography investigations; assessing the costs and benefits of taking extra steps to ensure the integrity of forensic analysis could help determine if there are efficiencies that could reduce backlogs. Forensic analysis of digital evidence consists of the review of information from digital media, such as hard drives, and can prove online child pornography crime. Several factors may contribute to backlogs in forensic analysis, including the steps federal law enforcement agencies believe enhance the integrity of analysis, such as making exact copies of digital evidence to discourage tampering. The FBI takes additional steps it believes enhance integrity, such as separating the forensic examination from the investigation. However, some federal officials and prosecutors GAO spoke with differed on the need for such steps. According to DOJ, the national strategy's working group is in a good position to address backlog issues and having this group assess the costs and benefits of steps taken to ensure the integrity of forensic analysis could help it determine potential efficiencies that could reduce backlogs. GAO recommends that NCMEC enhance its processes to collect feedback to improve tips and that DOJ assess the costs and benefits of steps agencies take to ensure the integrity of forensic analysis. NCMEC and DOJ generally concurred with our recommendations and discussed actions to address them.

Details: Washington, DC: U.S.Government Accountability Office, 2011. 77p.

Source: Internet Resource: GAO-11-334: Accessed April 2, 2011 at: http://www.gao.gov/new.items/d11334.pdf

Year: 2011

Country: United States

URL: http://www.gao.gov/new.items/d11334.pdf

Shelf Number: 121221

Keywords:
Child Abuse
Child Pornography
Child Protection
Computer Crimes
Criminal Investigations
Cybercrimes
Internet
Sex Offenses

Author: Organisation for Economic Co-Operation and Development (OECD)

Title: The Protection of Children Online: Risks Faced by Children Online and Policies to Protect Them

Summary: An increasing number of children are now using the Internet. They are starting at a younger age, using a variety of devices and spending more time online. The Internet can be a major channel for their education, creativity and self-expression. However, it also carries a spectrum of risks to which children are more vulnerable than adults. Addressing risks faced by children online is becoming a policy priority for an increasing number of governments. This means facing many complex policy challenges: How to mitigate risks without reducing the opportunities and benefits for children online? How to prevent risks while preserving fundamental values for all Internet users, including the children themselves? How to ensure that policies are proportionate to the problem and do not unsettle the framework conditions that have enabled the Internet economy to flourish? Governments are not alone in their efforts to protect children online. Parents, caregivers, educators, business and civil society can also help children to benefit from the Internet. They too have a responsibility to protect them against risks online. Although some of these issues emerged in the early days of the World Wide Web, they have recently gained policy attention. At the Seoul Ministerial Meeting on the Future of the Internet Economy in June 2008, Ministers called for a collaborative effort by governments, the private sector, civil society and the Internet technical community to build a common understanding of the impact of the Internet on minors and to enhance their protection and support when using the Internet. They also called for increased cross-border co-operation by governments and enforcement authorities with respect to the protection of minors. This report focuses on online risks for children and policies to protect them as Internet users. It examines direct and indirect policy measures available to OECD member and non-member countries to help mitigate risks for children online in order to: • Present and compare existing and planned policy approaches for the protection of children online; • Explore how international co-operation can enhance the protection of minors on the Internet. Three broad categories of online risks for children are considered in this report: i) content and contact risks, including exposure to pornography, cybergrooming and cyberbullying; ii) consumer risks related, for example, to online marketing and fraudulent transactions; and iii) privacy and security risks, including the use of social networks without sufficient understanding of potential long-term consequences. Statistical data about children’s use of the Internet and the prevalence of risks are limited. The data are often fragmented and non-representative and offer few possibilities for comparing studies and countries. In particular, definitions of risks often differ, and survey methodologies vary significantly, making it difficult to compare risk prevalence rates. While the same spectrum of risks is present in all countries, the available data suggest that prevalence rates vary. Moreover, because children’s activities, skills and resilience differ, their interactions with the online environment and the consequences differ as well. While children’s capabilities are likely to increase with age, so can their own risky behavior. Online risks faced by children are many and evolving. Addressing them requires a blend of approaches that include legislative, self- and co-regulatory, technical, awareness and educational measures, as well as positive content provision and child safety zones. In practice, each country operates its own policy mix of characteristics and priorities, which reflects its perception of priorities as well as its culture and style of government. Moreover, policy measures that address different risks and initiatives from various stakeholders at different levels co-exist. This creates policy complexity at national level and policy heterogeneity across countries. Government policies to protect children online are in their infancy. To enhance their efficiency and catch up with the rapid adoption of the Internet by children, governments face three main challenges: • Managing policy complexity through enhanced policy co-ordination, consistency and coherence; • Adopting an evidence-based policy-making approach; • Taking advantage of international co-operation to improve the efficiency of national policy frameworks and foster capacity-building. For policy to protect children online to operate effectively as the sum of its parts, governments should enhance the coherence of their policy measures and tools in collaboration with all stakeholders. Public-private partnerships, for instance, have been a successful way to encourage self- and co-regulation. Policies to protect children online would benefit from efforts to ensure consistency with other important policy objectives, such as the preservation of fundamental rights and maintenance of the framework conditions which have enabled the Internet to become a global open platform for innovation, economic growth and social progress. With some notable exceptions, the impact of national policy frameworks and individual policy measures for the protection of children online is not regularly assessed and performance evaluations are only exceptionally built into policy. A systematic approach to evidence-based policy making is essential to determine policy priorities and maximise the protection afforded by national policy. The policy-making process would benefit from official statistics on children’s use of the Internet and the prevalence of risk. This would require a more consistent approach to definitions, methodologies and indicators. Impact assessments would help address conflicting policy objectives and place greater emphasis on the quantification of benefits and costs. International and regional co-operation is another area for improvement. While international and regional intergovernmental organisations (including, in addition to the OECD, the Asia-Pacific Economic Co-operation, the Council of Europe, the International Telecommunication Union, the Internet Governance Forum and the European Commission) are already involved, co-ordinated international work by governments and other stakeholders to protect children online would also support efforts by governments at national level. Successful international co-operation relies on the involvement of all relevant international stakeholders. The report provides examples of international co-operation at the policy and operational levels. These include international strategic partnerships, capacity building and joint events (e.g. Safer Internet Day) as well as the sharing of successful educational and awareness raising campaigns. However, the organisation of a regular joint international event on child protection online, with the participation of national and international players, would be an effective way to co-ordinate efforts and take advantage of potential synergies. It would offer a way to share best practices among governments, business and civil society, including the research community, with a view to making the lessons learned from field experience available to policy makers. It would also help bridge communities such as policy makers and practitioners in the area of Internet policy, education, development and capacity building, law enforcement, and statistics. Another avenue for international co-operation is the development of more comparable statistics to enable comparisons across countries and to help governments better assess the efficiency of their frameworks. OECD model surveys could, for example, include a module on children’s access to and use of the Internet and on risk prevalence. Significant work would be needed to harmonise age ranges and define risks to determine data collection methodologies (e.g. survey of parents and educators versus survey of children).

Details: Paris: OECD Publishing, 2011. 105p.

Source: Internet Resource: OECD Economy Papers, No. 179: Accessed July 5, 2011 at: http://www.oecd-ilibrary.org/docserver/download/fulltext/5kgcjf71pl28.pdf?expires=1309871644&id=id&accname=guest&checksum=2F467BD4A26D25F5DA1D104555EDFDC4

Year: 2011

Country: International

URL: http://www.oecd-ilibrary.org/docserver/download/fulltext/5kgcjf71pl28.pdf?expires=1309871644&id=id&accname=guest&checksum=2F467BD4A26D25F5DA1D104555EDFDC4

Shelf Number: 121968

Keywords:
Computer Crimes
Cyberbullying
Cybercrimes
Internet Crimes
Online Victimization (Children)
Pornography

Author: U.S. White House

Title: National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy

Summary: A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses “Our digital infrastructure, therefore, is a strategic national asset, and protecting it — while safeguarding privacy and civil liberties is a national security priority” and an economic necessity. By addressing threats in this environment, we will help individuals protect themselves in cyberspace and enable both the private sector and government to offer more services online As a Nation, we are addressing many of the technical and policy shortcomings that have led to insecurity in cyberspace Among these shortcomings is the online authentication of people and devices: the President’s Cyberspace Policy Review established trusted identities as a cornerstone of improved cybersecurity. In the current online environment, individuals are asked to maintain dozens of different usernames and passwords, one for each website with which they interact The complexity of this approach is a burden to individuals, and it encourages behavior — like the reuse of passwords — that makes online fraud and identity theft easier At the same time, online businesses are faced with ever-increasing costs for managing customer accounts, the consequences of online fraud, and the loss of business that results from individuals’ unwillingness to create yet another account Moreover, both businesses and governments are unable to offer many services online, because they cannot effectively identify the individuals with whom they interact Spoofed websites, stolen passwords, and compromised accounts are all symptoms of inadequate authentication mechanisms Just as there is a need for methods to reliably authenticate individuals, there are many Internet transactions for which identification and authentication is not needed, or the information needed is limited. It is vital to maintain the capacity for anonymity and pseudonymity in Internet transactions in order to enhance individuals’ privacy and otherwise support civil liberties Nonetheless, individuals and businesses need to be able to check each other’s identity for certain types of sensitive transactions, such as online banking or accessing electronic health records The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy) charts a course for the public and private sectors to collaborate to raise the level of trust associated with the identities of individuals, organizations, networks, services, and devices involved in online transactions.

Details: Washington, DC: The White House, 2011. 52p.

Source: Internet Resource: Accessed September 3, 2011 at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf

Year: 2011

Country: United States

URL: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf

Shelf Number: 121391

Keywords:
Cybercrimes
Identity Theft (U.S.)
Internet Crimes
Online Fraud

Author: Ponemon Institute

Title: Second Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies

Summary: Sponsored by ArcSight, an HP company, this report presents the findings of the Second Annual Cost of Cyber Crime Study. This year’s study is based on a representative sample of 50 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For consistency purposes, our benchmark sample consists of only larger-sized organizations (i.e., more than 700 enterprise seats). Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions. Key takeaways from this report include:  Cyber crimes can do serious harm to an organization’s bottom line. We found that the median annualized cost of cyber crime for 50 organizations in our study is $5.9 million per year, with a range of $1.5 million to $36.5 million each year per company. This represents an increase in median cost of 56 percent from our first cyber cost study published last year.  Cyber attacks have become common occurrences. The companies in our study experienced 72 successful attacks per week and more than one successful attack per company per week. This represents an increase of 44 percent from last year’s successful attack experience.  The most costly cyber crimes are those caused by malicious code, denial of service, stolen devices and web-based attacks. Mitigation of such attacks requires enabling technologies such as SIEM and enterprise governance, risk management and compliance (GRC) solutions. Similar to last year, the purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Recent well-publicized cyber attacks – for instance, Wikileaks, Epsilion, Sony, Citibank, Boeing, Google, and RSA – have affected private and public sector organizations. As described above, our goal is to be able to quantify with as much accuracy as possible the costs incurred by organizations when they have a cyber attack. In our experience, a traditional survey approach would not capture the necessary details required to extrapolate cyber crime costs. Therefore, we decided to pursue field-based research that involved interviewing senior-level personnel and collecting details about actual cyber crime incidents. Approximately nine months of effort was required to recruit companies, build an activity-based cost model, collect source information and analyze results. This research culminated with the completion of case studies involving 50 organizations. The focus of our project was the direct, indirect and opportunity costs that resulted from the loss or theft of information, disruption to business operations, revenue loss and destruction of property, plant and equipment. In addition to external consequences of the cyber crime, the analysis attempted to capture the total cost spent on detection, investigation, containment, recovery and after-the-fact or “ex-post” response.

Details: Traverse City, MI: Ponemon Institute, 2011. 30p.

Source: Internet Resource: Accessed September 20, 2011 at: http://www.arcsight.com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August.pdf

Year: 2011

Country: United States

URL: http://www.arcsight.com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August.pdf

Shelf Number: 122797

Keywords:
Crimes Against Businesses
Cybercrimes
Cybersecurity
Internet Crimes

Author: Rush, Howard

Title: Crime Online: Cybercrime and Illegal Innovation

Summary: With the growing sophistication and use of information technology, the past decade has seen a major growth in cybercrime. Broadly described, cybercrime refers to all types of crime that exploit modern telecommunications networks, in which computers or computer networks are used for criminal activity. This report focuses exclusively on financial cybercrime, specifically credit card fraud and identity theft. Financial cybercrime has increased dramatically in recent years and looks set to increase further as the proliferation of communications technology proceeds apace and reaches regions of the world with many underemployed poor people with information technology skills who can take advantage of cybercrime opportunities. The current global recession will likely increase this trend still further.

Details: Brighton, UK: CENTRIM, University of Brighton, 2009. 97p.

Source: Internet Resource: Accessed October 22, 2011 at: http://eprints.brighton.ac.uk/5800/

Year: 2009

Country: United Kingdom

URL: http://eprints.brighton.ac.uk/5800/

Shelf Number: 123116

Keywords:
Computer Crimes
Credit Card Fraud
Cybercrimes
Financial Crimes
Identity Theft
Online Victimization

Author: Mishna, Faye

Title: Interventions for Children, Youth, and Parents to Prevent and Reduce Cyber Abuse

Summary: Child participation in Internet safety interventions does not change risky online behaviour, according to a new Campbell review. The Internet has created a new communication tool, particularly for young people. Worldwide, the use of e-mail, websites, instant messaging, web cams, chat rooms, social networking sites and text messaging is exploding. While there are many benefits that result from electronic based communication, the Internet is at the same time a potential site for abuse and victimization. Young people can fall victim to sexual perpetrators, stalkers, exploiters, and peers who bully online. Interventions against cyber abuse have been developed in response to the growing need to protect children and youth from online dangers. The authors of a new Campbell review examined the effectiveness of cyber abuse interventions in increasing Internet safety knowledge and decreasing risky online behaviour. Having identified more than 3,000 potentially relevant studies, only three met the authors' eligibility criteria and were included in the review: an evaluation of the I-SAFE cyber safety program, an evaluation of the Missing cyber safety program, and an evaluation of an in-school cyber bullying intervention (HAHASO). Results provide evidence that participation in psycho-educational Internet safety interventions is associated with an increase in Internet safety knowledge; but it is not significantly associated with a change in risky online behaviour. The need for further research in this field is highlighted.

Details: Oslo: Campbell Collaboration, 2009. 54p.

Source: Campbell Systemic Reviews 2009:2, Internet Resource: Accessed February 14, 2012 at www.campbellcollaboration.org/lib/download/681/

Year: 2009

Country: International

URL:

Shelf Number: 116293

Keywords:
Crime Reduction
Cybercrimes
Juvenile Victims

Author: Vettori, Barbara, ed.

Title: Child Pornography on the Internet - Evaluating Preventive Measures in order to Improve their Effectiveness in the EU Member States - Final Report

Summary: This Final Report presents the results of the Study Child Pornography on the Internet - Evaluating Preventive Measures in order to Improve their Effectiveness in the EU Member States, funded by the EU Commission under the DAPHNE Programme 2000-2003 (Contract 01/097/c) and carried out by Transcrime, Joint Research Centre on Transnational Crime, Universita degli Studi Trento- Universita Cattolica del Sacro Cuore di Milano, in cooperation with Unicf - Innocenti Research Centre, Firenze and Unisys Belgium. The aim of the Study was to evaluate the effectiveness of the preventive measures in place of EU Member States, in the field of child pornography on the Internet in order to contribute to their improvement. To achieve this aim, the Study set itself the following objectives: 1. to map the preventive measures in place in EU Member States against child pornography on the Internet; 2. to assess (where possible) the level of adherence to EU guidelines of the preventive measures against child pornography in place in EU Member States; 3. to assess the effectiveness of the preventive measures against the child pornography on the Internet in place of EU Member States; 4. to identify good practices in the field of preventive measures against child pornography on the Internet in place in EU Member States and to disseminate them; to identify ways and forms to improve the effectiveness of such measures.

Details: Milan, Italy: Transcrime, 2007. 608p.

Source: Transcrime Reports No. 15. Internet Resource: Accessed February 17, 2012 at http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/TR/15_Child_Pornography_on_the_Internet.pdf

Year: 2007

Country: Europe

URL: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/TR/15_Child_Pornography_on_the_Internet.pdf

Shelf Number: 124152

Keywords:
Child Pornography (Europe)
Cybercrimes
Internet Crimes

Author: Rogers, Audrey

Title: From Peer-To-Peer Networks to Cloud Computing: How Technology is Redefining Child Pornography Laws

Summary: Child pornography circulating in cyberspace has ballooned into the millions. To punish this flood, the law must accurately delineate culpable conduct. Technology such as peer-to-peer networks has erased the divisions among traders of child pornography, and, therefore, the differentials in punishment have lost their underpinnings. The current sentencing controversy surrounding child pornographers is merely the tip of the iceberg of the larger need to revamp the offenses themselves. This paper provides a framework for a normative critique of the offenses and their sentences. It suggests the law could better reflect technology by comporting with a refined harm rationale that rests on the fundamental injury to the victim’s dignity and privacy. Drawing on comparisons to diverse laws such as the Geneva Convention’s ban on photographs of prisoners of war, this paper states all traders in child pornography violate the rights of the children depicted and therefore inflict harm, albeit at different levels. Accordingly, the paper proposes three categories: producers, traders, and seekers of child pornography with base sentences varying accordingly. Starting at the same base level, the Sentencing Commission could then propose enhancements or departures to distinguish among the traders and their individual culpability.

Details: Social Science Research Network, 2012. 41p.

Source: Working Paper Series: Internet Resource: Accessed March 9, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2006664&

Year: 2012

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2006664&

Shelf Number: 124403

Keywords:
Child Pornography
Cybercrimes
Internet Crimes
Sentencing
Sentencing Reform

Author: Smith, Kevin (ed.)

Title: Hate Crime, Cyber Security and the Experience of Crime among Children: Findings from the 2010/11 British Crime Survey: Supplementary Volume 3 to Crime in England and Wales 2010/11

Summary: This bulletin covers three topic areas. These are: The extent of and perceptions towards hate crime -- This chapter contains analysis of figures from the 2009/10 and 2010/11 British Crime Surveys, including extent and reporting of hate crime, its effects on victims and victim satisfaction with the police. It also looks at a range of public perception measures relating to hate crime. Questions were asked of adults aged 16 or over in England and Wales. Use of the internet and cyber security -- This chapter contains information from the 2010/11 British Crime Survey on levels of internet use, concerns people may have about using the internet, and any measures taken to protect personal details when using the internet. Variations by age and sex are highlighted throughout the chapter. Questions were asked of adults aged 16 or over in England and Wales. Experimental statistics on the experience of crime among children aged 10 to 15 -- This chapter is based on data collected from 10 to 15 year olds who took part in the 2010/11 British Crime Survey. Questions were asked of children in England and Wales who had experienced a crime about the circumstances of the incident, any details on the offender(s) and their views of the incident. Experimental statistics is a designation for statistics still in a development phase.

Details: London: Home Office, 2012. 84p.

Source: Internet Resource: Home Office Statistical Bulletin: Accessed March 29, 2012 at: http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/crime-research/hosb0612/hosb0612?view=Binary

Year: 2012

Country: United Kingdom

URL: http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/crime-research/hosb0612/hosb0612?view=Binary

Shelf Number: 124757

Keywords:
Children, Crimes Against
Crime Statistics (U.K.)
Cybercrimes
Hate Crimes
Internet Crimes

Author: Global Agenda Council on Organized Crime

Title: Organized Crime Enablers

Summary: The Global Agenda Council on Organized Crime focused on the enablers of organized crime during the 2011-2012 term. This broad concept includes individuals, mechanisms and situations that play an important role in facilitating organized crime activities – whether intentionally or inadvertently – increasing its benefits and scale while reducing its risks. Organized crime exacts a multibillion cost on legitimate business, distorts markets and causes widespread ill-effects on society. Fuelled by the same forces of globalization that have expanded trade, communications and information worldwide, criminal syndicates now have unprecedented reach not only into the lives of ordinary people but into the affairs of multinational companies and governments worldwide. Although law enforcement has long focused on criminal gangs and illicit markets, only recently has it paid greater attention to those factors that enable such activities. This report focuses on the impact of enablers on three critical areas: cybercrime, money laundering and Free Trade Zones. In developing this report, the Council on Organized Crime took into account two main criteria: – continuity with its work in 2010-2011 on cybercrime and on money laundering in real estate – input received by Council on Organized Crime Members during virtual meetings and at the Summit on the Global Agenda in Abu Dhabi in October 2011

Details: Cologny/Geneva Switzerland: World Economic Forum, 2012. 27p.

Source: Internet Resource: Accessed September 13, 2012 at: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/GAC_Organized_Crime_2307_light_july.pdf

Year: 2012

Country: International

URL: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/GAC_Organized_Crime_2307_light_july.pdf

Shelf Number: 126325

Keywords:
Computer Crimes
Cybercrimes
Internet Crimes
Money Laundering
Organized Crime

Author: KPMG, Assurance & Advisory Services Center

Title: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation

Summary: At the turn of the millennium, one would be hard-pressed to find a competitive and thriving organisation that does not rely upon communications and other information technologies as an enabler of its activities. No longer incidental to the workings of an organisation, technology is integral to business today. At the same time, however, the very “digital nervous system,” as Bill Gates terms it, that enables and improves our lives at work and at home also creates enormous new risks, many of which organisations may not perceive or have not yet considered. The complexity of modern enterprises, their reliance on technology, and the heightened interconnectivity among organisations that is both a result and a driver of e-business— these are rapidly evolving developments that create widespread opportunities for theft, fraud, and other forms of exploitation by offenders both outside and inside an organisation. With the growth of e-business, internal and external perpetrators can exploit traditional vulnerabilities in seconds. They can also take advantage of new weaknesses—in the software and hardware architectures that now form the backbone of most organisations. In a networked environment, such crimes can be committed on a global basis from almost any location in the world, and they can significantly affect an organisation’s overall well-being. As businesses grow and partner, systems become increasingly sophisticated and less dependent on human intervention. Monitoring individual behaviour becomes more difficult (though certainly more important); and vulnerability to electronic crime grows as organisations are increasingly connected to, and reliant on, individuals and systems they do not directly control. Most organisations are alert to the risks posed by electronic viruses such as the May 2000 “I Love You” virus, which spawned a number of derivative viruses and is estimated to have cost businesses and governments upward of $10 billion dollars. Many, however, remain unaware of the extent to which they can be harmed by a wide variety of cyber misbehaviour that may originate with their own employees or partners. As organisations develop and refine their e-business strategies, they need to consider the issues that influence the confidentiality, integrity, and availability of their data. In this context, they need to know how they can be affected by the new risks of e-crime and how inadequate preparation could leave them open to an attack that could easily diminish the value of their businesses. This white paper focuses on how organisations can use a comprehensive cyber defence program to turn e-crime preparedness into a new competitive advantage. It describes the business risks now evolving rapidly in the electronic marketplace. It discusses how some attacks take place as well as how some organisations are beginning to protect themselves, both to deter and respond to attacks and to avert further damage once an exploitation has taken place. Finally, this document examines how the scope and nature of e-crime is expected to change and how organisations can prepare to meet those new challenges.

Details: New York: KPMG, 2000. 32p.

Source: Internet Resource: Accessed September 13, 2012 at http://www.uazuay.edu.ec/bibliotecas/e-marketing/E-Commerce%20and%20Cyber%20Crime.pdf

Year: 2000

Country: United States

URL: http://www.uazuay.edu.ec/bibliotecas/e-marketing/E-Commerce%20and%20Cyber%20Crime.pdf

Shelf Number: 126333

Keywords:
Computer Crimes
Costs of Crime
Cybercrimes
Cybersecurity

Author: Levy, Nathaniel

Title: Bullying in a Networked Era: A Literature Review

Summary: "Bullying in a Networked Era: A Literature Review", by Nathaniel Levy, Sandra Cortesi, Urs Gasser, Edward Crowley, Meredith Beaton, June Casey, and Caroline Nolan, presents an aggregation and summary of recent academic literature on youth bullying and seeks to make scholarly work on this important topic more broadly accessible to a concerned public audience, including parents, caregivers, educators, and practitioners. The document is guided by two questions: “What is bullying?” and “What can be done about bullying?” and focuses on the online and offline contexts in which bullying occurs. Although the medium or means through which bullying takes place influence bullying dynamics, as previous research demonstrates, online and offline bullying are more similar than different. This dynamic is especially true as a result of the increasing convergence of technologies. Looking broadly at the commonalities as well as the differences between offline and online phenomena fosters greater understanding of the overall system of which each is a part and highlights both the off- and online experiences of young people – whose involvement is not typically limited to one end of the spectrum.

Details: Cambridge, MA: The Berkman Center for Internet & Society at Harvard University, 2012. 62p.

Source: Kinder & Braver World Project: Research Series, Research Publication No. 2012-17: Internet Resource: Accessed September 23, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146877

Year: 2012

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146877

Shelf Number: 126406

Keywords:
Bullying
Cyberbullying
Cybercrimes
Internet Crime

Author: Dooley, Julian

Title: Educational Evaluation of Cybersmart Detectives

Summary: The aim of the Australian Communications and Media Authority‟s (ACMA) Cybersmart Detectives (CSD) activity is to teach children key Internet safety messages in a safe school environment. The activity brings together a number of agencies with an interest in promoting online safety for young people, including education, State and Federal Police, government and child welfare advocates. The activity has been played by over 28, 000 students in Australia since initial trials in 2004. Cybersmart Detectives is offered free to schools by the ACMA as part of the Australian Government‟s commitment to cyber-safety. Based on a real-world Internet safety scenario, the CSD activity is delivered to students in the classroom as a series of messages. Aided by the classroom teacher, students work in small teams, reading correspondence, voting on a series of poll questions and sending questions and suggestions to their „Cybersmart Guide‟ waiting online. As the scenario unfolds, students discuss the risks of certain online and offline behaviours and ways of managing those risks. Cybersmart Guides are an important part of the activity. Guides are teachers, police and Internet safety experts who help students throughout the activity. The Guides respond to questions and theories posed by students online and help guide teams through each of the clues. Along with the interactive online CSD activity, the ACMA also provides a suite of teaching resources to support ongoing Internet safety education in the classroom. These resources include lesson plans and access to other ACMA online and hard copy resources. This independent evaluation, which was conducted by the Child Health Promotion Research Centre (CHPRC) at Edith Cowan University, was designed to answer five key questions: 1. Investigate if the game‟s key cyber-safety messages are identified by students; 2. Measure the short-term impact of CSD on student learning about cyber-safety; 3. Determine if students recognise the link between key cyber-safety messages and how these messages should be assimilated in their own behaviours/lives; 4. Examine the teacher‟s role in reinforcing the key cyber-safety messages; and 5. Assess the value of the pre-game and post-game lessons in reinforcing the key cyber-safety messages. The evaluation used a mixed methods approach, comprising stakeholder interviews, teacher interviews, quantitative student data collection and focus groups with students enabling the triangulation of results to support the implementation of the CSD activity. In addition to the data collection and analyses described in the proposal, the CHPRC conducted supplementary analyses to explore students‟ responses to poll questions (embedded within the CSD activity) and qualitative transcripts comprising student and guide comments posed during the CSD activity.

Details: Perth, Australia: Child Health Promotion Research Centre Edith Cowan University, 2011. 249p.

Source: Internet Resource: Accessed October 11, 2012 at: http://www.acma.gov.au/webwr/_assets/main/lib310665/cybersmart_detectives-report.pdf

Year: 2011

Country: Australia

URL: http://www.acma.gov.au/webwr/_assets/main/lib310665/cybersmart_detectives-report.pdf

Shelf Number: 126680

Keywords:
Computer Safety
Cybercrimes
Educational Programs
Internet Safety (Australia)
Social Networking

Author: Dooley, Julian

Title: Educational Evaluation of Cybersmart Detectives

Summary: The aim of the Australian Communications and Media Authority‟s (ACMA) Cybersmart Detectives (CSD) activity is to teach children key Internet safety messages in a safe school environment. The activity brings together a number of agencies with an interest in promoting online safety for young people, including education, State and Federal Police, government and child welfare advocates. The activity has been played by over 28, 000 students in Australia since initial trials in 2004. Cybersmart Detectives is offered free to schools by the ACMA as part of the Australian Government‟s commitment to cyber-safety. Based on a real-world Internet safety scenario, the CSD activity is delivered to students in the classroom as a series of messages. Aided by the classroom teacher, students work in small teams, reading correspondence, voting on a series of poll questions and sending questions and suggestions to their „Cybersmart Guide‟ waiting online. As the scenario unfolds, students discuss the risks of certain online and offline behaviours and ways of managing those risks. Cybersmart Guides are an important part of the activity. Guides are teachers, police and Internet safety experts who help students throughout the activity. The Guides respond to questions and theories posed by students online and help guide teams through each of the clues. Along with the interactive online CSD activity, the ACMA also provides a suite of teaching resources to support ongoing Internet safety education in the classroom. These resources include lesson plans and access to other ACMA online and hard copy resources. This independent evaluation, which was conducted by the Child Health Promotion Research Centre (CHPRC) at Edith Cowan University, was designed to answer five key questions: 1. Investigate if the game‟s key cyber-safety messages are identified by students; 2. Measure the short-term impact of CSD on student learning about cyber-safety; 3. Determine if students recognise the link between key cyber-safety messages and how these messages should be assimilated in their own behaviours/lives; 4. Examine the teacher‟s role in reinforcing the key cyber-safety messages; and 5. Assess the value of the pre-game and post-game lessons in reinforcing the key cyber-safety messages. The evaluation used a mixed methods approach, comprising stakeholder interviews, teacher interviews, quantitative student data collection and focus groups with students enabling the triangulation of results to support the implementation of the CSD activity. In addition to the data collection and analyses described in the proposal, the CHPRC conducted supplementary analyses to explore students‟ responses to poll questions (embedded within the CSD activity) and qualitative transcripts comprising student and guide comments posed during the CSD activity.

Details: Perth, Australia: Child Health Promotion Research Centre Edith Cowan University, 2011. 249p.

Source: Internet Resource: Accessed October 11, 2012 at: http://www.acma.gov.au/webwr/_assets/main/lib310665/cybersmart_detectives-report.pdf

Year: 2011

Country: Australia

URL: http://www.acma.gov.au/webwr/_assets/main/lib310665/cybersmart_detectives-report.pdf

Shelf Number: 126680

Keywords:
Computer Safety
Cybercrimes
Educational Programs
Internet Safety (Australia)
Social Networking

Author: British Retail Consortium

Title: Future Online Security: Tackling eCrime and Fraud

Summary: The growth of e-commerce and corresponding opportunities for increasing fraudulent behaviour should not be underestimated. Retailers need to be sure that as they seek to expand their businesses via e-commerce the customers they attract will be well protected. Retailers invest significant resources in protecting their customers. But too often, the current law enforcement response to eCrime and fraud is inadequate. The BRC is calling for a dedicated national unit tasked to investigate and respond to the increasing levels of eCrime. Engagement between the private sector and law enforcement agencies should be focused on finding the most effective way to achieve a better response to eCrime and fraud. The focus must be on finding ways in which the public and private sectors can work more effectively together to reduce the level of offending and to raise consumer confidence. The value of internet retailing in 2009 was £18.5 billion. The value for 2010 to date (January to the end of October 2010) was £17 billion. This was a 21 per cent increase when compared to the same period in 2009. The BRC has undertaken this study to ensure that this important growth area of the economy is adequately policed and protected.

Details: London: British Retail Consortium, 2010. 16p.

Source: Internet Resource: Accessed October 14, 2012 at http://www.brc.org.uk/trct/downloads/Future%20Online%20Security.pdf

Year: 2010

Country: United Kingdom

URL: http://www.brc.org.uk/trct/downloads/Future%20Online%20Security.pdf

Shelf Number: 126699

Keywords:
Computer Crimes
Computer Fraud
Cybercrimes
Internet Crime

Author:

Title: Implementing Peace and Security Architecture (II): Southern Africa

Summary: The last part of Africa to be decolonised, the Southern African Development Community (SADC) region, remains one of the most peaceful. Yet, despite comprehensive protocols and agreements, SADC faces acute challenges characterised by tensions between member states, resource deficits, citizens’ exclusion, social discontent and limited internal and external coordination. Regional security cooperation requires adept infrastructures underwritten by political commitment; but the organisation’s Secretariat appears powerless to ensure policy implementation. It must develop an effective common security policy framework, improve coordination with international partners, harmonise and clarify its role with other SADC structures, broaden engagement with civil society, ensure member-state commitment to African Union (AU) efforts on human and people’s rights and build capacity for evaluation and monitoring. As long as national sovereignty prevails over regional interests, however, the success of SADC mechanisms, notably in conflict resolution, will remain limited. The region faces a range of evolving peace and security threats, including maritime security and piracy, cyber and technology-driven security threats, and socio-economic unrest. Beyond efforts to respond to these challenges, policy implementation capacity and information and response mechanisms are urgently required. SADC’s intervention in Madagascar and Zimbabwe has exposed the region’s limited capacity to enforce agreements it has brokered. Ad hoc and under-resourced mediation imposes additional burdens and responsibilities on the mediators. Civil society engagement in SADC processes in the two countries has been at best tangential, confirming the gulf between the regional body and its citizens. The Madagascar and Zimbabwe cases also highlight that structural governance deficits and politicised security sectors exacerbate conflict. SADC’s mediation efforts reveal the complexities and challenges of dealing with unconstitutional changes in government, contested elections and violations of the region’s electoral code.

Details: Johannesburg; Brussels: International Crisis Group, 2012. 39p.

Source: Internet Resource: Africa Report No. 191: Accessed November 2, 2012 at:

Year: 2012

Country: South Africa

URL:

Shelf Number: 126854

Keywords:
Cybercrimes
Maritime Crimes
Maritime Security
Piracy (South Africa)
Socio-Economic Conditions

Author: Poolen, W.J.

Title: Intentional Disintegration of Cybercriminal Networks: Approaches in Network Strategic Security Modeling

Summary: This thesis assesses whether network strategic security models can be used for disintegration of cybercriminal networks. Strategic models are conceptualized as methods for security intervention that use network mathematical algorithms to define sets of targets in a hostile network that seem crucial to attack in order to disintegrate a cybercriminal network. Two strategic models are constructed that are associated with different types of targets in cybercriminal networks. One model focusses on hubs (computer devices, human operators and other nodes that interact within a network); the other model focusses on the exchange connections between clusters of interacting nodes. After elaboration of the strategic models a set of cases of cybercriminal interventions is invoked to investigate how the theoretical models contribute to real life intervention. In reflection on the cases and theory the main issue that becomes apparent is that the strategic models do not adequately take in account the ability of targeted networks to react to disintegration attempts. The notion of network resilience is considered and a subsequent theoretical attempt interprets network resilience as an effect of the relations that a network maintains with its resource networks. Networks are perceived to be embedded and interconnected in a network environment in which they exchange resources. Finally, a broadening of the theoretical understanding towards the multilayered aspects of a network is suggested to gain a more adequate perspective for network strategic security interventions.

Details: Amsterdam: Vrije Universiteit,, 2012. 69p.

Source: Internet Resource: Thesis: Accessed November 9, 2012 at: http://www.screenwork.nl/PDF/20120910_masterthesis_webversie.pdf

Year: 2012

Country: International

URL: http://www.screenwork.nl/PDF/20120910_masterthesis_webversie.pdf

Shelf Number: 126899

Keywords:
Computer Crime
Computer Security
Criminal Networks
Cyber Security
Cybercrimes
Cybercriminal Networks

Author: Clemente, Dave

Title: Epub: Cyber Security and Global Interdependence: What Is Critical?

Summary: The evolution of interconnection between infrastructure sectors has been accelerated by the spread of cyberspace, which has become the 'nervous system' linking them. There is no avoiding the security implications emerging at the intersection of cyberspace and infrastructure. As countries become more dependent on infrastructure distributed around the world, the growing complexity of interconnections makes it harder for authorities to identify what infrastructure is 'critical'. Improving risk management relies on using rigorous definitions of what infrastructure is 'critical', which enables more effective prioritization and protection of nodes and connection points. In this context, the ever-rising importance of data makes distinctions between 'physical' and 'information' infrastructure increasingly irrelevant. Societal resilience can be just as important as infrastructure resilience, and policy-makers should consider closely what levels of societal dependency on digital technologies are appropriate. Building public confidence in the security and governance of the critical infrastructure ecosystem is essential to avoid policy-making driven by reactive or narrow interests. Meeting these security challenges requires better shared understanding of what is critical between those who protect an organization and those who set its strategic direction. Better understanding of the economic and political incentives that guide stakeholders also reveals the scope for potential cooperation.

Details: London: Chatham House, 2013. 46p.

Source: Internet Resource: Accessed march 7, 2013 at: http://www.chathamhouse.org/publications/papers/view/189679

Year: 2013

Country: International

URL: http://www.chathamhouse.org/publications/papers/view/189679

Shelf Number: 127867

Keywords:
Cyber Security
Cybercrimes
Infrastructure Protection
Internet Crimes
Risk Management

Author: Albury, Kath

Title: Young People and Sexting in Australia: Ethics, Representation and the Law

Summary: Young People and Sexting in Australia report presents the #ndings of a qualitative study of young people’s understandings of, and responses to, current Australian laws, media and educational resources that address sexting. While there are many defnitions of sexting, for the purposes of this report we are referring to the production and distribution of naked or semi-naked photographs via mobile phones and social media. The project involved a review of both international local and academic research as well as popular media addressing sexting, and a review of educational resources for young people. Three focus groups were conducted with young people aged 16 and 17 in 2012, and a working paper based on those findings was then distributed to adult stakeholders in the fields of law enforcement, youth and children’s legal support, education, criminology, media and communications, youth work, youth health care, counseling and youth health promotion. This report therefore draws on both the focus group discussions, and a workshop consultation with the adult stakeholder group. Key Findings: 􀁴􀀁 While focus group participants were familiar with the practice of sending naked or semi-naked pictures, the term sexting was understood as an adult or media-generated concept that did not adequately reflect young people’s everyday practices and experiences of creating and sharing digital images. 􀁴􀀁 Young people observed that gendered double-standards were applied to discussions of sexting, and digital self-representation in general. For example one group of young women were particularly offended that their self-portraits or selves were viewed by both peers and adults as ‘provocative’ while young men’s naked or semi-naked pictures were understood as ‘jokes’. 􀁴􀀁 Sample media campaigns and public education materials viewed by focus groups were rejected by some participants for failing to acknowledge young women’s capacity for consensual production and exchange of images. These participants also felt that current sexting education fails to emphasise young people’s responsibility to not share images without consent. 􀁴􀀁 Both young people and adult stakeholders agreed that current legal frameworks relating to sexting (particularly those that con$ate sexting with child pornography) are not widely understood by either young people or adults, and that this lack of education and awareness places young people at risk of unreasonable criminal charges. The Young People and Sexting in Australia report recommendations are presented in two major categories, (1) strategies and (2) new approaches to understanding sexting.

Details: Sydney: University of New South Wales, 2013. 39p.

Source: Internet Resource: Accessed May 8, 2013 at: http://www.cci.edu.au/sites/default/files/Young_People_And_Sexting_Final.pdf

Year: 2013

Country: Australia

URL: http://www.cci.edu.au/sites/default/files/Young_People_And_Sexting_Final.pdf

Shelf Number: 128673

Keywords:
Computer Crimes
Cybercrimes
Internet
Media
Sex Laws
Sexting (Australia)

Author: Ringrose, Jessica

Title: A Qualitative Study of Children, Young People and 'Sexting'

Summary: Sexting has been conventionally defined as ‘exchange of sexual messages or images’ (Livingstone et al., 2011) and ‘the creating, sharing and forwarding of sexually suggestive nude or nearly nude images’ (Lenhart, 2009) through mobile phones and/or the internet. The legal interest has been in under-aged sexually explicit images which are a form of child pornography. Quantitative research on sexting has found rates as wide as 15% to 40% among young people, depending on age and the way what is understood as sexting is measured. However, quantitative research alone cannot offer in-depth understandings about the nature or complexity of technologically mediated sexual expression or activity via mobile or online media. Many teenagers do not even use the term ‘sexting’ indicating a gap between adult discourse and young people’s experiences. The purpose of this small scale qualitative research was to respond to and enhance our understandings of the complex nature of sexting and the role of mobile technologies within peer teen networks. It was designed as a pilot study – to investigate a phenomenon whose nature, scale and dimensions were unknown. Thus the research itself also was small in scale and exploratory in nature and also culturally and geographically specific. We conducted focus group interviews with 35 young people years 8 and 10 in two inner city London schools. At the focus groups we asked participants to friend us on Facebook, with a research Facebook profile. We then mapped some of their activities online and returned for 22 individual interviews with selected case study young people. We also interviewed key teachers and staff at the schools. While we believe that the findings that emerged are far from unique to the two year groups studied in two schools, considerable caution is needed before making any generalisations to other groups. This also underscores the urgent need for expanding the research with a broader scoped study (outlined in policy recommendations).

Details: London: National Society for the Prevention of Cruelty to Children, 2012. 76p.

Source: Internet Resource: Accessed May 30, 2013 at: http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research-report_wdf89269.pdf

Year: 2012

Country: United Kingdom

URL: http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research-report_wdf89269.pdf

Shelf Number: 128875

Keywords:
Computer Crimes
Cybercrimes
Internet
Media
Sex Laws
Sexting (U.K.)

Author: Hui, Kai-Lung

Title: Marginal Deterrence in the Enforcement of Law: Evidence from Distributed Denial of Service Attack

Summary: By studying a panel dataset of distributed denial of service attack across 240 countries over 5 years, we find that enforcing the Convention on Cybercrime had increased the intensity of attack by 43 to 52 percent. It did not significantly reduce the chance for a country to be selected for the attack. We conducted a battery of identification and falsification tests to show that such increased attack intensity arose because of failure in marginal deterrence, instead of other theories such as brutalization, stigmatization, or defiance, or general forms of endogeneity. We show that raising the standard of proof of conviction is one way to facilitate marginal deterrence, but it has the undesirable effect of raising the offense rate. We discuss other possible solutions.

Details: Unpublished paper, 2013. 58p.

Source: Internet Resource: Accessed June 6, 2013 at: http://home.ust.hk/~davcook/marginal%20deterrence.pdf

Year: 2013

Country: International

URL: http://home.ust.hk/~davcook/marginal%20deterrence.pdf

Shelf Number: 128967

Keywords:
Computer Crimes
Cybercrimes
Deterrence

Author: Tallon, Kelly

Title: New Voices / New Laws: School-age young people in New South Wales speak out about the criminal laws that apply to their online behaviour

Summary: This report provides a children’s rights-based analysis and evaluation of the current criminal laws that can apply to peer-to-peer sexting and cyber bullying among young people in New South Wales (NSW). The report is the outcome of New Voices/New Laws, a project undertaken by the National Children’s and Youth Law Centre (NCYLC) and Children’s Legal Service of Legal Aid NSW (CLS). It offers insight on sexting and cyber bullying that we have garnered from our work as youth legal educators and advocates; examines the criminal law framework that applies to these behaviours in NSW; explains the need to reform these laws; surveys the views of young people on sexting, cyber bullying and the law; reviews some of the law reform efforts undertaken in other Australian and overseas jurisdictions; and on these bases, makes recommendations for law and policy makers in NSW. The New Voices/New Laws project grew out of our concern that young people’s use of social media, mobile phones and the internet can lead to serious and often disproportionate criminal penalties—of which most young people (and many adults) are unaware. The project aimed to: • educate young people about the criminal laws that can apply to sexting and cyber bullying; • encourage young people to voice their opinions on these laws; • amplify the voices and opinions of young people; and • facilitate advocacy for reform of inappropriate criminal laws and penalties. In order to achieve these aims, we engaged directly with over 1,000 young people through school-based consultations. Between June and October 2012, we conducted 10 consultations at 8 schools in 7 regions—Wollongong, Dubbo, Sydney, Hunter, Tamworth, Broken Hill and Albury. The consultations generally consisted of a presentation on the laws and penalties that can apply to sexting and cyber bullying; a survey asking participants to share their knowledge and opinions of these laws and penalties; and a focus group discussion of the issues. The presentation and survey were also made available online.

Details: Sydney: National Children’s and Youth Law Centre and Legal Aid NSW, 2012. 87p.

Source: Internet Resource: Accessed June 26, 2013 at: http://www.lawstuff.org.au/__data/assets/pdf_file/0009/15030/New-Voices-Law-Reform-Report.pdf

Year: 2012

Country: Australia

URL: http://www.lawstuff.org.au/__data/assets/pdf_file/0009/15030/New-Voices-Law-Reform-Report.pdf

Shelf Number: 129186

Keywords:
Cyberbullying
Cybercrimes
Internet Crimes
Online Communications
Sexting (Australia)

Author: Ablon, Lillian

Title: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Summary: Markets are good because they facilitate economic efficiency, but when that efficiency facilitates criminal activity, such "black markets" can be deemed harmful. Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets in both the tools (e.g., exploit kits) and the take (e.g., credit card information). As with most things, intent is what can make something criminal or legitimate, and there are cases where goods or services can be used for altruistic or malicious purposes (e.g., bulletproof hosting and zero-day vulnerabilities). This report describes the fundamental characteristics of these markets and how they have grown into their current state in order to give insight into how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options that could minimize the potentially harmful influence these markets impart. This report assumes the reader has a basic understanding of the cyber, criminal, and economic domains, but includes a glossary to supplement any gaps. This report should be of interest to cybersecurity, information security, and law enforcement communities. It was sponsored by Juniper Networks as part of a multiphase study on the future security environment.

Details: Santa Monica, CA: RAND, 2014. 83p.

Source: Internet Resource: Accessed April 19, 2014 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf

Year: 2014

Country: International

URL: https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf

Shelf Number: 132082

Keywords:
Black Markets
Computer Crimes
Cybercrimes
Cybersecurity
Hackers
Illegal Markets
Internet Crime

Author: Welsh Local Government Association

Title: Tackling Hate Crimes and Incidents: A Framework for Action

Summary: The Framework aims to tackle hate crimes and incidents in respect of the protected characteristics under the Equality Act 2010. These include: -disability -race -religion -sexual orientation -gender identity -age. The Framework has also been developed to tackle areas of hate crimes and incidents across cyber hate and bullying, far right hate and mate crime (befriending of people, who are perceived by perpetrators to be vulnerable, for the purposes of taking advantage of, exploiting and/or abusing them). The Framework includes three objectives on prevention, supporting victims and improving the multi-agency response. It is supported by a Delivery Plan which will be updated on an annual basis.

Details: Cardiff: Welsh Government, 2014. 64p.

Source: Internet Resource: Accessed July 1, 2014 at: http://wales.gov.uk/docs/dsjlg/publications/equality/140512-hate-crime-framework-en.pdf

Year: 2014

Country: United Kingdom

URL: http://wales.gov.uk/docs/dsjlg/publications/equality/140512-hate-crime-framework-en.pdf

Shelf Number: 132580

Keywords:
Bias-Motivated Crimes
Bullying
Crime Prevention
Cybercrimes
Hate Crimes

Author: NetNames

Title: Behind the Cyberlocker Door: A Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions

Summary: Digital theft of copyrighted content, has surged as for-profit pirate sites continue making money by illegally distributing movies, music, TV shows and other content. Cyberlockers are among the most profitable content theft sites, but very little research has been conducted to determine how much money they are pocketing by illegally distributing the work of content creators. As a society, we can no longer shrug off content theft as the isolated activity of high school and college students who want to watch a movie or listen to music for free. Recent reports, this one by NetNames and one earlier this year by MediaLink, lay bare the truth that content theft is big business, raking in hundreds of millions of dollars a year - essentially bleeding the Internet for profit while making it less attractive for generations to come. Content theft harms not only creators whose products are stolen and legitimate distributors that are forced to compete with cyberlockers who pay nothing for the content that drives their business. It also hurts consumers who pay the price for "free" content in a reduction of quality choices as revenues are reduced, and may be subjected to identity theft and malware that cyberlockers are associated with. New research by NetNames has demonstrated that: - It's easy to profit on the Internet when you leverage other people's creative works. In fact, it is possible you could make millions of dollars doing so. - There is a compelling difference between the business models of rogue cyberlockers that peddle in content theft and legitimate cloud storage services. - Malware is a serious issue when it comes to content theft. - Major brands are victimized by content thieves who leverage these brands to make their own rogue sites seem legitimate. - That all it takes for bad operators to succeed is for the facilitators of commerce - payment processors and the advertising industry, among other stakeholders- to do nothing. In the NetNames research, for example, MasterCard and Visa could be used to buy subscriptions on almost all the cyberlockers. The question is what we do about it. It's going to take concerted action by the Internet and the payment processors, advertising industries, consumers, public interest groups, Internet safety organizations and responsible government officials to address this corrosive issue that threatens our basic trust in our online world.

Details: London: Digital Citizens Alliance, 2014. 50p.

Source: Internet Resource: Accessed October 30, 2014 at: http://www2.itif.org/2014-netnames-profitability.pdf

Year: 2014

Country: International

URL: http://www2.itif.org/2014-netnames-profitability.pdf

Shelf Number: 133832

Keywords:
Computer Crimes
Computer Security
Credit Cards
Cyber Security
Cybercrimes
Digital Piracy
Intellectual Property Theft
Internet Crimes

Author: Diallo, Ismaila

Title: Confronting Crime Networks in Dakar

Summary: Organised crime is increasing in Dakar, Senegal, involving drug trafficking, illicit pharmaceutical products and cybercrime. The implications for urban governance range from the risk of undermining the rule of law to state governance being weakened and replaced by criminal governance. Solutions that are well informed, comprehensive and sustainable are required. They should also involve subregional and international collaboration. The government needs to identify the actors involved, improve law enforcement, adapt relevant laws to newly emerging needs and adopt a comprehensive approach to the problem, while involving civil society in finding possible solutions.

Details: Pretoria, South Africa: Institute for Security Studies, 2014. 8p.

Source: Internet Resource: Policy Brief 65: Accessed November 3, 2014 at: http://www.issafrica.org/uploads/PolBrief65.pdf

Year: 2014

Country: Senegal

URL: http://www.issafrica.org/uploads/PolBrief65.pdf

Shelf Number: 133950

Keywords:
Criminal Networks
Cybercrimes
Drug Trafficking
Illegal Pharmaceuticals
Organized Crime (Dakar, Senegal)

Author: Moens, Alexander

Title: Cybersecurity Challenges for Canada and the United States

Summary: The Internet was designed not with security in mind, but rather openness and the free flow of information. The resulting globally connected Internet has brought unprecedented levels of information and commercial exchange, contributed enormous gains to individual prosperity, and promoted and expanded individual liberty. Only in recent years have governments, militaries, industries, firms, and individuals come to grips with how to protect legitimate activity in cyberspace without compromising the Internet's open character. Overemphasizing security can restrict freedom and stifle entrepreneurial potential. Conversely, liberty in cyberspace without an appreciation of cybersecurity presents rising commercial and governmental costs as well as unacceptable threats to national security. One study on the economic costs of cyberespionage and other forms of cyberattack estimates the global costs at between $375 billion and $575 billion annually, and a range of nation-states, state-linked groups, and non-state actors are exploiting cyberspace to conduct espionage, military operations, and large-scale theft of intellectual property. Although there have been calls for international norms of behaviour and rules of the road in cyberspace, treaties and arms control as developed and understood in the conventional, nuclear, and chemical realm are not easily transferred to the domain of cyberspace. Nevertheless, the rule of consequences and of self-interest is in play, as is the logic of cost-benefit in escalation. Still, cyberattacks continue, increasing in quantity and quality, which is why resilience is the watchword of cyberspace. As in other zones of commerce and theatres of operation, Canada and the United States are deeply integrated in cyber-space. Canada draws a clear net benefit from close cooperation with the United States in cyberspace because both the nature of the evolving threat and the nature and cost of countering this threat are increasingly more difficult for a state to address on its own. At the same time, as it cooperates with the United States and other close allies, the Canadian government faces the challenge of finding a balance between security and the Canadian definition of freedom. As the powers of Canadian government agencies expand and coordination with US agencies and other allied agencies increases, the task of providing cybersecurity should not be left to the specialized agencies without a layer of oversight by elected representatives. As Canada updates its ability to deal with threats in cyberspace, it needs to enhance the ability of its representative government to oversee this important work.

Details: Calgary, AB, Canada: Fraser Institute, 2015. 54p.

Source: Internet Resource: Accessed April 1, 2015 at: http://www.fraserinstitute.org/uploadedFiles/fraser-ca/Content/research-news/research/publications/cybersecurity-challenges-for-canada-and-the-united-states.pdf

Year: 2015

Country: Canada

URL: http://www.fraserinstitute.org/uploadedFiles/fraser-ca/Content/research-news/research/publications/cybersecurity-challenges-for-canada-and-the-united-states.pdf

Shelf Number: 135115

Keywords:
Cybercrimes
Cybersecurity
Internet Crimes
National Security

Author: Tehan, Rita

Title: Cybersecurity: Authoritative Reports and Resources, by Topic

Summary: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: - Policy overview - National Strategy for Trusted Identities in Cyberspace (NSTIC) - Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) - Critical infrastructure - Cybercrime, data breaches, and data security - National security, cyber espionage, and cyberwar (including Stuxnet) - International efforts - Education/training/workforce - Research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions.

Details: Washington, DC: Congressional Research Services, 2015. 129p.

Source: Internet Resource: R42507: Accessed April 1, 2015 at: http://fas.org/sgp/crs/misc/R42507.pdf

Year: 2015

Country: United States

URL: http://fas.org/sgp/crs/misc/R42507.pdf

Shelf Number: 135117

Keywords:
Cloud Computing
Cybercrimes
Cybersecurity
Internet Crimes

Author: Klein, Andrew

Title: An Exploratory Study of Juvenile Orders of Protection as a Remedy for Dating Violence

Summary: An increasing number of states, like New York, are expanding order of protection (OP) laws to allow teens to secure orders for dating violence without parental involvement. New York did so effective July, 2008. While there has been extensive research in regard to civil OPs involving adults for intimate partner violence, this study of all OPs taken out by New York dating violence victims in 2009 and 2010 represents the first of its kind to examine OPs involving teens for dating violence. The goal of this research is to increase our understanding of OPs by teens as a remedy for dating violence by developing a comprehensive portrait of their use in New York State. The study is both quantitative and qualitative. The quantitative portion of the study features secondary data analysis of multiple data sets, including all appropriate OPs obtained from New York Family Courts and criminal histories and police incident files from the State's Division of Criminal Justice Services. The qualitative research is based on focus groups and individual interviews with two populations of youth: 1) a statewide sample (N=122), both boys and girls, likely to be dating and exposed to dating violence but who had not necessarily used OPs (At Risk Group) and 2) a small sample of New York City young women (N=13) who have sought and/or secured Civil Orders of Protection (User Group). We find the New York law to be very much a work in progress. Even the lowest estimates of teen dating violence (9.4% physical abuse, CDC, 2012), far exceed the number of OPs (1,200) requested for dating violence in the two years of study. As the At Risk teen focus groups reveals, teens are unfamiliar with the expanded law. In addition, the User group reports substantial barriers facing teens in obtaining orders, including being labeled as "snitches" by their peers, fears that OPs would not work, and ambivalence about giving up on the abusive relationship. The data reveals that more than 90% of the petitioners were female and respondents male. While all of the victims were teens, most of the abusers were not, averaging just short of 21 years old. The majority of respondents had prior criminal histories. Most victims alleged harassment, including cyberstalking, and assaults. The relatively few female respondents more closely resembled female petitioners, than male respondents, being younger and less likely to have prior arrest histories. Police were involved in only 10 percent of the incidents that prompted the study petitions. While the majority of the teen petitioners returned to court more than once, most received only one or two temporary orders, lasting a month or so. Likely as a result of this limited duration, few respondents were charged with violating the orders. However, analysis of arrest and police incident reports, as well as new petitions taken out by study petitioners, indicated that a little more than a quarter of the respondents re-abused their victims from one to three years after the initial petition. Risk for re-abuse was associated with gender (being male), respondents having a prior criminal history, respondents being year or more older than their victims, and couples with children in common. The research suggests OPs potentially constitute an important tool for teen victims. However, given lack of police involvement, without an alternative network of supportive adults, including parents and school personnel, the expanded use of OPs for teen dating violence will remain limited. New York courts also face a challenge in accommodating teen petitioners.

Details: Report to the U.S. Department of Justice, 2013. 172p.

Source: Internet Resource: Accessed May 26, 2015 at: https://www.ncjrs.gov/pdffiles1/nij/grants/242131.pdf

Year: 2013

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/242131.pdf

Shelf Number: 129682

Keywords:
Cybercrimes
Cyberstalking
Dating Violence
Orders of Protection
Restraining Orders

Author: Morselli, Carlo

Title: Crime facilitation purposes of social networking sites: A review and analysis of the 'cyberbanging' phenomenon

Summary: There have been growing claims in media circles and law-enforcement settings that street gangs and criminal organizations are turning to Internet-based social networking sites for various reasons, ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. The few studies that are available acknowledge the importance of the Internet as a key channel of diffusion for street gang values and general subculture. The presence of social networking sites has been documented, but no signs of proactive recruitment have emerged. Instead, past research has demonstrated that street gangs are primarily using social networking sites for bragging about their exploits and sharing their plights with law-enforcement and criminal justice with a wider, often supportive public. That street gangs are not recruiting members through social networking sites is not a surprise. It is often assumed that street gangs are cohesive groups, but network research on this issue has found otherwise. Street gang culture and organization is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized street gang setting and the presence of street gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over fifty street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In most cases, the sites are designed and managed by members and associates who emphasize their allegiance to reputed groups, such as the MS-13, Crips, Bloods, or Latin Kings. These gangs are the most prominent across the social networking sites that were monitored. There are some exceptions, such as the the Hells Angels, which were also very prominent, but which exist on-line as chapters or groups and not as individuals. Unlike the majority of street gang groups that were monitored in this study, the Hells Angels did not display their criminal or violent exploits. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiousity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Street gangs are thus not proactively using the Internet to convert anyone into

Details: Ottawa: Public Safety Canada, 2010. 22p.

Source: Internet Resource: Accessed September 4, 2015 at: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-114-2011-eng.pdf

Year: 2010

Country: Canada

URL: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-114-2011-eng.pdf

Shelf Number: 132904

Keywords:
Cybercrimes
Gangs
Internet Crimes
Organized Crime
Social Networking Sites
Street Gangs

Author: McFarland, Charles

Title: Jackpot! Money Laundering through Online Gambling

Summary: The ingenuity of criminals never ceases to amaze us. Whether it's the things they steal or the way they steal them, creativity reigns. That cleverness also flows to converting their ill-gotten gains into "clean" money. Modern money laundering is said to have started during Prohibition in the United States, when the proceeds from illegal alcohol sales needed to be converted into cash flowing from a legitimate business. They took advantage of common, large cash-flow businesses with anonymous, difficult-to-trace transactions - taxi services, restaurants, laundries, foreign currency exchanges come to mind - and many seemingly legitimate fortunes were built as a result. Indeed, several prominent American families trace their financial success to the sale of alcohol during Prohibition. That same basic money-laundering model - taking advantage of accessible, high-volume businesses with anonymous, difficult-to-trace transactions - is applied today by the modern cyber-thief. In this report, we highlight one such example: the use of online gambling sites to launder dirty money. Like criminals during Prohibition, cyber-thieves employing this method depend on anonymity, access, and the river of money that typically flows through an online gambling site.

Details: Santa Clara, CA: McAfee Labs, 2014. 16p.

Source: Internet Resource: Accessed November 16, 2015 at: http://www.mcafee.com/us/resources/white-papers/wp-jackpot-money-laundering-gambling.pdf

Year: 2014

Country: International

URL: http://www.mcafee.com/us/resources/white-papers/wp-jackpot-money-laundering-gambling.pdf

Shelf Number: 137764

Keywords:
Cybercrimes
Gambling and Crime
Money Laundering
Online Gambling

Author: European Parliament. Directorate-General for Internal Policies. Policy Department C: Citizzen's Rights and Constitutional Affairs

Title: The Law Enforcement Challenges of Cybercrime: Are We Really Playing Catch-Up

Summary: Cybercrime has become one of the key priorities for EU law enforcement agencies, as demonstrated by the establishment of the European Cybercrime Centre (EC3) in January 2013 and the development of specific European threat assessment reports in this field. High-profile criminal investigations such as the 'Silk Road' case, major data breaches or particularly nefarious hacks or malware attacks have been very much in the spotlight and widely reported in the media, prompting discussions and debates among policymakers and in law enforcement circles. Over the last few months, the cybercrime debate has specifically evolved around the issue of encryption and anonymisation. In this context, this Study argues that debates on the law enforcement challenge of cybercrime in the EU should steer clear both of doomsday scenarios that overstate the problem and scepticism that understates it, and that the key cybercrime concern for law enforcement is legal in nature rather than simply technical and technological. Indeed, the Study finds that the key challenge for law enforcement is the lack of an effective legal framework for operational activities that guarantees the fundamental rights principles enshrined in EU primary and secondary law. In order to address this core argument, this Study starts by analysing claims and controversies over the Internet 'going dark' on law enforcement (Section 2). It shows that these claims have been made for quite some time and should be considered as moral panics rather than accurate reflections of the challenges posed by cybercrime to law enforcement. Moreover, current controversies rehash older ones, conflating law enforcement concerns with intelligence-gathering and surveillance concerns. Without denying the fact that criminal activities do take place online, pose technical difficulties to law enforcement services and require the availability of specific capabilities, this section demonstrates that these difficulties do not impede criminal investigation to such an extent that exceptional means should be envisaged. While these technical aspects need to be considered, they raise issues related to policy and law rather than technology as such. The policy and law-related challenges are made greater by the fact that defining cybercrime is not an easy task. Very broad definitions have been adopted at the EU level, often leading to overlapping and sometimes conflicting mandates. Section 3 thus analyses the institutional architecture of EU cybercrime policy. It shows that the complexity of cybercrime measures and the expansive mandates and number of actors involved in their implementation make it difficult to ascertain and circumscribe the full scope of EU cybercrime policy. Whereas the Council of Europe (CoE) sought to codify cybercrime powers into an international convention, much of the EU's policy to fight cybercrime is based on non-legislative measures, including operational cooperation and ad hoc public-private partnerships. Furthermore, important distinctions and restrictions designed to ensure a 'separation of powers' between state agencies concerned with law enforcement (cyber-policing), civil protection (cybersecurity), national security (cyberespionage) and military force (offensive cyber capabilities) are harder to distinguish in the area of cybercrime, at both national and EU level. Section 3 underlines that, within this complex architecture, and with the blurring of the boundaries between those responsible for policing the Internet, for gathering intelligence from it, for conducting cyber-espionage against foreign targets, and for ensuring the safety of critical internet infrastructure, the European Parliament and civil society are largely excluded from policy development, impeding public scrutiny and accountability. This compounds the EP's existing problems in ensuring that fundamental rights and data protection are diligently protected in the area of justice and home affairs. In light of these gaps in oversight and accountability, Section 4 analyses in particular the challenge of jurisdiction, cooperation and fundamental rights safeguards. This section argues that operational challenges in cybercrime law enforcement do not change the obligation of EU institutions and Member States to ensure the safeguarding of EU fundamental rights in any operating framework of internal or transnational cooperation in law enforcement and criminal justice. Cybercrime law enforcement frequently cites the challenge of accessing and transferring data through existing Mutual Legal Assistance agreements. Yet practices taken outside of established legal channels cannot guarantee rights protections and run the risk of raising mistrust in the general public, the private sector and in transatlantic relations. Furthermore, across the spectrum of cybercrime prevention, investigation, and prosecution, the particular geography of the digital environment is said to complicate the traditional territorial foundations of law. Law enforcement bodies make continuous reference to the ways in which traditional legal structures stand in the way of operations. However, an updated legal framework designed to overcome these challenges should foreground fundamental rights concerns, which are essential to ensure due process and a necessary condition for the successful prosecution of cybercriminal offences. In light of these findings, the Study concludes with key recommendations for the European Parliament. In particular, to ensure that the Parliament is not marginalised altogether with respect to the implementation and review of EU cybercrime policies by the exercise of delegated powers, EU agency discretion and non-legislative decision-making bodies, further monitoring of EU council structures, Europol and international cooperation agreements is required (Recommendation 1). Moreover, the EP should ensure that the development of any cooperation/information-sharing framework guarantees the respect of fundamental rights (Recommendation 2). In light of the current discussions on a revised CoE Cybercrime Convention, the European Parliament should, further, ensure that the Convention's obligations are consistent with EU law and fundamental rights protections (Recommendation 3). The EP must also ensure that cybercrime is not used as a justification to undermine new information security protocols and the right to privacy in telecommunications, both of which are fundamental components of the functioning of the Internet (Recommendation 4). Finally, if European law enforcement agencies need to keep pace with technological change, it is imperative that training courses on cybercrime forensics and digital evidence include an applied fundamental rights component (Recommendation 5).

Details: Brussels: European Parliament, 2015. 68p.

Source: Internet Resource: Accessed November 17, 2015 at: http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536471/IPOL_STU(2015)536471_EN.pdf

Year: 2015

Country: Europe

URL: http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536471/IPOL_STU(2015)536471_EN.pdf

Shelf Number: 137311

Keywords:
Cybercrimes
Cybersecurity
Internet Crimes
Law Enforcement
Police Investigations

Author: Levi, Michael

Title: The Implications of Economic Cybercrime for Policing

Summary: London, as one of the world's leading financial centres, had a daily turnover in the foreign exchange market of L2,626 billion in April 2013 - all dependent on a highly interconnected electronic infrastructure and supporting technology. Yet this same technology that underpins and enables these global transactions also opens up businesses and individuals to new risks, in particular relating to cybercrime. The introduction of sophisticated technology has brought about a step-change in the way economic crime is committed - enabling frauds to be perpetrated at scale, at great speed, and at a distance, with no physical contact necessary between criminal and victim. It can be much harder to identify the individuals initiating crime, and often the location will be outside UK jurisdiction. These factors have resulted in a sharp escalation of such activities in recent years, bringing new challenges for policing and industry in preventing and tackling such crime. The City of London Police is the National Policing Lead for Economic Crime, and is playing a key role in proactively addressing these challenges including developing a national strategy. One major challenge has been coordinating information about criminal activity where this can be geographically widely dispersed. In addition to investigating some of the most serious frauds in the country, the City of London Police hosts the national reporting database - Action Fraud. This current research piece undertakes new analysis of data held by Action Fraud and its partner unit, the National Fraud Intelligence Bureau (NFIB) also hosted by the City of London Police. It finds that between October and December 2014 alone there were 106,681 reported fraud cases, a third of which related to banking and credit industry frauds. The median amount lost to fraudsters across all fraud types ranged from L112 lost through misuse of contracts in the telecom industry, to 38,974 lost from pension fraud. However the annual 250,000 crime reports received present only a limited view of several million crimes that are taking place within the UK annually to the cost of some $30billion. Under-reporting presents a challenge both in terms of research and policy responses. City of London Police initiatives to reduce fraud include training both the private and public sector in specialist skills through their Economic Crime Academy, piloting a focused victim care unit in London - the Economic Crime Victim Care Unit - and working closely with law enforcement across the UK to share information and co-ordinate action. Most importantly they include the formation of new national police fraud and cyber strategies focused on prevention at a national and local level. This research report highlights the necessity of working in partnership, both around primary prevention and building in security protection, and working with other agencies to disrupt criminal activities and pursue and prosecute offenders.

Details: London: City of London Corporation, 2015. 96p.

Source: Internet Resource: Accessed February 8, 2016 at: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf

Year: 2015

Country: United Kingdom

URL: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf

Shelf Number: 137785

Keywords:
Computer Crimes
Computer Fraud
Cybercrimes
Economic Crimes
Financial Crimes
Internet Crimes
Police Technology

Author: Tasmania Law Reform Institute

Title: Bullying

Summary: The Tasmania Law Reform Institute has released Final Report No 22, Bullying. The Report considers what role the law should play in responding to all types of bullying behaviours including cyber-bullying and questions whether the current legal regime in Tasmania can provide appropriate redress for victims. The Report makes 15 recommendations. Together, the recommendations are designed to create a tiered response to bullying consisting of: a criminal justice response reserved for the most serious examples which extends the offence of stalking in the Criminal Code to cover common bullying behaviours. The Report also recommends changes to the Justices Act to facilitate applications for restraint orders on the grounds of bullying. a civil justice response which seeks solutions through mediation and restorative justice practices. The Report recommends incorporating a mediation procedure into the restraint order process, or extending the jurisdiction of the Anti-Discrimination Commissioner to deal with complaints of bullying. Recommendations are also made to ensure that all Tasmanian workers have access to workplace bullying complaint processes. the development of legislative requirements for schools to implement anti-bullying policies and procedures. Policies should address the best interests of all children involved, whether those children are involved as victims, participants or bystanders.

Details: Hobart: Tasmania Law Reform Institute, 2016. 72p.

Source: Internet Resource: Final Report no. 22: Accessed http://www.utas.edu.au/__data/assets/pdf_file/0011/789698/Bullying_FR_A4_Print.pdf

Year: 2016

Country: Australia

URL: http://www.utas.edu.au/__data/assets/pdf_file/0011/789698/Bullying_FR_A4_Print.pdf

Shelf Number: 137799

Keywords:
Bullying
Cyberbullying
Cybercrimes
Internet Crimes
Stalking

Author: Delfino, Rebecca A.

Title: Pornographic Deepfakes - Revenge Porn's Next Tragic Act - The Case for Federal Criminalization

Summary: This could happen to you: You have appeared in digital photographs. Your pictures aren't sexually explicit or revealing - they just are pictures of your daily life: spending time with friends or your vacation selfies. Like millions of people, these images have likely made their way onto the Internet when you shared them on social media. But what if someone decides they don't like you? With an app available on any smartphone, the digital images of your face can be easily clipped from the pictures you posted the Internet and pasted onto the body of a person engaged in sexually explicit acts. Without your knowledge or consent, you become the "star" of a realistic, pornographic "deepfake." This hypothetical reflects an emerging phenomenon in sex exploitation cybercrimes - it is the next tragic act in the unauthorized public dissemination of private sexually explicit photos or videos, known as "revenge porn." What, if anything, can you do if you are inserted into a pornographic deepfake image or video against your will? Is it against the law to create, share, and spread falsified pornography on the Internet? At best, the answer to these questions is complicated and uncertain, and at worst, the answer is - no. Although the most effective deterrent for bad actors is one that criminalizes their behavior, there are currently no federal or state laws that criminalize the creation or distribution of pornographic deepfakes. And since deepfakes exist in cyberspace, they are not confined to an individual state jurisdiction. This is the first article to focus on the intersection of the law and pornographic deepfakes and to propose a legislative solution to the harms they unleash. A national response rooted in federal criminal law is required because everyone, everywhere is a potential deepfake victim - even you.

Details: Los Angeles: Loyola Law School, 2019. 61p.

Source: Loyola Law School, Los Angeles Legal Studies Research Paper No. 2019-08: Accessed April 13, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3341593

Year: 2019

Country: United States

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3341593

Shelf Number: 155391

Keywords:
Cybercrimes
Deepfakes
Digital Images
Internet
Online Victimization
Pornography
Revenge Pornography
Social Media

Author: Ball, Matthew

Title: Data Capture and Analysis of Darknet Markets

Summary: Darknet markets have been studied to varying degrees of success for several years (since the original Silk Road was launched in 2011), but many obstacles are involved which prevent a complete and systematic survey. The Australian National University's Cybercrime Observatory has developed tools to collect and analyse data captured from the darknet (illicit cryptomarkets). This report describes, at the high level, a method for collecting, and analysing, data from specific darknet marketplaces. Examples of typical results that may be obtained from darknet markets and current limitations to the automation of data capture are briefly outlined. While the proposed solution is not error-free, it is a significant step in the direction of providing a comprehensive solution tailored for data scientists, social scientists, and anyone interested in analysing trends from darknet markets.

Details: Canberra: Australian National University (ANU); ANU Cybercrime Observatory, 2019. 14p.

Source: Internet Resource: Accessed April 13, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3344936

Year: 2019

Country: Australia

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3344936

Shelf Number: 155400

Keywords:
Cryptomarkets
Cybercrimes
Dark Web
Illicit Markets