- Cybercrime
Cybercrime contains all criminal offences which are committed with the aid of communication devices in a
network . This can be for example theInternet , thetelephone line or themobile network .Overview
An international legal definition of cybercrime that is used by most of the countries in Europe and North America as well as South Africa and Japan was agreed to in the
Convention on Cybercrime , and entered into force on1 July 2004 .Although the term "cybercrime" is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.
:Examples of cybercrime which the computer or network is a tool of the criminal activity include
spamming andcopyright crimes, particularly those facilitated throughpeer-to-peer networks.:Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating
access control s), malicious code, anddenial-of-service attacks.:Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds.
:Finally, examples of traditional crimes facilitated through the use of computers or networks include Nigerian 419 or other gullibility or
social engineering frauds (e.g.,hacking "phishing ",identity theft ,child pornography ,online gambling ,securities fraud , etc.).Cyberstalking is an example of a traditional crime -- harassment -- that has taken a new form when facilitated through computer networks.Additionally, certain other information crimes, including
trade secret theft and industrial or economic espionage, are sometimes considered cybercrimes when computers or networks are involved.Cybercrime in the context of national security may involve
hacktivism (online activity intended to influence policy), traditionalespionage , orinformation warfare and related activities.One of the recent researches showed that a new cybercrime is being registered every 10 seconds in Britain. During
2006 the computer crooks were able to strike 3.24 million times. Some crimes performed on-line even surpassed their equivalents in real world. In addition, experts believe that about 90% of cybercrimes stay unreported.According to a study performed by Shirley McGuire, a specialist in psychology of the
University of San Francisco , the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. Shirley McGuire mentioned that quite often parents cannot understand the motivation of the teenage hackers. She performed an anonymous experiment, questioning more than 4,800 students in the area ofSan Diego . Her results were presented attheAmerican Psychological Association conference:
* 38% of teenagers were involved in software piracy;
* 18% of all teens confessed of entering and using the information stored on other personal computers or websites;
* 13% of all the participants mentioned they performed changes in computer systems or computer files. The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. Most teenagers performed illegal computer actions of curiosity, to experience excitement. Many cyber police are getting more complaints aboutOrkut these days as many fake profiles are being created and thus facilitating crimes.Cyber criminology
The
neologism of cyber criminology is increasingly used to describe an area of study for criminologists which is separate fromcyber forensics .ee also
*
Internet police References
#Adamski A. (1998) Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
#Jaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol 1 Issue 1 January 2007.Retrieved on March 15 2007, from http://www40.brinkster.com/ccjournal/editorial.htm
#Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar, Sage Publications. Retrieved on December 15 2006, from http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351
#Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to pornography on the internet’, Library and Information Research, 27(86), 8–18.
#McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households using the Routine Activity Approach. A thesis submitted to the University of Melbourne, February, 2000. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/childsafety/index.html
#Mann, David and Sutton, Mike, (1999). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, vol. 38, no. 2, Spring 1998.
#Thomas, D. and Loader, B. (2000) ‘Introduction – cyber crime: law enforcement, security and surveillance in the information age’, in: D. Thomas and B. Loader (Eds.), Cyber crime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge.
#Wall, D.S. (2007) Cybercrime: The transformation of crime in the information age, Cambridge: Polity
#Yar, M. (2005) The Novelty of ‘Cyber crime’: An Assessment in Light of Routine Activity Theory European Journal of Criminology, Volume 2 (4): 407–427:Further reading
*Brenner, S.W. (2007) "Law in an Era of Smart Technology", New York: OUP
*McQuade, S. (2006) "Understanding and Managing Cybercrime", Boston: Allyn & Bacon
* Pattavina, A. (ed.) (2005) "Information Technology and the Criminal Justice System", Thousand Oaks, CA: Sage
* Wall, D.S. (2007) "Cybercrime: The transformation of crime in the information age", Cambridge, UK: Polity
*Williams, M. (2006) "Virtually Criminal: Crime, Deviance and Regulation Online", London, UK: RoutledgeExternal links
* [http://www.bluecoat.com/doc/7993 The Alarming Shift in Cybercrime] wikinewshas|news related to this article
*
* [http://politicalhacking.blogspot.com/ Politically Motivated Computer Crime and Hacktivism]
* [http://www.infoniac.com/hi-tech/british-cybercrooks-moving-crime-per-seconds-speed.html British Cybercrooks Moving at One-Crime per 10 Seconds Speed]Academic links
* [http://steeplemedia.com/blogs/cyb3r_crim3/ Cyb3rCrim3.org] Susan W. Brenner
* [http://www.jisclegal.ac.uk/cybercrime/cybercrime.htm Cybercrime - High Tech crime] JISC Legal Information Service
* [http://www.lib.msu.edu/harris23/crimjust/cybercri.htm Criminal Justice Resources - Cybercrime]
* [http://information-retrieval.info/cybercrime/ Cybercrime NYLS]
* [http://www.cybercrimelaw.org/ Cybercrime Law]
* [http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm Council of Europe's Cybercrime Convention]
* [http://www.crime-research.org Computer Crime Research Center]
* [http://www.ask-pc.com/lessons/CYBERCRIME-MIDDLE-EAST.pdf Cybercrime in the Middle East] Informative Article about Cybercrime in the Middle East, ISSA JournalGovernment resources
* [http://www.cybercrime.gov/ Cybercrime.gov] US Department of Justice CCIPS
* [http://www.us-cert.gov/ US CERT] United States Computer Emergency Readiness Team (US-CERT)
* [http://www.fbi.gov/cyberinvest/cyberhome.htm FBI Cyber Investigations Home Page]
* [http://www.ustreas.gov/usss/financial_crimes.shtml#Computer US Secret Service Computer Fraud]
* [http://onguardonline.gov/index.html On Guard] OnGuardOnline.gov
* [http://www.consumer.gov/idtheft/ ID Theft]
* [http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html FindLaw Computer Crime]
* [http://www.rcmp-grc.gc.ca/scams/ccprev_e.htm RCMP Computer Crime Prevention] Royal Canadian Mounted Police
* [http://www.international.gc.ca/foreign_policy/internationalcrime/cybercrime-en.asp Foreign Affairs and International Trade Canada]
* [http://www.dc3.mil Department of Defense Cyber Crime Center]Commercial resources
* [http://www.e-crimecongress.org Annual e-Crime Conference] : International Conference for Public & Private Security Specialists
Wikimedia Foundation. 2010.