Regulating Cybercrime Flashcards
(103 cards)
anonymity online?
the use of proxy servers, encryption technology, and anonymous email accounts facilitates the ability to conceal one’s identity online.
What is cybercrime?
ybercrime refers to crimes committed through the use of computers, computer networks, or other forms of information and communication technology (ICT).
What are the two main categories of cybercrime?
Cyber-dependent crimes, which can only be committed through the use of technology
Cyber-enabled crimes are traditional crimes that have been increased in scale or reach by using technology.
What are some challenges in regulating cybercrime?
The networked nature of communication makes tracing difficult
Data may be stored in jurisdictions with lax regulation
Effective regulation requires a mix of legal, architectural, social norms, and market-based approaches to address cybercrime.
What is cyberterrorism?
Cyberterrorism can broadly be divided into two categories: situations where technology is used to facilitate the activities of terrorists and the use of computer network tools to harm or shut down critical national infrastructures.
What are some challenges in collecting statistical data on cybercrime?
There is a lack of consensus on the definition of cybercrime which affects its inclusion in official crime statistics
Some crimes facilitated by technology are not distinguished from offline crimes in the statistics
Under-reporting of cybercrime incidents
Lack of expertise and resources among law enforcement agencies
Problems with data collection methods can all contribute to the difficulty in collecting accurate data.
What is the distinction between an internal and external perspective in online offending?
The internal perspective is the perception of the user inside the virtual world
The external perspective is the view of the outsider observing the computer in the physical world
Criminal law is based on physical conduct and requires the physical act and mental state of the defendant
Online offending is reduced to physical conduct, as the harm and conduct leading to it occur in the real world.
what is Lax regulation?
Definition: Regulations that are not strict or rigorous.
Criminal sanctions for online conduct generally fall into three categories
offenses against the person,
offenses against property, and
offenses against public order.
Offenses against the person, such as virtual rape, can only be prosecuted if they fall under threat, harassment or stalking statutes.
Offenses against property may be offenses relating to unauthorized access and modification of data, while offenses against public order may include hate speech or incitement to violence.
what is malware?
Malware refers to malicious software, including viruses, worms, Trojans, bots, and spyware. It is often used to gather personal information for fraud or to discover vulnerabilities to exploit. Malware is commonly disseminated through infected storage devices or via the internet through executable files or deceptive advertisements.
What is a virus?
A virus is a malicious software that infects another program and replicates itself.
Requires activation of its host to be triggered.
Can cause significant damage to computer networks, and can result in data loss or theft.
What is a worm?
A self-replicating malicious software that propagates independently.
Similar to a virus but does not need to infect another program.
Can cause significant damage to computer networks, and can result in data loss or theft.
Can breach a system and propagate independently without triggering its host.
virus vs. worm
Primary difference: viruses require activation of their host, while worms can propagate independently after breaching a system.
Both can cause significant damage to computer networks and result in data loss or theft.
Both are types of malicious software.
What are Trojans?
Trojans are malicious programs that appear to be harmless but contain a hidden function. These programs can be delivered through software, email attachments, or websites, and can be used to install a back door, allowing a hacker to gain remote access to a computer. Some Trojans are designed specifically for financial attacks, such as Man-In-The-Browser attacks during online banking sessions.
In some cases, the presence of Trojans may be used as a defense, as the defendant claims that their computer was infected with malware of which they were unaware.
Bots
Bots are programs that infect a computer and allow remote control. They can be part of a “botnet”, a group of infected computers that can carry out coordinated tasks, such as spamming, DDoS attacks, malware distribution, click-fraud, and identity theft.
spyware
Spyware: a type of software that monitors a computer user’s activities and can collect personal and financial information without the user’s knowledge; can range from adware to more malicious programs designed for covert surveillance
DoS attack
DoS (Denial of Service) attack: a malicious effort to overload a network, server, website or computer, and cause it to crash, thus denying access to legitimate users.
DDoS attack
DDoS (Distributed Denial of Service) attack: the most sophisticated form of DoS attack, involving enlisting other computers to attack the target.
Challenges of cybercrime
Scale: Enormous scale due to the large pool of potential offenders and victims.
Accessibility: Technology is almost everywhere, making it accessible for both offenders and victims.
Anonymity: Criminals try to stay anonymous, and this possibility increases in cybercrime, making it hard to find a person behind a cybercrime attack.
Portability and Transferability
Global Reach: Cybercrime often has an international character, making it difficult to assess the case.
Absence of Capable Guardians: There is a lack of effective substantive criminal law, which has to do with prosecution.
types of cybercrime
Individual Cyber Crimes: Targeting individuals.
Organizational Cyber Crimes: Targeting organizations.
Property Cybercrimes: Targeting property such as credit cards or intellectual property rights.
Society Cybercrimes.
Article 6 Convention on cybercrime :
Art 6 CoC deals with the misuse of devices
Tools and programs are criminalised in art 6 CoC, however under 1(a) and 2 manuals on how to misuse devices could also be included through interpretation
It is up to national law to decide whether it falls or not.
Computer related forgery
Article 7 CoC
input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless of whether or not the data is directly readable and intelligible. A Party may require an intent to defraud, or similar dishonest intent before criminal liability attaches.
explanation:
It does not have to be tangible, and it does not have to be directly readable and intelligible.
Art 225 DPC -> general forgery
Falsification of digital documents falls under this provision (dutch case law)
Art 232 DPC -> forgery of payment cards
Used for cases of skimming, not like the one above bc in 225 the requirements is ‘readable’ and cards contain codes with no meaning so are they readable? For this art this doesn’t matter bc it is specific to payment cards
Skimming is collecting data from a magnetic strip of a card and copying it in another card.