CRM303 Week 1 - Introduction to Cybercrime

CRM303 Technology, Crime and Justice

Course Overview

  • Instructor: Dr. Michael Wilson

  • Institution: Murdoch University

  • Email: michael.wilson@murdoch.edu.au

Acknowledgement of Country

  • Recognizes the Whadjuk people of the Noongar nation as traditional custodians.

  • Acknowledges Noongar elders past, present, and emerging.

Introduction to the Course

  • Focus on the intersection of technology, crime, and justice.

Important Classroom Guidelines

  • Discussions will cover controversial topics.

  • Emphasis on creating a safe space for debate and exploration of sensitive issues.

  • Students are encouraged to seek help if struggling with content.

Key Questions to Explore

  1. Influence of technology on deviant behavior.

  2. Change in offender-victim relationships due to technological advancements.

  3. Geographic jurisdiction challenges created by technology.

  4. Digital property ownership in criminal law.

  5. Challenges posed by technology in criminal investigations.

  6. Effects of digital surveillance on privacy rights.

  7. Distribution of technology's costs and benefits.

  8. Realization of the rule of law in cyberspace.

Understanding Technology

What is Technology?

  • Definition: Development via science and mathematics for practical purposes (Brey, 2017).

  • Two components:

    • Hardware: Tools and machines extending human capabilities.

    • Techniques: Knowledge of means-ends/ cause-effect relationships.

Examples of Technology in Society

  • Historical comparisons:

    • IBM 5100 (1975)

    • Dell XPS Laptop (2021)

    • Royal #10 Typewriter (1918)

    • Printing Press Machine (1819)

Technological and Social Determinism

  • Explores the relationship between technology and culture:

    • Technological Determinism: Technology shapes society and culture.

    • Social Determinism: Cultural choices influence technological development.

Autonomous Technology

  • Definition: Technology that evolves beyond human control (Ellul, 1964).

  • Discussion on the social impacts of technology and technophobia:

    • Technophobia: Excessive fear or anxiety towards new technologies (Khasawneh, 2018).

Understanding Cyberspace

What is Cyberspace?

  • Definition: The environment for communication over computer networks.

  • Differentiates between public and private cyberspace.

  • Concept of the metaverse as a unified virtual space.

Understanding Computers

  • Definition: Devices for data processing and storage.

  • Programming basics:

    • Instructions for computers to execute (Brookshear & Brylow, 2020).

    • Higher-level programming languages for efficiency.

Computer Networking

  • Basics of networking:

    • Node: Individual computer in a network.

    • Client: Requests services from a server.

    • Server: Provides services to clients.

  • Overview of the Internet:

    • As a 'network of networks'.

    • Surface Web, Deep Web, and Dark Web distinctions.

History of the Internet

  • Development timeline from ARPANET to commercialization.

  • Major milestones:

    • Web 1.0: Static webpages (1991-2004).

    • Web 2.0: Social media and user-generated content (2004-present).

    • Introduction of smartphones and smart devices.

The Concept of Cybercrime

Overview of Cybercrime

  • Definition: Illegal behaviors using computer systems or cyberspace (Holt et al., 2018).

Distinction from Traditional Crimes

  • Cybercrime has unique characteristics:

    1. Compressed space-time between offenders and victims.

    2. Potential for extensive connectivity.

    3. Dynamic online identities.

Types of Cybercrime

  1. Computer-enabled Crime: Incidental use of a computer for traditional crimes.

  2. Computer-dependent Crime: Crimes requiring computer use.

Evolution of Cybercrime

  • Generational changes in cybercrime:

    • First Generation: Traditional offences using computers.

    • Second Generation: Blended cybercrimes in global networks.

    • Third Generation: High-end cybercrimes mediated by technology.

Categories of Cybercrime

  1. Cyber-Trespass: Unauthorized digital boundary crossing.

  2. Cyber-Deception and Theft: Illegal acquisition of information or resources.

  3. Cyber-Obscenity: Content deemed obscene within legal jurisdictions.

  4. Cyber-Violence: Online harassment and harmful behavior.

Next Week's Focus

  • Topic: Regulating Cyberspace

  • Email: michael.wilson@murdoch.edu.au

  • Reminder about classroom standards and expectations for virtual interaction.

Examples of Cybercrime Typology:

  1. Computer-enabled Crime:

    • Example: Someone uses a computer to commit fraud by sending deceptive emails that look like they come from a legitimate bank (phishing).

  2. Computer-dependent Crime:

    • Example: A hacker breaks into a company’s database to steal sensitive personal information, relying entirely on their computer skills and tools.

  3. Categories of Cybercrime:

    • Cyber-Trespass:

      • Example: A user bypasses security measures to access restricted areas of a website without authorization.

    • Cyber-Deception and Theft:

      • Example: A scam where an individual impersonates another person online to gain access to their financial resources.

    • Cyber-Obscenity:

      • Example: Distribution of illegal pornography that violates local laws on obscenity.

    • Cyber-Violence:

      • Example: A person engaging in online bullying or harassment, leading to psychological harm to the victim.

Cybercrime typologies can fit into traditional crime categories as follows:

  1. Crimes Against Person: This includes cyber-violence (e.g., online harassment, bullying), where the victim may suffer psychological harm. Cyber deception that leads to fraud can also impact individuals directly.

  2. Crimes Against Property: Cyber-trespass and computer-dependent crime, such as hacking into systems to steal sensitive information, directly affects the property rights of individuals and organizations. These acts represent violations of ownership and security of data.

  3. Crimes Against Morality: Cyber-obscenity pertains to the dissemination of content that violates societal standards of decency, such as illegal pornography. This typology raises moral and ethical questions about online behavior and its impact on social values.

Overall, these cybercrime typologies represent modern interpretations of traditional crime classifications, adapting to the complexities of digital interactions.

robot