Cybercrime Definition:
Cybercrime is described as a "computer-assisted crime" where computers play a supporting role in committing a crime.
Computer Crime: Focuses directly on harming computer technology; examples include hacking and DDoS attacks.
Legal Perspective: U.S. Department of Justice defines computer crime as any criminal law violation involving knowledge of computer technology.
Nature of Cybercrime: Involves causing physical or mental harm or committing extortion through networks and information technology (Back, 2018).
Two major trends contributing to cybervictimization:
Increased usage of computers.
Increased access to technical information on creating viruses and hacking techniques.
David Wall's Four-Category Typology:
Cybertrespass: Gaining unauthorized access to computer systems (hacking).
Cyberpornography: Involves the trading of sexually explicit materials online.
Cyberviolence: Represents acts of harm (actual or threatened) in the digital space, including bullying and hate crimes.
Cyberdeception: Involves acquisition through deceit in cyberspace, covering areas like fraud, identity theft, and digital piracy.
Cybertrespass: Unauthorized access to a university system or corporate database.
Cyberdeception: Cyber piracy (stealing intellectual property), romance scams, and data theft.
Cyberpornography: Broad definition including trading of images, videos, and sexual services online.
Cyberviolence: Encompasses behaviors that result in emotional or physical harm.
Cyberterrorism Definition:
A politically or ideologically motivated attack against computer systems resulting in violence against civilian targets.
Examples include attacks leading to serious disruptions and bodily harm (UNODC, 2020).
Cyber Warfare:
The use of technology to wage war against states, compromising critical infrastructure similar to physical warfare (UNODC, 2020; Maras, 2016).
Propaganda, financing, training, planning, execution, and cyberattacks.
Online methods include direct solicitation, e-commerce, and exploiting payment tools.
Example: Younis Tsouli's case illustrates laundering through stolen credit cards for recruitment and propaganda.
Primary Tactics: Malware distribution, social engineering, spear phishing, and monitoring frequented websites (watering hole attacks).
Typologies based on online vs. offline operations:
Type 1: Groups primarily online.
Type 2: Hybrid groups that operate both online and offline.
Theories:
Rational Choice Theory: Crime occurs when benefits outweigh the risks.
Routine Activities Theory: Crime occurs in the absence of capable guardians and presence of motivated offenders.
Deterrence Theory: The possibility of punishment deters crime; applicable to both general and specific deterrence.
Agnew's General Strain Theory: Crime may result from stress or negative emotions.
Akers’ Social Learning Theory: Crime is learned through associations with others who engage in it.
Gottfredson and Hirschi’s Self-Control Theory: Low self-control correlates with higher likelihood of engaging in cybercrime.
Motivations: Revenge, exposure, hacktivism, ego, monetary gain, and entertainment.
Industrial Espionage: Theft for commercial advantage by private entities.
Economic Espionage: State-sponsored intelligence activity targeting U.S. interests.
Identity Theft: Significant increase due to technological advances, leading to numerous consumer fraud complaints.
Internet Fraud Schemes: Include financial fraud, online auctions, and phishing, with multiple methods employed to deceive victims.