CJ240_Mid-Term Review (Short version without White-Collar Crime)_3.6.20221

Chapter 1: Introduction and Overview of Cyber Crime and Cyber Terrorism

  • Cybercrime Definition:

    • Cybercrime is described as a "computer-assisted crime" where computers play a supporting role in committing a crime.

    • Computer Crime: Focuses directly on harming computer technology; examples include hacking and DDoS attacks.

    • Legal Perspective: U.S. Department of Justice defines computer crime as any criminal law violation involving knowledge of computer technology.

    • Nature of Cybercrime: Involves causing physical or mental harm or committing extortion through networks and information technology (Back, 2018).

The Reality of Increased Cybervictimization

  • Two major trends contributing to cybervictimization:

    • Increased usage of computers.

    • Increased access to technical information on creating viruses and hacking techniques.

The Wall's Categories of Cybercrime

  • David Wall's Four-Category Typology:

    • Cybertrespass: Gaining unauthorized access to computer systems (hacking).

    • Cyberpornography: Involves the trading of sexually explicit materials online.

    • Cyberviolence: Represents acts of harm (actual or threatened) in the digital space, including bullying and hate crimes.

    • Cyberdeception: Involves acquisition through deceit in cyberspace, covering areas like fraud, identity theft, and digital piracy.

Examples of Cybercrime

  • Cybertrespass: Unauthorized access to a university system or corporate database.

  • Cyberdeception: Cyber piracy (stealing intellectual property), romance scams, and data theft.

  • Cyberpornography: Broad definition including trading of images, videos, and sexual services online.

  • Cyberviolence: Encompasses behaviors that result in emotional or physical harm.

Chapter 2: Cyber Terrorism and Information Warfare

  • Cyberterrorism Definition:

    • A politically or ideologically motivated attack against computer systems resulting in violence against civilian targets.

    • Examples include attacks leading to serious disruptions and bodily harm (UNODC, 2020).

  • Cyber Warfare:

    • The use of technology to wage war against states, compromising critical infrastructure similar to physical warfare (UNODC, 2020; Maras, 2016).

Uses of the Internet for Terrorist Purposes (UNODC, 2012)

  • Propaganda, financing, training, planning, execution, and cyberattacks.

Financing Terrorism

  • Online methods include direct solicitation, e-commerce, and exploiting payment tools.

  • Example: Younis Tsouli's case illustrates laundering through stolen credit cards for recruitment and propaganda.

Cyber Espionage

  • Primary Tactics: Malware distribution, social engineering, spear phishing, and monitoring frequented websites (watering hole attacks).

Cyber Organized Crime

  • Typologies based on online vs. offline operations:

    • Type 1: Groups primarily online.

    • Type 2: Hybrid groups that operate both online and offline.

Chapter 3: The Criminology of Computer Crime

  • Theories:

    • Rational Choice Theory: Crime occurs when benefits outweigh the risks.

    • Routine Activities Theory: Crime occurs in the absence of capable guardians and presence of motivated offenders.

    • Deterrence Theory: The possibility of punishment deters crime; applicable to both general and specific deterrence.

  • Agnew's General Strain Theory: Crime may result from stress or negative emotions.

  • Akers’ Social Learning Theory: Crime is learned through associations with others who engage in it.

  • Gottfredson and Hirschi’s Self-Control Theory: Low self-control correlates with higher likelihood of engaging in cybercrime.

Chapter 4: Hackers

  • Motivations: Revenge, exposure, hacktivism, ego, monetary gain, and entertainment.

Chapter 5: Cyber Espionage and Cyber Organized Crime

  • Industrial Espionage: Theft for commercial advantage by private entities.

  • Economic Espionage: State-sponsored intelligence activity targeting U.S. interests.

Chapter 6: White-Collar Crimes

  • Identity Theft: Significant increase due to technological advances, leading to numerous consumer fraud complaints.

  • Internet Fraud Schemes: Include financial fraud, online auctions, and phishing, with multiple methods employed to deceive victims.

robot