Cybercrime Research Papers - Academia.edu (original) (raw)
Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas,... more
Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas, industria automotriz e instituciones gubernamentales de 150 países; y con el virus Firewall que, de acuerdo con la empresa de ciberseguridad Checkpoint, infectó a 250 mil máquinas alrededor del mundo, dejan de manifiesto que en cuestiones de ciberseguridad todos los actores de la sociedad son potenciales objetivos de ataques cibernéticos.
In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... more
In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international cooperation to battle cybercrime in signatory States. Whether or not India should join the Convention has, since then, been a topic of intense debate. In this paper, the author considers the Convention’s major strengths and weaknesses in five areas of crucial importance to Indian stakeholders. To sign or not? There might not be an easy answer, as this paper will show.
Cryptocurrency market is estimated at several hundred billion dollars. The number of digital coins has exceeded the threshold of one thousand, each day appearing or disappearing some of them. Volatility, the difficulty in practical... more
Cryptocurrency market is estimated at several hundred billion dollars. The number of digital
coins has exceeded the threshold of one thousand, each day appearing or disappearing some
of them. Volatility, the difficulty in practical operation, high cost, associated risk and particular
complexity make it quite difficult to choose one of the products without adequate counseling.
Proponents of new technologies presents relevant arguments, while the appellants their call
attention to the potential hazards/dangers to which expose themselves the investors. Reality
offers us a spectrum that combines measures to limit the phenomenon development with the
recognition and support from national and international organisms from which, however, is
expected to adopt a joint position on the approach. Born at the end of the first decade of the
second millennium, cryptocurrency has begun and continues to raise the interest of financial
markets in general and specialized institutions in particular.
- by Ștefan Zaharie Pop and +1
- •
- Cybercrime, Cryptocurrency
Apresentação destinada a um Seminário na disciplina "Cibercriminalidade" do Mestrado em Direito e Informática da Escola de Direito da Universidade do Minho, no dia 19 de maio de 2023, o qual tenho lecionado desde 2012. Uma versão... more
Apresentação destinada a um Seminário na disciplina "Cibercriminalidade" do Mestrado em Direito e Informática da Escola de Direito da Universidade do Minho, no dia 19 de maio de 2023, o qual tenho lecionado desde 2012.
Uma versão anterior servira de apoio uma aula da disciplina "Direito e Segurança Informática" do Mestrado em Segurança Informática da Universidade de Coimbra, no dia 2 de dezembro de 2022.
The criminalization of cybercrime is dependent on national sensitivities and implementation, even though cybercrime exhibits a transnational character. The Council of Europe Convention on Cybercrime [2001. ETS No. 185, Council of Europe,... more
The criminalization of cybercrime is dependent on national sensitivities and implementation, even though cybercrime exhibits a transnational character. The Council of Europe Convention on Cybercrime [2001. ETS No. 185, Council of Europe, Explanatory Report to the Convention on Cybercrime. 23. XI.2001, ETS – No.185. Budapest] does not specify general provisions of substantive criminal law, such as provisions on the minimum age of criminal responsibility (MACR). Therefore, determining this necessary element of culpability – the MACR for cybercrime – has been left to the choice of the States parties to the Convention. At the moment, the MACRs set by the States parties differ widely. Consequently, discrepancies between national laws have the potential to hinder international cooperation against cybercrime and to create criminal safe havens for perpetrators who are below the MACRs. This paper seeks to analyse the problem for cybercrime enforcement caused by the MACR and to develop suitable criteria against which provisions on MACRs for cybercrime should be judged.
While there are no new frauds, internet technology provides new opportunities for fraudsters by facilitating volumes of attacks that law enforcement then struggles to address. Moreover, since context can affect how potential victims... more
While there are no new frauds, internet technology provides new opportunities for fraudsters by facilitating volumes of attacks that law enforcement then struggles to address. Moreover, since context can affect how potential victims respond to frauds, crisis context influences how fraudsters design frauds. This article assesses fraudsters’ fraud design strategies during two external crisis events that impacted Australia: The Black Summer Bushfires that occurred from September 2019 to March 2020 and the onset and first year of the COVID-19 pandemic that occurred from January 2020 through January 2021. Targets, during these crises, were more likely to be vulnerable according to Steinmetz’s model victim for social engineering framework. This study shows that, in both crises, fraudsters deployed the social engineering techniques of “authority” and “scarcity,” techniques that are more likely to be successful based solely on initial contact. Fraudsters designed their requests to be easily actioned and crafted their scams to reference very recent events as the external crisis events evolved. Thus, they targeted broad audiences with minimal personal involvement. Furthermore, this study shows that fraudsters, when disseminating their scams via social media outlets, attempted to build “social proof” to expand their potential victim pool to include the marks’ social circles.
This essay aims to address a general conception of what privacy is, as well as an analysis of the challenges and dangers of living without privacy and the importance of data protection against the breakdown of traditional paradigms by new... more
This essay aims to address a general conception of what privacy is, as well as an analysis of the challenges and dangers of living without privacy and the importance of data protection against the breakdown of traditional paradigms by new technologies disruptive, concluding that cyber literacy and cyber hygiene are fundamental pillars to combat threats, disclosures, risks and vulnerabilities that could become security incidents that threaten arbitrary interference with private life.
This paper assesses the multiple initiatives developed currently in Europe to facilitate the cross-border access of law enforcement authorities to electronic evidence, which is every day more necessary to fight crime. It is a challenge... more
This paper assesses the multiple initiatives developed currently in Europe to facilitate the cross-border access of law enforcement authorities to electronic evidence, which is every day more necessary to fight crime. It is a challenge because it is imperative to develop effective mechanisms without sacrificing the human rights safeguards. Specifically, this paper studies the European Commission proposal of European production and preservation orders, the parallel efforts of the Council of Europe on the negotiation of an Additional Protocol to the Convention on Cybercrime to facilitate the access to electronic evidence, and finally the interaction of the European Union Law with the United States Cloud Act.
Infringement of an information system or data - case study
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals... more
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.
EL PRESENTE ARTÍCULO SE CENTRA EN EL DELITO DE ACCESO ABUSIVO ESTABLECIDO EN EL ARTÍCULO 615-TER DEL CÓDIGO PENAL ITALIANO. EN PRIMER LUGAR, ANALIZA LOS ACTOS DE ACCESO Y PERMANENCIA EN UN SISTEMA INFORMÁTICO. EN SEGUNDO LUGAR, DETERMINA... more
EL PRESENTE ARTÍCULO SE CENTRA EN EL DELITO DE ACCESO ABUSIVO ESTABLECIDO EN EL ARTÍCULO 615-TER DEL CÓDIGO PENAL ITALIANO. EN PRIMER LUGAR, ANALIZA LOS ACTOS DE ACCESO Y PERMANENCIA EN UN SISTEMA INFORMÁTICO. EN SEGUNDO LUGAR, DETERMINA SI EL DELITO DE ACCESO ABUSIVO PUEDE SER APLICADO, ADEMÁS DEL ‘OUTSIDER’ QUE CARECE DEL DERECHO DE ACCESO AL SISTEMA INFORMÁTICO, AL EMPLEADOR Y AL ‘INSIDER’ QUE ACCEDEN EXCEDIENDO SUS AUTORIZACIONES. FINALMENTE, SE ANALIZA EL BIEN JURÍDICO PROTEGIDO POR EL DELITO
Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such... more
Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such motivations and opportunities. Successful strategies to prevent cybercrime cannot focus only on technological or infrastructural defences but must address these global developments. While scientific understanding and political awareness of such causes are still limited, studies from different disciplines, including sociology, criminology and psychology, allow to detect some global criminogenic patterns and to identify the state responsibilities of national governments for failing to address them adequately. This article integrates the findings of these studies to provide a preliminary interdisciplinary theory of the global causes of cybercrime and assess what national governments can do to mitigate them.
The growing threat of cyber-crime poses significant challenges for police organisations. This paper presents original, empirical research on specialist cyber-crime units in Australia to report on the issues and problems faced by police... more
The growing threat of cyber-crime poses significant challenges for police organisations. This paper presents original, empirical research on specialist cyber-crime units in Australia to report on the issues and problems faced by police staff at the frontline of cyber-policing. Using a mix of survey data and in-depth interviewing with supervisors, key investigators, and civilian staff from two specialist cyber-crime units, this paper outlines the priority challenges as identified by members of these units. While staff report generally positive levels of job satisfaction working in the field of cyber-crime, three major themes emerged: (a) the accelerating quantity of the workload as cyber-crime becomes a bigger social problem; (b) the resourcing of the units has not developed commensurate with demand on workloads; and (c) the level of skills and training within units are insufficient to address the unique nature and growing complexities of policing cyber-crime. Suggestions by staff regarding how to improve this situation are considered.
En el Mercosur no existe un derecho penal común, no obstante observarse una creciente corriente orientada a la adopción de normas generales de política criminal tendiente a combatir diversos actos delictivos. Ello se cristaliza en la... more
En el Mercosur no existe un derecho penal común, no obstante observarse una creciente corriente orientada a la adopción de normas generales de política criminal tendiente a combatir diversos actos delictivos. Ello se cristaliza en la creación de normas de cooperación internacional en materia penal, con el objeto de lograr la asimilación y adecuación "macro" de las legislaciones penales de los Estados Parte. Es justo reconocer que en este trabajo no se pretende elaborar un corpus iuris por simple traslación de conceptos o legislación mercosureña, todo lo contrario. Por medio del análisis de las particularidades jurídicas del proceso de integración y sus instrumentos de derecho se busca dejar sentado que el Mercosur se encuentra encaminado en la creación de un espacio integrado de cooperación en materia penal, más allá del aspecto pura y exclusivamente económico. Y, principalmente, analizar cómo se presenta hoy en día la modalidad conocida como cibercrimen y la utilidad de las herramientas señaladas para lograr combatirlo.
Resume Não existe um direito penal comum no Mercosul, apesar disso se pode observar uma tendência crescente para a adoção de regras gerais de política criminal destinadas a combater vários atos criminosos. Isso se cristaliza na criação de normas de cooperação internacional em matéria penal, com o objetivo de alcançar a assimilação e a adaptação "macro" das leis penais dos Estados Parte. É justo reconhecer que este artigo não pretende elaborar um corpus iuris por simples tradução de conceitos ou legislação do Mercosul, muito pelo contrário. Através de uma análise das peculiaridades legais do processo de integração e dos seus instrumentos jurídicos, procura-se estabelecer que o Mercosul se destina a criar um
Penggunaan Teknologi Informasi (TI) yang sangat tidak terbatas menyebabkan kejahatan dunia maya dapat dilakukan oleh semua kalangan baik itu orang dewasa maupun di bawah umur. Di satu sisi, TI sangat berguna bagi pihak-pihak yang... more
Penggunaan Teknologi Informasi (TI) yang sangat tidak terbatas menyebabkan kejahatan dunia maya dapat dilakukan oleh semua kalangan baik itu orang dewasa maupun di bawah umur. Di satu sisi, TI sangat berguna bagi pihak-pihak yang memerlukannya namun di sisi lain TI dapat saja disalahgunakan oleh pihak-pihak tertentu termasuk anak di bawah umur. Tujuan dari penelitian ini untuk mengetahui bagaimana penegakan hukum dari kejahatan dunia maya di Indonesia serta bentuk-bentuk kejahatan dunia maya yang mungkin dilakukan oleh anak di bawah umur. Jenis metode yang digunakan dalam jurnal ini adalah metode penelitian hukum normatif. Penegakan hukum kejahatan dunia maya yang dilakukan oleh anak di bawah umur seharusnya melibatkan pihak yang berkompeten seperti Psikolog, Pembimbing kemasyarakatan, atau ahli lain yang diperlukan sehingga tidak salah dalam mengambil suatu keputusan dan setelah proses penegakan hukum, orang tua dari anak yang terlibat sebaiknya diwajibkan memberikan pengawasan dal...
The researcher investigated the extent of involvement in Cybercrime activities among students’ in tertiary institutions in Enugu state of Nigeria using cross sectional survey design. Questionnaires were used for data collection. A sample... more
The researcher investigated the extent of involvement in Cybercrime activities among students’ in tertiary institutions in Enugu state of Nigeria using cross sectional survey design. Questionnaires were used for data collection. A sample of 175 students was drawn from a population of 18,340 final year students in higher institutions in Enugu State using cluster sampling procedure. The instrument contains 12 items with 4 point scale of Most-times, Sometimes, Seldom and Never. The findings showed that students of higher institutions in Enugu state are involved in cybercrime. It also showed that students’ involvement in cybercrime is dependent on gender and Institution type. The implication of the finding for knowledge and development is that the present level of students’ involvement in cybercrime has a negative effect on the value of education and by extension, has lead to the setback in economic development of the State. It was recommended that government should empower the law enfo...
- by chinasa Odo
- •
- Cybercrime, Stalking, Phishing
India places fourth rank in cybercrimes in out of the top 10 most targeted countries by cyber attackers. The defenders are facing a lot of threats from these criminals via Internet. As Cyber-crime is an illegal activity and are... more
India places fourth rank in cybercrimes in out of the top 10 most targeted countries by cyber attackers. The defenders are facing a lot of threats from these criminals via Internet. As Cyber-crime is an illegal activity and are continuously increasing in India for financial loot. As Indian society are totally & blindly dependent on Internet without any precaution and required knowledge & education. These cybercriminals do their work quietly and smartly to access web users' private details over the internet. The motive of cybercriminal is intentionally harms the reputation of victim by using modern telecommunication network and mobile phones. Now the maximum uses of internet, the area of cybercrime is massive that include not hacking and cracking but also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage etc. and many more. They threaten a person or a nation and a government and business organization to access theirs prosperity. India is combatting to such problem and imposing some strict law that is not familiar with in the Indian society. In this paper we want to impose the awareness to society against these hidden criminals so that they do not share easily and frequently theirs private details over the internet without any knowledge and also want to aware cyber Laws and articles.
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics
Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and Communication Technologies (ICT) have enhanced the human interactions and have contributed to “reinvent” classical concepts such as political participation, political debate, decision-making. However, their all-encom- passing, ubiquitous nature and their growing use for political and military purposes poses significant risks to international peace, stability and security. The low barrier of access to ICT capabilities, the speed of technological advances and the complexity of the cyberspace environment with regard to traditional legal definitions of borders have presented new challenges to States (the main actors of international relations) such as the inherent complexity of accurately attributing cyber-attacks. It is both this complexity and the frequent insistence of parties to attribute cyber-attacks and incidents “beyond a reasonable doubt” that gives one the ability to deny responsibility and frustrate attempts to build trust and political rapport in cyberspace. The purpose of this research is to analyze how cyberspace affects the international politics. The nature of the topic dictates the use of qualitative analysis of primary and secondary sources such as official reports, declarations and policy documents, and academic analysis, in order to understand effects and dynamics carried out by the cyber domain on classical concepts such as war, peace and international relations. The main idea of this research is that the development of Information and Communication Technolo- gies (ICTs) and the related (r)evolution of warfare have produced relevant effects on the dynamics of the contemporary international system highlighting, at the same time, how the militarization of the cyber domain has posed consequences on interna- tional security, peace and stability. However, the lack of specific research related to “cyberspace’s effects on international politics” highlights the need to devote more attention on this topic bearing in mind that, more extensive and enduring analysis on cyberspace’s dynamics might allowed policy makers the opportunity to improve
awareness related to cyber threats in order to governing challenges emerging from the digital sphere.
For as long as Internet exists, jurists and lawyers have tried to convince the public and sometimes we should add also themselves that Internet is not an outlaw region, a new far west whereas the civilization’s rules cease to apply.... more
For as long as Internet exists, jurists and lawyers have tried to convince the public and sometimes we should add also themselves that Internet is not an outlaw region, a new far west whereas the civilization’s rules cease to apply. However, now more than ever it has become obvious that every internet user is susceptible to become the victim of various forms of attacks from unknown sources, most of the time with unknown means and with any trace to the criminal.
While the terms virus, hacking and even cracking have become very familiar to the public, the new evolution of the cybercriminality’s activity are for now much less known: what are exactly the romance scam, the scareware and ransomware? And what does it tell us about the actual mutations of the cybercriminal profile? This is the topic of this paper.
- by Tatiana Synodinou and +2
- •
- Cybercrime
- by Kitti Mezei
- •
- Hacking, Cybercrime
Social media content moderation is an important area to explore, as the number of users and the amount of content are rapidly increasing every year. As an effect of the COVID-19 pandemic, people of all ages around the world spend... more
Social media content moderation is an important area to explore, as the number of users and the amount of content are rapidly increasing every year. As an effect of the COVID-19 pandemic, people of all ages around the world spend proportionately more time online. While the internet undeniably brings many benefits, the need for effective online policing is even greater now, as the risk of exposure to harmful content grows. In this paper, the aim is to understand the context of how harmful content-such as posts containing child sexual abuse material, terrorist propaganda or explicit violence-is policed online on social media platforms, and how it could be improved. It is intended in this assessment to outline the difficulties in defining and regulating the growing amount of harmful content online, which includes looking at relevant current legal frameworks at development. It is noted that the subjectivity and complexity in moderating content online will remain by the very nature of the subject. It is discussed and critically analysed whose responsibility managing toxic online content should be. It is argued that an environment in which all stakeholders (including supranational organisations, states, law enforcement agencies, companies and users) maximise their participation, and cooperation should be created in order to effectively ensure online safety. Acknowledging the critical role human content moderators play in keeping social media platforms safe online spaces, consideration about their working conditions are raised. They are essential stakeholders in policing (legal and illegal) harmful content; therefore, they have to be treated better for humanistic and practical reasons. Recommendations are outlined such as trying to prevent harmful content from entering social media platforms in the first place, providing moderators better access to mental health support, and using more available technological tools.
A lo largo de la historia, las personas han expresado su política y su poder en una variedad de formas. En ese sentido, si bien la política internacional aparecería con la llegada de los primeros Estados organizados hace miles de años, la... more
A lo largo de la historia, las personas han expresado su política y su poder en una variedad de formas. En ese sentido, si bien la política internacional aparecería con la llegada de los primeros Estados organizados hace miles de años, la política global sería más reciente, apareciendo hace aproximadamente unos cinco siglos, cuando los Estados imperiales europeos comenzaron a unir los espacios geográficos más remotos del planeta a través de la conquista y del comercio. A partir de entonces, el planeta estaría caracterizado por la globalización o la interdependencia económica, cultural, legal, social, psicológica, tecnológica, ambiental y, por lo tanto, política, cada vez más compleja. Hasta hace poco, el desarrollo de la globalización había sido lento. Aunque los países se aliaban, intercambiaban y negociaban entre sí, las divisiones entre los Estados superaban con creces los lazos de cooperación, y las naciones a menudo resolvían sus conflictos con la guerra o la amenaza de guerra.
Artykuł ma za zadanie opisanie stron przestępstwa child groomingu, jakimi są sprawca oraz dziecko w wieku do piętnastego roku życia. Wskazane zostały zarówno zachowania ryzykowne, jak i czynniki chroniące w odniesieniu do ofiar, a także... more
Artykuł ma za zadanie opisanie stron przestępstwa child groomingu, jakimi są sprawca oraz dziecko w wieku do piętnastego roku życia. Wskazane zostały zarówno zachowania ryzykowne, jak i czynniki chroniące w odniesieniu do ofiar, a także cechy osobowościowe osoby dorosłej, która decyduje się na pokrzywdzenie dziecka. W niniejszym artykule przedstawione zostały również etapy wchodzące w skład procesu uwodzenia małoletnich z użyciem sieci teleinformatycznej. Istotnym zaznaczenia jest również fakt, iż w opracowywanym artykule przytoczono liczne dane statystyczne pochodzące z raportów krajowych oraz międzynarodowych traktujące o szeroko pojętej tematyce używania przez osoby małoletnie Internetu oraz podejmowanymi przez nie zachowaniami ryzykownymi mogące wpłynąć na fakt pokrzywdzenia cyberprzestępstwem.
Livro, em recurso eletrônico (eBook), publicado em 2011 em parceria com a Editora Delpos. Avalia os aspectos sobre a (in)segurança virtual no Brasil, desde o contexto da guerra cibernética, o cibercrime e os incidentes na Internet e como... more
Livro, em recurso eletrônico (eBook), publicado em 2011 em parceria com a Editora Delpos. Avalia os aspectos sobre a (in)segurança virtual no Brasil, desde o contexto da guerra cibernética, o cibercrime e os incidentes na Internet e como eles são/deveriam ser avaliados sob a ótica da atividade de inteligência. Obs.: não autorizo a colocação em outros sites para download.
With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also... more
With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also gaining ground which can be seen with an increase in the cyber crime cases in the last few years, especially in metropolitan cities. So, this paper tries to analyse the secondary data related to cyber crimes in metropolitan cities in India.
Key Words: Cyber Crime; Metropolitan Cities; Persons Arrested; Conviction; Police Pendency; Court Pendency, etc.
El surgimiento de la pandemia Covid-19, en diciembre de 2019 en China y su posterior expansión a nivel mundial, representó un fuerte impacto en los hábitos de toda la población. Las relaciones sociales virtuales, que ya estaban... more
El surgimiento de la pandemia Covid-19, en diciembre de 2019 en China y su posterior expansión a nivel mundial, representó un fuerte impacto en los hábitos de toda la población. Las relaciones sociales virtuales, que ya estaban aumentando, se expandieron y pasaron a formar parte de nuestra rutina, convirtiéndose en un lugar común para el trabajo, la educación, la salud y otros campos de la actividad humana. En el escaso tiempo de un año, la infraestructura cibernética soportó un flujo de información muchas veces más grande que el que teníamos hasta
entonces. Este artículo tiene como objetivo evaluar la relación entre la pandemia y el campo de la ciberseguridad durante el año 2020.
- by Mariano C Bartolome and +1
- •
- Cybercrimes, Cybersecurity, Public Security, Cybercrime
The acknowledgement that cybercrime offenders are embedded within local contexts presents a broad vector for further study. But research in this area is still in its early days and many topics need to be developed further. Foremost among... more
The acknowledgement that cybercrime offenders are embedded within local contexts presents a broad vector for further study. But research in this area is still in its early days and many topics need to be developed further. Foremost among these is the geography of cybercrime. This endeavour has an important policy contribution to make. For example, if we can determine which countries are producing cybercrime at more significant levels, preventative measures can be specifically targeted to those countries. The first step within such a research agenda must be the development of an index of cybercriminality by country, as this is foundational to identifying hubs of digital offending and the factors driving the emergence of these hubs. This paper is methodological in its contribution, and does not offer its own empirical findings. Instead, it aims to provide some broad foundational thinking for a very challenging research exercise, and it is intended to support later, more refined, efforts to develop indices. It consists of two components. First, it reviews existing attempts to identify and rank cybercrime hotspots. Second, it draws important lessons from these works towards developing a successful index. Some methodological points are made on what the way forward may be for this emerging field, and how a reliable and valid index on cybercriminality could be crafted.
- by Miranda Bruce and +1
- •
- Information Security, Cybercrimes, Computer Security, Cybercrime
The recent hacking of the Federal Board of Revenue (FBR) system, which resulted in the leakage of confidential data on the dark web, has once again raised questions on the effectiveness cybersecurity response system in Pakistan 1.... more
The recent hacking of the Federal Board of Revenue (FBR) system, which resulted in the leakage of confidential data on the dark web, has once again raised questions on the effectiveness cybersecurity response system in Pakistan 1. However, it’s not a new incident. In January 2021, Sophos Labs (A private cyber threat intelligence firm) report made some extremely alarming revelations2. According to the report, there are trojanized versions of Android Apps and websites such as the Pakistan Citizen Portal App, published by the Government of Pakistan on Google Play Store. These sites and apps contain malware to steal and exfiltrate sensitive data and information such as CNIC numbers, passport details, usernames, passwords of Facebook accounts, can also read private messages, GPS data, and record phone calls. Hackers deployed the torjanized versions of legitimate apps and websites for the cyber espionage and covert surveillance of Pakistani citizens. Since its introduction in the early 1990s, the Internet industry has progressed rapidly3. Pakistani society has gradually built up its footprints in cyberspace and resultantly its dependence on Information and Communication Technologies (ICT). However, despite this increasing reliance on ICT platforms, Cyber Space is still ungoverned and poses a multitude of challenges to the national security of Pakistan. Hostile agencies are taking full benefit of the unguarded cyberspace of Pakistan to undermine the national security of the country. EU DisinfoLab report is a case study example of such targeted online campaigns against Pakistan4. Rising cyber-attacks against the government and private websites, fake news, targeted disinformation campaigns, phishing attacks, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are some facets of cybersecurity challenges confronted by the State.
Bu el kitabını CEH içeriğine uygun olarak modüler bir yapıda hazırlamaya çalıştım. El kitabı, daha çok bir saldırı klavuzu olarak nitelendirilebilir. Penetrasyon testi sırasında “hangi işlemleri, hangi sırayla ve nasıl uyguluyoruz?”... more
Bu el kitabını CEH içeriğine uygun olarak modüler bir yapıda hazırlamaya çalıştım. El kitabı, daha çok bir saldırı klavuzu olarak nitelendirilebilir. Penetrasyon testi sırasında “hangi işlemleri, hangi sırayla ve nasıl uyguluyoruz?” sorularını ortadan kaldırmak ve karışıklıkları gidermek adına, adım adım hazırlanmış bir rehber ortaya koymaya çalıştım.
Okunduğunda, rehberde ele alınan başlıklar hakkında sizlere tatmin olabileceğiniz kadar çok şey öğretebilecek bir çalışma olmayacağının altını çizmek istiyorum. Burada iş biraz okuyucuya düşüyor. Bu çalışmada genel hattıyla ele alınan konuları daha detaylı öğrenerek, araştırma yaparak ve azimle çalışarak kendinizi geliştirmek şartıyla bir şeyler öğrenebilirsiniz.
Cybercrime represents a significant threat for the 21st century, a threat that traditional methods of policing cannot adequately manage. Consequently, new ways of policing utilising specialised teams have been implemented to address... more
Cybercrime represents a significant threat for the 21st century, a threat that traditional methods of policing cannot adequately manage. Consequently, new ways of policing utilising specialised teams have been implemented to address cybercrime proactively. One method of policing that has been relatively unexplored within academic literature is covert online investigations, wherein law enforcement creates false identities to interact with offenders from. Existing research has not comprehensively explored what tactics, techniques, and procedures law enforcement use when conducting these investigations. Accordingly, selection and training of employees presents unique challenges. Therefore, this study aims to provide a detailed evaluation of what skills are needed by law enforcement. This information can then inform future training and selection. This study examines in-depth semi-structured interviews with eight New Zealand Police investigators using Applied Cognitive Task Analysis. Dat...
What marked forensic linguistics as unique is its young age compared to other disciplines. Here we review and collected 88 articles that strongly related to Forensic Linguistic (FL) from time to time. These articles help to reveal from... more
What marked forensic linguistics as unique is its young age compared to other disciplines. Here we review and collected 88 articles that strongly related to Forensic Linguistic (FL) from time to time. These articles help to reveal from its conceptualization in 1968 to its fame in 1988, how it responds to the great diversity of people, and what form it may take in the future. A literature-based analysis as library research in nature helps in defining the FL issue and manage to see in the early stages was simply concerned about the use of language in legal cases. As society continues to change FL has linked with so many other disciplines besides law. Therefore the definition of this discipline may also transform. Presently, FL no longer limits itself to the particular social setting of a courtroom but could be applied to the virtual world or cyberspace influences users negatively and dynamically developed. There is a line of proof that FL will be used to prevent and predict the social settings between citizens who could easily be not law-abiding as they seem. Shortly, the use of FL will be much more accessible to individuals through artificial intelligence (AI). Moreover, individuals will no longer need to hire experts and be able to use FL with freely available artificial intelligence (AI).
Misogyny Online explores the worldwide phenomenon of gendered cyberhate as a significant discourse which has been overlooked and marginalised. The rapid growth of the internet has led to numerous opportunities and benefits; however, the... more
Misogyny Online explores the worldwide phenomenon of gendered cyberhate as a significant discourse which has been overlooked and marginalised. The rapid growth of the internet has led to numerous opportunities and benefits; however, the architecture of the cybersphere offers users unprecedented opportunities to engage in hate speech. This book weaves together data and theory from multiple disciplines. Its data sources include a meticulously archived collection of cyberhate that I received over the course of two decades working as a journalist – has already been recognised by scholars and public figures as providing a powerful, original, and timely statement about the rapidly escalating international gendered cyberhate problem and its harms. It has also been commended for offering a major contribution to the interdisciplinary study of emerging communication technologies, contemporary manifestations of hate speech, digital citizenship, internet governance, and digital divides.
what is Troll Trolling & Law in India
Marking the 25th anniversary of the “digital divide,” we continue our metaphor of the digital inequality stack by mapping out the rapidly evolving nature of digital inequality using a broad lens. We tackle complex, and often unseen,... more
Marking the 25th anniversary of the “digital divide,” we continue our metaphor of the digital inequality stack by mapping out the rapidly evolving nature of digital inequality using a broad lens. We tackle complex, and often unseen, inequalities spawned by the platform economy, automation, big data, algorithms, cybercrime, cybersafety, gaming, emotional well-being, assistive technologies, civic engagement, and mobility. These inequalities are woven throughout the digital inequality stack in many ways including differentiated access, use, consumption, literacies, skills, and production. While many users are competent prosumers who nimbly work within different layers of the stack, very few individuals are “full stack engineers” able to create or recreate digital devices, networks, and software platforms as pure producers. This new frontier of digital inequalities further differentiates digitally skilled creators from mere users. Therefore, we document emergent forms of inequality that...
Despite the rapid escalation of cyber threats, there has still been little research into the foundations of the subject or methodologies that could serve to guide Information Systems researchers and practitioners who deal with cyber... more
Despite the rapid escalation of cyber threats, there has still been little research into the foundations of the subject or methodologies that could serve to guide Information Systems researchers and practitioners who deal with cyber security. In addition, little is known about Crime-as-a-Service (CaaS), a criminal business model that underpins the cybercrime underground. This research gap and the practical cybercrime problems we face have motivated us to investigate the cybercrime underground economy by taking a data analytics approach from a design science perspective. To achieve this goal, we propose (1) a data analysis framework for analyzing the cybercrime underground, (2) CaaS and crime ware definitions, and (3) an associated classification model. In addition, we (4) develop an example application to demonstrate how the proposed framework and classification model could be implemented in practice. We then use this application to investigate the cybercrime underground economy by analyzing a large dataset obtained from the online hacking community. By taking a design science research approach, this study contributes to the design artifacts, foundations, and methodologies in this area. Moreover, it provides useful practical insights to practitioners by suggesting guidelines as to how governments and organizations in all industries can prepare for attacks by the cybercrime underground.
Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in... more
Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity.
This paper includes the gender-neutral approach of Section 66E, the application of this section, the explanations, and the kind of situations this section would be applicable in, a similar provision in the Protection of Children from... more
This paper includes the gender-neutral approach
of Section 66E, the application of this section, the
explanations, and the kind of situations this section
would be applicable in, a similar provision in the
Protection of Children from Sexual Offences (herein
after referred to as POCSO) Act, 2012 and the
shortcomings of this section.
Zeus is a well-known and effective family of 'man-in-the-browser' malware. This qualitative case study analyses posts in online cybercrime forums that discuss Zeus configuration. Online cybercriminals were found to share, sell, steal, and... more
Zeus is a well-known and effective family of 'man-in-the-browser' malware. This qualitative case study analyses posts in online cybercrime forums that discuss Zeus configuration. Online cybercriminals were found to share, sell, steal, and trade configuration files. The discussions and advertisements on the forums, which span four years, were found to evolve with market conditions and externalities, including Zeus being offered as a subscription service. The release of tools to decrypt configuration files by security researchers was also closely followed on the forums, and assisted offenders when it came to stealing configuration files from others.
Healthcare system is rapidly transitioning from a traditional health-center and specialist-focused model to a more scattered, patient-centric model. Medical Internet of Things (MIoT) provides machine-to-machine contact and real-time... more
Healthcare system is rapidly transitioning from a traditional health-center and specialist-focused model to a more scattered, patient-centric model. Medical Internet of Things (MIoT) provides machine-to-machine contact and real-time intervention solutions, which in the near future will drastically revolutionize healthcare delivery, affordability, and reliability. The Medical Internet of Things (MIoT) is a new technology that aims to improve patient quality of life by allowing individualized e-health services irrespective of time or place. The Medical Internet of Things (MIoT), often known as healthcare IoT, is a network of medical devices and applications. MIoT applications are intimately linked to sensitive healthcare services, particularly because they manage sensitive patient information such as names, health records, addresses, and health problems. The key problem in the MIoT area is to protect the confidentiality and privacy of patients without compromising security. The security and privacy of data acquired from MIoT devices, either while transmission to the cloud or while kept in the cloud, are key unsolved challenges, as this data is heavy, sensitive, and require a high level of security. We examine present security and privacy challenges, as well as security and privacy needs connected to data flow in the MIoT, as well as technical shortcomings and research issues for future work, in this paper. Finally, we can state that the growing adoption of the MIoT in recent years has brought enormous benefits to both medical organizations and their patients.
we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will... more
we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will take a gander at a couple of the diverse security strategies that are being utilized in this field and their different shortcomings. Innovation is quickly advancing in a world driven by informal communities, online exchanges, distributed computing, and robotized measures. Yet, with the innovative advancement comes the advancement of cyber-crime, which ceaselessly grows new assault types, apparatuses, and strategies that permit aggressors to enter more intricate or very much controlled conditions, produce expanded harm and even stay untraceable. The current article plans to get an outline of the cyber-crime as it is characterized and uncovered by particular writing, worldwide enactment, and chronicled realities, and play out an investigation of attacks revealed from one side of the planet to the other throughout the most recent three years to decide examples and patterns in cyber-crime. Because of the consequences of the examination, the article presents countermeasures that organizations may embrace to guarantee improved security that would uphold in safeguarding their business from assailants from a data security point of view.