Cybercriminaliteit
Week 1
The Internet and its Opportunities for Cybercrime
Cybercrime: crimes in which computer networks are the target or a substantial tool.
Typologies: the internet as object, instrument or environment.
- The internet as tool.
- The internet as target.
- Computers as the environment of crime, in the sense of a more or less neutral background
for a crime.
Categorization of cybercrime (Council of Europe’s Cybercrime Convention):
- Offences against the confidentiality, integrity and availability of computer data and
systems -> hacking, illegal interception, data interference (viruses), system interference,
and misuse of devices.
- Computer-related offences: forgery and fraud.
- Content-related offences and copyright offences -> child pornography.
Typologie (Wall, 2007):
- First generation: consists of traditional crimes where (stand-alone) computers are merely a
tool.
- Second generation: consists of crimes facilitated by local or global computer networks.
- Third generation: true crimes, wholly mediated by technology. These are high end and sui
generis cybercrimes that would not exist without the Internet.
o The focus is not so much the role of the Internet as tool or target, but the way in
which crime itself is being transformed by the Internet, evolving into new forms
with different patterns of offender organization and offender-victim relations.
- Fourth generation?: cybercrime occurs not only through the internet but in completely
virtual spaces.
Risk factors of cybercrime:
- The internet has a global reach, enabling perpetrators to look for the most vulnerable
computers and victims anywhere in the world without having to leave home or the next-
door internet café.
- The internet leads to deterritorialization, which implies that cybercrime is almost by
definition international, with consequent legal challenges of jurisdiction and cross-border
co-operation.
- Allows for decentralized, flexible networks in which perpetrators can (loosely) organize
themselves to divide labour or to share skills, knowledge, and tools.
1
, - The internet facilitates anonymity, at least for perpetrators who have the knowledge and
take some effort of using anonymization tools such as remailers and torrent networks;
however, also less tech-savvy perpetrators are relatively anonymos when they operate at a
(large) distance from behind an IP number, email address, or scame profile that is often
not easy to trace to a specific individual.
- The internet enables distant interaction with victims, removing potential social barriers
that perpetrators face in physical, person-to-person interaction.
- The internet facilitates manipulability of data and software with minimal cost, because it
is based on digital representation and because the Internet was built as an open
infrastructure with intelligence at the end points to foster innovation by end-users.
- The internet allows for automation of criminal processes, where one piece of software
launched on the Internet can replicate and attack millions of computers at the same time,
but also over longer periods of time, and where basic software such as sample virus can
be easily costumised by so-called ‘script kiddies’ to create a new virus.
- The internet can blow up the scale of a crime form a minor nuisance to a major harm, for
example when a virus has far graver consequences than a curious script kiddie imagined.
- The internet allows for aggregation of a large number of insubstantial gains. More in
general, cybercrime often has many victims with relatively small damage each.
o Reduces incentive to report, investigate and prosecute the crime.
- The internet facilitates an information economy where information has become a valuable
asset, both in the legal market and in the black market, where credit-card numbers and
passwords are traded to facilitate fraud and theft.
- The internet has structural limitations to capable guardianship that can serve as a social
or technical obstacle to commit crime.
- The internet has rapid innovation cycles, allowing for new techniques and tools to be
developed in short periods for committing crime and for circumventing existing
countermeasures.
High risk cyber-crime is really a mixed bag of threats
Cyber-assisted crimes: criminals have used computers to help organize crimes.
- Transformation test: If you take internet away from the crime they will probably still be
committed.
Cyber-enabled crimes / hybrid cybercrimes: established crimes in law for which the internet
provides criminals with global and networked opportunities, such as pyramid-selling schemes.
- If you take the internet away these crimes will still take place, but at more localized
levels.
Cyber-dependent crimes: the true cybercrimes that are the spawn of the internet.
- If you take the internet away, these crimes will disappear completely.
2
,Modus operandi:
- Crimes against the machine: crimes that attack the integrity of the computer’s access
mechanisms such as hacking and cracking.
o Computer misuse act 1990.
- Crimes that use machines: fraud, phishing, which use networked computer systems to
engage victims with the intention of dishonestly acquiring cash, goods or services.
o Fraud act 2006.
- Crimes in the machine: computer-content crimes that relate to the illegal content of
computers systems.
o Verspreiden van kinderporno en haat-gerelateerd materiaal.
DDOS: distributed denial of service.
Werkgroepopdrachten
Vraag 1
Categorieën:
1. Op basis van welke rol het internet speelt in de daad.
2. Op basis van de Council of Europe’s Cybercrime Convention: deze ordert cybercrime op
basis van de soort overtreding.
3. Wall’s categorie: op basis van generaties.
1. Typologies: the internet as object, instrument or environment.
- The internet as tool.
- The internet as target.
- Computers as the environment of crime, in the sense of a more or less neutral background
for a crime.
2. Categorization of cybercrime (Council of Europe’s Cybercrime Convention):
- Offences against the confidentiality, integrity and availability of computer data and
systems -> hacking, illegal interception, data interference (viruses), system interference,
and misuse of devices.
- Computer-related offences: forgery and fraud.
- Content-related offences and copyright offences -> child pornography.
3. Typologie (Wall, 2007):
- First generation: consists of traditional crimes where (stand-alone) computers are merely a
tool.
- Second generation: consists of crimes facilitated by local or global computer networks.
3
, - Third generation: true crimes, wholly mediated by technology. These are high end and sui
generis cybercrimes that would not exist without the Internet.
o The focus is not so much the role of the Internet as tool or target, but the way in
which crime itself is being transformed by the Internet, evolving into new forms
with different patterns of offender organization and offender-victim relations.
- Fourth generation?: cybercrime occurs not only through the internet but in completely
virtual spaces.
Vraag 2
Botnet (robot network): is een verzameling computers die zijn aangesloten op het internet en in
onderlinge samenwerking een taak uitvoeren.
DDOS (distributed denial of service): Hiermee wordt de capaciteit van onlindediensten of de
ondersteunende servers en netwerkapparatuur aangevallen. Het resultaat van deze aanval is dat
diensten slecht of helemaal niet bereikbaar zijn van medewerkers of klanten.
Door een botnet te gebruiken kan, middels de samenwerkende computers, de capaciteit
van een server of website worden overspoeld, waardoor deze niet meer (goed) werkt. Het
botnet kan dus gebruikt worden om een DDOS-aanval uit te voeren.
Malware (malicious software): software die gebruikt wordt om computersystemen te verstoren,
gevoelige informatie te verzamelen of toegang te krijgen tot private computersystemen.
Ransomware (gijzelsoftware): is een malware die een computer (of de gegevens die op een
computer staan) blokkert en vervolgers de gebruiker geld vraagt om de computer weer te
‘bevrijden’ middels een tegen betaling verstrekte code.
Ransomware is een vorm van malware.
Social engineering: een techniek waarbij een computerkraker een aanval op de computersystemen
tracht te ondernemen door in te spelen op de eigenaar van die computer. Hierbij wordt gebruik
gemaakt van nieuwsgierigheid, vertrouwen, hebzucht, angst en onwetendheid. De aanval is
gericht op het verkrijgen van vertrouwelijke of geheime informatie.
Phishing: pogingen om mensen via e-mail informatie te ontfutselen en in de val te lokken.
Bij phishing wordt gebruik gemaakt van social engineering, om zo de slachtoffers in de
‘val te lokken’.
White hat hackers: ethische ‘goede’ hackers
4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller seanjansen. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $5.36. You're not tied to anything after your purchase.