Defining and Measuring CybercrimeHow does modern society cope with the
threats caused by the ubiquity of technology? Internet access and technology have affected
all aspects of modern lifeCommunicationsFinance and businessMedicine Private entities
This has benefits but also results in costs
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Costs of growth of technologyGrowth has spawned a range of deviant and
criminal behaviorsPose unique challenges to law enforcement
and legal systemMassive numbers of victims with little effortAttacks against nations/states Little time or money invested Allows for a significant degree of anonymity
Significant threat creates a strong need to identify and understand online criminality
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Defining and Measuring Cybercrime Cybercrime
Perpetrator uses special knowledge of cyberspace
Computer crimePerpetrator uses special knowledge about
computer technologyVarious definitions
Among government agenciesNational agencies
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Global Cyber Law SurveyConsensus crimes include
Unauthorized accessComputer-mediated espionagePrivacy violationsDamage or theft of computer hardwareIllicit tampering of data or filesComputer or network sabotage Use of information systems to commit fraud,
forgery, and “traditional crimes”
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Definitional and Measurement IssuesCountries can agree on what behaviors
constitutes cybercrimeFew nations define what cybercrime is
Affected by industrialization level Significant undercounting of these crimes
Crimes go unreported Confusion over how or where to file reports
Barriers to research Lack of statistical measures, quality data
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Cybercrime FrameworkCyber-trespassCyber-deception/TheftCyber-porn/ObscenityCyber-violence
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Cyber-trespass Crossing of invisible yet salient boundaries of
ownership on-lineMost notable example of cyber trespass
criminals are computer hackersHackers are individuals with desire to
penetrate systems they do not own
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Cyber-trespass: Hackers Individuals with a profound interest in
computers and technology that have used their knowledge to access computer systems
Malicious or ethical purpose alike More hackers are tied to criminal breaches of
networksAlso responsible for malicious software
programs or malware
Copyright © 2010, Thomas J. Holt, All Rights Reserved
Computer MalwareComputer viruses, worms, Trojan horse programsAlter functions within computer programs and
filesDisrupt email and network operationsAccess private filesDelete or corrupt computer software or hardware
Enable identity theft, fraud and loss of personal information
Pose significant threat to users around globeSignificant costs and losses
Copyright © 2010, Thomas J. Holt, All Rights Reserved