Professional Documents
Culture Documents
C Criminal Justice and Cybersecurity Module 6 1
C Criminal Justice and Cybersecurity Module 6 1
C Criminal Justice and Cybersecurity Module 6 1
Types of cybercrime
What is cybercrime?
∙ Legal definition – cyber-related behavior that is against
the law
- Defined as illegal
- No legal defense or justification
- Offenders can be punished
∙ Sociological definition – cyber-related behavior society
describes as wrong, regardless of legality
Functions of cybercrime
Warning light about problems.
Social change
Boundary maintenance (help to understand rules)
Community integration (some would say that Russia’s behaviors in 2016
election brought Democrats together)
These functions apply to all types of crime (Durkheim)
Would you make cybercrime go away if you could?
Digital forensics – field that was borne, in part, out of criminal justice.
Experts define it as: “The use of scientifically derived and proven methods toward
the preservation, collection, validation, identification, analysis, interpretation,
documentation and presentation of digital evidence derived from digital sources for
the purpose of facilitating or furthering the reconstruction of events found to be
criminal, or helping to anticipate unauthorized actions shown to be disruptive to
planned operations.”
Criminal justice has been identified as one of three social sciences (Sociology and
Psychology being the other two) that would create competencies for the growing field
of digital forensics.
Digital
Hacking Cyber Attack Cyber Fraud
Piracy
Aka White Hat Hackers and ethical Should we teach “ethical hacking”?
hackers Benefits
Synack held a challenge – paid $30,000 ∙ Understand hacking
as highest reward for exposing ∙ Understand hackers
hacking vulnerabilities Disadvantages
Called bug bounties ∙ Learn how to commit crimes
∙ Pike (2013) cites research showing that
“both white-hat and black-hat hackers
understand the consequences of illegal
hacking, however, college students do not”
Wikimedia (2009). Bones DOS Trojan. Retrieved October 14, 2018 from
https://commons.wikimedia.org/w/index.php?search=BONES+dos+trojan&tit
le=Special%3ASearch&profile=default&fulltext=1#/media/File:Bones_DOS_
Trojan.jpg
spoofing, web/email phishing, session hijacking, attack based on manipulating network protocols,
network attacks
wireless WEP cracking, web application attacks against users or networks
basic, energy weapon (HERF gun, EMP/T bomb, attacks based on damaging the physical components
physical attacks
LERF), Van Eck of a network or computer
packet sniffing, host mapping, security scanning, attacks in which no damage is carried out, but information
information gathering
port scanning, OS fingerprinting is gathered by attacker
Information
Business Philosophy
Technology
Computer Criminal
Engineering
Science Justice
Illegally copying/using digital media that Top 10 Most Pirated Movies of 2017
is protected by copyright. ∙ Thor Ragnarok
∙ Music, television shows, movies, ebooks, ∙ Shape of Water
software photos, etc. ∙ Jumanji: Welcome to the Jungle
∙ Bright
Nearly $32 billion in TV/Movie revenue ∙ Blade Runner 2049
lost from piracy in 2017. ∙ Murder on the Orient Express
191 billion visits to online piracy sites in ∙ Downsizing
2016. ∙ Geostorm
∙ Justice League
∙ Coco (PCMAG.COM, 2018).
Sexting
Flaming
Outing
Here is one girl’s story:
Masquerading https://www.girlshealth.gov/bullying
/whatis/sexting.html
Exclusion
Some have talked about the “joy of violence” referring to the pleasure
some get out of hurting others. Is it possible that, for some bullies,
there is a “joy of cyber bullying”? If so, how does technology promote
this “joy”?
Business
Philosophy
Engineering
Computer Science
Criminal Justice
Revenge Sexual
Sexting Prostitution
porn blackmail
Internet technology:
Helps prostitutes “(a) reach large numbers of potential clients with informative advertising,
(b) build reputations for high-quality service, and (c) employ screening methods to reduce
the risk of discovery” (Cunningham/Kendall)
Provides new strategy for communication in form of sexting
“Weapon of emotional and reputational destruction” in revenge porn (Calvert)
Information Technology
Business
Philosophy
Engineering
Computer Science
Criminal Justice
https://www.pexels.com/photo/aircraft-
formation-diamond-airplanes-66872/
Shane, S. (2017, November 01). These Are the Ads Russia Bought on Facebook in 2016. Retrieved October 14, 2018,
from https://www.nytimes.com/2017/11/01/us/politics/russia-2016-election-facebook.html
Similar to other types of crime, when cases are prosecuted, cyber offenders are more
likely to plead guilty than go to trial.
Challenges
∙ Determining appropriate charges
∙ For cases that go to trial, technical evidence may confuse jurors
∙ Determining actual losses can be hard.
∙ Because cases are rarely prosecuted, defense will argue sentence is “unusual”
∙ Cases take a long time to prosecute.
∙ Victims (companies) may not be willing to participate
Fine Fine
Yes 10 (9.3) 2 (20.0) Yes 6 (7.2) 6 (17.1)
No 98 (90.7) 8 (80.0) No 77 (72.6) 29 (82.9)
Restitution Restitution
Yes 43 (39.8) 4 (40.0) Yes 38 (45.8) 9 (25.7)
No 65 (60.2) 6 (60.0) No 45 (54.2) 25 (75.3)
Probation Probation
Yes 7 (6.5) 0 (0.0) Yes 7 (8.4) 0 (0.0)
No 101 (93.5) 10 (100.0) No 76 (91.6) 35 (100.0)
Community Community
Service 8 (7.4) 0 (0.0) Service 8 (9.6) 0 (0.0)
Yes 110 (92.6) 10 (100.0) Yes 75 (90.4) 35 (100.0)
No No