Chapter 1: Technology and Cybercrime Part 2
Cyber-Deception/Theft *Includes all the ways that individuals may illegally ___ information or resources online and often goes hand in hand with trespass *Criminals can use emails to acquire bank account information from victims through the use of ___ messages *In this case, a criminal sends a message claiming to be from the bank which needs the prospective consumer to validate their account information by clicking on a web link provided. The individuals are sent to a fraudulent website that resembles the actual financial institution and are asked to enter in their bank account username, login, and other sensitive information. This data is stored and used by the criminal to engage in fraud or resold to others through an online black market for stolen data. These crimes are particularly costly for consumers and businesses. *Digital ___ is included under cyber-theft, encompassing the illegal copying, using, or distributing of digital media, such as computer software, digital sound recordings, and digital video recordings, without the explicit permission of the copyright holder *The problem of piracy appears to be facilitated in large part by the subculture of pirates operating online. Participants help break ___ protections. They can access pirated media and software through various outlets. They encourage piracy by sharing their __ toward copyright law and ___ the harm caused by pirating media *Many young people believe piracy is an acceptable ___ behavior that has little impact on artists or private industry
acquire; phishing; piracy; copyright; attitudes; minimizing; victimless
There are several unique factors that may account for offending online, including the ___ of technology in the modern world, the ___ of committing certain forms of cybercrime, technology acting as a force ___, the ability to ___ detection by law enforcement via online anonymity, and challenges in international extraditions
availability; ease; multiplier decrease
*The third and final way that technology may be used in the course of an offense is through its incidental role or involvement in a __ -The computer may either be involved in the ___ of a crime or is being used merely as a ___ device -The presence of child porn on a laptop suggests that it is __ to the offense -This information, wherever it is stored, constitutes ___ evidence -Anything from the browser history of an individual to the emails, chat logs, photos present on mobile phones, GPS devices, IoT devices, and cell phone cameras of both victims and offenders
crime; commission; storage; digital
the ability to send or access injurious, hurtful, or dangerous materials online
cyber violence
can extend from hacking and other forms of cyber-trespass
cyber-deception/theft
the act of crossing boundaries of ownership in online environments
cyber-trespass
*There is a wide range of cybercrimes that can be performed ___ upon the individual's technical skill. -Some forms of cybercrime require a good deal of skill and proficiency, such as the creation and dissemination of malicious software. -Other forms of cybercrime may be performed with minimal investment on the part of the offender
dependent
information that is either transferred or stored in a binary form
digital evidence
*The __, ___, or ___ that may come from reporting cybercrime victimization also reduces the likelihood of contacting law enforcement. -___ scams: fraudster develops a romantic, emotional relationship with a person and gets the individual to send them money over time -Victims of these scams often feel substantial shame and embarrassment over their experience, not only because of the money lost but over the ___ trauma experienced by the betrayal of someone they thought loved them -When they report their experience, they often report feeling ___ by the police because of their complicity in transferring funds to the fraudster
embarrassment; shame; harm; romance; emotional; blamed
Cyber-Violence *This may encompass emotional harm such as __ or ___, and in limited circumstances __ harm through suicidal ideation *Technology has greatly increased the likelihood of ___ or ___ harm resulting from these messages *Various extremist groups with their own subcultures norms and values utilize the Internet in order to promote their beliefs and connect interested parties together *Extremist groups have utilized the Internet in order to engage in attacks against ___ targets worldwide *Hackers associated with various jihadist groups around the world have attempted to engage in ___ ___ of ___ (DDoS) attacks against governments and private businesses *In a DDoS attack, individuals send multiple requests to servers that house online content to the point where these servers become overloaded and are unable to be used by others. *As a consequence, these attacks can completely knock a service ___, causing companies to lose money and, potentially, customer confidence.
embarrassment; shame; physical; emotional; psychological; governmental; Distributed Denial of Service; offline
*Taken as a whole, the global reach of the Internet has created substantial difficulties for law enforcement agencies at home and abroad to ___ cybercrime laws globally. -The structure of policing establishes ___ for the investigation of crimes at the local, state, and federal levels -Offenses that occur within a single jurisdictional boundary are often the responsibility of ___ municipal police departments or sheriffs' departments, while those that cross state or national boundaries are handled by __ or ___ agencies -Many cybercriminals may not live within the ___ region as their victim, though even in they were in the same region, a victim may have no idea where the offender actually resides. This creates significant ___ as to the appropriate agency to contact and diminishes the amount of cybercrime reported to law enforcement. This undercounting is referred to as "the __ ___" of cybercrime, in that the true number of offenses is unknown
enforce; guidelines; local; state; federal; same; confusion; dark figure
Cyber-Porn/Obscenity *Cyber-porn and obscenity represents the range of sexually __ content online *Sexually explicit content is defined differently based on ___ *Porn and obscenity may be __ or __ based on local laws *The relatively legal nature of adult pornography has enabled the development of an extremely lucrative industry, thanks in part to the availability of streaming web content and high-speed connectivity *Accessing certain content like __ or ___-related material may be criminal depending on local laws *The ability to access pornographic content has also enabled the development of online subcultures focused on various deviant sexual activities. *Individuals with niche sexual fetishes can identify multiple outlets to discuss their interests with others in web forums, email lists, and online groups that engender the exchange of information in near real time. These make people feel like that are part of a larger group that validates their beliefs and attitudes *Sexual subcultures can also move into criminal activity when the actors victimize ___ and ___ either online or offline
expressive; locations; deviant; criminal; violent; animal; children; adults
*Cybercrimes are also attractive for some actors based on the ___ of their nation -__ laws make a significant difference regarding who and what an offender targets -Many industrialized nations have laws against ___, increasing the risk of prosecution and investigation for offenders if caught. -Therefore, attacking people within that country may ___ the likelihood of being prosecuted. -If a country does not allow their citizens to be ___ to another country to face prosecution for crimes, then the actor cannot be successfully investigated. (like Russians for the US) -It is extremely difficult to deter or sanction cybercriminals in ___ countries and may encourage attacks against certain countries with no consequences -Some developing nations may not have laws against computer misuse. If there is no laws, then the nation serves as a sort of "___ ___" for actors where they can operate with minimal risk of legal sanctions
laws; local; cybercrimes; increase; extradited; foreign; safe haven
*Various technological resources are designed to hide a person's ___ from others -__, the service used by individuals to access the Silk Road is a form of a proxy server that can be used to hide a computer's location by acting as an intermediary between a computer and the servers and systems it connects to through the Internet -Some offenders are even able to route their web and email traffic through other people's computers in order to minimize the likelihood that they are caught
location; Tor
*The risk of detection from law enforcement is much ____ in online environments than in the real world. -It is easier for offenders to conceal their identity -The faceless nature of the Internet makes it easy for individuals to hide their gender, age, or race -You can create a false account that is used to send threatening or harassing messages to others to help conceal their true identity
lower
*Technology acts as a force ___ in that computers and CMCs allow a single person to engage in crimes that otherwise would involve multiple and complex schemes in order to target such a significant number of victims. -In online environments, offenders can target thousands of victims at a time, worldwide, within seconds. -Online fraudsters regularly send out unsolicited emails, called spam, to thousands of victims using addresses harvested from information posted on public websites -Fraudsters increase the likelihood of success by targeting thousands of victims at once with information that is often publicly available.
multiplier
Cyber-Trespass *If the shop did not offer connectivity to customers, but you attempt to join and use their Wi-Fi anyway, you are trespassing because you are trying to break into the network that they own without the company's __ *The issue of ownership is critical in instances of trespass; especially for computer hackers who often attempt to access computer systems, email accounts, or protected systems that they do not __ *Many in the general public recognize hackers for their involvement in criminal acts of trespassing sensitive ___ of ownership, contributing to the belief that hackers cause significant harm to citizens, industry, and government alike. *Not all hackers engage in crime *Individuals who are interested in computer hacking operate within a large online ___ with participants from across the globe. They often come together online to discuss various techniques of hacking and their attitudes toward hacking with or without permission from system owners *Because not all hackers engage in crime, there is a rift within the subculture based on an individual's ___ to engage in acts of cyber-trespass in support of hacking
permission; own; boundaries; subculture; willingness
*One reason for the lack of reporting is the inherent difficulty in ___ when illegal activities have taken place *Individuals may be completely ___ that they have been the victim of cybercrime until it is too late *Many in the general public do not have the skills necessary to discern the __ cause, making it hard when some sort of compromise has taken place *It has also been challenging to identify clear risk ___ for certain cyber offenses *Protective software programs designed to reduce individual risk of victimization do not always ___. This is due in part to ___ error, such as misconfiguring the software or not updating it properly which increases the risk of infections. As a result, ___ software are not a total solution to reduce the risk of compromise.
recognizing; unaware; root; patterns; work; user; antivirus
*David ___ created one of the most recognized typologies of cybercrime, which encapsulates behavior into four categories: 1. Cyber-___ 2. Cyber-___ and ___ 3. Cyber-___ and ___ 4. Cyber-___ *These categories reference the wide range of deviant, criminal, and terrorist behaviors that have emerged utilizing technology, as well as the subcultures supporting offenders throughout the world
trespass; deception and theft; porn and obscenity; violence
*The ___ of technology makes it easy for individuals to gain access to the tools necessary to offend with relative ease. -The prices of computers have dropped making it easy to get. -IPads and phones have made it easier too. -Offenders can readily acquire and access information from anywhere through these resources -There are ___ barriers to computer technology globally
ubiquity; minimal
*Digital evidence can also be derived from online sources that may be present on __ and ___ ___. *Digital evidence collected from social media sites has been ___ in law enforcement over the last few years *With virtually every crime incorporating some form of ___ evidence, it is up to law enforcement to be able to identify the possible sources of information and the locations where such information may be found *Various peripheral devices like flash drives, CDs, DVDs, and even gaming systems may contain digital evidence than can be collected. *With digital devices increasingly being used to ___, act as a ___, or provide ___ for criminal activities, law enforcement and investigators must understand the nature of the digital crime scene
websites; social media; influential; digital; target; tool; suppport