Write conclusion with recommendations for a paper attached.
Writing style. You will use
American Psychological AssociationLinks to an external site.
(APA) writing style using the seventh edition of the
APA Manual Links to an external site.
. Another source for APA writing style is Purdue University’s Online Writing Lab (OWL) at
APA OwlLinks to an external site.
. In the event there is a conflict between the APA manual and my instructions, my instructions will be followed.
Criteria | |
---|---|
Your group paper will be organized as follows: You will name your Word or PDF file as: group name_C100_title of paper. Example: Group_A_C100_Determinism_and_Policing.Your paper will have a running head that matches the title of your paper.You will use APA formatYou use standard font, 12-point. (Excludes tables and footnotes).Use double-spaced text.Your paper will the following mandatory sections:Title pageTitle of paper – bold textAuthors’ nameInstitutional affiliationCourse number and nameMy name: Dr. Ygnacio FloresAssignment due dateAuthor’s note is optionalAbstractInclude list of key wordsMain BodyIntroductionYou must start with the sub-heading of the Thesis Statement. This section will include only your thesis statement.The second sub-heading will be your Working Theory. Identify your working theory and why you selected this theory to write on your topic.Use a SPECT Analysis using the following headings:Social PerspectivePolitical PerspectiveEconomic PerspectiveCultural PerspectiveTechnological PerspectiveUse additional headings to organize your paper into logical ideas and arguments.ReferencesYou will have a minimum of seven resources.You will have no more than two quotes. Quotes can be no longer than two sentences. I want to read your voice in the paper, not that of another author. Paraphrase your sources and cite using APA writing style.A factual statement will be accompanied by a citation.Use primary sources. |
MAIN BODYIntroduction, to include a thesis statement and working theory. Keep this section brief.Discuss the issue or problem to be examined, why you selected it, why it is important, and what can be expected from your analysis.What the scholarly objective of the paper is.Developed as a group.SPECT AnalysisThis is the heart of your paper.Devote your critical thinking to this section.Each group member will write a section from the SPECT analysis that is at-least two-pages in length.Conclusions and Recommendations. Developed as a group.Reference page. |
TOPIC SELECTION
- How high-profile attacks are leading to increased government response
. You will explore your selected topic using a SPECT/720-Degree analysis (Social, political, economic, cultural, and technological/3
60
-degree analysis of criminal justice internally and 360-degree analysis of criminal justice externally). This is an analytical paper and not a book-report style paper.
GRADING CRITERIA
For maximum credit on your group paper, you must show that you:
- Selected a relevant topic for your paper. You must research a topic concerning cybercrime or cybersecurity.
- Composed a coherent thesis and supported it fully in your paper.
- Conducted the appropriate level of research into the topic you selected.
- Critically analyzed your research, as well as other relevant information.
- Reached a logical conclusion and supported it with your research.
- Understand the social development, processes, and outcomes, as well as any limitations or implications of the subject matter you are examining.
- Communicated and articulated your thoughts clearly following the appropriate form, style, and citation requirements and employing correct grammar.
Rubric
Rubric
Maximum Points
30
Rubric
SPECT/720-Degree Analysis Rubric
Ratings | Pts | ||
---|---|---|---|
This criterion is linked to a Learning OutcomeAnalysis of TopicAnalysis of TopicHow effectively does the Topic Paper accomplish its intended task?Paper is complete and effectively meets assignment requirements.Paper effectively addresses a cybercrime or cybersecurity problem.Paper contains substantive ideas; specific, relevant, useful and accurate information; verifiable facts; adequate explanation of terms and concepts; and sound argument in support of its claims.Paper has a clear thesis.Paper provides a logical sequence of thoughts.Paper has an introduction and conclusion.Paper has well-structured paragraphs with effective transitions. |
30 pts |
||
This criterion is linked to a Learning OutcomeMechanics of Topical PaperTopic Paper demonstrates effective drafting, editing, revision, proofreading and formatting that addresses:Grammar and sentence structure- No passive sentences- No contractions- No colloquial languageSpellingWord choice/correct usagePunctuation and capitalizationCorrect use of APA citation and reference formats |
30 ptsFull Marks0 ptsNo Marks | ||
Total Points: 60 |
Use a SPECT/720 Analysis when writing your paper. A SPECT analysis is based on a multi-disciplinary approach using the following academic lenses:
SPECT ANALYSIS (MY PART IS THE SOCIAL- DO THE SOCIAL WITH 720 DEGREE ANALYSIS )
- Social: Factors that shape and define the mores and behaviors in a population.
- Political: Factors related to the factors of power in society. This includes governments, organizational leaders, and individual influence.
- Economic: Factors that affect the systems of monetary practices and the identification of types of currency in society.
- Cultural: Factors that shape unique practices, beliefs, morals, and definitions of acceptable behavior in society.
- Technological: Factors that shape society using technology and how actors use technology to shape, direct, and control a population.
720-DEGREE ANALYSIS
- Analysis considers multiple stakeholders.
- 360-deree analysis of the phenomena being explored from within a structural perspective. Example: Looking at homeland security from within the government.
- 360-degree analysis of the phenomena being explored from an external structural perspective. Example: Looking at homeland security from organizations and people external to the government.
- Gilbert, “TikTok is Pushing Incel and Suicide Videos…Links to an external site.” (2023) (PDF Version Download PDF Version)
- UN Office of Counter-Terrorism, Report, “Examining the IntersectionLinks to an external site.Between Gaming and Violent ExtremismLinks to an external site.,” (skim and explore)
- Southern Poverty Law Center “Hate MapLinks to an external site.” (2022)
- Warzel and Thompson, “They Stormed the Capitol. Their Apps TrackedLinks to an external site.ThemLinks to an external site.” (on digital footprints)
- Harris, “How Police Exploited the Capitol Riot’s Digital RecordsLinks to an external site.” (2023):
How high-profile attacks are leading to increased government
response
Prompt:
SPECT Analysis
● Social: Factors that shape and define the mores and behaviors in a population.
● Political: Factors related to the factors of power in society. This includes
governments, organizational leaders, and individual influence.
● Economic: Factors that affect the systems of monetary practices and the identification
of types of currency in society.
● Cultural: Factors that shape unique practices, beliefs, morals, and definitions of
acceptable behavior in society.
● Technological: Factors that shape society using technology and how actors use
technology to shape, direct, and control a population.
720-Degree Analysis
● Analysis considers multiple stakeholders.
● 360-degree analysis of the phenomena being explored from within a structural
perspective. Example: Looking at homeland security from within the government.
● 360-degree analysis of the phenomena being explored from an external structural
perspective. Example: Looking at homeland security from organizations and people
external to the government.
Misc:
●
●
●
●
●
15 pages
APA format
Min 7 resources
< 2 quotes
Primary sources
Project breakdown:
● https://georgewbush-whitehouse.archives.gov/nsc/nssall.html
● https://time.com/6096903/september-11-legal-history/
○ https://www.theguardian.com/nsa-inspector-general-report-document-data-collecti
on
○ https://www.nytimes.com/interactive/2015/04/25/us/25stellarwind-ig-report.html
● https://archives.fbi.gov/archives/news/testimony/the-terrorist-threat-confronting-the-unite
d-states
● https://www.justice.gov/archive/ll/what_is_the_patriot_act.pdf
How high-profile attacks are leading to increased government
response
● https://www.justice.gov/archive/ll/highlights.htm
● https://crsreports.congress.gov/product/pdf/IF/IF11451
●
Title
How high-profile attacks are leading to increased government
response
Your paper will the following mandatory sections:
Abstract
● Include list of keywords
Main Body
Introduction
You must start with the sub-heading of the Thesis Statement. This section
will include only your thesis statement.
The second sub-heading will be your Working Theory. Identify your
working theory and why you selected this theory to write on your topic.
Use a SPECT Analysis using the following headings:
Social Perspective
Political Perspective
Economic Perspective
Cultural Perspective
Technological Perspective
720 Analysis
Use additional headings to organize your paper into logical ideas and arguments.
References
Social Perspective
Since many high-profile cyber attack cases recently, cyber security has become crucial to
government and society. However, they go far beyond raising awareness—they often determine
moral values in populations whose lives have been changed due to such incidents. An all-around
examination, as it were, which dissects the ramifications of these externalities from more societal
perspectives. (Kollmuss & Agyeman, 2002).
How high-profile attacks are leading to increased government
response
Public Awareness and Behavioral Change
One of the most apparent social reactions to famous cyber attacks is a significant rise in public
awareness. The attention does not stop at an appreciation that cyber-attacks are possible but also
extends to a sense of their full potential impact. This creates awareness in individuals that they
are vulnerable in the digital space, which causes them to alter their behavior. This can be
exemplified by the TikTok event, which shows how digital media influences social behaviors,
especially among the young generation. This algorithm in the platform is intended to engage
users by providing them with content that the system predicts they are interested in. This
exposure can be quite influential in determining social norms and behavior, which is especially
important in vulnerable childhood. Such content presents a moral dilemma concerning the
obligation of tech firms to protect their users, including minors, from such content.
Organizations, too, transform. Companies, especially those with confidential client data, are
more vigilant in protecting their networks. There is a renewed emphasis on implementing strong
cybersecurity measures, annual security audits, and training programs to recognize and counter
cyber threats. This is directly caused by comprehending the catastrophic business impact, brand
damage, and trust loss by the customers resulting from cyber-attacks. (Hofstede, 1980).
Government Response and Policy Evolution
The government's response to large-scale cyberattacks has short-term and medium-term
solutions. Right after the attack, there was a strong focus on the investigation issue, identifying
the perpetrators and limiting the damage. Nevertheless, the long-term implications are much
more crucial socially. Governments start reviewing and strengthening their cyber security
legislation and policies. This could involve the development of stricter data protection laws,
How high-profile attacks are leading to increased government
response
more funding for national cybersecurity programs, and more collaboration with the private sector
and international organizations.
These policy changes do not merely constitute administrative adjustments; instead, they denote
recognition of cyber security as an integral component of national security. Such practices also
shape social norms and expectations regarding digital privacy and information protection,
resulting in a more aware public.
As such, tick-tock incidents force governments to rethink their regulation of digital platforms.
TikTok's recent revelation likely results in heightened governmental scrutiny and strict rules to
protect the public from potentially harmful content. Such a move requires a more robust content
moderation system, age verification, and transparency of the functioning of algorithms. This
indicates a shift in society to give digital platform users, especially the youth, safety and
well-being.
Ethical Considerations and Moral Shifts
Ethics in the digital age will be discussed after high-profile cyber attacks: these challenge
privacy, personal and corporate data, and ethical bounds of lawful digital behavior. With
increasing numbers of such attacks in a given society, you can see some moral decay in the area
of what is deemed to be appropriate digital behavior. Hacking, data theft, and disseminating
malware are considered highly unethical, and there is growing support for legislation that
punishes such behaviors.
On the other hand, ethical hacking and cybersecurity research are gaining respect and
recognition. Cybersecurity professionals are increasingly appreciated for protecting digital assets
How high-profile attacks are leading to increased government
response
and social fabric towards a moral realignment that upholds digital integrity (Kollmuss &
Agyeman, 2002).
International Collaboration and Collective Action
In a globalized world, cyber threats do not respect national boundaries. High-profile attacks often
demonstrate the interconnectedness of our digital ecosystems, leading to increased international
collaboration. Governments, cybersecurity agencies, and private entities begin to recognize the
importance of effectively sharing intelligence, best practices, and resources to combat these
threats. This collective action extends beyond mere information exchange; it fosters a sense of
global community and shared responsibility in the face of everyday challenges.
Impact on Trust and Technology Adoption
Every major cyber incident has a ripple effect on public trust in technology. These attacks can
lead to a general apprehension towards adopting new digital technologies, especially those
involving personal data. While this skepticism can hinder technological innovation and adoption,
it also catalyzes. They are developing more secure and resilient technologies, recognizing the
increasing sophistication of cyber threats. Companies are compelled to prioritize security in their
products, and consumers become more discerning in their digital choices, opting for solutions
that offer better protection and privacy (Hofstede, 1980).
Education and Skill Development
There is a growing emphasis on education and skill development in cybersecurity. In
collaboration with industry partners, educational institutions often begin offering specialized
cybersecurity courses and programs. This education drive goes beyond formal institutions to
How high-profile attacks are leading to increased government
response
involve corporate training programs and public enlightenment campaigns. Arming people with
the relevant skills and competencies gives society a higher level of alertness on cyber security
issues.
Community Engagement and Public Discourse
Finally, high-profile cyber-attacks often ignite public discourse and community engagement on
cybersecurity issues. These discussions in various forums, such as social media, public seminars,
and educational institutions, involve a broad spectrum of stakeholders. They provide a platform
for sharing experiences, discussing challenges, and collectively brainstorming solutions.
Engagement at this level is crucial in developing an acceptable societal approach towards cyber
security, a culture where all stakeholders are equally engaged and take action. Consequently, the
social reaction to large-scale cyber-attacks is complex and holistic. It encompasses heightened
public awareness, behavioral changes, government policy evolution, ethical considerations,
international collaboration, impacts on trust and technology adoption, education and skill
development, and community engagement.
Political Perspective
Within the past few decades, society has been exposed to alarming digital vulnerabilities
as high-profile cybercrime attacks have shown to be far more advanced and invasive. From
small-scale hacking of government institutions to elaborately planned global cyber attacks, it is
clear that American institutions are still battling in the cyber realm. Extremist and terrorist
groups have been actively keeping up with our tech-advanced world as they are known to
How high-profile attacks are leading to increased government
response
disseminate misleading content, engage in invasion of privacy, and manipulate information. This
has raised public concern about the government’s capability to handle newly emerging cyber
threats. Although the public may be wary of the future of the government in handling
cyberattacks, it is important to acknowledge their increased efforts to expand their knowledge
and responsiveness in the cyber world. As theorized, amidst high-profile attacks, the government
has found ways in which to strengthen its cybersecurity measures.
Creation of Specialized Agencies
During the early 21st century, government technological intervention and response
weren’t as advanced as it is today. It wasn’t until high-profile attacks, such as 9/11, that pushed
the government to take more proactive measures, one of them being the establishment of
agencies that are responsible for addressing cyber threats and persecuting cyber criminals
(Watson, 2002). In the wake of the 9/11 attack, President Bush was committed to defending the
nation by building the federal government’s countermeasures (Bush, 2002). As a product of an
aggressive approach to defending the nation, the Department of Homeland Security (DHS)
(2002) was founded to provide security for the United States from manmade and natural
disasters, antiterrorism, immigration, border enforcement, and cybersecurity (DHS, n.d.). Since
2002, DHS proactively worked to investigate tangible and cyber threats, however, it wasn’t until
2007 when it formed the National Protection and Programs Directorate (NPPD) that it finally had
a section focused on eliminating cyber threats (Homeland Security, 2018). Then, about a decade
later in 2018, President Trump signed the Cybersecurity and Infrastructure Security Agency Act
(2018) which upgraded the operations of the NPPD into the now-established Cybersecurity and
Infrastructure Security Agency (CISA) (Homeland Security, 2018). CISA currently works on
building secure infrastructures and mobilizing defense to minimize threats to the country’s cyber
How high-profile attacks are leading to increased government
response
systems (CISA, n.d.). The development of the DHS shows the government’s prompt response to
cyber threats as well as its commitment to evolve its countermeasures to reflect the ongoing
threats they face.
Invasion of Privacy
Increased high-profile attacks during the early 21st century have marked a significant
change in how the government responds to attacks, all while claiming to do it in the name of
safety. The attack of 9/11 left the state in shock and agonizing fear, something the nation hadn’t
felt since the assassination of Kennedy (Watson, 2002). These mixed emotions of grief, fear, and
a need for revenge morphed into a strong-held sentiment that continues to prevail among
American citizens. It is clear that American citizens were petrified by the event but few have
discussed how it rocked the government’s internal response to threats. The discourse surrounding
the event highlights how the government increased military funding and international hostility
but not how the government used this event as momentum to enact invasive security
surveillance. High-profile attacks, specifically that of 9/11, led to increased government response
through the use of legislation that enabled the government to invade the privacy of its citizens.
In the wake of the War on Terror, the Bush Administration launched programs and
legislation to increase their surveillance of concealed terrorist groups (Carlisle, 2021). One of the
first programs to be launched was the President’s Surveillance Program (PSP). PSP was a set of
covert intelligence activities meant to collect foreign intelligence and prevent terrorist attacks
(Carlisle, 2021). Included in the secret activities was “STELLARWIND,” the clearance to
wiretap individuals who were thought to be connected with Al-Qaeda without requiring a
warrant (Savage, 2015). Additionally, the program allowed for warrantless collection of
information found in citizen’s phones and internet data. In a National Security Agency (NSA)
How high-profile attacks are leading to increased government
response
draft detailing the development of the Patriot Act, the inspector general described how the act
expanded the agency’s ability to collect bulk data on individuals (The Guardian, 2013). The NSA
was previously limited from collecting data such as phone calls, phone numbers, and internet
metadata but the Patriot Act allowed them to increase their database collection to improve their
surveillance efforts. This first step in combating terrorism met some resistance such as that of
Russ Feingold, a U.S. senator at the time. Feilgold believed that programs such as PSP gave the
government too much power and gave them the power to unjustly pursue innocent
people(Carlisle, 2021).
Alongside PSP, Congress took another step in strengthening surveillance by passing the
Patriot Act. The Patriot Act allowed the government to (1) use non-terrorist-related tools to
investigate suspected terrorist groups, (2) facilitate information sharing, (3) update laws to reflect
emerging technology, and (4) increase penalties for individuals who commit terrorist crimes
(Dept. of Justice, n.d.). Years before terrorist groups, the government’s target was organized
crime offenders. Tools such as wiretapping and electronic surveillance as well as authorizations
to obtain business records and delay notifications for search warrants were all being used to
incarcerate drug cartels. However, with a newfound focus on terrorist groups, the government
used the Patriot Act to use court-approved tools and authorizations on terrorists.
Due to the significant threat level of terrorist groups, government agencies, and officials
all needed to work together to combat the war on terror. The attack of 9/11 demanded immediate
attention due to the overwhelming impact it had on the country. Interestingly enough,
government agencies weren’t able to collaboratively work together before the attack. The FBI,
federal prosecutors, police officers, and intelligence officials were mostly in the dark when it
came to each other’s work. However, the patriot act removed legal barriers that hindered them
How high-profile attacks are leading to increased government
response
from discussing and coordinating their work to facilitate their collaborative efforts to eliminate
terrorist threats (Dept. of Justice, n.d.).
Other factors were taken into consideration when drafting the act such as the lack of legal
inclusion and coverage of emerging technologies. One major change was that law enforcement
was allowed to obtain search warrants in areas that were found to have terrorist-related activities
(Dept. of Justice, n.d.). Previously, districts were required to obtain search warrants for the area
they were trying to investigate but due to the far-reaching effects of terrorism, law enforcement
could acquire a warrant for any terrorist-related district. Additionally, the act updated the law to
allow law enforcers to assist victims of computer hacking to track the hacker. This means that
victims could combat hackers with the help of law enforcement instead of falling victim to their
crimes. Lastly, the patriot act imposed stricter and wider penalties for terrorist criminals by
prohibiting accomplices from helping terrorists, increasing penalties, and punishing a wider
range of terrorist offenses (Dept. of Justice, n.d.). Some government officials and historians
would contribute to America’s success in preventing another attack greatly due to preventative
measures of the Patriot Act.
Cultural Perspective
Cyber attacks are done by various groups of people but there is a specific instance where
terrorist groups have used these attacks and caused significant changes to the perception of
privacy. With there being an increase in high-profile attacks this has led to an influx in awareness
of cyber threats. This significant increase has now been considered a threat to national security.
Accompanied by the threat of national security government surveillance has faced scrutiny due
to the lack of balance between personal privacy and national security. There has been an ongoing
How high-profile attacks are leading to increased government
response
erosion of trust in institutions causing a shift in communication such as encrypted
communication and more hypervigilance in information sharing. Organizations and individuals
need to prioritize cyber security and practice mitigating threats. It is necessary to instill stricter
regulations to protect against cyber attacks.
The attack that occurred on September 11 in the United States demonstrates a key
reaction that the government had taken impacting the response of its citizens towards
cybersecurity and the government. However, the response of the government has led to
restrictions upon civil liberties. After the 9/11 attacks, there was an implementation of the Patriot
Act, which gave power to authorities to not only monitor but investigate individuals. It was
deemed necessary to provide national security. Under the patriot act, there is a divide across the
nation because civil liberties are being repressed. The Patriot Act was seen as a gateway into
overlooking democratic values that have been instilled in the U.S. It not only undermines
equality and freedom but the foundation as a whole of America.
Rise on Discrimination
Acts such as the Patriot Act have divided the nation into deeming whether the
government’s response was adequate or not. The Pew Research Center surveyed whether the
public finds the Patriot Act necessary. This survey found that in 2011 42% of Americans found
that the act is a necessary tool. Yet what lies deeper in this act is the impact on various
individuals of different backgrounds. The constant surveillance of the population led to the
profiling of people based on religion, race, and ethnicity. This created a rise of discriminatory
practices towards existing prejudices. Not only were individual civil liberties being targeted but
the main value of democracy was.
How high-profile attacks are leading to increased government
response
There was a rise of anxiety and fears instilled in citizens regarding different groups of
people. This fear led to an upward spiral of targeting Muslim people placing blame for the
terrorist attack on them. With the rise of Islamaphobia, the Muslim community faced scrutiny
encountering ongoing discrimination still to this day. After 9/11 there was a shift in the
perception of Muslims and Islam especially by Republicans. They centered on associating the
Islamic faith with violence essentially instilling fear in the public towards Muslims ( Pew). This
change of views added ramifications such as a rise in discrimination and violence.
This governmental response incited the authorization* of Islamaphobia across the
country. With the increase in hypervigilance of security and privacy of citizens there was an
occurrence of overgeneralizations and stereotyping spreading towards Muslims. Many Muslims
were experiencing violence outside of their homes and inside as well. For example, Hafez
recounts his experiences, as someone who grew up during the peak of anti-Muslim rhetoric, as
constantly being on guard and having to educate those around him (born to take islamophobia).
Society has demonstrated a shift in attitudes towards Muslims leading to the Islamic community
having to keep an open mind to be able to counter the violence they face.
Internal Structural Perspective - Government
The United States is a powerhouse wielding much more wealth and influence than
possibly imaginable. When threatened, it’s no secret that the attacker will face repercussions for
its threat to the country. As aforementioned, the 9/11 attack is known as the most notorious
contemporary attack on the US. Back then, the government still didn’t have a solid structure to
reinforce security and combat attacks. Around that time, the government established the
How high-profile attacks are leading to increased government
response
Department of Homeland Security (DHS) as the government’s way of strengthening the nation’s
security internationally and domestically. Not only does the DHS protect the nation
internationally but also through natural disasters, cyber infrastructures, the country’s borders, and
also through the economy (U.S. DHS, 2023). The diversification of Homeland Security allowed
the government’s other sectors to focus on addressing other issues while maintaining their safety.
As presidencies have come and gone, presidential administrations have assigned the DHS to
focus on some of their sector specialties more than others. The Biden-Harris Administration has
currently made cybersecurity the DHS’ priority as there is an increase in incoming threats from
the cyber world (U.S. DHS, 2023). The DHS was founded for the country’s safety and it
primarily oversees 5 sectors. Our democratic government established the DHS to not just provide
safety but also to enforce the country’s values and principles both domestically and
internationally.
External Structural Perspective - Citizens
Within the first few weeks of establishment, researchers began studying how safe the
public felt by the newly instated department. A 2002 Gallup poll asked the public to evaluate
their feelings regarding the DHS. About 47% of the respondents stated that they felt “a little
safer” and nearly 4 in 10 participants stated that they believed that the DHS wouldn’t make the
country safer (Carlson, 2023). These feelings of uncertainty surrounding the DHS have expanded
as newer generations are advocating for critical social issues. The recent socio-political climate
has shown that Gen Z believes that immigration is a critical issue (Deckman & Rouse, 2020).
Since immigration is one of the areas in which the DHS enforces security, then it can be assumed
that newer generations won’t hold a favorable opinion toward the DHS. However, the DHS isn’t
How high-profile attacks are leading to increased government
response
at the front of political discourse, it is the government as a whole. Newer studies have shown that
the youth is largely distrustful of Congress, the Presidency, the Supreme Court, amongst other
political institutions (Hrynowski & Marken, 2023). Going forward, the government could see a
decrease in political support from newer generations as well as a call for reform to better reflect
emerging values and principles.
Reference
Kollmuss, A., & Agyeman, J. (2002). Mind the gap: Why do people act environmentally, and
what are the barriers to pro-environmental behavior? Environmental education research, 8(3),
239-260.
Hofstede, G. (1980). Culture and organizations. International studies of management &
organization, 10(4), 15–41.
References
Bush, G. W. (2002, June 1). The National Security Strategy of the United States . National
Archives and Records Administration.
https://georgewbush-whitehouse.archives.gov/nsc/nssall.html
How high-profile attacks are leading to increased government
response
Carlson, D. K. (2023, March 27). Homeland security: Do americans feel safer?. Gallup.com.
https://news.gallup.com/poll/7321/homeland-security-americans-feel-safer.aspx#:~:text=J
ust%2013%25%20say%20the%20country,make%20the%20country%20any%20safer
Deckman, M., & Rouse, S. M. (2020, June 25). Generation Z, immigration, and the fall election.
PRRI. https://www.prri.org/spotlight/generation-z-immigration-and-the-fall-election/
Department of Justice. (n.d.). The USA PATRIOT Act: Preserving Life and liberty. The USA
PATRIOT Act: Preserving Life and Liberty.
https://www.justice.gov/archive/ll/what_is_the_patriot_act.pdf
Homeland Security. (2018, February 13). NPPD at a glance - cisa. NPPD At a Glance.
https://www.cisa.gov/sites/default/files/publications/nppd-at-a-glance-bifold-02132018-5
08.pdf
Hrynowski, Z., & Marken, S. (2023, November 21). Gen Z voices lackluster trust in major U.S.
institutions. Gallup.com.
https://news.gallup.com/opinion/gallup/510395/gen-voices-lackluster-trust-major-instituti
ons.aspx
U.S. Department of Homeland Security. (2023, February 3). What does DHS do?. What Does
DHS Do? | Homeland Security.
https://www.dhs.gov/employee-resources/what-does-dhs-do
How high-profile attacks are leading to increased government
response
U.S. Department of Homeland Security. (2023, May 30). Cybersecurity. Cybersecurity |
Homeland Security. https://www.dhs.gov/topics/cybersecurity
U.S. Department of Homeland Security (DHS). (n.d.). U.S. Department of Homeland Security
(DHS): Usagov. USAGov.
https://www.usa.gov/agencies/u-s-department-of-homeland-security
Cybercrime and Digital Forensics
This book offers a comprehensive and integrative introduction to cybercrime. It provides
an authoritative synthesis of the disparate literature on the various types of cybercrime,
the global investigation and detection of cybercrime and the role of digital information,
and the wider role of technology as a facilitator for social relationships between deviants
and criminals. It includes coverage of:
• key theoretical and methodological perspectives;
• computer hacking and malicious software;
• digital piracy and intellectual theft;
• economic crime and online fraud;
• pornography and online sex crime;
• cyber-bullying and cyber-stalking;
• cyber-terrorism and extremism;
• digital forensic investigation and its legal context around the world;
• the law enforcement response to cybercrime transnationally;
• cybercrime policy and legislation across the globe.
The new edition features two new chapters, the first looking at the law enforcement
response to cybercrime and the second offering an extended discussion of online child
pornography and sexual exploitation.
This book includes lively and engaging features, such as discussion questions, boxed
examples of unique events and key figures in offending, quotes from interviews with
active offenders, and a full glossary of terms. This new edition includes QR codes
throughout to connect directly with relevant websites. It is supplemented by a
companion website that includes further exercises for students and instructor resources.
This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics,
cybercrime investigation, and the sociology of technology.
Thomas J. Holt is a Professor in the School of Criminal Justice at Michigan State
University, USA.
Adam M. Bossler is a Professor of Criminal Justice and Criminology at Georgia
Southern University, USA.
Kathryn C. Seigfried-Spellar is an Assistant Professor in the Department of Computer
and Information Technology at Purdue University, USA.
“The second and expanded edition of Cybercrime and Digital Forensics is a most welcome update on this
popular introductory text that covers the field, from the origins of computer hacking to the seizure and
preservation of digital data. Each chapter begins with a useful general overview of the relevant literature on the
2
topic or issue covered, whether economic cybercrimes or online stalking, and then provides coverage of laws,
cases, and problems not just in the US but pertinent to other jurisdictions. Additional chapters on child
exploitation materials, the role of transnational police and private investigation of cybercrime, and expanded
treatment of cyber-terrorism, allow for more in depth treatment of these topics and, importantly, options for
streaming or modifying the content of taught courses on cybercrime and digital investigations. The authors have
again provided numerous online sources in the text and cases for students to explore, and a supporting website
that should help to keep readers and instructors in touch with this rapidly changing field.”
— Roderic Broadhurst, Professor of Criminology, RegNet, Australian National University
“It is unusual to find a book in this field that does not simply focus on the technical aspects of the subject area.
This book brings together a wide range of literature, sources, and real case-studies to provide an in-depth look at
this ever-changing subject area. The book is rich in material and is a good read for those just starting to look at
cyber-security, all the way through to those living and breathing it.”
— Emlyn Butterfield, Course Director, School of Computing, Creative Technologies and Engineering, Leeds
Beckett University
“The style and organization of the book are ideal, not only for the introductory student, but also for the lay
reader. What’s more, the timeliness and detail of the issues discussed make it a useful resource for more
advanced researchers. In this book, the authors have delivered something for everyone.”
— Peter Grabosky, Professor Emeritus, RegNet, Australian National University
“Cybercrime and Digital Forensics provides an excellent introduction to the theory and practice of cybercrime.
This second edition introduces new chapters on law enforcement responses to cybercrime and an extended
section on online child pornography and sexual exploitation. The authors have introduced new and recent case
material making the subject relevant and accessible to academics and students interested in this new and
exciting field of study. I used the first edition of this book extensively in teaching an undergraduate course on
cybercrime. This new edition updates and expands on the topic. Both students and teachers will be attracted to
the clarity of presentation and extensive use of cases to focus discussion on challenging issues.”
— Dr Lennon Chang, Lecturer in Criminology, School of Social Sciences, Monash University
3
Cybercrime and Digital Forensics
An Introduction
Second Edition
Thomas J. Holt, Adam M. Bossler
and Kathryn C. Seigfried-Spellar
4
Second edition published 2018
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
and by Routledge
711 Third Avenue, New York, NY 10017
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2018 Thomas J. Holt, Adam M. Bossler and Kathryn C. Seigfried-Spellar
The right of Thomas J. Holt, Adam M. Bossler and Kathryn Seigfried-Spellar to be
identified as authors of this work has been asserted by them in accordance with sections
77 and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or utilised in
any form or by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying and recording, or in any information storage or
retrieval system, without permission in writing from the publishers.
Trademark notice: Product or corporate names may be trademarks or registered
trademarks, and are used only for identification and explanation without intent to
infringe.
First edition published by Routledge 2015
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
Names: Holt, Thomas J., 1978– author. | Bossler, Adam M., author. | Seigfried-Spellar,
Kathryn C., author.
Title: Cybercrime and digital forensics : an introduction / Thomas J. Holt, Adam M.
Bossler and Kathryn C. Seigfried-Spellar.
Description: Second edition. | Abingdon, Oxon ; New York, NY : Routledge, 2018. |
Includes bibliographical references and index.
Identifiers: LCCN 2017017922 | ISBN 9781138238725 (hardback) | ISBN 9781138238732
(pbk.) | ISBN 9781315296975 (ebook)
Subjects: LCSH: Computer crimes. | Forensic sciences.
Classification: LCC HV6773 .H648 2018 | DDC 363.25/968—dc23
LC record available at https://lccn.loc.gov/2017017922
ISBN: 978-1-138-23872-5 (hbk)
5
ISBN: 978-1-138-23873-2 (pbk)
ISBN: 978-1-315-29697-5 (ebk)
Typeset in Bembo
by Apex CoVantage, LLC
Visit the companion website: www.routledge.com/cw/holt
6
Contents
List of figures
List of tables
List of boxes
1 TECHNOLOGY AND CYBERCRIME
Introduction
Technology as a landscape for crime
A typology of cybercrime
This text
2 LAW ENFORCEMENT, PRIVACY, AND SECURITY IN DEALING WITH
CYBERCRIME
Introduction
Local police and sheriffs' offices
State agencies
Federal law enforcement
Civil investigation and application of digital evidence
Extralegal agencies and non-governmental organizations
International enforcement challenges
The tension between security and privacy
Summary
3 COMPUTER HACKERS AND HACKING
Introduction
Defining computer hacking
Victims of hacking
The human aspects of the hacker subculture
Hacking history
The modern hacker subculture
Legal frameworks to prosecute hacking
Enforcing and investigating hacker activity
Summary
4 MALWARE AND AUTOMATED COMPUTER ATTACKS
Introduction
The basics of malware
7
Viruses, trojans, and worms
The global impact of malware
Hackers and malware writers
The market for malicious software
Legal challenges in dealing with malware
Coordination and management in addressing malware
Summary
5 DIGITAL PIRACY AND INTELLECTUAL PROPERTY THEFT
Introduction
What is intellectual property?
The evolution of piracy over time
The subculture of piracy
The evolution of legislation to deal with piracy
The law enforcement and industry response
Summary
6 ECONOMIC CRIMES AND ONLINE FRAUD
Introduction
Fraud and computer-mediated communications
Identity theft
Email-based scams
Romance scams
The problem of carding and stolen data markets
Identity theft and fraud laws
Summary
7 PORNOGRAPHY, PROSTITUTION, AND SEX CRIMES
Introduction
The spectrum of sexuality online
Pornography in the digital age
Prostitution and sex work
Dealing with obscenity and pornography online
Self-regulation by the pornography industry
Summary
8 CHILD PORNOGRAPHY AND SEXUAL EXPLOITATION
Introduction
Defining and differentiating child porn from obscene content
The role of technology in child pornography and exploitation
8
Explorations of the pedophile subculture online
The legal status of child pornography around the globe
Summary
9 CYBERBULLYING, ONLINE HARASSMENT, AND CYBERSTALKING
Online threats, bullying, and harassment
Defining cyberbullying
Predictors of bullying online and offline
Summary
10 ONLINE EXTREMISM, CYBERTERROR, AND CYBERWARFARE
Introduction
Defining terror, hacktivism, and cyberterror
The role of nation-state vs. non-nation-state attacks
The use of the Internet in the indoctrination and recruitment of
extremist groups
Electronic attacks by extremist groups
Cyberwar and the nation-state
Legislating extremism and cyberterror
Investigating and securing cyberspace from the threat of terror and
war
Cyberwar and response
Summary
11 CYBERCRIME AND CRIMINOLOGICAL THEORIES
Introduction
Subcultural theories
Social learning theory and cybercrime
General theory of crime
Agnew's general strain theory
Techniques of neutralization
Deterrence theory
Theories of cybercrime victimization
Need for new cyberspace theories?
Summary
12 EVOLUTION OF DIGITAL FORENSICS
Introduction
From computer forensics to digital forensics
Stages of digital forensic investigation
9
The role of digital evidence
Types of hardware, peripherals, and electronic evidence
Evidence integrity
Summary
13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE
Introduction
Data preservation
Digital forensic imaging tools
Uncovering digital evidence
Data analysis
Data reduction and filtering
Reporting of findings
Summary
14 LEGAL CHALLENGES IN DIGITAL FORENSIC INVESTIGATIONS
Introduction
Constitutional issues in digital investigations
Federal Rules of Evidence 702
Summary
15 THE FUTURE OF CYBERCRIME, TERROR, AND POLICY
Introduction
Considering the future of cybercrime
How technicways will shift with new technologies
Social movements, technology, and social change
Need for new cyber criminological theories?
Shifting enforcement strategies in the age of the Internet
Considering the future of forensics
The challenge to policy makers globally
Summary
Glossary
Index
10
Figures
1.1 Venn diagram of cybercrime, cyberterrorism, and cyberdeviance
3.1 Venn diagram of computer hacking
4.1 The SubSeven Attacker Graphical User Interface (GUI)
4.2 An example of a Zeus Malware Variant GUI
4.3 Botnet command and control distribution
4.4 An example of the Illusion Bot Malware GUI
12.1 Floppy disks
12.2 An unmanned aircraft system (UAS), also known as a drone
12.3a/b Hiding flash drives
12.4 An older model computer
12.5 The evolution of removable storage devices
12.6 The evolving state of mobile phones
12.7a/b Hidden media examples
13.1a/b Write blockers
13.2 Screenshot of EnCase created by Guidance Software
13.3 Screenshot of Forensic Toolkit (FTK) created by AccessData
13.4a/b Diagram of a hard drive, sectors, and clusters
13.5 Keyword searching through forensic software
13.6 Common file signatures
13.7 File carving
13.8a/b An example of encryption
14.1 A pay phone booth
14.2 Cellebrite device
14.3 The scientific method
11
Tables
3.1 A timeline of notable events in the history of hacking
3.2 A timeline of computer hacking conferences
12
Boxes
1.1 Getting around Russian extradition laws
2.1 A local agency's new cybercrime detective
2.2 Assessing the credibility of a fusion center's analysis of a cyber-attack
2.3 The role of digital evidence in divorce cases
2.4 An examination of why we should be concerned by government spying
campaigns
3.1 The Jargon File definition of hacking
3.2 Mainframe computing systems
3.3 A hacker talks about WarGames
3.4 The criminal exploits of Kevin Mitnick
3.5 The electronic disturbance theater and cyber-attacks
3.6 The ongoing conflict between Indian and Pakistani hackers
3.7 LulzSec hacks FBI affiliate, Infragard
4.1 The debate over public or private vulnerability disclosures
4.2 F-Secure report on virus W32/Concept malware
4.3 Interview with MPack creator
4.4 Interview with the malware writer Corpse
4.5 One of the first modern prosecutions for malware distribution in the USA
5.1 Friedman Wolverine review
5.2 These were the top-14 illegally downloaded movies in 2015
5.3 Torrent downloads: Fiasco over three-year jail term shows absurdity of
India's John Doe orders
6.1 Follow Friday: where debit card numbers get stolen
6.2 Nigerian email text
6.3 Phishing example
6.4 Work-at-home scheme
6.5 Understanding the human dimensions of romance scams
6.6 Pump-and-dump message
6.7 Counterfeit luxury goods message
6.8 The rise of virtual brand protection communities
6.9 Counterfeit pharmaceutical message
6.10 Albert Gonzales
6.11 Using Japanese ATMs to defraud South African banks
6.12 The overlapping role of the Secret Service and the Federal Bureau of
Investigation
7.1 The impact of revenge porn on its victims
7.2 The rise of VR porn content
7.3 The role of escort review sites
13
7.4 The opinions of a hobbyist in Canada
7.5 The vagaries of prosecuting obscene content online
8.1 The practices of To Catch a Predator
8.2 The 10-Point COPINE Scale
8.3 Details on Operation Delego
8.4 Live-streaming sexual abuse content
8.5 Understanding attempts to solicit youth into documenting sexual acts
8.6 The complex techniques required to investigate Dark Web child porn
8.7 The Rogers Seigfried-Spellar Hybrid Model
8.8 Immigration and Customs Enforcement operations in action
8.9 The Virtual Global Taskforce in action
9.1 Catfishing in the news
9.2 Vickie Newton and negative outcomes of cyberstalking
9.3 The unfortunate suicides resulting from bullying
9.4 The Computer Fraud and Abuse Act applied to Megan Meier's death
9.5 The failure of the Megan Meier bullying legislation
9.6 The suicide of Rehtaeh Parsons
9.7 Facebook security suggestions for parents
10.1 The use of technology in protest activities
10.2 The use of encrypted chat applications by terrorists
10.3 Ultimatum For DDoS attacks against US banks
10.4 Anonymous open letter example
10.5 The role of social media in recruitment and radicalization
10.6 An example of Facebook live being used for terrorism
10.7 Examples of cyber-attacks against SCADA systems in water treatment
10.8 Questioning the reality of cyberterror
10.9 Inside the Russian troll organization
10.10 The tools created by the NSA for espionage and attack
11.1 Examples of websites that provide information on hacking techniques
11.2 Understanding the consequences of cyberbullying
11.3 Justifications for hacking
11.4 Self-protection while online
11.5 Psychological theories of cybercrime
12.1 The Flagler Dog Track incident
12.2 Alexa a witness to murder? Prosecutor's seek Amazon Echo data
12.3 Video game systems and digital evidence
12.4 Digital evidence and real-world crime
13.1 An example of how the MD5 algorithm works
13.2 The Adam Walsh Act
13.3 State (Ohio) vs. Cook (2002)
13.4 Example of partition recovery
13.5 Data sectors
14
13.6 Slack space
13.7 An example of encryption
14.1 A fictional search warrant
14.2 A fictional search warrant
14.3 Double jeopardy
14.4 Excerpt from Apple's "Message to Our Customers"
14.5 An excerpt from the US Federal Rules of Evidence
14.6 An excerpt from the Indian Evidence Act of 1972 (Section 65A and 65B)
15.1 Understanding changes in ransomware
15.2 Examining the harassment experienced by Leslie Jones on Twitter
15.3 Understanding the Burgernet in the Netherlands
15.4 Investigating Tor users
15
Chapter 1
Technology and Cybercrime
Chapter goals
• Explain how technology has affected human behavior.
• Identify the difference between digital natives and digital immigrants.
• Discuss the three ways in which technology can be abused by individuals.
• Recognize a subculture and their role in offending behaviors.
• Identify the differences between cyberdeviance, cybercrime, and
cyberterror.
• Understand how computers and technology produce digital evidence and
its value in criminal investigation .
• Explain the factors that make cybercrimes attractive to certain people.
• Explore the various forms of cybercrime that occur across the world.
16
Introduction
The Internet, computers, and mobile technologies have dramatically reshaped modern
society. Although it is difficult to comprehend, less than two decades ago most
individuals did not own a cell phone and personal computers were still somewhat
expensive pieces of equipment. Individuals could not text and email was uncommon.
Internet connectivity was possible through dial-up modems or Ethernet cabling and
people paid by the hour for access to the Web. Video game systems used 16-bit graphics
and did not connect to other devices. Global Positioning Systems (GPS) were largely
used in military applications only.
Today, most of the world now depends on computers, the Internet, and cellular
technology. Individuals now own laptops that are connected via Wi-Fi, cell phones that
may also connect to the Internet, and one or more video game systems that may be
networked. In addition, people have multiple email accounts for personal and business
use, as well as social networking profiles in multiple platforms. Cell phones have become
a preferred method of communication for most people, especially text messages. In fact,
individuals under the age of 20 regularly send more texts than any other age group, and
prefer to send texts rather than make phone calls (Zickuhr, 2011). Individuals also
frequently purchase goods online and are increasingly using e-readers for books and
newspapers rather than traditional print media.
It is amazing to consider that the world and human behavior have changed so quickly
through the use of technology. In fact, there are now 3.4 billion Internet users
worldwide, comprising 46.1 percent of the world’s population (Internet Live Stats, 2016).
China and India have the largest population of Internet users, though only 55 percent
and 34 percent of their total populations have access (Internet Live Stats, 2016). The USA,
Brazil, and Japan have the next largest populations, though a much greater proportion of
their populations have access (88.5%, 66.4%, and 91.1% respectively: Internet Live Stats,
2016). (sự tăng sinh)
The proliferation of technology has led to distinct changes in how individuals engage
with the world around them. People now shop, communicate, and share information in
digital formats, which was previously impossible. Additional changes in behavior are
likely to continue in the face of technological innovations as they are developed and
implemented. In fact, the sociologist Howard Odum referred to this process as
technicways, recognizing the ways in which behavior patterns change in response to, or
as consequence of, technological innovations (Odum, 1937; Parker, 1943; Vance, 1972).
From Odum’s perspective, technic-ways replace existing behavior patterns and force
institutional changes in society (Vance, 1972). For instance, if an individual 30 years ago
wanted to communicate with other people, he/she might call them, see them in person if
possible, or more likely send a letter through postal mail. Now, however, that person
17
would send a text, write an email, instant message, or poke them through Facebook
rather than write a letter through “snail mail.”
The impacts of technicways are evident across all demographic groups in modern
society. For instance, 77 percent of Americans owned a smart phone as of 2016, with
substantial access among younger populations: 92 percent of 18- to 29-year-olds have one
(Smith, 2017). In addition, there are over 1 billion mobile phone subscribers each in
China and India (Rai, 2016). Importantly, China has over 500 million smartphone users,
while India has only 125 million. As these rates continue to increase Internet use will
change, transforming social and economic interactions in unique ways from country to
country (Rai, 2016).
This is evident in the fact that many people around the world use social media as a
means to connect and engage with others in different ways. For instance, 79 percent of
American adults use Facebook, though there has been a substantial increase in the use of
Instagram and LinkedIn as a means to communicate (Greenwood, Perrin, and Duggan,
2016). Adults aged 65 and older are joining these sites at the highest rates compared to
other age groups. In addition, Americans appear to use the Facebook messenger app
more than any other product available (Schwartz, 2016). WhatsApp is much more
popular in a global context, and is the number one messaging application across much of
South America, Western Europe, Africa, and Asia. Viber, however, is much more
popular across Eastern Europe, particularly Belarus, Ukraine, and other nations in the
region (Schwartz, 2016).
Despite regional variations in use, technology has had a massive impact on youth
populations who have never experienced life without the Internet and computermediated communications (CMCs) like email and texting. Today, youth in the USA
acquire their first cell phones when they are between the ages of 12 and 13 (Lenhart,
2010). Similar use patterns are evident across the globe, with children in the UK
receiving a phone by an average age of 11 (Gibbs, 2013), and 12 in a study of Japan,
India, Indonesia, Egypt, and Chile (GSM Association, 2012).
18
For more information on statistics of social media and technology use, go
online to:
1. www.pewinternet.org/
2. www.huffingtonpost.com/april-rudin/life-on-a-social-mediais_b_4600429.html
(thực sự đã định hình và uốn nắn hành vi của họ)
(đơn giản là dịch chuyển)
Technology has not simply shifted the behaviors of youth, but has actually shaped and
molded their behavior and worldview from the start. Most people born in the mid- to
late 1980s have never lived without computers, the Internet, or cell phones. As a
consequence, they do not know a world without these devices and what life was like
without these resources. Thus, Prensky (2001) argued that these youth are digital
natives, in that they were brought into a world that was already digital, spend large
amounts of time in digital environments, and use technological resources in their day-today lives. For instance, individuals between the ages of 18 and 34 are the most heavy
Internet users worldwide (Statistica, 2015). Virtually everyone (96%) aged 16 to 24 in the
UK accesses the Internet on a mobile device (Office for National Statistics, 2015). Young
people are also more likely to use auto-delete messaging applications like Snapchat,
comprising 56 percent of Internet users in a recent US study (Greenwood et al., 2016). In
fact, youth in India and Indonesia send an average of 51 text or application-based
messages a day via a mobile device (GSM Association, 2012).
By contrast, digital immigrants are those who were born prior to the creation of the
Internet and digital technologies (Prenksy, 2001). These individuals quite often need to
adapt to the digital environment, which changes much more rapidly than they may be
prepared for otherwise. This is especially true for many older individuals who were born
decades before the creation and advent of these technologies. As a consequence, they
may be less willing to immediately adopt these resources or use them in diverse ways.
For instance, only 45 percent of adults in the USA over the age of 65 own either a laptop
or desktop computer (Zickuhr, 2011). In addition, some resources may be more difficult
for digital immigrants to understand because of the technologies employed or their
perceived utility. For example, only 9 percent of US adults aged 50 and older were likely
to use an app like Snapchat, and less than 1 percent accessed services like YikYak
(Greenwood et al., 2016). Similarly, only 29 percent of people aged 65 years and older in
the UK used the Internet on a mobile device (Office for National Statistics, 2015). Thus,
digital immigrants have a very different pattern of adoption and use of technologies
relative to digital natives.
The proliferation of technology in modern society has had a massive impact on
(đang được cơ cấu lại)
human behavior. The world is being restructured around the use of CMCs, affecting the
way in which we interact with governments, businesses, and one another. In addition,
19
technology use is also creating a divide between generations based on the way in which
individuals use technology in their day-to-day lives. In turn, individuals are adapting
their behavior in ways that subvert the original beneficial design and application of
computers and the Internet. lật đổ
20
(môi trường/bối cảnh)
Technology as a landscape for crime
sự tiến hóa
(đổi mới)
The continuing evolution of human behavior as a result of technological innovations has
created unparalleled opportunities for crime and misuse. Over the past three decades,
(cơ hội chưa từng có)
there has been a substantive increase in the use of technology by street criminals and
đáng kể
novel applications of technology to create new forms of crime that did not previously
(nơi/địa điểm )
exist. The World Wide Web and the Internet also provide a venue for individuals who
engage in crime and deviance to communicate and share information, which is not
(sự lệch lạc)
(thiết yếu)
otherwise possible in the real world. As a result, it is vital that we begin to understand
how these changes are occurring, and what this means for offending in the twenty-first
century. There are three key ways in which computer and cellular technologies may be
abused or subverted by offenders:
(bị lạm dụng hoặc bị lật đổ)
(phương tiện để giao tiếp)
(nền văn hóa trực tuyến)
1. as a medium for communication and the development of subcultures online;
chế)
2. as a(cơmechanism
to target sensitive resources and engage in crime and deviance;
tạo điều kiện
3. as an incidental device to facilitate the offense and provide evidence of
(ngẫu nhiên)
criminal activity both online and offline.
Technology as a communications medium
The Internet, telephony, and digital media may be used as a means for communication
(nhanh chóng)
(phi tập trung)
toàn cầu
between individuals in a rapid and decentralized fashion across the globe. Computers,
cell phones, and technological equipment may be obtained at minimal cost and used
(sự ẩn danh)
with a high degree of anonymity. For instance, major retailers and convenience stores
sell phones that may be used without a contract through a carrier like Sprint or Verizon.
The ability to use the phone depends on the number of minutes purchased and it can be
(xử lý)
disposed of after use.
In turn, criminals can use these devices to connect with others and share information
(gái mại dâm)
(diễn đàn)
that may be of interest. For example, the customers of prostitutes use web forums and
chatrooms to discuss where sex workers are located, services provided, pricing, and the
police presence in a given area (Holt and Blevins, 2007; Holt, Blevins, and Kuhns, 2008;
(chỉ đạo)
Sharp and Earle, 2003). This exchange of first-hand information is difficult to conduct in
dấu hiệu bên ngoài
khác
the real world, as there are no outward signs to otherwise suggest that someone is
interested in or has visited a prostitute. In addition, there is a high degree of social
sự kỳ thị
stigma and shame surrounding paying for sex, so it is unlikely that someone would
admit this behavior to another person in public (McKeganey and Barnard, 1996;
O’Connell Davidson, 1998). The faceless, anonymous nature of the Internet, however,
sự trả thù
allows people to talk about such actions with little risk of harm or reprisal.
chất ma túy
The sale of illicit narcotics like cocaine, marijuana, and methamphetamines has also
trái phép
21
moved online with the development of markets where individuals buy and sell narcotics
through various methods. The primary resources used by sellers and buyers are forums
phần
operating on the so-called Dark Web, which is a portion of the Internet that can only be
mã hóa
phần mềm
accessed via the use of specialized encryption software and browser protocols.
Individuals can only access these forums through the use of The Onion Router, or TOR
service, which is a free proxy and encryption protocol that hides the IP address and
location details of the user (Barratt, Ferris, and Winstock, 2014; Dolliver, 2015). In
addition, the content of these sites cannot be indexed by google or other search engines.
As a result, this technology limits the ability of law enforcement agencies to eliminate
illicit content because the hosting source cannot be identified through traditional means
(Dolliver, 2015; Estes, 2014).
For more information on TOR, including how it operates, go online to:
www.torproject.org/about/overview.html.en.
sự nổi bật
One of the first Tor-based narcotics markets that gained prominence was called the
Silk Road. The market gained attention from researchers and the popular media due to
the nature of the products sold, and the fact that transactions were paid using bitcoins, a
relatively anonymous form of electronic currency (Franklin, 2013). The site was created
to enable individuals to buy various materials ranging from computer equipment to
clothing, though sellers offered various narcotics from locations across the globe. In fact,
its name was a reference to the trade routes used to transport goods between Europe,
India, and Asia throughout history (Franklin, 2013).
As the Silk Road gained prominence as a venue for the sale of various narcotics, law
tiến hành
enforcement agencies in both the USA and Australia conducted sting operations against
buyers. In fact, since it opened in 2011 the Silk Road enabled over one million
doanh thu
transactions worth an estimated $1.2 billion in revenue (Barratt, 2012). An FBI
investigation into the site administrator, who used the handle Dread Pirate Roberts, led
to the arrest of Ross William Ulbricht in San Francisco, California on October 2, 2013
gạ gẫm/xúi giục
(Gibbs, 2013). Ulbricht was charged with drug trafficking, soliciting murder, enabling
computer hacking and money laundering, and had several million dollars’ worth of
rửa tiền
bitcoins seized.
bị tịch thu
22
For more information on the arrest of Dread Pirate Roberts, go online to:
http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dreadpirate-roberts/.
chứng tỏ
phân bố/
phân tán
tính chất/bản chất
The Silk Road demonstrates that the distributed nature of the Internet and CMCs
enables individuals to connect to other people and groups that share similar likes,
tạo điều kiện thuận lợi
dislikes, behaviors, opinions, and values. As a result, technology facilitates the creation
bất kể
of subcultures between individuals based on common behaviors and ideals regardless of
địa lý
geographic or social isolation. From a sociological and criminological perspective,
subcultures are groups that have their own values, norms, traditions, and rituals which
tách no ra khỏi
thống trị
set them apart from the dominant culture (Kornblum, 1997; Brake, 1980).
cấu trúc
Participants in subcultures generate their own codes of conduct to structure the ways
tạo ra
in which they interact with other members of the subculture and different groups in
society (Foster, 1990). In addition, membership in a subculture influences individual
behavior by providing beliefs, goals, and values that approve of and justify activity
(Herbert, 1998). For instance, a subculture may emphasize the development of skills and
abilities that may find less value in the general culture, like an ability to use multiple
programming languages and manipulate hardware and software among computer
hackers (Holt, 2007; Jordan and Taylor, 1998; Taylor, 1999). Members of a subculture also
lập luận riêng
have their own argot or slang to communicate with others and protect their discussions
trình diễn thực tế
from outsiders (Maurer, 1981). The use of this language can serve as a practical
demonstration of membership in any subculture. Thus, subcultures provide members
with a way to gauge their reputation, status, and adherence to the values and beliefs of
đánh giá
danh tiếng
tuân thủ
the group.
vô số tiểu
There are myriad subcultures in modern society, many involving both online and
offline experiences. However, not all subcultures are deviant, and you can also be a
member of several subcultures at once. For instance, you may belong to a subculture of
sports team fans (whether football, basketball, or any athletics) if you: (1) enjoy watching
their games, (2) know the statistics for your favorite players, (3) know the historic events
in your team’s previous seasons, and (4) you debate with others over who may be the
best players in certain positions. Similar subcultures exist for gardening, fashion, cars,
movies, and other behaviors. Finding others who share your interests can be beneficial,
as it allows for social connectivity and a way to channel your interests in positive ways.
23
For examples of various subcultures with a heavy online presence, go online to:
http://abcnews.go.com/ABC_Univision/Entertainment/subcultures-strong-onlinepresence/story?id=18511594#1.
hiện ra
In much the same way, subcultures can emerge on and offline for those with an
interest in certain forms of crime and deviance (Quinn and Forsyth, 2005). Technology
allows individuals to connect to others without fear of reprisal or social rejection, and
even enables individuals who are curious about a behavior or activity to learn more in
phát hiện/nhận ra
an online environment without fear of detection (Blevins and Holt, 2009; Holt, 2007;
cho phép
sự hình thành
Quinn and Forsyth, 2005). New technologies also enable the formation of and
dễ dàng hơn
participation in multiple subcultures with greater ease than is otherwise possible offline.
dễ dàng
In fact, individuals can readily communicate subcultural knowledge through email and
xúc phạm
kỹ thuật
other CMCs, such as techniques
of offending, which may reduce their risk of detection
from victims and law enforcement (Holt et al., 2008; Holt and Copes, 2010). Because of
the prominence of technology as a means to communicate with others, this book will
focus extensively on the role of online subcultures to facilitate crime and deviance in
virtual and real-world environments.
For more information on the current state of online subcultures, go online to:
www.highsnobiety.com/2015/03/11/internet-subcultures-health-goth-seapunk/.
Technology as a target of or means to engage in crime
sử dụng sai
nguy hiểm
The second way in which technology can be misused is much more insidious – as a
24
resource for individuals to attack and to cause harm to individuals, businesses, and
khả năng
governments both online and offline. Many devices in our daily lives have the capability
to connect to the Internet, from mp3 players to desktop computers. These technologies
contain sensitive pieces of information, ranging from our shopping habits to usernames
and passwords for bank and email accounts. Since these devices can communicate with
one another, individuals can potentially gain access to this information through various
methods of computer hacking (see Chapter 3 for more details).
While hacking is often thought to involve highly skilled individuals with a significant
thường được cho là
understanding of technology, the simple act of guessing someone’s email or computer
password could be defined as a hack (Bossler and Burruss, 2011; Skinner and Fream,
trái phép
Đạt được
1997). Gaining unauthorized access to personal information online is often key to
definitions of hacking, as an individual is attempting to gain entry into protected
systems or data (see Schell and Dodge, 2002; Wall, 2001). In turn, that information, such
as who a person talks to or which financial institution they choose for banking purposes,
can be used to cause additional harm. In fact, research on college students suggests that
between 10 and 25 percent of undergraduates have tried to guess someone else’s
password (Holt, Burruss, and Bossler 2010; Rogers, Smoak, and Liu, 2006; Skinner and
được tập hợp
Fream, 1997). Thus, the information that can be assembled about our activities online
may be compromised and used by others to cause financial or emotional harm.
bị xâm phạm
For more information on
http://passwordsgenerator.net/.
creating
passwords,
go
online
to:
Similarly, some hackers target websites and resources in order to cause harm or to
tư tưởng
express a political or ideological message. Often, the hacker and activist community use
web defacement in order to spread a message and cause harm at the same time
(Brenner, 2008; Denning, 2001, 2011; Kilger, 2011). Web defacements are an act of online
sự phá hoại
trong đó
vandalism wherein an individual replaces the existing HTML code for a web page with
an image and message that they create. For example, a person may try to deface the
làm xấu mặt
website for the White House (www.whitehouse.gov) and replace the content with a
message that they want others to see. Although this is an inconvenience and
embarrassment to the site owner, it may be more malicious if the defacer chooses to
độc hại
delete the original content entirely.
Defacements have become a regular tool for politically motivated hackers and actors
thể hiện
về mặt chính trị
25
to express their opinions, and have been used around many hot-button social events. For
instance, the Turkish hacker community began a widespread campaign of web
defacements following the publication of a cartoon featuring an image of the prophet
Mohammed with a bomb in his turban (Holt, 2009; Ward, 2006). Many Muslims were
deeply offended by this image, and Turkish hackers began to deface websites owned by
the Danish newspaper which published the cartoon, along with any other site that
reposted the image. The defacements were conducted in support of the Islamic religion
and to express outrage over the way in which their faith was being portrayed in the
popular media (Holt, 2009; Ward, 2006). Thus, motivated actors who want to cause harm
or express an opinion may view various resources online as a target.
For more on web defacements and images of such content, go online to:
www.zone-h.org.
Defining computer misuse and abuse
một phương tiện truyền thông
Since technology may be used both as a communications medium and a target for
cơ sở hạ tầng
cấu thành
quan trọng
phân định
attacks against digital targets and infrastructure, it is vital to delineate what constitutes
the abuse and misuse of technology. For instance, the term deviance is used to refer to a
behavior that may not be illegal, though it is outside of the formal and informal norms
thịnh hành
or beliefs of the prevailing culture. There are many forms of deviance, depending on
societal norms and societal contexts. For instance, texting and using Facebook while in
gây rối
class may not be illegal, but it is disruptive and generally frowned upon by faculty and
administrators. The same is true in movie theaters and other public settings. Therefore,
texting and using Facebook could be viewed as deviant in the context of certain
situations and locations, but may not be illegal otherwise. The fact that this activity is
gây ra/sanh ra
engendered by technology may allow it to be referred to as cyberdeviance.
thích hợp
A more pertinent example of cyberdeviance is evident in the creation and use of
cực kỳ
pornography. The Internet has made it exceedingly easy for individuals to view
pornographic images and videos, as well as to make these materials through the use of
webcams, cell phone cameras, and digital photography. It is legal for anyone over the
age of 18 to either access pornographic images or star in these films and media. If the
larger community shares the view that pornography is morally wrong, then viewing
26
these materials may be considered deviant in that area. Therefore, it is not illegal to
vi phạm
engage in this activity; rather it simply violates local norms and belief systems, making it
a deviant behavior.
các quy định pháp lý được luật hóa
Activities that violate codified legal statutes move from deviance to criminal acts. In
luật hóa
the context of pornography, if an individual is under the age of 18 in the USA, they are
not legally allowed to either create or view pornographic images. Therefore, such an act
is considered a crime because it carries legal sanctions. The criminal statutes in the USA
at both the state and federal level recognize a variety of offenses in the real world.
áp dụng nhanh chóng
tạo điều kiện
The rapid adoption and use of technology in order to facilitate criminal activity,
however, have led to the creation of several terms in order to properly classify these
xuất hiện
behaviors. Specifically, cybercrime and computer crime emerged a few decades ago to
refer to the unique way in which technology is used to facilitate criminal activity.
ám chỉ
thủ phạm
Cybercrime refers to crimes “in which the perpetrator uses special knowledge of
không gian mạng
cyberspace,” while computer crimes occur because “the perpetrator uses special
knowledge about computer technology” (Furnell, 2002: 21; Wall, 2001). In the early days
làm rõ
of computing, the difference between these terms was useful to clarify how technology
hợp nhất
was incorporated into the offense. The fact that almost every computer is now connected
giảm đi
phân đoạn
to the Internet in some way has diminished the need to segment these two acts (Wall,
hầu như đồng nghĩa
2007). In addition, they have become virtually synonymous in both academic circles and
popular media. As a result, this book will use the term “cybercrime” due to the range of
crimes that can occur through the use of online environments and the massive number
of computers and mobile devices that are connected to the Internet.
Thiên nhiên không biên giới
The borderless nature of the Internet complicates the criminal justice response to
crime and deviance, since the ways in which nations define an act do not generally
cản trở
hinder individuals from accessing content. Using the example of pornography, it is legal
to produce and access this content in the USA and in most other parts of the globe.
Islamic majority nations like Iran and Saudi Arabia, however, have banned and made it
illegal to access pornography due to their religious beliefs (Wall, 2001, 2007). Other
countries like Sweden, however, place minimal restrictions on the production of
thú tính
pornographic content, including images of animals or “bestiality.” Although it is illegal
to create or view this content in the USA and in most other nations, individuals can
access bestiality, violent, or unusual pornographic material from across the globe,
regardless of their nation’s laws, due to the connectivity afforded by the Internet
thi hành
(Brenner, 2008; Wall, 2007). Thus, it is difficult to restrict or enforce local laws on
individual conduct because of the ability to access content globally.
hành vi/ứng xử cá nhân
27
Fig. 1.1 Venn diagram of cybercrime, cyberterrorism, and cyberdeviance
The intersection of cybercrime and cyberdeviance is also related to the emerging
problem of cyberterrorism (see Figure 1.1 for details). This term emerged in the mid1990s as technology began to play an increasingly significant role in all aspects of society
(Denning, 2001; Britz, 2010). There is no single accepted definition of cyberterrorism,
though many recognize this behavior as the use of digital technology or computermediated communications to cause harm and force social change based on ideological or
sự cố
political beliefs (Brenner, 2008; Britz, 2010). Although there are few known incidents of
sự phổ biến
cyberterrorism that have occurred over the past two decades, the ubiquity of technology
cực đoan
could allow extremist groups like Al Qaeda to target military systems containing
tạo ra thương mại
sensitive information, financial service systems that engender commerce, power grids,
cơ sở hạ tầng trọng yếu
switching stations, and other critical infrastructure necessary to maintain basic services.
chiến thuật
Criminals may also attack these targets using similar tactics, making it difficult to
separate acts of cyberterror from cybercrime (Brenner, 2008).
For more information on the technologies supporting power grids, go online to:
www.tofinosecurity.com/blog/scada-cyber-securityinternational-issue.
In order to classify these phenomena, it is necessary to consider both the motive of the
attacker and the scope of harm caused. For instance, criminal acts often target single
28
trong khi
individuals and may be motivated by economic or other objectives, whereas terrorist
attacks are often driven by a political motive and are designed to not only hurt or kill
innocents but also to strike fear into the larger population (Brenner, 2008; Britz, 2010). In
addition, the communications capability afforded by the Internet creates an interesting
cực đoan
intersection between cyberdeviance and cyberterror. For example, members of extremist
and hate groups increasingly depend on web forums and blogs to post their views to
audiences across the globe. In fact, the Islamic State of Iraq and the Levant (ISIS) uses
tuyển dụng và cực đoan hóa
Twitter and other social media platforms as a means to recruit and radicalize individuals,
as well as to promote their agenda (see Chapter 10 for more details). The laws of a given
country may not allow such language, as in Germany where it is illegal to post Nazirelated content (Wall, 2001). In the USA, though, such speech is protected under the First
Amendment of the Constitution; therefore, the act of using online forums to express an
opinion largely unsupported by society is deviant rather than illegal behavior.
It is not always possible to identify cleanly and clearly the nature of some
đáng kể
cyberattacks, as is evident in the substantial number of attacks by hackers around the
world who belong to the collective Anonymous. The origins of Anonymous stem from
the image board 4chan, where people upload and share images with one another without
revealing any personal information about themselves (Olson, 2012). Individuals
continuously posting pictures without identifying themselves led to the popularity of the
kết tinh
idea of Anonymous as a real person. This crystallized in 2004 when one of the 4chan
administrators implemented a “Forced_Anon” protocol signing all posts to Anonymous
(Olson, 2012). As a result, this led to the acceptance of a collective identity of
Anonymous centering on the idea that the Internet is an outlet that has no limits or
boundaries.
khuyến khích nhận thức và công nhận
The group encourages awareness and recognition of individuals who are engaging in
either illicit activities or unacceptable actions that harm society. There is no way to
identify a member of Anonymous; instead they are a collection of individuals who
support an idea or goal without the need for individual recognition (Olson, 2012). In
most of their online communications, they use the following language as an expression
of these values: “We are Anonymous. We are Legion. We do not forgive. We do not
forget. Expect us.” The group also uses Guy Fawkes masks and a body wearing a black
suit with a question mark for a head in representation of the anonymous nature of the
group. There is also no necessary leadership of Anonymous.
lĩnh hội
They are often perceived as hacktivists in the general media, since they use DDoS
attacks, group-based research, email hacking, and other techniques in order to affect a
target. For instance, one of the first targets of the group was a white supremacist radio
show host named Hal Turner. Members of Anonymous DDoSed his site offline, causing
tiếp theo/sau đó
thousands of dollars in losses (Olson, 2012). A subsequent attack by individuals
associated with Anonymous targeted the Support Online Hip Hop (SOHH) website and
chê bai
its forums. Individuals in the SOHH forum made disparaging comments against
Anonymous in June 2008. Their website was then attacked in two stages. The first attack
used DDoS tools to knock out access followed by a series of web defacements adding
29
Nazi images and racial language to change the site content (Reid, 2008). Shortly
thereafter, Anonymous accessed and shared personal information for a teenage boy who
ran the site “No Cussing Club” (Olson, 2012). The boy’s family was harassed by
individuals associated with the group, including hate mail and obscene phone calls.
Following these attacks, the focus of Anonymous turned toward social activism in
support of free access to information. For instance, the group engaged in a DDoS attack
against multiple targets in both the music and private industries in a campaign called
“Operation Payback.” The attacks began in September 2010 as retaliation against antipiracy initiatives started by media companies in order to reduce access to copyrighted
materials online. The attacks expanded to include Sony and their PlayStation Network in
2011. The company began to crack down on attempts to pirate games and media, such as
a lawsuit against a hacker who released information on techniques to download
PlayStation 2 video games (Olson, 2012). Anonymous members used the Low Orbit Ion
Cannon attack tool to engage in a DDoS campaign that took down the Play-Station
Network for hours and days at a time. They also accessed and released personal
information of PlayStation users obtained by hacking (Olson, 2012). Their involvement in
a variety of attacks and hacktivist operations has continued throughout the past few
years, targeting governments, law enforcement, and industrial targets.
Taken as a whole, Anonymous does not appear to hack for economic gain. The
absence of consistent ideological justifications for their Anonymous actions makes it
difficult to classify their attacks as acts of cyberterrorism. Although scholars differ as to
cấu thành
whether Anonymous constitutes
cybercriminals or terrorists, their actions demonstrate
có liên quan với nhau
that cybercrime, terror, and deviance are all interrelated and share common elements
due to the nature of online environments.
What makes cybercrime and deviance attractive?
The rise of cyberdeviance, cybercrime, and cyberterror has led many to question why
some people choose to engage in wrongdoing in virtual environments. There are several
unique factors that may account for offending online, most especially the availability of
quan trọng nhất
có ở khắp mọi nơi
technology in the modern world. First and foremost, the ubiquity of technology makes it
tương đối dễ dàng
easy for individuals to gain access to the tools necessary to offend with relative ease. The
về cơ bản
prices of laptop and desktop computers have dropped substantially over the past decade,
making it easy to acquire this equipment. For instance, the price of laptop PCs decreased
from an average of $1,640 in 2001 to $1,000 in 2005 (Associated Press, 2005). The price has
cầm tay
continued to drop, and these devices now compete with even smaller portable
computers, like the iPad and smart phones, that can connect to the Internet through
cellular technology. As a result, offenders can readily acquire and access information
from anywhere through these resources. If a person cannot afford to buy these devices
on their own, they can always use computers in Internet cafés and public libraries for
free or for a small cost. Thus, there are minimal barriers to computer technology
30
globally.
phạm vi
In addition, there is a wide range of cybercrimes that can be performed dependent
upon the individual’s technical skill. Some forms of cybercrime require a great deal of
skill and proficiency, though simple offenses may be performed with minimal
investment on the part of the offender. For instance, anyone can download pirated music
or movies from online environments or post an ad for sexual encounters on craigslist or
another website.
một hệ số nhân lực
Technology also acts as a force multiplier in that computers and CMCs allow a single
kế hoạch/âm mưu
person to engage in crimes that otherwise involve multiple people or complex schemes in
order to target victims (Brenner, 2008; Taylor, Fritsch, Liederbach, and Holt, 2010). For
cố gắng/nỗ lực
instance, if a criminal attempts to rob a person in the real world, they must often target
đáng sợ
single individuals due to the difficulty in intimidating and managing groups of people.
The offender must also try to determine in advance if the individual he is attempting to
rob has money, jewelry, or other goods that are of value.
In online environments, offenders can target thousands of victims at a time,
worldwide, within seconds. For example, individuals regularly send out unsolicited
thu hoạch
emails, called spam, to thousands of victims using addresses harvested from information
posted on public websites (Holt and Graves, 2007; King and Thomas, 2009; Wall, 2004).
For instance, public universities often post the addresses of professors, faculty, and staff
đối chiếu
on their websites. In turn, individuals can copy and collate these addresses into lists and
use them to send a variety of different spam messages. In fact, one of the most common
forms of spam message appears to originate in part from Nigeria, where the sender
claims to be foreign royalty, bankers, or attorneys who need assistance in moving large
sums of money (Holt and Graves, 2007; King and Thomas, 2009; Wall, 2004). They
request information from the email recipients like names, addresses, phone numbers, and
thực hiện
bank account details so that they can reuse the information to commit identity theft or
bank fraud. Since few people fall for this sort of scheme, sending out thousands of
khả năng xảy ra
messages increases the likelihood that a victim may respond. Thus, fraudsters increase
the likelihood of success by targeting thousands of victims simultaneously.
đồng thời
For more information on the rate of spam distribution, go online to:
https://securelist.com/all/?category=442.
The risk of detection from law enforcement is much lower in online environments
Nguy cơ bị phát hiện
31
than in the real world. Offenders in the real world must take several steps to reduce the
likelihood that their actual identity can be determined. For example, robbers may wear a
mask or baggy clothing to conceal their face and build (Miller, 1998; Wright and Decker,
cải trang
1997). They may also try to disguise their voice by speaking in a higher or lower tone.
Victims may be able to recall information about the offender and video cameras may
capture the incident on film, making it harder to hide the offense from police.
These issues are largely absent in online environments, since it is easier for offenders
to conceal their real identity (Wall, 2001). The faceless nature of the Internet makes it
easy for individuals to hide their gender, age, or race in various ways. A profile in a
social networking site like Facebook or email account can be created using false
information through Google, Yahoo, or Hotmail. This false account may be used to send
threatening or harassing messages to others to help conceal their true identity (Bocij,
2004). Similarly, various technological resources are designed to hide a person’s location
from others. For example, Tor, the service used by individuals to access the Silk Road, is
a form of proxy server that may be used to hide a computer’s location by acting as an
intermediary between a computer and the servers and systems to which it connects
through the Internet. If we try to access Google from a PC using a proxy, the command
will be routed through a service that will make the request on our behalf and send the
information back to us. In turn, the servers at Google will not register our computer as
the one making the request, but rather associate it with the proxy server. Some offenders
are even able to route their web and email traffic through other people’s computers in
order to minimize the likelihood that they are caught (see Chapter 4 for more details).
For more on proxy servers, go online to:
1. www.publicproxyservers.com.
2. http://proxy4free.com.
32
Cybercrimes are also attractive for some actors based on the laws of their nation.
Since individuals can target victims across the world, local laws make a significant
công nghiệp hóa
difference to who and what an offender targets. Many industrialized nations have laws
truy tố
against cybercrimes, increasing the risk of prosecution and investigation for offenders if
caught (Brenner, 2008). Therefore, attacking people within that country may increase the
likelihood of being prosecuted. If, however, a country does not allow their citizens to be
bị dẫn độ
extradited to another country to face prosecution for crimes, then the actor cannot be
successfully investigated (Brenner, 2008). For instance, there is no treaty allowing
Russian citizens who engage in attacks against US citizens to be brought to the USA for
prosecution. Russian criminals cannot be extradited for these offenses and may generally
receive no punishment for their actions (see Box 1.1 for an example). In turn, it is
extremely difficult to deter or sanction cybercriminals in foreign countries, which may
encourage attacks against certain countries with no consequences.
Box 1.1 Getting around Russian extradition laws
www.nbcnews.com/id/3078784#.WNbZom_ytQI.
FBI agent charged with hacking
Russia alleges agent broke law by downloading evidence
In a first in the rapidly evolving field of cyberspace law, Russia’s counterintelligence service on Thursday
filed criminal charges against an FBI agent it says lured two Russian hackers to the United States, then
illegally seized evidence against them by downloading data from their computers in Chelyabinsk, Russia.
This article provides interesting insights into the challenges posed by cybercrime
investigations that cross national boundaries.
By contrast, some developing nations may not have laws against computer misuse. If
there are no laws, then the nation serves as a sort of “safe haven” for actors where they
can operate with minimal risk of legal sanctions (Brenner, 2008; Holt, 2003). This was
được ví dụ
exemplified in the creation of the ILOVEYOU virus that spread around the world in 2000.
phần mềm độc hại
This form of malware attacked millions of computers and spread through infected email
làm tê liệt
attachments, effectively crippling the Internet at the time (Poulsen, 2010). The program
33
started in the Philippines on May 4, 2000 and spread across the world in a single day. It is
thought to have been created by a Filipino college student named Onel de Guzman,
based on the start of the program from Manila and his interest in hacking (Poulsen,
2010). At the time, there were no laws against writing malware in the Philippines,
making prosecutors unable to pursue de Guzman. Thus, the absence of laws can make it
extremely difficult to combat cybercrimes internationally.
khó khăn đáng kể
Taken as a whole, the global reach of the Internet has created substantial difficulties
for law enforcement agencies at home and abroad to enforce cybercrime laws globally.
kết cấu
The structure of policing, especially in the USA, establishes guidelines for the
investigation of crimes at the local, state, and federal level. Offenses that occur within a
ranh giới pháp lý
thành phố địa phương
single jurisdictional boundary are often the responsibility of local municipal police
departments or sheriffs’ departments, while those that cross state or national boundaries
are handled by state or federal agencies. Many cybercriminals may not live within the
same region as their victim (Holt, 2003; Wall, 1998), though, even if they were in the
same region, a victim may have no idea where the offender actually resides. This creates
giảm đi
significant confusion as to the appropriate agency to contact, and diminishes the amount
of cybercrime reported to law enforcement (Goodman, 1997; Wall, 1998). In fact, this
đếm thiếu
under-counting is referred to as “the dark figure” of cybercrime, in that the true number
of offenses is unknown.
vốn có
One reason for the lack of reporting is the inherent difficulty in recognizing when
illegal activities have taken place. Individuals may be completely unaware that they have
been the victim of cybercrime until it is too late. For example, failures in computer
phần cứng và phần mềm
hardware and software may be either the result of an error in the equipment, or a direct
tần suất xảy ra
result of criminal activities designed to hide their occurrence. Many in the general public
phân biệt
nguyên nhân sâu xa
do not have the skills necessary to discern the root cause, making it hard to know when
thỏa hiệp
some sort of compromise has taken place. Since cybercriminals attempt to target as
many victims as possible, it is also difficult to identify any patterns for risky behavior
online (Bossler
and Holt, 2009). Finally, protective software programs designed to reduce
nguy cơ trở thành nạn nhân
individual risk of victimization do not always work. Approximately 25 percent of
personal computers around the world that use a variety of security solutions have
phần mềm độc hại
malicious software, such as a virus, loaded into their memory (PandaLabs, 2007).
The embarrassment, shame, or harm that may come from reporting cybercrime
victimization also reduces the likelihood of contacting law enforcement. For instance,
Nigerian email scams often target naïve individuals who believe that an unlikely claim
may be valid. Reporting that they have been defrauded may be substantially
embarrassing and thereby diminish the likelihood of reporting. Within corporate and
government computing environments, there are several issues that may reduce the
likelihood of reporting when a cybercrime has occurred. For instance, a company may
lose customers or overall stock value if they report that their systems have been
gây ra sự che đậy
compromised. Embarrassment over the loss of sensitive information may engender
cover-ups or diminished reporting in order to reduce the loss of business.
Taken as a whole, technology affords multiple unique advantages for offenders that
34
are not necessarily present in the real world. Technology is readily available across the
globe, providing offenders with widespread access to resources. The number of people
vô số nạn nhân tiềm năng
online provides a wealth of prospective victims that can be affected with greater ease
triển vọng
than is possible in the real world. Technology also offers people the ability to hide their
actual identity behind a variety of false names and locations, making it difficult to
determine who is responsible for a criminal incident. Finally, the different legal
hợp tác
structures and cooperative agreements in place across the globe make it difficult to
successfully prosecute cyber-crimes. As a result, individuals who engage in cybercrime
and deviance face a much lower risk of detection and arrest, and may experience greater
monetary or emotional rewards from cybercrime.
monetary
tinh thần
For more information on the challenges of prosecuting cybercrimes, go online
to: www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf .
Technology as evidence
The third and vaifinal
way that technology may be used in the course of an offense is
trò ngẫu nhiên
through its incidental role or involvement in a crime. In this case, the computer may
thực hiện
một thiết bị lưu trữ
either be involved in the commission of a crime or is being used merely as a storage
device (Maras, 2012). For instance, the presence of child pornography on a laptop or cell
bất cứ nơi nào nó được lưu trữ
phone suggests that it is incidental to the offence. This information, wherever it is stored,
cấu thành
constitutes digital evidence, defined as information that is either transferred or stored in
một dạng nhị phân
a binary form (Casey, 2011). Digital evidence may be anything from the browser history
of an individual to the emails, chat logs, photos present on mobile phones, GPS devices,
IoT devices, and cell phone cameras of both the victim and offenders (see Chapter 12).
có khả năng
Computers, in the traditional sense, are no longer the only devices capable of sending
emails, chatting, and browsing the Internet. Tablets, music players, and various other
devices can be connected to the Internet and provide some evidence of an individual’s
behaviors.
There are several valuable examples that help clarify what is digital evidence and
thích hợp
when it may be pertinent for various forms of crime both online and offline (Clifford,
2006; Maras, 2012). For example, BTK (Bind, Torture, Kill) was a serial killer in Kansas
(USA) from 1974 until 2005 when he was arrested and convicted of ten homicides
35
(Williams and Landwehr, 2006). The killer murdered ten people in Kansas between 1974
nằm im
and 1991 and then went dormant, though he constantly wrote letters to the media and
police describing his exploits. The investigation went cold, though the BTK Killer
chỉ ra
gán cho
indicated that he had committed another murder that had not been attributed to him.
Police then began communicating directly with BTK, when the killer asked if it was
đĩa mềm
sai lầm
tìm
possible to truy
trace
his identity on the basis of data on floppy disks. The agency erroneously
said that they could not, and BTK sent them a disk with a document discussing his
pháp y
behaviors. Using specialized computer forensic software to help process the data and
evidence located on the disk, investigators determined the location of the computer
where the disk had been opened, as well as the person who created the document. In
turn, they were able to develop detailed information about the killer and gather enough
tương lai
circumstantial evidence to suggest a prospective identity, which turned out to be a man
named Dennis Rader. He was subsequently arrested and pled guilty to the murders,
liên tiếp
receiving ten consecutive life sentences, one for each murder (Williams and Landwehr,
chung thân
2006).
nguồn gốc
Digital evidence may also be derived from online sources that may be present on
websites and social media. In fact, digital evidence collected from social media sites, such
as Facebook and Twitter, has been influential in law enforcement over the past few
years. Following the Vancouver Canucks’ loss to the Boston Bruins in the Stanley Cup
finals in 2011, a massive riot broke out in Vancouver with fans setting vehicles on fire,
breaking windows, looting stores, and dancing atop overturned cars (CBC News, 2011).
Within hours of the riot, police received over 3,500 emails that included videos, photos,
and web links to various social media sites. In addition, a “Vancouver Riot Pics”
Facebook page was created to identify those individuals involved in the riots by allowing
the public to “tag” the pictures and videos (Leger, 2011). More than 100 people were
arrested through the assistance of social media.
hầu hết
kết hợp
With virtually every crime incorporating some form of digital evidence, it is up to law
enforcement to be able to identify the possible sources of information and the locations
ngoại vi
where such information may be found. Various peripheral devices like flash drives, CDs,
DVDs, and even gaming systems may contain digital evidence that can be collected.
cải trang
Some companies even produce removable storage media that are easily disguised, such
as a pair of sunglasses or a wristband that contains a flash drive. With digital devices
being increasingly used to target, act as a tool, or provide support for criminal activities,
law enforcement and investigators must understand the nature of the digital crime scene.
For
more
on
hidden
media
devices,
www.trendhunter.com/slideshow/disguised-usb-drives.
36
go
online
to:
37
loại hình
A typology of cybercrime
gây ra
In light of the various ways in which technology engenders crime and deviance as well
bồi dưỡng
as fostering unique tactics for offending, it is necessary to understand the wide range of
cấu tạo
behaviors that constitute cybercrime. David Wall (2001) created one of the most
gói gọn
recognized typologies of cybercrime, which encapsulates behavior into one of four
xâm phạm mạng
lừa đảo và trộm cắp trên mạng
khiêu dâm trên mạng và tục tĩu
categories: (1) cyber-trespass; (2) cyber-deception and theft; (3) cyber-porn and obscenity;
and (4) cyber-violence. These categories reference the wide range of deviant, criminal,
and terrorist behaviors that have emerged using technology, as well as the subcultures
supporting offenders throughout the world.
Cyber-trespass
vượt qua ranh giới sở hữu
The first category is cyber-trespass, referring to the act of crossing boundaries of
ownership in online environments. This may seem confusing at first. If you go to a
coffee shop or restaurant, you may notice that they offer free Wi-Fi. Their network
chỉ ra
probably has a name they chose which identifies their network and indicates who
manages and is responsible for that space. In order to use the service, you must join their
network and accept the terms of service that may come up when you open your web
browser. In this instance, the coffee shop owns and manages this wireless network, but
allows others to use the connectivity. By contrast, if the shop did not offer connectivity
to customers, but you attempt to join and use their Wi-Fi anyway, you are trespassing
because you are trying to break into the network that they own without the company’s
permission.
trường hợp
xâm phạm
The issue of ownership is critical in instances of trespass, especially for computer
hackers who often attempt to access computer systems, email accounts, or protected
systems that they do not own (Furnell, 2002; Jordan and Taylor, 1998). Many in the
general public recognize hackers for their
involvement in criminal acts of trespassing
đóng góp
sensitive boundaries of ownership, contributing to the belief that hackers cause
significant harm to citizens, industry, and government alike. Although not all hackers
engage in crime, those who do cost individuals and corporations a great deal of money
each year. Individuals who are interested in computer hacking operate within a large
online subculture with participants from across the globe. They often come together
online to discuss various techniques of hacking and their attitudes toward hacking with
or without permission from system owners. Because not all hackers engage in crime,
một vết nứt
there is a rift within the subculture based on an individual’s willingness to engage in acts
of cyber-trespass in support of hacking (see Chapter 3 for more details).
38
Cyber-deception...