Vince

Cards (159)

  • Cybercrimes and International Organizations

    • Email with Illegal content often pass through a number of countries during the transfer from sender to recipient, or illegal content is stored outside the country
    • UN has a draft a treaty on an International Court or Tribunal for cyber space
    • The treaty mentions who has jurisdiction over internet crimes, who is considered a cybercriminal and thus must be liable to punishment
    • The Council of Europe Convention on Cybercrime (2001) states types of cybercrimes, and declares that any person liable to these actions is sanctioned through deprivation of liberty
    • The League of Arab States Convention on Combating Information Technology Offences states that each member state of the convention should be committed to fulfill its obligations arising from the convention, however without the interference of other states' interior affairs
    • The Convention also clearly stated that no state judicial is entitled to jurisdiction on other states, and that every state should respect the sovereignty of other states
    • The Convention also endows with the imposition of sanctions on the following crimes: entry i.e. hacking, interference with the private lives, withholding some information, amendment, mail fraud, or posting obscene material
    • The Commonwealth of Independent States Agreement on Cooperation in Combating Offenses related to Computer Information (2007) define the type of criminal acts, who are the competent authorities, forms of cooperation to combat cybercrime, and how to request their assistance in case of being victimized
    • The Shanghai Cooperation Organization Agreement in the Field of International Information Security (2008-2012) states that the members are: "firmly convinced that terrorism, separatism and extremism, as defined in this Convention, regardless of their motives, cannot be justified under any circumstances, and that the perpetrators of such acts should be prosecuted under the law
    • The African Union Convention on Cyber Security and Personal Data Protection (June 27, 2014) states the online activities should be exercised freely except: Gambling, even in the form of legally authorized betting and lotteries; Legal representation and assistance activities; Activities exercised by notaries or equivalent authorities in application of extant texts
    1. enabled cybercrimes
    Crimes that were known to the world before the internet, but are facilitated through the World Wide Web
  • True cybercrimes

    Crimes that would not exist outside the online environment
  • Criminal profiling

    • Seeks to identify criminals by analyzing their behavior after they have engaged in a crime
    • The fundamental rational is simple: If a certain behavior and evidence in a crime are found to be in common with other crimes, then there is a big probability that it is the same criminal activity because behavior is related to the psycho-socio characteristics of an offender
  • Criminal profiling emerged as a new tool for investigation at the beginning of the 20th century, starting with the case of the infamous Jack, the Ripper killings in England
  • Jack the Ripper was an English serial killer. Between August and November 1888, he murdered at least five women—all prostitutes—in or near the Whitechapel district of London's East End
  • Jack the Ripper was never identified or arrested
  • What was unique about the murders committed by Jack the Ripper

    • All of Jack the Ripper's victims were prostitutes, and all but one were killed while soliciting customers on the street. In each instance the victim's throat was cut, and the body was mutilated in a manner indicating that the murderer had at least some knowledge of human anatomy
  • Criminal profiling is estimated to have a success rate of 83 % when assisting traditional investigations
  • Due to the fact that cybercrime is a new unpaved addition to the "new world", officials would seek all the help they can get in order to catch the invisible criminal, especially when physical evidence is lacking in a cybercrime
  • Challenges of cybercrime investigation

    • Unlike traditional crime scenes, the evidence found mostly exists only in the cyber-world; in a network, computer, or the Internet
    • The faceless aspect of cybercrime that compiles its challenge
    • Cyber criminals depend on the pseudo-anonymous nature of the Internet and need this technology to camouflage their true identities
  • Fortunately, a cyber-criminal's facelessness is considered as a signature behavior, a motivation, and an MO (modus operandi)
  • Criminal profiling relies heavily on such clues because not all cyber criminals have the same maturity in technique, behavior, characteristics and motives, making every cybercrime unique
  • Developing countries need to integrate protection measures into the roll-out of the Internet from the beginning, as although this might initially raise the cost of Internet services, the long-term gains in avoiding the costs and damage inflicted by cybercrime are large and far outweigh any initial outlays on technical protection measures and network safeguards
  • Compared with the costs of grafting safeguards and protection measures onto computer networks at a later date, it is likely that initial measures taken right from the outset will be less expensive
  • Preventing cyber-crime and Future opportunities for managing cybercrime

    • Law Enforcement
    • Attitude awareness
    • Ethics
    • IT Technology
  • Law Enforcement
    The law enforcement is very weak and in order to strengthen the law, the maximum fine should be increased as well as imprisonment so that the guilty will be charged
  • Attitude awareness
    In order to prevent cyber-crimes, creating attitude awareness during online business is important. Business entrepreneurs from the survey are unaware cyber-crime, thus, awareness programs on preventing cyber-crime should educate them in order to ensure entrepreneurs feel safe during online business transaction
  • Ethics
    A good ethics while doing online business transaction should be addressed by entrepreneurs and they should respect potential buyers and seller by giving detail information and respect each other during online business
  • IT Technology

    Information technology infrastructure is comprehensive, thus, cyber-crime prevention strategies should remain a top concern as enterprise now must support more devices such tablets and smartphones. The enterprise should equip them with knowledge and update technology security devices so that can protect from cyber criminals
  • Law enforcement
    Weak, needs to be strengthened by increasing maximum fines and imprisonment so the guilty are charged
  • Attitude awareness

    Important to prevent cyber-crimes, business entrepreneurs are unaware of cyber-crime so awareness programs should educate them to ensure they feel safe during online business transactions
  • Ethics
    Good ethics should be addressed by entrepreneurs during online business transactions, they should respect potential buyers and sellers by giving detailed information and respecting each other
  • IT Technology
    Information technology infrastructure is comprehensive, cyber-crime prevention strategies should remain a top concern as enterprises must support more devices like tablets and smartphones, enterprises should equip them with knowledge and update technology security devices to protect from cyber criminals
  • Factors identified in the research
    • Law enforcement
    • Attitude awareness
    • Ethics
    • IT technology
  • Law enforcement should be reviewed by the government so that new amendments will protect online business users
  • Creating attitude awareness during online business transaction is important to help both parties, the seller and buyer
  • Applying good ethics will increase trust toward buyers while conducting online business transactions
  • Business entrepreneurs should equip with latest information technology, and updated security systems will prevent being attacked by cyber-criminals
  • Anonymity of identity and location
    Facilitates committing crimes online, making it easier for criminals but harder for law enforcement to bring them to justice
  • Article 1 of the United Nations Code of Conduct for Law Enforcement Officials

    Clarifies the responsibility of law enforcement is to execute the duty forced upon them by law, by serving the community and defending all persons from illicit acts
  • Cybercrimes generally transpire globally, but are reported locally, creating a need for collaboration between nation states to avoid jurisdiction problems
  • Cyberattacks are becoming highly developed and more difficult to discover especially when new techniques promptly find their way to a broader audience
  • Almost half of international organizations tackling cybercrimes are non-binding
  • Open membership treaty

    Any state may become a member by simply articulating their intent to join and follow the presented treaty terms
  • Semi-open membership treaty
    Membership is approved by a majority vote from the contracting states
  • Closed membership treaty
    Membership requires a unanimous vote from the contracting states
  • Examples of membership types
    • Council of Europe Cybercrime Convention (closed)
    • Shanghai Cooperation Organization Agreement (open)
  • No single international organization dealing with cybercrimes has a global geographic reach of membership
  • The Council of Europe Cybercrime Convention has the leading number of signatures/memberships with 43 member-states, and 5 Non-member States of the Council of Europe