Crucial Elements in Law Enforcement against Cybercrime
Crucial Elements in Law Enforcement against Cybercrime
Technological innovation, globalization, and urbanization have facilitated criminals and terrorists to pose a fresh wave of hazards that can shake the security establishment of global markets. The development of information and communications technology creates not only advantages, convenience and efficiency, but also disadvantages, challenges and threats. The purpose of this paper is to explore into crucial elements in combating cybercrime. The paper identified the following crucial elements as special perpetrator-victim relationship, time elements, spatial elements, technological nature of cybercrime, complexity, costs, anonymity, hidden victims, concealment, trans-territoriality, and fast increase in recent four decades. They should be emphasized in fighting against cybercrime. The paper further analyzes the phenomenon of rent-seeking from the exaggeration of insecurity and cybercrime, which can be misinformation in this battle.
___
- [1].Allen, J. (2001). CERT System and
Network Security Practices, in Proceedings
of Fifth National Colloquium for
Information and communications systems
Security Education, George Mason
University, Fairfax, Virginia, 22-24 May.
Retrieved 23 Novemer 2017, from
http://www.theebusinesssite.com/PPT/Secu
reWebsites769468/769498_Reading_Class8-
CERT_Network_Hardening.pdf
- [2].American Society for Industrial Security
(ASIS). (2004). Cybercrime-Fighting Tools
Still Lacking, Security Management,
number 40.
- [3].Anderson, R. (2001). Why Information
Security Is Hard--an Economic
Perspective, in Proceedings of the 17th
Annual Computer Security Applications
Conference, Washington, DC: IEEE
Computer Society. Retrieved 23 Novemer
2017, from
http://www.acsac.org/2001/papers/110.pdf
- [4].Behar, R. (1997). Who's Reading Your Email? Fortune, number 66, pp. 57-70.
- [5].Bequai, A. (1978). Computer Crime,
Lexington, Massachusetts, Toronto:
Lexington Books.
- [6].Carter, D. L. (1995). Computer Crime
Categories, Law Enforcement Bulletin, U.
S. Department of Justice: Federal Bureau
of Investigation, volume 64, number 7, pp.
21-26.
- [7].CCIPS. (2006). Computer Intrusion Cases.
Retrieved 23 Novemer 2017, from
http://www.usdoj.gov/criminal/cybercrime/
cccases.html
- [8].Centre for Strategic and International
Studies (CSIS). (1998). Cybercrime
Cyberterrorism Cyberwarfare: Averting an
Electronic Waterloo (CSIS Task Force
Report), Centre for Strategic and
International Studies.
- [9].Clark, F. and Diliberto, K. (1996).
Investigating Computer Crime, Boca
Raton, Florida: CRC Press LLC.
- [10]. Collin, B. C. (1999). The Future of
Cyberterrorism: Where the Physical and
Virtual Worlds Converge, 11th Annual
International Symposium Criminal Justice
Issues. Retrieved 23 Novemer 2017, from
http://www.crimeresearch.org/library/Cyberter.htm
- [11]. Conly, Catherine H. (1991).
Organizing for Computer Crime
Investigation and Prosecution, Darby, PA:
Diane Publishing.
- [12]. Cook, D. (1997). Poverty, Crime
and Punishment, London: CPAG.
- [13]. CSI. (2000). CSI/FBI 2000
Computer Crime and Security Survey.
- [14]. CSI. (2005). CSI/FBI 2005
Computer Crime and Security Survey.
- [15]. Daler, T., Gulbrandsen, R., Melgrd,
B. and Sjølstad, T. (1989). Security of
Information and Data, Chichester: Ellis
Horwood.
- [16]. Davidson, A. (14 April 2003).
Decentralization, Disease and Terrorism.
Retrieved 23 Novemer 2017, from
http://www.eclicktick.com/decentralization
__disease_and_terrorism__.htm
- [17]. Dnes, A. W. (2000). The Economics
of Crime, in N. G. Fielding, A. Clarke and
R. Witt. (eds.). The Economic Dimensions
of Crime, London: Palgrave, 2000, pp. 70-
81.
- [18]. Dong, S. & Li, X. (2016). Besieged
privacy in social networking services.
International Journal of Electronic Security
and Digital Forensics. Vol. 8, Issue 3. pp.
224-233. Retrieved 23 November 2017,
from
https://www.inderscienceonline.com/doi/pd
f/10.1504/IJESDF.2016.077447. DOI:
10.1504/IJESDF.2016.077447
- [19]. Feldman, P. (1993). The
Psychology of Crime, New York, NY:
Cambridge University Press.
- [20]. Felson, M. (2002). Crime and
Everyday Life, third edition, Thousand
Oaks, California: SAGE Publications.
- [21]. Fields, G. (6 April 2004).
Cyberexperts and Engineers Wanted by
FBI, Wall Street Journal, B1.
- [22]. Gelbstein, E., and Kamal, A.(
2002). Information Insecurity: A Survival
Guide to the Uncharted Territories of
Cyber-threats and Cyber-security, the
United Nations Information and
Communications Technology Task Force
and the United Nations Institute for
Training and Research.
- [23]. Grabosky, P. (2000). Cyber Crime
and Information Warfare, The
Transnational Crime Conference convened
by the Australian Institute of Criminology
in association with the Australian Federal
Police and Australian Customs Service and
held in Canberra, 9-10 March. Retrieved 23
Novemer 2017, from
http://www.aic.gov.au/conferences/transnat
ional/grabosky.pdf
- [24]. Gray, C. M. (1979). The Costs of
Crime: Review and Overview, in C. M.
Gray. (ed.). The Costs of Crime, Beverly
Hills, CA: SAGE Publications, pp. 13-32.
- [25]. Greenberg, M. S. and Ruback, R. B.
(1985). A Model of Crime Victim Decision
Making, Victimology: An International
Journal, volume 10, pp. 600-616.
- [26]. Hatcher, M. and co-workers.
(1999). Computer Crimes, American
Criminal Law Review, volume 36.
- [27]. Hoo, J. S. (2000). How Much is
Enough? A Risk Management Approach to
Computer Security, Centre for International
Security and Cooperation Working Paper.
Retrieved 23 Novemer 2017, from
http://iisdb.stanford.edu/pubs/11900/soohoo.pdf
- [28]. Institute for Security Technology
Studies (ISTS). (2002). Law Enforcement
Tools and Technologies for Investigating
Cyber Attacks: A National Needs
Assessment.
- [29]. International Monetary Fund (IMF).
(2002). Global Financial Stability Report,
A Quarterly on Market Developments and
Issues, International Monetary Fund.
- [30]. Johnson, T. A. (2006). Forensic
Computer Crime Investigation, Boca
Raton, Florida: Taylor and Francis Group.
- [31]. Kelly, J. X. (2002). Cybercrime -
High Tech Crime, JISC Legal Information
Service - University of Strathclyde.
Retrieved 23 November 2017, from
http://www.jisc.ac.uk/legal/index.cfm?nam
e=lis_cybercrime
- [32]. Kingdon, J. (1994). Shooting the
Messenger: The Liability of Internet
Service Providers for Prohibited
Expression. Retrieved 23 Novemer 2017,
from
http://www.catalaw.com/logic/docs/jkisps.htm
- [33]. Lee, M. and co-workers. (1999).
Electronic Commerce, Hackers, and the
Search for Legitimacy: A Regulatory
Proposal, Berkeley Technological Law Journal, volume 14, number 2, pp. 839-
885.
- [34]. Levinson, D. (ed.). (2002).
Encyclopedia of Crime and Punishment,
Newbury Park, CA: Sage Publications.
- [35]. Li, X. (2008a). The Criminal
Phenomenon on the Internet: Hallmarks of
Criminals and Victims Revisited Through
Typical Cases Prosecuted. University of
Ottawa Law & Technology Journal, 5,
125−140.
- [36]. Li, X. (2008b). Cybercrime and
Deterrence: Networking Legal Systems in
the Networked Information Society.
(University of Turku). Turku, Finland:
University of Turku.
- [37]. Loeb, M. P. (1 April 2004). The
True Cost of Cybercrime, Network
Computing.
- [38]. London School of Economics and
Political Science. (2001). Cybercrime: the
Challenge to Leviathan?. Retrieved 23
Novemer 2017, from
http://www.lse.ac.uk/clubs/hayek/Essays/c
ybercrime.htm
- [39]. Mandia, K. and Prosise, C. (2003).
Incident Response and Computer
Forensics, Emeryville, California:
McGraw-Hill/Osborne.
- [40]. McAfee. (2005). Virtual
Criminology Report: North American
Study into Organized Crime and the
Internet.
- [41]. McConnell International. (2000).
Cyber Crime . . . and Punishment? Archaic
Laws Threaten Global Information.
Retrieved 23 Novemer 2017, from
http://www.witsa.org/papers/McConnellcybercrime.pdf.
- [42]. McCullagh, D. (19 August 2004).
Punishment Fails to Fit the Cybercrime,
ZDNet United Kingdom. Retrieved 23
Novemer 2017, from http://www.crimeresearch.org/news/19.08.2004/574/
- [43]. McKenna, B. (2003). United
Kingdom Police Promise Charter to Guard
Good Names, Computers and Security,
volume 22, number 1, pp. 38-40.
- [44]. Miethe, T. D. (1995). Fear and
Withdrawal from Urban Life, in Wesley G.
Skogan, ed. Reactions to Crime and
Violence, Thousand Oaks, London, New
Delhi: SAGE Periodicals Press, pp. 14-27.
- [45]. Miettinen, J. E. (1996). Survey of
Hacking in Finland in the 1990s- Summary
of the Results, Oulu: University of Oulu.
- [46]. Mitchell, C. (2012). The Cyber
Crime Threat on Mobile Devices.
Retrieved 23 Novemer 2017, from
chrismitchell.net/Papers/tcctom.pdf
- [47]. Mitchell, S. D., and Banker, E. A.
(1998). Private Intrusion Response,
Harvard Journal of Law and Technology,
volume 11, number 3, pp. 699-732.
- [48]. Mohay, G., Byron, C., Vel, O.,
McKemmish R., and Anderson, A. (2003).
Computer and Intrusion Forensics,
Norwood, Massachusetts: Artech House.
- [49]. Molnar, J. (1987). Putting
Computer-related Crime in Perspective,
Journal of Policy Analysis and
Management, volume 6, number 4,
Privatization: Theory and Practice, pp. 714-
716.
- [50]. NPA. (1998). The Situation of
High-tech Crime and the Suppression of
Police, Japan Police White Paper, Tokyo:
National Police Agency.
- [51]. Nycum, S. H. (1983). Testimony on
Computer Security before the U. S. Senate
Subcommittee on Oversight of
Government Management of the
Committee on Governmental Affairs,
Computers and Society, volume 13,
number 4 and volume 14, Nos. 1, 2, and 3.
- [52]. Pethia, R. D. (2001). Information
Technology—Essential But Vulnerable:
How Prepared Are We for Attacks? Before
the House Committee on Government
Reform,
- [53]. Philip, A. R. (2002). The Legal
System and Ethics in Information Security, SANS Institute, 2002. Retrieved 23
Novemer 2017, from
http://www.securitydocs.com/go/1604
- [54]. Radzinowicz, L. and King, J.
(1977). The Growth of Crime: The
International Experience, London: Hamish
Hamilton.
- [55]. Roush, W. (1995). Hackers: Taking
a Bite Out of Computer Crime, Technology
Review.
- [56]. Salgado, R. P. (2001). Working
with Victims of Computer Network Hacks,
USA Bulletin, volume 49, number 2.
- [57]. Schneier, B. (2004). Hacking the
Business Climate for Network Security,
Computer, volume 37, number 4, pp. 87-
89.
- [58]. Sieber, U. (1998). Legal Aspects of
Computer-Related Crime in the
Information Society, The COMCRIMEStudy for the European Commission.
Retrieved 23 Novemer 2017, from
http://ec.europa.eu/archives/ISPO/legal/en/
comcrime/sieber.html
- [59]. Sinrod, E. J., and Reilly, W. P.
(2000). Cyber-Crimes: A Practical
Approach to the Application of Federal
Computer Crime Laws, Computer and
High Technology Law Journal, volume 16,
pp. 177-232.
- [60]. Smith, R. G., Grabosky, P. and
Urbas, G. (2004). Cyber Criminals on
Trial, Cambridge: The Press Syndicate of
the University of Cambridge.
- [61]. Sofaer, A. D. and Goodman, S. E.
(eds.). (2001). The Transnational
Dimension of Cyber Crime and Terrorism,
Hoover Institution, pp. 35-68.
- [62]. Speer, D. L. (2000). Redefining
Borders: The Challenges of Cybercrime,
Crime, Law and Social Change, volume 34,
pp. 259-273.
- [63]. Stanley, T. J. (1995). Optimal
Penalties for Concealment of Crime,
Economics Working Paper Archive.
- [64]. Stephenson, P. (2000). Investigating
Computer-Related Crime, Boca Raton:
Florida: CRC Press LLC.
- [65]. Stoll, C. (1988). Stalking the Wily
Hacker, Communication of the ACM,
volume 31, number 5, 484-497. Reprinted
in C. Dunlop and R. Kling (eds.)
Computerization and Controversy: Value
Conflicts and Social Choices, San Diego:
Academic Press, 1991, pp. 524-532.
- [66]. Telang, R, and Wattel, S. (2005).
Impact of Vulnerability Disclosure on
Market Value of Software Vendors: An
Empirical Analysis, Presented at the Fourth
Workshop on Economics and Information
Security, Boston, 1-3 June.
- [67]. Thompson, D. (1989). Police
Powers - Where’s the Evidence?
Proceedings of The Australian Computer
Abuse Inaugural Conference.
- [68]. Tullock, G. (1967). The Welfare
Costs of Tariffs, Monopolies and Theft,
Western Economic Journal, volume 5, pp.
224-232.
- [69]. UNCJIN. (1999). International
Review of Criminal Policy -United Nations
Manual on the Prevention and Control of
Computer-Related Crime, International
Review of Criminal Policy, nos. 43 and 44.
- [70]. Vacca, J. R. (2005). Computer
Forensic: Computer Crime Scene
Investigation, Hingham, Massachusetts:
Charles River Media.
- [71]. Vamosi, R. (10 September 2003).
Make the Punishment Fit the Cybercrime,
CNET Reviews. Retrieved 23 Novemer
2017, from http://reviews.cnet.com/4520-
3513_7-5073597-1.html
- [72]. Walsh, D. P. (1983). Visibility, in
Dermot Walsh and Adrian Poole (eds), A
Dictionary of Criminology, London,
Boston, Melbourne and Henley: Routledge
and Kegan Paul.
- [73]. Wasik, M. (1991). Crime and the
Computer, Oxford: Clarendon Press.