0% found this document useful (0 votes)
18 views8 pages

Cybercrime

The document provides an overview of cybercrime, categorizing it into four main types: offenses against computer data confidentiality, computer-related offenses, content-related offenses, and copyright-related offenses. It discusses various forms of cybercrime, including financial fraud, hacking, cyberstalking, and cyberterrorism, highlighting the challenges in classifying these crimes due to their evolving nature and overlap. Additionally, it addresses the implications of cybercrime on security and legal frameworks, emphasizing the need for effective responses to combat these threats.

Uploaded by

mariahmedina2314
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views8 pages

Cybercrime

The document provides an overview of cybercrime, categorizing it into four main types: offenses against computer data confidentiality, computer-related offenses, content-related offenses, and copyright-related offenses. It discusses various forms of cybercrime, including financial fraud, hacking, cyberstalking, and cyberterrorism, highlighting the challenges in classifying these crimes due to their evolving nature and overlap. Additionally, it addresses the implications of cybercrime on security and legal frameworks, emphasizing the need for effective responses to combat these threats.

Uploaded by

mariahmedina2314
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION

Typology of Cyber Crime Types of Cybercrime Description


In a traditional means, a term crime covers a broad range of offenses. It is from Financial Crimes Credit Card Frauds; Money Laundering
this broad-range, the typology or classification of cybercrime became difficult. Cyber Pornography Pornographic Websites; Online distribution
A good example of an international instrument which tried to categorize types of Online Gambling Millions of websites, all hosted on servers abroad,
cybercrime is the Council of Europe the History of Global Harmonization on Cyber Crime offer online gambling.
Legislation-The Road to Geneva, December 2008. IP Crimes Software Piracy; Copyright Infringement;
The Convention on Cyber Crime distinguishes between four different types of Trademarks Violations; Theft of Computer Source
offenses Code.
1. Offenses against the confidentiality, integrity and availability of computer data Email Spoofing A spoofed email is one that appears to originate from
and systems, such as illegal access, illegal interception, data interference, system one source but actually has been sent from another
interference, and misuse of devoice; source.
2. Computer-related offenses, such as computer-related forgery and computer- Cyber Defamation This occurs when defamation takes place with the
related Fraud help of computers and/or the Internet. E.g. someone
3. Content-related offenses, such as offenses related to child pornography; And publishes defamatory matter about another website.
4. Copyright-related offenses, such as offenses related to copyright infringements Cyber Stalking This involves following a person's movements across
and related rights. the Internet by posting messages (sometimes
Even though this typology of cybercrime is not wholly consistent, as the fourth threatening) on bulletin boards frequented by the
category does not focus on the object of legal protection but on the method, which in turn victim, entering chat-rooms frequented by the victim,
brings about overlap between categories. Nonetheless, the categories serve as a useful basis constantly bombarding he victim with emails etc.
for discussing the phenomena of cybercrime globally. Unauthorized Access Also known as Hacking. Involves gaining access
The term "cybercrime" is used to cover a wide variety of criminal conduct. As illegally to a computer system or network and in some
recognized crimes include a broad range of different offenses, it is difficult to develop a cases making unauthorized use of this access.
typology or classification system for cybercrime. One approach can be found in the Hacking is also the act by which other forms of
Convention on Cybercrime, which distinguishes between four different types of offenses: cyber-crime (e.g., fraud, terrorism) are committed.
1. offenses against the confidentiality, integrity and availability of computer data Theft Theft of information contained in electronic form
and systems; such as that stored in computer hard disks. removal
2. computer-related offenses; storage media, etc. Can extend to identity theft.
3. content-related offenses; Email Bombing This refers to sending a large number of emails to the
4. copyright-related offenses. victim resulting in the victim's email account (in case
This typology is not wholly consistent, as it is not based on a sole criterion to of an individual) or mail servers (in case of a company
differentiate between categories. Three categories focus on the object of legal protection: or an email service provider) crashing.
"offenses against the confidentiality, integrity and availability of computer data and Salami Attacks These attacks are often used in committing financial
systems"; content-related offences; and copyright related offenses. The fourth category of
crime and are based on the idea that an alteration, so
"computer-related offences"109 does not focus on the object of legal protection, but on insignificant, would go completely unnoticed in a
the method used to commit the crime. This inconsistency leads to some overlap between single case. E.g. a bank employee inserts a program,
categories. into the bank's servers, that deducts a small amount
In addition, some terms that are used to describe criminal acts (such as of money (say 5 cents a month) from the account of
"cyberterrorism" or "phishing") cover acts that fall within several categories. Nonetheless,
the four categories can serve as a useful basis for discussing the phenomena of cybercrime.
Crim CDI 9 | 1
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
every customer. This unauthorized debt is likely to go
unnoticed by an account holder. Classification of Computer Crimes
Denial of Service (DNS) This involves flooding a computer resource with Computer crime encompasses a broad range of activities.
Attack more requests than it can handle, causing the 1. Financial fraud crimes - Financial fraud can be broadly defined as an
resource (e.g. a web server) to crash thereby denying intentional act of deception involving financial transactions for purpose of
authorized users the service offered by the resource. personal gain. Fraud is a crime, and is also a civil law violation.
Another variation to a typical denial of service attack 2. Internet fraud - means trying to trick or scam someone else using the Internet.
is known as a Distributed Denial of Service (DDoS) This usually means that the person who is being tricked loses money to the people
attack wherein the perpetrators are many and are scamming them. Internet fraud can take place on computer programs such as chat
geographically widespread. It is very difficult to rooms, e-mail, message boards, or Web sites.
control such attacks and is often used in acts of civil 3. Computer fraud - is any dishonest misrepresentation of fact intended to let
disobedience. another to do or refrain from doing something which causes loss. In this context,
Virus/worm Viruses are programs that attach themselves to a the fraud will result in obtaining a benefit by:
computer or a file and then circulate themselves to a. Altering in an unauthorized way. This requires little technical expertise
other files and to other computers on a network. and is a common form of theft by employees altering the data before entry
They usually affect the data on a computer, either by or entering false data, or by entering unauthorized instructions or using
altering or deleting it. Worms, unlike viruses do not unauthorized processes;
need the host to attach themselves to. They merely b. Altering, destroying, suppressing, or stealing output, usually to conceal
make functional copies of themselves and do this unauthorized transactions. This is difficult to detect;
repeatedly till they eat up all the available space on a c. Altering or deleting stored data;
computer's memory. 4. Other forms of fraud may be facilitated using computer systems,
Logic Bombs These are event dependent programs where including
programs kick into action only when a certain event ✓ bank fraud - is the use of potentially illegal means to obtain money, assets, or
(known as a trigger event) occurs. Some viruses may other property owned or held by a financial institution, or to obtain money from
be termed logic bombs because they lie dormant depositors by fraudulently posing as a bank or other financial institution. For this
throughout the year and become active only on a reason, bank fraud is sometimes considered a white-collar crime.
particular date (e.g. Chernobyl virus). ✓ carding - is a form of credit card fraud in which a stolen credit card is used to
Trojan Attacks An unauthorized program which functions from charge pre-paid cards. Carding typically involves the holder of the stolen card
inside what seems to be an authorized program, purchasing store-branded gift cards, which can then be sold to others or used to
thereby concealing what it is actually doing. purchase other goods that can be sold for cash
Web Jacking This occurs when someone forcefully takes control ✓ identity theft - also known as identity fraud, is a crime in which an imposter
of a website (by cracking the password and later obtains key pieces of personally identifiable information, such as Social Security or
changing it). driver's license numbers, in order to impersonate someone else.
Cyber-Terrorism Hacking designed to cause terror. Like conventional
✓extortion - (also called shakedown, outwrestling and exaction) is a criminal
terrorism, e-terrorism is utilized hacking to cause
offense of obtaining money, property, or services from an individual or institution,
violence against persons or property, or at least cause
through coercion
enough harm to generate fear.
✓ theft of classified information

Crim CDI 9 | 2
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
o Classified information is sensitive information to which access is Sailors analyze, detect and defensively respond to unauthorized activity within U.S.
restricted by law or regulation to particular classes of people. A Navy information systems and computer networks
formal security clearance is required to handle classified The U.S. Department of Defense (DoD) notes that the cyberspace has emerged
documents or access classified data. The operation of assigning as a national-level concern through several recent events of geo-strategic significance.
the level of sensitivity to data is called data classification. Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by
A variety of internet scams, many based on phishing and social Russian hackers. "In August 2008, Russia again allegedly conducted cyberattacks, this time
engineering, target consumers and businesses. in a coordinated and synchronized kinetic and non-kinetic campaign against the country
of Georgia. The December 2015 Ukraine power grid cyberattack has also been attributed
Cyberterrorism to Russia and is considered the first successful cyberattack on a power grid. Fearing that
Government officials and information technology security specialists have such attacks may become the norm in future warfare among nation-states, the concept of
documented a significant increase in Internet problems and server scans since early 2001. cyberspace operations impacts and will be adapted by war fighting military commanders
But there is a growing concern among government agencies such as the Federal Bureau of in the future.
Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are
part of an organized effort by cyberterrorists, foreign intelligence services, or other groups Computer as a target
to map potential holes in critical systems. A cyberterrorist is someone who intimidates or These crimes are committed by a selected group of criminals. Unlike crimes using
coerces a government or an organization to advance security his or her political or social the computer as a tool, these crimes require the technical knowledge of the perpetrators.
objectives by launching a computer. based attack against computers, networks, or the As such, as technology evolves, so too does the nature of the crime. These crimes are
information stored on them. relatively new, having been in existence for only as long as computers have which explains
Cyberterrorism in general can be defined as an act of terrorism committed through how unprepared society and the world in general is towards combating these crimes. There
the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda are numerous crimes of this nature committed daily on the internet:
piece in the Internet that there will be bomb attacks during the holidays can be considered Crimes that primarily target computer networks or devices include:
cyberterrorism. There are also hacking activities directed towards individuals, families, 1. Computer viruses
organized by groups within networks, tending to cause fear among people, demonstrate 2. Denial-of-service attacks
power, collecting information relevant for ruining peoples' lives, robberies, blackmailing 3. Malware (malicious code)
etc. Computer as a tool
Internet fraud, Spamming, Phishing, and Carding (fraud)
Cyber-extortion When the individual is the main target of cybercrime, the computer can be
Cyber-extortion occurs when a website, e-mail server, or computer system is considered as the tool rather than the target. These crimes generally involve less technical
subjected to or threatened with repeated denial of service or other attacks by malicious expertise. Human weaknesses are generally exploited. The damage dealt is largely
hackers. These hackers demand money in return for promising to stop the attacks and to psychological and intangible, making legal action against the variants more difficult. These
offer "protection". According to the Federal Bureau of Investigation. cyber-crime are the crimes which have existed for centuries in the offline world. Scams, theft, and the
extortionists are increasingly attacking corporate websites and networks, crippling their likes have existed even before the development in high-tech equipment. The same criminal
ability to operate and demanding payments to restore their service. More than 20 cases are has simply been given a tool which increases his potential pool of victims and makes him
reported each month to the FBI and many go unreported in order to keep the victim's all the harder to trace and apprehend.
name out of the public domain. Perpetrators typically use a distributed denial-of-service
attack. What does Spamming mean?
An example of cyberextortion was the attack on Sony Pictures of 2014. Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
Cyberwarfare The term spamming is also applied to other media like in internet forums, instant
Crim CDI 9 | 3
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
messaging, and mobile text messaging, social networking spam, junk fax transmissions, through newsgroups, and by sending hate e-mail to interested parties. Harassment on the
television advertising and sharing network spam. internet also includes revenge porn.
Crimes that use computer networks or devices to advance other ends include: There are instances, where committing a crime using a computer can lead to an
✓ Fraud and identity theft (although this increasingly uses malware, hacking or enhanced sentence. For example, in the case of United States v. Neil Scott, Kramer was
phishing, making served an enhanced sentence according to the U.S. Sentencing Guidelines §2G1.3(b) (3)
it an example of both «computer as target» and «computer as tool» crime) for his use of a cell phone to "persuade, induce, entice, coerce, or facilitate the travel of,
✓ Information warfare the minor to engage in prohibited sexual conduct." Kramer argued that this claim was
insufficient because his charge included persuading
✓ Phishing scams through a computer device and his cellular phone technically is not a computer. Although
✓ Spam Kramer tried to argue this point, U.S. Sentencing Guidelines Manual states that the term
✓ Propagation of illegal obscene or offensive content, including harassment and computer "means an electronic, magnetic, optical, electrochemically, or other high speed
threats data processing device performing logical, arithmetic, or storage functions, and includes
Phishing is mostly propagated via email. Phishing emails may contain links to any data storage facility or communications facility directly related to or operating in
other websites that are affected by malware. Or, they may contain links to fake online conjunction with such device.
banking or other websites used to steal private account information. Connecticut was the U.S. state to pass a statute making it a criminal offense to
Phishing is the fraudulent attempt to obtain sensitive information such as harass someone by computer. Michigan, Arizona, Virginia and South Carolina have also
usernames, passwords and credit card details by disguising oneself as a trustworthy entity passed laws banning harassment by electronic means.
in an electronic communication. Typically carried out by email spoofing or instant Harassment as defined in the U.S. computer statutes is typically distinct from
messaging, it often directs users to enter personal information at a fake website which cyberbullying, in that the former usually relates to a person's "use a computer or computer
matches the look and feel of the legitimate site. network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language,
Phishing is an example of social engineering techniques being used to deceive or make any suggestion or proposal of an obscene nature, or threaten any illegal or
users. Users are often lured by communications purporting to be from trusted parties such immoral act," while the latter need not involve anything of a sexual nature.
as social web sites, auction sites, banks, online payment processors or IT administrators. Although freedom of speech is protected by law in most democratic societies (in
the US this is done by the First Amendment it does not include all types of speech. In fact,
Obscene or offensive content spoken or written "true threat" speech/text is criminalized because of "intent to harm or
The content of websites and other electronic communications. may be distasteful, intimidate", that also applies for online or any type of network related threats in written
obscene or offensive for a variety of reasons. In some instance these communications may text or speech. The US Supreme Court definition of "true threat" is "statements where the
be legal. speaker means to communicate a serious expression of an intent to commit an act of
The extent to which these communications are unlawful varies greatly between unlawful violence to a particular individual or group".
countries, and even within nations. It is a sensitive area in which the courts can become
involved in arbitrating between groups with strong beliefs. Drug trafficking
One area of Internet pornography that has been the target of the strongest efforts Darknet markets are used to buy and sell recreational drugs online. Some drug
at curtailment is child pornography, which is illegal in most jurisdictions in the world. traffickers use encrypted messaging tools to communicate with drug mules. The dark web
site Silk Road was a major online marketplace for drugs before it was shut down by law
Online harassment enforcement (then reopened under new management, and then shut down by law
Various aspects needed to be considered when understanding harassment online. enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged.
Whereas content may be offensive in a non-specific way, harassment directs However, it was just an older marketplace named Diabolus Market, that used the name
obscenities and derogatory comments at specific individuals focusing for example on for more exposure from the brand's previous success.
gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms,
Crim CDI 9 | 4
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
CATEGORIES OF CYBER CRIME services and internet access to all kinds of criminal and objectionable
We can categorize cybercrime in two ways. activities, with an individual activity earning up to $150 million in one year.
1. The computer as a target using a computer to attacks other computer, e.g. It specialized in and in some cases monopolized personal identity theft for
Hacking, virus/worms attacks, Dos attack etc. resale. It is the originator of MPack and an alleged operator of the now
2. The computer as a weapon using a computer to commit real world crime e.g. defunct Storm botnet.
cyber terrorism, credit card fraud and pornography etc. • On 2 March 2010, Spanish investigators arrested some personalities in
Documented cases infection of over 13 million computers around the world. The "botnet" of
One of the highest profiled banking computer-crime occurred during a course of infected computers included PCS inside more than half of the Fortune
three years beginning in 1970. The chief teller at the Park Avenue branch of New York's 1000 companies and more than 40 major banks, according to investigators.
Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts. A • In August 2010 the international investigation Operation Delego,
hacking group called MOD (Masters of Deception), allegedly stole passwords and operating under the aegis of the Department of Homeland Security, shut
technical data from Pacific Bell, Nynex, and other telephone companies as well as several down the international pedophile ring Dreamboard. The website had
big credit agencies and two major universities. The damage caused was extensive, one approximately 600 members, and may have distributed up to 123 terabytes
company, Southwestern Bell suffered losses of $370,000 alone. of child pornography (roughly equivalent to 16,000 DVDs). To date this
In 1983, a nineteen-year-old UCLA student used his PC to break into a Defense is the single largest U.S. prosecution of an international child pornography
Department International Communications system. ring; 52 arrests were made worldwide. In January 2012 Zappos.com
• Between 1995 and 1998 the Newscorp satellite pay to view encrypted experienced a security breach after as many as 24 million customers) credit
SKY-TV service was hacked several times. during an ongoing card numbers, personal information, billing and shipping addresses had
technological arms race between a pan-European hacking group and been compromised. In June 2012 LinkedIn and eHarmony were attacked,
Newscorp. The original motivation of the hackers was to watch Star Trek compromising 65 million password hashes. 30,000 passwords were
re-runs in Germany; which was something which Newscorp did not have cracked and 1.5 million EHarmony passwords were posted online.
the copyright to allow. December 2012 Wells Fargo website experienced a denial-of-service
• On 26 March 1999, the Melissa worm infected a document on a victim's attack. Potentially compromising 70 million customers and 8.5 million
computer, then automatically sent that document and a copy of the virus active viewers. Other banks thought to be compromised: Bank of America,
spread via e-mail to other people. J. P. Morgan U.S. Bank, and PNC Financial Services.
• In February 2000, an individual going by the alias of Mafiaboy began a • April 23, 2013 saw the Associated Press' Twitter accounts hacked the
series denial-of-service attacks against high-profile websites, including hacker posted a hoax tweet about fictitious attacks in the White House that
Yahoo, Dell Inc., E*TRADE, eBay, and CNN. About fifty computers at they claimed left President Obama injured,1311 This hoax tweet resulted
Stanford University, and also computers at the University of California at in a brief plunge of 130 points from the Dow Jones Industrial Average,
Santa Barbara, were amongst the zombie computers sending pings in removal of $136 billion from S&P 500 index, and the temporary
DDoS attacks. On 3 August 2000, Canadian federal prosecutors charged suspension of AP's Twitter account. The Dow Jones later restored its
Mafiaboy with 54 counts of illegal access to computers, plus a total of ten session gains.
counts of mischief to data for his attacks
• The Russian Business Network (RBN) was registered as an internet site in Diffusion of cybercrime
2006. Initially, much of its activity was legitimate. But apparently the The broad diffusion of cybercriminal activities is an issue in computer crimes
founders soon discovered that it was more profitable to host illegitimate detection and prosecution. According to Jean Loup Richet (Research Fellow at ESSEC
activities and started hiring its services to criminals. The RBN has been ISIS), technical expertise and accessibility no longer acts as barriers to entry into
described by VeriSign as «the baddest of the bad»>. It offers web hosting cybercrime. Indeed, hacking is much less complex than it was a few years ago, as hacking

Crim CDI 9 | 5
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
communities have greatly diffused their knowledge through the Internet. Blogs and with this company. Upon completion of the interview, the suspects were arrested outside
communities have hugely contributed to information sharing: beginners could benefit of the building. Clever tricks like this are sometimes a necessary part of catching
from older hackers' knowledge and advice. Furthermore, hacking is cheaper than ever: cybercriminals when weak makes it impossible otherwise President Barack Obama
before the cloud computing era, in order to spam or scam one needed a dedicated server, released in an executive order in April 2015 to combat cybercrime. The executive order
skills in server management, network configuration, and maintenance, knowledge of allows the United States to freeze assets of convicted cybercriminals and block their
Internet service provider standards, etc. By comparison, a mail software-as-a service is a economic activity within the United States. This is some of the first solid legislation that
scalable, inexpensive, bulk, and transactional e-mail sending service for marketing combats cybercrime in this way.
purposes and could be easily set up for spam. Jean-Loup Richet explains that cloud The European Union adopted directive 2013/40/EU. All offenses of the directive,
computing could be helpful for a cybercriminal as a way to leverage his attack - brute and other definitions and procedural institutions are also in the Council of Europe's
forcing a password, improve the reach of a botnet, or facilitating a spamming campaign. Convention on Cybercrime.

Investigation Penalties
A computer can be a source of evidence (see digital forensics). Even when a Penalties for computer related crimes in New York State can range from a fine and
computer is not directly used for criminal purposes, it may contain records of value to a short period of jail time for a Class A misdemeanor such as unauthorized use of a
criminal investigators in the form of a logfile. In most countries are required, by law, to computer up to computer tampering in the first degree which is a Class C felony and can
keep their logfiles for a predetermined amount of time. For example; a European wide carry 3 to 15 years in prison
Data Retention Directive (applicable to all EU member states) states that all E-mail traffic However, some hackers have been hired as information security experts by private
should be retained for a minimum of 12 months. companies due to their inside knowledge of computer crime, a phenomenon which
theoretically could create perverse incentives. A possible counter to this is for courts to
Methodology of cybercrime investigation ban convicted hackers from using the Internet or computers, even after they have been
There are many ways for cybercrime to take place, and investigations tend to start released from prison though as computers and the Internet become more and more central
with an IP Address trace, however that is not necessarily a factual basis upon which to everyday life, this type of punishment may be viewed as more and more harsh and
detectives can solve a case. Different types of high-tech crime may also include elements draconian. However, nuanced approaches have been developed that manage cyber
of low-tech crime, and vice versa, making cybercrime investigators an indispensable part offender behavior without resorting to total computer or Internet bans. These approaches
of modern law-enforcement. Methodology of cybercrime detective work is dynamic and involve restricting individuals to specific devices which are subject to computer monitoring
is constantly improving. whether in closed police units, or in international cooperation or computer searches by probation or parole officers.
framework.
Awareness
Legislation As technology advances and more people rely on the internet to store sensitive
Due to easily exploitable laws, cybercriminals use developing countries in order to information such as banking or credit card information, criminals increasingly attempt to
evade detection and prosecution from law enforcement. In developing countries, such as steal that information. Cybercrime is becoming more of a threat to people across the
the Philippines, laws against cybercrime are weak or sometimes nonexistent. These weak world. Raising awareness about how information is being protected and the tactics
laws allow cybercriminals to strike from international borders and remain undetected. criminals use to steal that information continues to grow in importance. According to the
Even when identified, these criminals avoid being punished or extradited to a country, FBI's Internet Crime Complaint Center in 2014 there were 269,422 complaints filed. With
such as the United States, that has developed laws that allow for prosecution. While this all the claims combined there was a reported total loss of $800,492,073. But cybercrime
proves difficult in some cases, agencies, such as the FBI, have used deception and does yet seem to be on the average person's radar. There are 1.5 million cyber-attacks
subterfuge to catch criminals. For example, two Russian hackers had been evading the FBI annually, that means that there are over 4,000 attacks a day, 170 attacks every hour, or
for some time. The FBI set up a fake computing company based in Seattle, Washington. nearly three attacks every minute, with studies showing us that only 16% of victims had
They proceeded to lure the two Russian men into the United States by offering them work asked the people who were carrying out the attacks to stop. Anybody who uses the internet
Crim CDI 9 | 6
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
for any reason can be a victim, which is why it is important to be aware of how one is combination of any of these occasions. In the example, Carrie has had a combination of
being protected while online. these occasions and is being subjected to several types of stalking.

Intelligence Types of Stalking


As cybercrime has proliferated, a professional ecosystem has evolved to support Stalking can occur in several forms.
individuals and groups seeking to profit from cybercriminal activities. The ecosystem has The first type of stalking is when the perpetrator follows an individual and watches them.
become quite specialized, including malware developers, botnet operators, professional Maria is being watched while she is walking back to her home. Her stalker is using
cybercrime groups, groups specializing in the sale of stolen content, and so forth. A few surveillance stalking to track and follow her. With surveillance stalking, the perpetrator is
of the leading cybersecurity companies have the skills, resources and visibility to follow known to sit outside the home, place of work, school, or other places that the individual
the activities of these individuals and group. A wide variety of information is available usually go to regularly. Along with surveillance stalking, there is cyberstalking.
from these sources which can be used for defensive purposes, including technical Maria is also a victim of cyberstalking, which is the use of electronic means, such as the
indicators such as hashes of infected files or malicious IPS/URLs, as well as strategic Internet or cellphones, to stalk victims. Cyberstalking is also considered unsolicited contact
information profiling the goals, techniques and campaigns of the profiled groups. Some from the perpetrator to the victim. The difference between cyberstalking and surveillance
of it is freely published, but consistent, on-going access typically requires subscribing to an stalking is that surveillance stalking is done in a physical sense, and cyberstalking is done
adversary intelligence subscription service. At the level of an individual threat actor, threat through technology and electronic means. The perpetrator has not made physical contact,
intelligence is often referred to that actor's "TTP", or "tactics, techniques, and procedures," so the stalking is not considered aggravated stalking.
as the infrastructure, tools, and other technical indicators are often trivial for attackers to Another type of stalking is aggravated stalking. Aggravated stalking occurs when the
change. perpetrator restrains the victim, causes bodily harm to the victim, or violates an order of
Computer viruses are forms of code or malware programs that can copy protection. Maria has not had any of these happen to her, so her stalker is using
themselves and damage or destroy data and systems. When computer viruses are used on surveillance stalking and cyberstalking. There are also categories that try to define each
a large scale, like with bank, government or hospital networks, these actions may be type of stalker.
categorized as cyberterrorism. Computer hackers also engage in phishing scams, like asking
for bank account numbers, and credit card theft. Types of Stalkers
Actions define the type of stalking, but personalities combined with the actions define the
Stalking Defined type of stalker:
Carrie walks back to her dorm room, but she cannot shake the feeling that she's 1. Rejected Stalker -This type of stalker becomes upset when the friendship or romantic
being watched. Over the last two weeks, she has received several blocked calls to her cell relationship has ended. The rejected stalker is not only self-centered and jealous but also
phone. Sometimes she will answer the calls, and other times she lets it go to voicemail. over-dependent and persistent.
When she answers, no one speaks, and whoever it is does not leave a voicemail message. 2. Resentful Stalker - The resentful stalker feels humiliated that the relationship has
Carrie has also been getting emails to her school account. The emails tell her that she is ended and seeks revenge upon the victim. Resentful stalkers are often irrationally paranoid
pretty, and there will be comments about the pants or shirt she wore that day. Tonight, and are known to verbally assault their victims.
Carrie feels she needs to talk to the police because she feels someone is stalking her. 3. Predatory Stalker - The predatory stalker seeks power and sexual gratification. They
The definition for stalking is when a perpetrator singles out a specific will not make physical contact but will use surveillance to track the victim.
person and causes the person emotional distress and causes the individual to fear 4. Intimacy Seeker - The intimacy-seeking stalker seeks an intimate and romantic
for his or her life, safety, or safety of others. A stalker can be a former boyfriend or relationship with the victim. When the stalker is rejected by the victim, he or she will
girlfriend, an acquaintance or a stranger. continually phone the victim, write the victim letters, and can become jealous and violent
In order for stalking to be a crime, there has to be two or more occasions of visual or if the victim enters into a relationship with someone else.
physical proximity; non-consensual communication, either written or verbal; threats; or a

Crim CDI 9 | 7
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
5. Incompetent Suitor- The incompetent suitor stalker usually has inadequate social
skills. They want a relationship with the victim but do not have the ability to realize he or
she is not meant to be with the victim.
6. Erotomania and Morbidly Infatuated - This type of stalker feels that the victim loves
them even though they may not have had any contact with the victim. The stalker is usually
paranoid, prefers suitors in a higher social class, and will repeatedly approach the victim.
Cyberstalking is the use of the Internet or other electronic means to stalk or
harass an individual, group, or organization. It may include false accusations, defamation,
slander and libel. It may also include monitoring, identity theft, threats, vandalism,
solicitation for sex, or gathering information that may be used to threaten, embarrass or
harass.
Cyberstalking is often accompanied by real time or offline stalking. In many
jurisdictions, such as California, both are criminal offenses. Both are motivated by a desire
to control, intimidate or influence a victim. A stalker may be an online stranger or a person
whom the target knows. They may be anonymous and solicit involvement of other people
online who do not even know the target.
Cyberstalking is a criminal offense under various state anti-stalking, slander and
harassment laws. A conviction can result in a restraining order, probation, or criminal
penalties against the assailant, including jail.
Cyberstalking is a crime in which the attacker harasses a victim using electronic
communication, such as e-mail or instant messaging (IM), or messages posted to a Web
site or a discussion group. A cyber stalker relies upon the anonymity afforded by the
Internet to allow them to stalk their victim without being detected.
Online harassment, sometimes referred to as "cyber harassment," usually pertains
to threatening or harassing emails, instant messages, or website entries. ... To be
considered cyberstalking, the behavior must pose a credible threat of harm to the
victim. All states have anti-stalking laws, but the legal definitions vary.

Crim CDI 9 | 8

You might also like