12.07.2015 Views

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(2008) 5:1&2 UOLTJ 125<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 127<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong>:<strong>Hallmarks</strong> <strong>of</strong> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s and Victims Revisited throughTypical Cases ProsecutedXingan Li1. INTRODUCTION<strong>the</strong> social changes <strong>of</strong> recent decades have been primarily driven by <strong>the</strong>development <strong>of</strong> informati<strong>on</strong> and communicati<strong>on</strong>s technology. One <strong>of</strong> <strong>the</strong> mostsignificant negative impacts in this c<strong>on</strong>text is <strong>the</strong> emergence and rampancy <strong>of</strong>cybercrime. Research <strong>on</strong> criminal activity related to informati<strong>on</strong> andcommunicati<strong>on</strong>s technology has become a focus <strong>of</strong> study in <strong>the</strong> fields <strong>of</strong>criminology, criminal law and informati<strong>on</strong> security.Cybercrime is a comprehensive topic and attracts scholars from differentdisciplines. Many have written about <strong>the</strong> <strong>the</strong>oretical explanati<strong>on</strong> for cybercrime.Studies <strong>of</strong> cybercrime have revealed different dimensi<strong>on</strong>s <strong>of</strong> this phenomen<strong>on</strong>.While <strong>the</strong> limited previous first-hand explorati<strong>on</strong>s have been widely acceptedand cited, inc<strong>on</strong>sistencies exist am<strong>on</strong>g various studies. Unfortunately, in <strong>the</strong> field<strong>of</strong> cybercriminal and cybervictim pr<strong>of</strong>iling, most subsequent <strong>the</strong>oretical treatisestend to reinforce <strong>the</strong> earliest findings, or at most provide some modest revisi<strong>on</strong>s.It is critical to answer <strong>the</strong> following questi<strong>on</strong>s: Who is most likely tocommit cybercrime? Who is most likely to be victimized by cybercrime? Andwhat are <strong>the</strong> similarities between cybercrime perpetrators and <strong>the</strong>ir victims? <str<strong>on</strong>g>The</str<strong>on</strong>g>subject <strong>of</strong> cybercrime leads <strong>the</strong> tide <strong>of</strong> <strong>the</strong> <strong>the</strong>ory and practice <strong>of</strong> legislati<strong>on</strong> andlaw enforcement in <strong>the</strong> sense that <strong>the</strong> perpetrators are those who challenge <strong>the</strong>traditi<strong>on</strong>al legal system. Studies <strong>on</strong> <strong>the</strong> subject <strong>of</strong> computer crime have a history<strong>of</strong> several decades and have established widely-accepted pr<strong>of</strong>iles forcybercriminals and <strong>the</strong>ir victims.With <strong>the</strong> deepening <strong>of</strong> <strong>the</strong> research <strong>on</strong> cybercrime, lawyers and lawenforcement <strong>of</strong>ficials are paying increased attenti<strong>on</strong> to <strong>the</strong> hallmarks <strong>of</strong>cybercriminals and <strong>the</strong> security <strong>of</strong> cybervictims. <str<strong>on</strong>g>The</str<strong>on</strong>g> purpose <strong>of</strong> this study is topresent an updated pr<strong>of</strong>ile <strong>of</strong> cybercriminality and cybervictimizati<strong>on</strong>, through<strong>the</strong> analysis <strong>of</strong> 115 typical cybercrime cases prosecuted in <strong>the</strong> United States <strong>of</strong>America between 18 March 1998 and 12 May 2006, and published <strong>on</strong> <strong>the</strong>Department <strong>of</strong> Justice website.(2008) 5:1&2 UOLTJ 125


128 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.ca*2. LITERATURE REVIEWWhen we talk about subjects <strong>of</strong> cybercrime, we are referring to <strong>the</strong> pr<strong>of</strong>ile<strong>of</strong> <strong>the</strong> perpetrators <strong>of</strong> <strong>the</strong>se crimes. However, <strong>the</strong> cybercriminal is not <strong>on</strong>e singlepers<strong>on</strong>, but represents a class <strong>of</strong> perpetrators. Previous literature has focused <strong>on</strong>who is most likely to commit cybercrime and who is most likely to be a victim <strong>of</strong>cybercrime. Any c<strong>on</strong>clusi<strong>on</strong>s drawn from <strong>the</strong> hundreds or thousands <strong>of</strong> casesmight be premature or even misleading. More than 20 years ago, Bequai pointedout that no <strong>on</strong>e single pr<strong>of</strong>ile could be developed <strong>of</strong> a cybercriminal. 1 Bequai<strong>of</strong>fered a tentative pr<strong>of</strong>ile <strong>of</strong> <strong>the</strong> typical perpetrator <strong>of</strong> computer crime based <strong>on</strong>hundreds <strong>of</strong> cases compiled from statistics by <strong>the</strong> United States Bureau <strong>of</strong>Justice. 2 Like many scholars, he was worried that attempts to oversimplify <strong>the</strong>pr<strong>of</strong>ile <strong>of</strong> cybercriminals could have a misleading effect <strong>on</strong> our understanding <strong>of</strong>cybercrime. Bequai states that:Studies <strong>of</strong> computer criminals usually portray <strong>the</strong>m as young, educated,technically competent, and usually aggressive. Some steal for pers<strong>on</strong>al gain,o<strong>the</strong>rs for <strong>the</strong> challenge, and still o<strong>the</strong>rs because <strong>the</strong>y are pawns in a largerscheme. … Still o<strong>the</strong>r studies typically portray computer criminals as technicians,managers, and programmers. <str<strong>on</strong>g>The</str<strong>on</strong>g>y are usually perceived as jovially challenging<strong>the</strong> machine, and discovery occurs <strong>on</strong>ly through inadvertence. … <str<strong>on</strong>g>The</str<strong>on</strong>g> <strong>the</strong>ftusually involves m<strong>on</strong>ey, services, or trade secrets. However, when caught, <strong>the</strong>computer criminal’s sentence is light compared to that <strong>of</strong> traditi<strong>on</strong>al propertycrimefel<strong>on</strong>s, who usually receive harsh sentences for crimes involving much lessproperty or m<strong>on</strong>ey. 3It is widely recognized that <strong>the</strong>re is no single pr<strong>of</strong>ile that can “capture <strong>the</strong>characteristics <strong>of</strong> a ‘typical’ computer criminal, and many who fit <strong>the</strong> pr<strong>of</strong>ile arenot [necessarily] criminals at all.” 4 D<strong>on</strong>n B Parker presented a brilliant portrait <strong>of</strong>a perpetrator <strong>of</strong> computer crime, stating that “[p]erpetrators are usually bright,eager, highly motivated, courageous, adventuresome, and qualified peoplewilling to accept a technical challenge. <str<strong>on</strong>g>The</str<strong>on</strong>g>y have exactly <strong>the</strong> characteristics thatmake <strong>the</strong>m highly desirable employees in data processing.” 5<str<strong>on</strong>g>The</str<strong>on</strong>g> development <strong>of</strong> computer technology has changed this depicti<strong>on</strong>completely. 6 Becker suggested seven views <strong>of</strong> computer systems: <strong>the</strong> playpen,<strong>the</strong> land <strong>of</strong> opportunity, <strong>the</strong> cookie jar, <strong>the</strong> war z<strong>on</strong>e, <strong>the</strong> soapbox, <strong>the</strong> fairyland,and <strong>the</strong> toolbox. 7 Bequai researched how <strong>the</strong> potential sources <strong>of</strong> computerattack might vary from <strong>on</strong>e to ano<strong>the</strong>r, and found that <strong>the</strong> majority <strong>of</strong> perpetratorscould essentially be grouped into three categories: dish<strong>on</strong>est insiders; outsiders;and users. 8 This implied that every<strong>on</strong>e had an equal chance <strong>of</strong> being involved in1. August Bequai, How to Prevent Computer Crime: A Guide for Managers (John Wiley & S<strong>on</strong>s., 1983) at p. xviii.2. Bequai, How to Prevent, supra note 1 at pp. 42-45.3. August Bequai, Computer Crime (Lexingt<strong>on</strong> Books, 1978) at p. 4.4. Charles P Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 3d ed., (Prentice Hall, 2003) at p. 20.5. D<strong>on</strong>n B Parker, Crime by Computer (Charles Scribner’s S<strong>on</strong>s, 1976) at p. 45.6. Jay Becker, “Who are <strong>the</strong> Computer <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s,” (1981) 25:1 Security Management 18–22.7. Becker, “Computer <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s,” supra note 6 at pp. 18–20.8. Bequai, How to Prevent, supra note 1 at pp. 47–50.


(2008) 5:1&2 UOLTJ 125<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 129computer crime, at a time when <strong>the</strong> internet was not as widespread as it ispresently. Wasik c<strong>on</strong>centrated <strong>on</strong> <strong>the</strong> characteristics and classificati<strong>on</strong>s <strong>of</strong>perpetrators as well. 9 Levins<strong>on</strong> sorted categories <strong>of</strong> cyber threats into fivegroups: insiders, hackers, virus writers, criminal groups, and terrorists. 10 Reynoldsclassified perpetrators into hacker, cracker, insider, industrial spy, cybercriminaland cyberterrorist. 11 That is to say, <strong>the</strong> widespread use <strong>of</strong> computers created amulti-dimensi<strong>on</strong>al social envir<strong>on</strong>ment that allowed potential computer criminalsto discover new opportunities for attack.<strong>Internet</strong> users worldwide are str<strong>on</strong>gly sex divided; that is, a higherpercentage <strong>of</strong> males than females use <strong>the</strong> internet. For example, in 2001, womenmade up 6 percent <strong>of</strong> internet users in <strong>the</strong> Arab states, 38 percent in LatinAmerica, 25 percent in <strong>the</strong> EU, 37 percent in China, 19 percent in Russia, 18percent in Japan, 17 percent in South Africa, and nearly 50 percent in <strong>the</strong> UnitedStates. 12 However, <strong>the</strong> gender gap is narrowing, with females c<strong>on</strong>stituting <strong>the</strong>majority <strong>of</strong> internet users in some countries. In Nordic countries, it was found thatmen c<strong>on</strong>stitute a higher percentage <strong>of</strong> daily users <strong>of</strong> <strong>the</strong> internet than women. 13Previous studies showed that cybercrime is far more sex divided than internetuse. According to Levins<strong>on</strong>, “[i]t is well established that boys commit far morejuvenile crime, particularly violent crime, than girls.” 14 Cybercrime seems lessviolent, but <strong>the</strong> research indicates that more males commit cybercrimes thanfemales. According to Jiang, males c<strong>on</strong>stitute 91.45 percent <strong>of</strong> <strong>the</strong> perpetrators,while females c<strong>on</strong>stitute <strong>on</strong>ly 8.55 percent. 15 He suggested that this was <strong>the</strong>result <strong>of</strong> differences between males and females in computer knowledge andskills combined with attitudes in <strong>on</strong>line interacti<strong>on</strong>s. However, <strong>the</strong> reas<strong>on</strong>s whyfemales are found guilty <strong>of</strong> cybercrime less <strong>of</strong>ten than males are not clear atall. Specific research is needed to address <strong>the</strong> following questi<strong>on</strong>s: Do womencommit less cybercrime? Are cybercrimes committed by women less likely tobe detected? More philosophically, can we measure this criminal phenomen<strong>on</strong>am<strong>on</strong>g men and women using <strong>the</strong> same c<strong>on</strong>cept? But this study is not intendedto answer <strong>the</strong>se questi<strong>on</strong>s.A noteworthy phenomen<strong>on</strong> is that whe<strong>the</strong>r it be individual cybercrime,corporate cybercrime, or organized cybercrime, young perpetrators play acritical part. Although <strong>the</strong>re is no age limit to commit cybercrime, we foundthat, similar to traditi<strong>on</strong>al crimes, youth c<strong>on</strong>stitute an important proporti<strong>on</strong> <strong>of</strong><strong>the</strong> cybercriminals. As LR Shann<strong>on</strong> reported, in 1993, cybercriminals tend to bebetween <strong>the</strong> ages <strong>of</strong> 14 and 30; <strong>the</strong>y are usually bright, eager, highly motivated,adventuresome and willing to accept technical challenges. 16 <str<strong>on</strong>g>The</str<strong>on</strong>g> age <strong>of</strong> criminalresp<strong>on</strong>sibility varies from nati<strong>on</strong> to nati<strong>on</strong>. In most countries, children younger9. Martin Wasik, Crime and <strong>the</strong> Computer (Oxford University Press 1991) at pp. 60–65.10. David Levins<strong>on</strong>, ed., Encyclopedia <strong>of</strong> Crime and Punishment, vol. 2. (Sage Publicati<strong>on</strong>s, 2002) at p. 525.11. George Reynolds, Ethics in Informati<strong>on</strong> Technology (Thoms<strong>on</strong> Course Technology 2003) at pp. 58-65.12. Women’s Learning Partnership, “Technology Facts & Figures,” (December 2001),.13. Nordic Council <strong>of</strong> Ministers, “Nordic Informati<strong>on</strong> Society Statistics 2005,” Report, at p. 42.14. Levins<strong>on</strong>, Encyclopedia, supra note 10 at p. 490.15. Ping Jiang, A Study <strong>of</strong> Computer Crime (Shang wu yin shu guan, 2000) at pp. 151–152.16. LR Shann<strong>on</strong>, “<str<strong>on</strong>g>The</str<strong>on</strong>g> Happy Hacker,” review <strong>of</strong> Paul Mungo and Bryan Clough, Approaching Zero: <str<strong>on</strong>g>The</str<strong>on</strong>g>Extraordinary Underworld <strong>of</strong> Hackers, Phreakers, Virus Writers, and Keyboard <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s (Random House, 1993),(21 March 1993) <str<strong>on</strong>g>The</str<strong>on</strong>g> New York Times G 16, .


130 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.cathan 14 or 15 years <strong>of</strong> age are not liable for criminal <strong>of</strong>fences, while childrenbetween 15-17 or 14-16 years <strong>of</strong> age are liable for a limited range <strong>of</strong> <strong>of</strong>fences. 17In fact, juveniles commit a number <strong>of</strong> <strong>the</strong>se crimes. In China, individuals between<strong>the</strong> ages <strong>of</strong> 19 and 40 make up 80 percent <strong>of</strong> all internet users, and <strong>the</strong> averageage <strong>of</strong> cybercrime perpetrators is 23. 18 Juvenile delinquency and juvenile justicehave become issues closely associated with cybercrime. According to findings <strong>of</strong>criminal psychological research, <strong>the</strong> reas<strong>on</strong> why children are more likely to commitcrime is not because more and more children will commit crime, but becausemost <strong>of</strong> <strong>the</strong> potential <strong>of</strong>fenders will commence to commit crime in childhood andc<strong>on</strong>tinue <strong>the</strong>ir criminality for much <strong>of</strong> <strong>the</strong>ir lifetime. After 16-17 years <strong>of</strong> age, <strong>the</strong><strong>of</strong>fending rates decreases to a plateau. 19Underwood found that cybercriminal behaviour cuts across a broad range<strong>of</strong> society, with <strong>the</strong> age <strong>of</strong> most <strong>of</strong>fenders ranging from 10 to 60 years. 20 Peoplebetween <strong>the</strong> ages <strong>of</strong> 20 and 59 make up 94 percent <strong>of</strong> computer criminals, with<strong>the</strong> most active being people in <strong>the</strong>ir thirties. 21Bequai’s pr<strong>of</strong>ile <strong>of</strong> typical computer criminal presented a full portrait <strong>of</strong><strong>the</strong> above menti<strong>on</strong>ed features, with o<strong>the</strong>r aspects. 22 He stated that <strong>the</strong> age <strong>of</strong>computer criminals is between 15 and 45 years old. He found that males wereresp<strong>on</strong>sible for most computer crimes, but that <strong>the</strong> proporti<strong>on</strong> committed byfemales was increasing. <str<strong>on</strong>g>The</str<strong>on</strong>g> occupati<strong>on</strong>al experience <strong>of</strong> computer criminals rangedfrom <strong>the</strong> highly experienced technician to <strong>the</strong> minimally experienced pr<strong>of</strong>essi<strong>on</strong>al.Both public and private sectors could be victims <strong>of</strong> computer crimes. Computercriminals had <strong>the</strong> pers<strong>on</strong>al traits <strong>of</strong> being bright, motivated, and ready to accepttechnical challenges. <str<strong>on</strong>g>The</str<strong>on</strong>g>y were usually desirable employees who were hard andcommitted workers. Computer crimes were mostly committed by individuals, butc<strong>on</strong>spiracies were increasing. Most <strong>of</strong>fences were committed by insiders whohad easy access to <strong>the</strong> computer system. <str<strong>on</strong>g>The</str<strong>on</strong>g> security <strong>of</strong> <strong>the</strong> victims’ system wasusually lax.An important topic <strong>of</strong> research has been <strong>the</strong> distincti<strong>on</strong> between <strong>the</strong>sources <strong>of</strong> <strong>of</strong>fenders and <strong>the</strong> relati<strong>on</strong>ship between <strong>of</strong>fenders and <strong>the</strong>ir victims,which can be used to divide <strong>of</strong>fences into those committed by insiders and thosecommitted by outsiders. Shaw, Ruby and Post classified insiders into informati<strong>on</strong>technology specialists such as full-time or part-time employees, c<strong>on</strong>tractors,c<strong>on</strong>sultants, or temporary workers; partners and customers with system access;and former employees retaining system access. 23 <str<strong>on</strong>g>The</str<strong>on</strong>g>re have been differentfindings as to whe<strong>the</strong>r insiders or outsiders c<strong>on</strong>stitute <strong>the</strong> greatest threat tocomputer system security. 2417. For example, in Article 17 <strong>of</strong> <strong>the</strong> penal law <strong>of</strong> China, children under 14 years old <strong>of</strong> age are not liable; inSecti<strong>on</strong> 4, Chapter 3 <strong>of</strong> <strong>the</strong> Penal Code <strong>of</strong> Finland, , <strong>the</strong>age limit is 15. In some o<strong>the</strong>r countries, <strong>the</strong> liability age is even lower. In England and Wales, <strong>the</strong> age is10-year-old, while <strong>the</strong> limited liability ages are between 10-14 years <strong>of</strong> age.18. B D<strong>on</strong>g, “Eighty Percent <strong>of</strong> Net Café C<strong>on</strong>sumers are Youths,” (15 October 2003) China Youth Newspaper19. Dennis Howitt, Forensic and <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> Psychology (Prentice Hall, 2002) at pp. 76–77.20. Jim Underwood, “<str<strong>on</strong>g>Criminal</str<strong>on</strong>g> Pr<strong>of</strong>ile,” (1999), 21. Jim Underwood, “<str<strong>on</strong>g>Criminal</str<strong>on</strong>g> Pr<strong>of</strong>ile,” supra note 20.22. Bequai, How to Prevent, supra note 1 at p. 43.23. Eric D Shaw, Keven G Ruby, and Jerrold M Post, “<str<strong>on</strong>g>The</str<strong>on</strong>g> Insider Threat to Informati<strong>on</strong> Systems,” (1998) 2-98Security Awareness Bulletin, .24. For example, <str<strong>on</strong>g>The</str<strong>on</strong>g> AFCOM’s Data Centre Institute found that <strong>the</strong> cyber attacks launched by outsiders (52percent) were ten times that <strong>of</strong> <strong>the</strong> insiders (5 percent). However, <strong>the</strong> resp<strong>on</strong>dents were more c<strong>on</strong>cerned <strong>the</strong>insider threats than <strong>the</strong> outsider <strong>on</strong>es. See Edward Hurley, “Are Insiders Really a Bigger Threat?” (17 July2003), .


(2008) 5:1&2 UOLTJ 125<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 131Mainstream findings support <strong>the</strong> view that insiders are more likely to beinvolved in computer crimes against <strong>the</strong> employers’ systems. <str<strong>on</strong>g>The</str<strong>on</strong>g> Nordic Council<strong>of</strong> Ministers found that students, employees and self-employed people c<strong>on</strong>stitute<strong>the</strong> highest percentage <strong>of</strong> internet users. 25 Mackenzie and Goldman reportedthat “some students, particularly computer science and engineering majors,with newly discovered skills attempt to break into <strong>the</strong> servers” <strong>of</strong> University <strong>of</strong>Delaware. 26 In November 2003, Meta Group found that, <strong>of</strong> more than 1,600informati<strong>on</strong> and communicati<strong>on</strong>s technology pr<strong>of</strong>essi<strong>on</strong>als, current employeesrepresent <strong>the</strong> biggest threat to technology infrastructures. 27 <str<strong>on</strong>g>The</str<strong>on</strong>g> ComputerSecurity Institute and Federal Bureau <strong>of</strong> Investigati<strong>on</strong> found that 55 percent <strong>of</strong>survey resp<strong>on</strong>dents reported malicious activity by insiders. 28 Researchers alsorevealed that dissatisfied employees are a major source <strong>of</strong> computer crimes 29and are <strong>the</strong> greatest threat to a computer’s security. 30 When Su<strong>the</strong>rland coined<strong>the</strong> term “white-collar crime” in <strong>the</strong> late 1930s, he could have hardly imaginedthat crimes would be committed in <strong>the</strong> process <strong>of</strong> human-machine interacti<strong>on</strong>, inadditi<strong>on</strong> to human-human interacti<strong>on</strong>, human-organizati<strong>on</strong> interacti<strong>on</strong>, or humanacti<strong>on</strong> against machines. Never<strong>the</strong>less, <strong>the</strong> term “white-collar cybercrime” wasrecently introduced as a c<strong>on</strong>tributi<strong>on</strong> to develop Su<strong>the</strong>rland’s <strong>the</strong>ory. 31Besides <strong>the</strong> revealed relati<strong>on</strong>ship between criminals and victims, o<strong>the</strong>rshave also explored <strong>the</strong> characteristics <strong>of</strong> victims. Debra Littlejohn Schindersuggests a summary <strong>of</strong> comm<strong>on</strong> cybervictim characteristics: <strong>the</strong>y are new to <strong>the</strong>internet; naturally naïve; disabled or disadvantaged; greedy; l<strong>on</strong>ely or emoti<strong>on</strong>allyneedy; pseudo-victims in <strong>the</strong> sense that <strong>the</strong>y may falsely report being victimized;or are simply unlucky enough to be in <strong>the</strong> wr<strong>on</strong>g virtual place at <strong>the</strong> wr<strong>on</strong>g time. 32From <strong>the</strong> previous literature, <strong>the</strong> pr<strong>of</strong>ile <strong>of</strong> <strong>the</strong> cybercriminal and <strong>the</strong>cybervictim can hardly be regarded as settled. In additi<strong>on</strong>, <strong>the</strong> available literaturedoes not provide detailed sources <strong>of</strong> materials nor does it clarify <strong>the</strong> methodsused. Many studies have apparently been based <strong>on</strong> sec<strong>on</strong>d-hand materials andmass media reports. <str<strong>on</strong>g>The</str<strong>on</strong>g>re is still a need for findings about <strong>the</strong> hallmarks <strong>of</strong>cybercriminals and cybervictims drawn from <strong>the</strong> prosecuted cases.25. “Nordic Informati<strong>on</strong> Society Statistics 2005,” supra note 12 at p. 42.26. Elizabeth MacKenzie and Kathryn Goldman, “Computer Abuse, Informati<strong>on</strong> Technology, and JudicialAffairs,” in Proceedings <strong>of</strong> <strong>the</strong> 28th Annual ACM SIGUCCS C<strong>on</strong>ference <strong>on</strong> User Services: Building <strong>the</strong>Future (ACM Press, 2000) 170–176 at p. 174.27. Meta Group, “Security Spending Spree,” (20 January 2004) 23:1 PC Magazine 25.28. Bill Hancock, “Security Views,” (1999) 18:3 Computers and Security 188-189.29. Michael A Vatis (Director, Nati<strong>on</strong>al Infrastructure Protecti<strong>on</strong> Center, Federal Bureau <strong>of</strong> Investigati<strong>on</strong>),Statement for <strong>the</strong> Record, NIPC Cyber Threat Assessment, hearing, Senate Judiciary CommitteeSubcommittee <strong>on</strong> Technology and Terrorism, 106th C<strong>on</strong>gress, 1st sessi<strong>on</strong> (USA, 6 October 1999) at “InsiderThreat.”30. Eric J Sinrod and William P Reilly, “Cyber-Crimes: A Practical Approach to <strong>the</strong> Applicati<strong>on</strong> <strong>of</strong> FederalComputer Crime Laws,” (2000) 16:2 Santa Clara Computer and High Technology Law Journal 177–232.31. See for example, Victim Assistance Online, “White Collar Cybercrime,” . <str<strong>on</strong>g>The</str<strong>on</strong>g> term “White-Collar Hacker” is also used, for example, by John Leyden, “<str<strong>on</strong>g>The</str<strong>on</strong>g> Rise <strong>of</strong>White Collar Hacker,” (31 March 2004) <str<strong>on</strong>g>The</str<strong>on</strong>g> Register,.32. Debra Littlejohn Shinder, Scene <strong>of</strong> <strong>the</strong> Cybercrime: Computer Forensics Handbook (Syngress Publishing, 2002).


132 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.ca*3. METHODS<strong>the</strong> study used a sample <strong>of</strong> 115 typical cases sentenced or <strong>on</strong> trial between18 March 1998 and 12 May 2006 published <strong>on</strong> <strong>the</strong> website <strong>of</strong> <strong>the</strong> United StatesDepartment <strong>of</strong> Justice. <str<strong>on</strong>g>The</str<strong>on</strong>g> study took all <strong>the</strong> cases listed <strong>on</strong> <strong>the</strong> website <strong>of</strong> <strong>the</strong>United States Department <strong>of</strong> Justice Computer Crime & Intellectual Property.<str<strong>on</strong>g>The</str<strong>on</strong>g> webpage notes: “Below is a summary chart <strong>of</strong> recently prosecuted computercases. Many cases have been prosecuted under <strong>the</strong> computer crime statute, 18U.S.C. §1030 [(2000) 18 United States Code s. 1030, ].This listing is a representative sample; it is not exhaustive.” 33<str<strong>on</strong>g>The</str<strong>on</strong>g> study classified <strong>the</strong> sample cases as follows: hacking and illegal access;attack, sabotage and botnet; viruses, worms, spyware and logic bomb; data <strong>the</strong>ftand espi<strong>on</strong>age; ID <strong>the</strong>ft and fraud; and miscellaneous, which includes embezzlementand corrupti<strong>on</strong>. <str<strong>on</strong>g>The</str<strong>on</strong>g> strict legal categorizati<strong>on</strong> is not used in this study. Ra<strong>the</strong>r, <strong>the</strong>classificati<strong>on</strong> is based <strong>on</strong> criminological characteristics <strong>of</strong> <strong>the</strong> behaviours.<str<strong>on</strong>g>The</str<strong>on</strong>g> statistical items c<strong>on</strong>sidered in this study include: <strong>the</strong> demographiccharacteristics <strong>of</strong> <strong>the</strong> cybercriminal (including gender, age, insider or outsider,American citizen or foreigner); <strong>the</strong> nature <strong>of</strong> <strong>the</strong> victims (including private, public,both private and public, and threat to public health or safety); <strong>the</strong> outcomes <strong>of</strong> <strong>the</strong>cases; <strong>the</strong> decided sentence for <strong>the</strong> cybercrime (impris<strong>on</strong>ment and fine), <strong>the</strong> level <strong>of</strong>security <strong>of</strong> <strong>the</strong> victim (classified into str<strong>on</strong>g, medium, and weak); and <strong>the</strong> complexities<strong>of</strong> techniques involved (classified into complicated, medium, and simple).*4. RESULTS4.1. Gender Distributi<strong>on</strong> <strong>of</strong> CybercrimeIn most categories <strong>of</strong> <strong>of</strong>fences, male <strong>of</strong>fenders c<strong>on</strong>stitute <strong>the</strong> absolute majority<strong>of</strong> <strong>the</strong> criminals. Only two female <strong>of</strong>fenders are reported in hacking and illegalaccess and <strong>on</strong>e female <strong>of</strong>fender is reported in miscellaneous <strong>of</strong>fences. Overall,male <strong>of</strong>fenders c<strong>on</strong>stitute more than 98 percent <strong>of</strong> <strong>the</strong> total perpetrators, whilefemales are less than two percent.4.2. Age Distributi<strong>on</strong> <strong>of</strong> Cybercrime<str<strong>on</strong>g>The</str<strong>on</strong>g> report from <strong>the</strong> website is incomplete in providing <strong>of</strong>fenders’ age informati<strong>on</strong>in every category <strong>of</strong> <strong>of</strong>fence. Age data is missing for 73.1 percent <strong>of</strong> ID <strong>the</strong>ft<strong>of</strong>fences; 30.4 percent <strong>of</strong> attack, sabotage and botnet <strong>of</strong>fences; 18.2 percent <strong>of</strong>viruses, worms, spyware and logic bomb <strong>of</strong>fences; 15.9 percent <strong>of</strong> hacking andillegal access <strong>of</strong>fences; 14.3 percent <strong>of</strong> data <strong>the</strong>ft and espi<strong>on</strong>age <strong>of</strong>fences; and14.3 percent <strong>of</strong> miscellaneous <strong>of</strong>fences.33. United States Department <strong>of</strong> Justice, Computer Crime & Intellectual Property Secti<strong>on</strong>, “Computer CrimeCases,” .


134 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.caOverall, insiders and outsiders c<strong>on</strong>stitute 21 percent and 79 percent <strong>of</strong> allreported <strong>of</strong>fenders respectively. Former employees c<strong>on</strong>stitute 16 percent <strong>of</strong> all <strong>of</strong><strong>the</strong> outsiders. If former employees are added to insiders, <strong>the</strong>y would c<strong>on</strong>stituteabout 34 percent <strong>of</strong> <strong>the</strong> total <strong>of</strong>fenders, still a smaller ratio than outsiders.4.5. Losses Resulting From CybercrimeIn more than 59 percent <strong>of</strong> cybercrime cases, no loss was menti<strong>on</strong>ed in <strong>the</strong> report.Am<strong>on</strong>g <strong>the</strong> remaining 41 percent <strong>of</strong> cases, 7 percent report losses <strong>of</strong> less than10,000 dollars; 15.7 percent report losses between 10,000 and 100,000; 10.4percent report losses between 100,000 and <strong>on</strong>e milli<strong>on</strong> dollars; and 9.6 percentreport losses <strong>of</strong> more than <strong>on</strong>e milli<strong>on</strong> dollars.<str<strong>on</strong>g>The</str<strong>on</strong>g> cybercrime <strong>of</strong>fences with <strong>the</strong> greatest losses were hacking and illegalaccess; viruses, worms, spyware and logic bomb; ID <strong>the</strong>ft; and miscellaneous<strong>of</strong>fences, each resulting in losses <strong>of</strong> over <strong>on</strong>e milli<strong>on</strong> dollars. <str<strong>on</strong>g>The</str<strong>on</strong>g> average lossesresulting from attack and sabotage, data <strong>the</strong>ft and espi<strong>on</strong>age, and fraud arerelatively lower: USA$160,000, USA$5,000 and USA$384,000, respectively.Overall, <strong>the</strong> average loss <strong>of</strong> <strong>the</strong> reported 49 cases is USA$2.989milli<strong>on</strong>. Adding cases without losses reported, <strong>the</strong> average loss still reachesUSA$1.274 milli<strong>on</strong>.4.6. Victims <strong>of</strong> Cybercrime<str<strong>on</strong>g>The</str<strong>on</strong>g> private sector is <strong>the</strong> primary victim <strong>of</strong> cybercrime. All <strong>of</strong> <strong>the</strong> cases <strong>of</strong> data<strong>the</strong>ft and espi<strong>on</strong>age, ID <strong>the</strong>ft, and fraud are against private interests. 87.5 percent<strong>of</strong> miscellaneous <strong>of</strong>fences, 81.8 percent <strong>of</strong> viruses, worms, spyware and logicbomb <strong>of</strong>fences, 77.3 percent <strong>of</strong> attack and sabotage <strong>of</strong>fences, and 69.5 percent<strong>of</strong> hacking and illegal access <strong>of</strong>fences are committed against <strong>the</strong> private sector.Only 18.2 percent <strong>of</strong> attack and sabotage <strong>of</strong>fences, 13.6 percent <strong>of</strong>hacking and illegal access <strong>of</strong>fences, and 12.5 percent <strong>of</strong> miscellaneous <strong>of</strong>fencesare committed against <strong>the</strong> public sector. However, 15.3 percent <strong>of</strong> hacking andillegal access cases and 9.1 percent <strong>of</strong> viruses, worms, spyware and logic bombcases are against both private and public sectors.In additi<strong>on</strong>, 9.1 percent <strong>of</strong> viruses, worms, spyware and logic bombcases, 4.5 percent <strong>of</strong> attack and sabotage cases, and 1.7 percent <strong>of</strong> hacking andillegal access cases are against public health and safety interests.4.7. Security Level <strong>of</strong> <strong>the</strong> VictimIn <strong>the</strong> majority <strong>of</strong> cases, security is weak. Exactly 100 percent <strong>of</strong> cases <strong>of</strong> data<strong>the</strong>ft and espi<strong>on</strong>age and ID <strong>the</strong>ft are possibly due to <strong>the</strong> absence <strong>of</strong> appropriatesecurity. In o<strong>the</strong>r cases, 90.9 percent <strong>of</strong> viruses, worms, spyware and logicbomb cases, 87.5 percent <strong>of</strong> miscellaneous cases (including embezzlement andcorrupti<strong>on</strong>), 82.6 percent <strong>of</strong> attack and sabotage cases, 80 percent <strong>of</strong> fraud cases,and 74.6 percent <strong>of</strong> hacking and illegal access cases are due to weak security.Approximately 20 percent <strong>of</strong> fraud cases, approximately 16.9 percent<strong>of</strong> hacking and illegal access, and approximately 9.1 percent <strong>of</strong> viruses, worms,spyware and logic bomb could be classified into <strong>the</strong> category <strong>of</strong> medium security.


(2008) 5:1&2 UOLTJ 125<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 135Only 17.4 percent <strong>of</strong> attack and sabotage, approximately 12.5 percent <strong>of</strong>miscellaneous (including embezzlement and corrupti<strong>on</strong>), and approximately 8.5percent <strong>of</strong> hacking and illegal access succeeded in penetrating a well-protectedcomputer system.4.8. Complexity <strong>of</strong> CybercrimeAll <strong>the</strong> cases <strong>of</strong> data <strong>the</strong>ft and espi<strong>on</strong>age seem uncomplicated to commit.Approximately 87.5 percent <strong>of</strong> miscellaneous cases (including embezzlement andcorrupti<strong>on</strong>), 80 percent <strong>of</strong> fraud cases, 73.9 percent <strong>of</strong> attack and sabotage cases,66.7 percent <strong>of</strong> ID <strong>the</strong>ft cases, and 66.1 percent <strong>of</strong> hacking and illegal access casesinvolved no complicated techniques or techniques that could be available to <strong>the</strong>most comm<strong>on</strong> computer or network user at <strong>the</strong> time <strong>of</strong> committing such <strong>of</strong>fences.Approximately 27.3 percent <strong>of</strong> viruses, worms, spyware and logic bombcases, 20 percent <strong>of</strong> fraud cases, 12.3 percent <strong>of</strong> hacking and illegal access cases,and 8.7 percent <strong>of</strong> attack and sabotage cases are committed with moderatelysophisticated techniques.Cases <strong>of</strong> viruses, worms, spyware and logic bombs might involve <strong>the</strong> mostcomplicated techniques, 72.7 percent <strong>of</strong> which fell into <strong>the</strong> most complicatedcategory. Approximately 33.3 percent <strong>of</strong> ID <strong>the</strong>ft cases, 18.3 percent <strong>of</strong> hackingand illegal access cases, 17.4 percent <strong>of</strong> attack and sabotage cases, and 12.5percent <strong>of</strong> miscellaneous cases might involve complicated techniques ortechniques unavailable to comm<strong>on</strong> users at <strong>the</strong> time <strong>of</strong> committing such <strong>of</strong>fences.4.9. Impris<strong>on</strong>ment Sentences<str<strong>on</strong>g>The</str<strong>on</strong>g> punishments for many cases are labelled as “to be decided.” This studycalculated <strong>the</strong> punishment <strong>of</strong> <strong>the</strong> sentenced cases. <str<strong>on</strong>g>The</str<strong>on</strong>g> average impris<strong>on</strong>mentsentence for <strong>the</strong> data <strong>the</strong>ft and espi<strong>on</strong>age cases is 50 m<strong>on</strong>ths, which is <strong>the</strong> l<strong>on</strong>gestam<strong>on</strong>g all <strong>the</strong> categories <strong>of</strong> cybercrimes. Cases <strong>of</strong> virus, worms, spyware, and logicbomb; and miscellaneous <strong>of</strong>fences have <strong>the</strong> same average impris<strong>on</strong>ment sentence<strong>of</strong> 40.3 m<strong>on</strong>ths. Fraudsters received an average impris<strong>on</strong>ment sentence <strong>of</strong> 32.5m<strong>on</strong>ths. Attack and sabotage cases are sentenced to an average impris<strong>on</strong>mentterm <strong>of</strong> 28.1 m<strong>on</strong>ths. <str<strong>on</strong>g>The</str<strong>on</strong>g> shortest average impris<strong>on</strong>ment term, 21.9 m<strong>on</strong>ths, isimposed <strong>on</strong> hacking and illegal access perpetrators, namely <strong>the</strong> hackers.<str<strong>on</strong>g>The</str<strong>on</strong>g> total impris<strong>on</strong>ment term imposed <strong>on</strong> <strong>the</strong> reported 53 <strong>of</strong>fenders is1429 m<strong>on</strong>ths, with an average <strong>of</strong> shorter than 27 m<strong>on</strong>ths. Am<strong>on</strong>g <strong>the</strong>se cases,<strong>the</strong> l<strong>on</strong>gest impris<strong>on</strong>ment is 96 m<strong>on</strong>ths, while <strong>the</strong> shortest is <strong>on</strong>ly <strong>on</strong>e m<strong>on</strong>th.4.10. Fine SentencesA fine is typically imposed <strong>on</strong> perpetrators <strong>of</strong> hacking and illegal access, andattack and sabotage cases. Overall, exactly ten cases ended with a fine <strong>of</strong> less thanUSA$10,000, nineteen cases with a fine between USA$10,000 and USA$100,000,twelve cases with a fine between USA$100,000 and USA$1 milli<strong>on</strong>, and two caseswith a fine over USA$1 milli<strong>on</strong> (<strong>on</strong>e case was fined USA$2 milli<strong>on</strong> and <strong>the</strong> o<strong>the</strong>rcase was fined USA$7.8 milli<strong>on</strong>).<str<strong>on</strong>g>The</str<strong>on</strong>g> fine imposed <strong>on</strong> 43 <strong>of</strong>fenders totalled USA$13.45 milli<strong>on</strong>, with an


136 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.caaverage <strong>of</strong> USA$312,780. However, this sum is largely due to <strong>the</strong> heavy fines intwo cases where <strong>the</strong> <strong>of</strong>fenders were fined USA$2 milli<strong>on</strong> and USA$7.8 milli<strong>on</strong>,which c<strong>on</strong>tributed to an excess <strong>of</strong> USA$228,000 for <strong>the</strong> calculati<strong>on</strong> <strong>of</strong> averagefine. If <strong>the</strong>se two cases are excluded from calculati<strong>on</strong>s, <strong>the</strong> average fine isapproximately USA$89,000.*5. DISCUSSION AND CONCLUSION<str<strong>on</strong>g>The</str<strong>on</strong>g> subjects <strong>of</strong> cybercrimes can be ei<strong>the</strong>r insiders or outsiders. Many studies havefound that insiders c<strong>on</strong>stitute a great threat to employers’ systems. However,younger juveniles are less likely to be employed and may represent <strong>the</strong> increasingnumber <strong>of</strong> outsiders engaged in cybercrimes. On <strong>the</strong> o<strong>the</strong>r hand, <strong>the</strong> nature <strong>of</strong>cybercrime is such that <strong>the</strong>re is no age limit. Any<strong>on</strong>e who can use computers and<strong>the</strong> internet can commit a cybercrime.In my opini<strong>on</strong>, <strong>the</strong> c<strong>on</strong>cept <strong>of</strong> white-collar crime cannot fit <strong>the</strong> situati<strong>on</strong><strong>of</strong> cybercrime. Although white-collar crime emphasizes <strong>the</strong> employment andsocial status <strong>of</strong> <strong>the</strong> criminals, I c<strong>on</strong>sider that <strong>on</strong>e <strong>of</strong> <strong>the</strong> most relevant factors inwhite-collar crime is <strong>the</strong> knowledge criminals have acquired from both <strong>the</strong>ir preemploymenteducati<strong>on</strong> and <strong>the</strong>ir occupati<strong>on</strong>al career. It is not oversimplified toview white-collar crime as a knowledge-based <strong>of</strong>fence, compared with violencebasedtraditi<strong>on</strong>al <strong>of</strong>fences. As opposed to <strong>the</strong>se two c<strong>on</strong>cepti<strong>on</strong>s, cybercrimecould be ei<strong>the</strong>r knowledge-based white-collar crime or knowledge-based cyberviolence. Overall, <strong>the</strong>re is a reluctant distincti<strong>on</strong> between cybercrime, white-collarcrime and even violent crime.However, it is reas<strong>on</strong>able to c<strong>on</strong>clude that when <strong>the</strong>re were fewcomputers, employees in <strong>the</strong> computer-related industries were am<strong>on</strong>g <strong>the</strong>small number <strong>of</strong> computer users. <str<strong>on</strong>g>The</str<strong>on</strong>g>y had more chances to commit an <strong>of</strong>fenceagainst <strong>the</strong>ir employers. With <strong>the</strong> prevalence <strong>of</strong> pers<strong>on</strong>al computers and <strong>the</strong>development <strong>of</strong> <strong>the</strong> internet, insiders maintain <strong>the</strong> advantage <strong>of</strong> having betterknowledge about access c<strong>on</strong>trol mechanisms, assets management systems, andoverall loopholes. Insider knowledge, c<strong>on</strong>venience, and directness encourageemployees to commit cybercrimes. As <strong>the</strong> United States Secret Service andCERT Coordinator Center’s study disclosed, minimal technical skill was requiredto launch cyberattacks <strong>on</strong> <strong>the</strong> banking and finance sector. 34In additi<strong>on</strong>, insiders are exposed to <strong>the</strong> negative psychological influencederived from <strong>the</strong>ir informati<strong>on</strong> work envir<strong>on</strong>ment. Shaw, Ruby and Post identifiedcharacteristics that increase <strong>the</strong> tendency towards illegitimate and harmfulbehaviour <strong>of</strong> <strong>the</strong> employees: “computer dependency, a history <strong>of</strong> pers<strong>on</strong>al andsocial frustrati<strong>on</strong>s (especially anger toward authority), ethical flexibility, a mixedsense <strong>of</strong> loyalty, entitlement, and a lack <strong>of</strong> empathy.” 35On <strong>the</strong> o<strong>the</strong>r hand, <strong>the</strong> <strong>of</strong>fences by insiders involve a less complicated34. Marisa Reddy Randazzo, Michelle Keeney, Eileen Kowalski, Dawn Cappelli, and Andrew Moore, “InsiderThreat Study: Illicit Cyber Activity in <strong>the</strong> Banking and Finance Sector,” Technical Report, CMU/SEI-2004-TR-021 (Carnegie Mell<strong>on</strong> S<strong>of</strong>tware Engineering Institute, 2005), at pp. 9, 23. Insider was defined as “current or former employeesor c<strong>on</strong>tractors.” ibid at p. 5.35. Shaw, Ruby, and Post, “<str<strong>on</strong>g>The</str<strong>on</strong>g> Insider Threat” supra note 23 at “Pers<strong>on</strong>al and Cultural Vulnerabilities.“


138 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.caAppendix: Table <strong>of</strong> Statistical Data115 cases151 pers<strong>on</strong>s1 companyHacking, illegalaccessNo. %GenderAgePerpetratorLossFormeremployeeMaleFemaleTotal-1617-2526-3536-4546-N/AInsiderOutsiderNo-10k10k-100k100k-1m1m-6126322018121101548Inclu. 8334(21k)15(753k)4(1076k)5(34.3M)96.83.21003.231.728.6191.615.923.876.212.7N/AN/AN/AN/AN/ATotal28(36.15M)N/AAttack,sabotage, botnetNo. %23 10002320Inclu. 10100030.426.18.7430.4138743.500762173122(10k)3(69k)6(1.679M)N/AN/AN/AN/AN/A011(1.758M)N/AVirus, worms,spyware, logicbombNo. %110111223122901000100018.218.227.39.118.218.281.8071(5k)003(93M)N/AN/AN/AN/AN/A4(93.005M)N/AData <strong>the</strong>ft,espi<strong>on</strong>ageNo. %70700312170010001000042.914.328.614.31000051(5k)000N/AN/AN/AN/AN/A1(5k)N/AID <strong>the</strong>ft Fraud O<strong>the</strong>r:embezzling,corrupti<strong>on</strong>No. %No. %No. %26026051011902601000100019.23.803.873.1010007070322004301000100042.928.628.60057.142.9013114047102113192.97.1100028.6507.1014.37.192.97.210002(8M)N/AN/AN/AN/AN/A4001(384k)0N/AN/AN/AN/AN/A6001(875k)1(6.3M)N/AN/AN/AN/AN/A2(8M) N/A 1(384k) N/A 2(7.175k) N/A


(2008) 5:1&2 UOLTJ 125<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 139115 cases151 pers<strong>on</strong>s1 companyCitizenshipImpris<strong>on</strong>mentFineNature <strong>of</strong>victimForeigner1-67-1213-2425-36>37TBD1mTBDPublicPrivatePrivate,publicPublichealth andsafetyHacking, illegalaccessNo. %1 case5(24)9(101)7(136)7(224)4(217)277(31.6k)13(512.6k)5(1.368M)3241N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A13.669.515.30891.71Attack,sabotage, botnetNo. %1 case2(11)4(81)2(72)2(117)131(5k)5(187.8k)4(643.8k)1317N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A18.277.3000404.51Virus, worms,spyware, logicbombNo. %0002(80)01(41)51(5k)1(17k)01(2m)7091N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A081.89.119.1Data <strong>the</strong>ft,espi<strong>on</strong>ageNo. %0001(18)1(36)1(96)300006050N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A0100000ID <strong>the</strong>ft Fraud O<strong>the</strong>r:embezzling,corrupti<strong>on</strong>No. %No. %No. %1 case00000300003030N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A010001 case0002(65)03002(624k)03040N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A010001 case0002(70)1(51)51(5k)01(250k)1(7.8M)5170N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A12.587.500 00 00 0


140 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.ca115 cases151 pers<strong>on</strong>s1 companyHacking, illegalaccessNo. %Securitylevels <strong>of</strong>victimsTechniqueavailability too<strong>the</strong>rsStr<strong>on</strong>gMediumWeakComplicatedMediumSimple51044119398.516.974.618.612.366.1Attack,sabotage, botnetNo. %4019421717.4082.617.48.773.9Virus, worms,spyware, logicbombNo. %011083009.190.972.727.30Data <strong>the</strong>ft,espi<strong>on</strong>ageNo. %0060060010000100ID <strong>the</strong>ft Fraud O<strong>the</strong>r:embezzling,corrupti<strong>on</strong>No. %No. %No. %0031020010033.3066.7014014020800208010710712.5087.512.5087.5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!