The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj
The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj
128 university of ottawa law & technology journal www.uoltj.ca*2. LITERATURE REVIEWWhen we talk about subjects of cybercrime, we are referring to the profileof the perpetrators of these crimes. However, the cybercriminal is not one singleperson, but represents a class of perpetrators. Previous literature has focused onwho is most likely to commit cybercrime and who is most likely to be a victim ofcybercrime. Any conclusions drawn from the hundreds or thousands of casesmight be premature or even misleading. More than 20 years ago, Bequai pointedout that no one single profile could be developed of a cybercriminal. 1 Bequaioffered a tentative profile of the typical perpetrator of computer crime based onhundreds of cases compiled from statistics by the United States Bureau ofJustice. 2 Like many scholars, he was worried that attempts to oversimplify theprofile of cybercriminals could have a misleading effect on our understanding ofcybercrime. Bequai states that:Studies of computer criminals usually portray them as young, educated,technically competent, and usually aggressive. Some steal for personal gain,others for the challenge, and still others because they are pawns in a largerscheme. … Still other studies typically portray computer criminals as technicians,managers, and programmers.
(2008) 5:1&2 UOLTJ 125
- Page 3: (2008) 5:1&2 UOLTJ 125The</
- Page 7 and 8: (2008) 5:1&2 UOLTJ 125The</
- Page 10 and 11: 134 university of ottawa law & tech
- Page 12: 136 university of ottawa law & tech
- Page 15 and 16: (2008) 5:1&2 UOLTJ 125The</
128 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.ca*2. LITERATURE REVIEWWhen we talk about subjects <strong>of</strong> cybercrime, we are referring to <strong>the</strong> pr<strong>of</strong>ile<strong>of</strong> <strong>the</strong> perpetrators <strong>of</strong> <strong>the</strong>se crimes. However, <strong>the</strong> cybercriminal is not <strong>on</strong>e singlepers<strong>on</strong>, but represents a class <strong>of</strong> perpetrators. Previous literature has focused <strong>on</strong>who is most likely to commit cybercrime and who is most likely to be a victim <strong>of</strong>cybercrime. Any c<strong>on</strong>clusi<strong>on</strong>s drawn from <strong>the</strong> hundreds or thousands <strong>of</strong> casesmight be premature or even misleading. More than 20 years ago, Bequai pointedout that no <strong>on</strong>e single pr<strong>of</strong>ile could be developed <strong>of</strong> a cybercriminal. 1 Bequai<strong>of</strong>fered a tentative pr<strong>of</strong>ile <strong>of</strong> <strong>the</strong> typical perpetrator <strong>of</strong> computer crime based <strong>on</strong>hundreds <strong>of</strong> cases compiled from statistics by <strong>the</strong> United States Bureau <strong>of</strong>Justice. 2 Like many scholars, he was worried that attempts to oversimplify <strong>the</strong>pr<strong>of</strong>ile <strong>of</strong> cybercriminals could have a misleading effect <strong>on</strong> our understanding <strong>of</strong>cybercrime. Bequai states that:Studies <strong>of</strong> computer criminals usually portray <strong>the</strong>m as young, educated,technically competent, and usually aggressive. Some steal for pers<strong>on</strong>al gain,o<strong>the</strong>rs for <strong>the</strong> challenge, and still o<strong>the</strong>rs because <strong>the</strong>y are pawns in a largerscheme. … Still o<strong>the</strong>r studies typically portray computer criminals as technicians,managers, and programmers. <str<strong>on</strong>g>The</str<strong>on</strong>g>y are usually perceived as jovially challenging<strong>the</strong> machine, and discovery occurs <strong>on</strong>ly through inadvertence. … <str<strong>on</strong>g>The</str<strong>on</strong>g> <strong>the</strong>ftusually involves m<strong>on</strong>ey, services, or trade secrets. However, when caught, <strong>the</strong>computer criminal’s sentence is light compared to that <strong>of</strong> traditi<strong>on</strong>al propertycrimefel<strong>on</strong>s, who usually receive harsh sentences for crimes involving much lessproperty or m<strong>on</strong>ey. 3It is widely recognized that <strong>the</strong>re is no single pr<strong>of</strong>ile that can “capture <strong>the</strong>characteristics <strong>of</strong> a ‘typical’ computer criminal, and many who fit <strong>the</strong> pr<strong>of</strong>ile arenot [necessarily] criminals at all.” 4 D<strong>on</strong>n B Parker presented a brilliant portrait <strong>of</strong>a perpetrator <strong>of</strong> computer crime, stating that “[p]erpetrators are usually bright,eager, highly motivated, courageous, adventuresome, and qualified peoplewilling to accept a technical challenge. <str<strong>on</strong>g>The</str<strong>on</strong>g>y have exactly <strong>the</strong> characteristics thatmake <strong>the</strong>m highly desirable employees in data processing.” 5<str<strong>on</strong>g>The</str<strong>on</strong>g> development <strong>of</strong> computer technology has changed this depicti<strong>on</strong>completely. 6 Becker suggested seven views <strong>of</strong> computer systems: <strong>the</strong> playpen,<strong>the</strong> land <strong>of</strong> opportunity, <strong>the</strong> cookie jar, <strong>the</strong> war z<strong>on</strong>e, <strong>the</strong> soapbox, <strong>the</strong> fairyland,and <strong>the</strong> toolbox. 7 Bequai researched how <strong>the</strong> potential sources <strong>of</strong> computerattack might vary from <strong>on</strong>e to ano<strong>the</strong>r, and found that <strong>the</strong> majority <strong>of</strong> perpetratorscould essentially be grouped into three categories: dish<strong>on</strong>est insiders; outsiders;and users. 8 This implied that every<strong>on</strong>e had an equal chance <strong>of</strong> being involved in1. August Bequai, How to Prevent Computer Crime: A Guide for Managers (John Wiley & S<strong>on</strong>s., 1983) at p. xviii.2. Bequai, How to Prevent, supra note 1 at pp. 42-45.3. August Bequai, Computer Crime (Lexingt<strong>on</strong> Books, 1978) at p. 4.4. Charles P Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 3d ed., (Prentice Hall, 2003) at p. 20.5. D<strong>on</strong>n B Parker, Crime by Computer (Charles Scribner’s S<strong>on</strong>s, 1976) at p. 45.6. Jay Becker, “Who are <strong>the</strong> Computer <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s,” (1981) 25:1 Security Management 18–22.7. Becker, “Computer <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s,” supra note 6 at pp. 18–20.8. Bequai, How to Prevent, supra note 1 at pp. 47–50.