The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

12.07.2015 Views

128 university of ottawa law & technology journal www.uoltj.ca*2. LITERATURE REVIEWWhen we talk about subjects of cybercrime, we are referring to the profileof the perpetrators of these crimes. However, the cybercriminal is not one singleperson, but represents a class of perpetrators. Previous literature has focused onwho is most likely to commit cybercrime and who is most likely to be a victim ofcybercrime. Any conclusions drawn from the hundreds or thousands of casesmight be premature or even misleading. More than 20 years ago, Bequai pointedout that no one single profile could be developed of a cybercriminal. 1 Bequaioffered a tentative profile of the typical perpetrator of computer crime based onhundreds of cases compiled from statistics by the United States Bureau ofJustice. 2 Like many scholars, he was worried that attempts to oversimplify theprofile of cybercriminals could have a misleading effect on our understanding ofcybercrime. Bequai states that:Studies of computer criminals usually portray them as young, educated,technically competent, and usually aggressive. Some steal for personal gain,others for the challenge, and still others because they are pawns in a largerscheme. … Still other studies typically portray computer criminals as technicians,managers, and programmers. ong>Theong>y are usually perceived as jovially challengingthe machine, and discovery occurs only through inadvertence. … ong>Theong> theftusually involves money, services, or trade secrets. However, when caught, thecomputer criminal’s sentence is light compared to that of traditional propertycrimefelons, who usually receive harsh sentences for crimes involving much lessproperty or money. 3It is widely recognized that there is no single profile that can “capture thecharacteristics of a ‘typical’ computer criminal, and many who fit the profile arenot [necessarily] criminals at all.” 4 Donn B Parker presented a brilliant portrait ofa perpetrator of computer crime, stating that “[p]erpetrators are usually bright,eager, highly motivated, courageous, adventuresome, and qualified peoplewilling to accept a technical challenge. ong>Theong>y have exactly the characteristics thatmake them highly desirable employees in data processing.” 5ong>Theong> development of computer technology has changed this depictioncompletely. 6 Becker suggested seven views of computer systems: the playpen,the land of opportunity, the cookie jar, the war zone, the soapbox, the fairyland,and the toolbox. 7 Bequai researched how the potential sources of computerattack might vary from one to another, and found that the majority of perpetratorscould essentially be grouped into three categories: dishonest insiders; outsiders;and users. 8 This implied that everyone had an equal chance of being involved in1. August Bequai, How to Prevent Computer Crime: A Guide for Managers (John Wiley & Sons., 1983) at p. xviii.2. Bequai, How to Prevent, supra note 1 at pp. 42-45.3. August Bequai, Computer Crime (Lexington Books, 1978) at p. 4.4. Charles P Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 3d ed., (Prentice Hall, 2003) at p. 20.5. Donn B Parker, Crime by Computer (Charles Scribner’s Sons, 1976) at p. 45.6. Jay Becker, “Who are the Computer ong>Criminalong>s,” (1981) 25:1 Security Management 18–22.7. Becker, “Computer ong>Criminalong>s,” supra note 6 at pp. 18–20.8. Bequai, How to Prevent, supra note 1 at pp. 47–50.

(2008) 5:1&2 UOLTJ 125ong>Theong> ong>Criminalong> ong>Phenomenonong> on the Internet 129computer crime, at a time when the internet was not as widespread as it ispresently. Wasik concentrated on the characteristics and classifications ofperpetrators as well. 9 Levinson sorted categories of cyber threats into fivegroups: insiders, hackers, virus writers, criminal groups, and terrorists. 10 Reynoldsclassified perpetrators into hacker, cracker, insider, industrial spy, cybercriminaland cyberterrorist. 11 That is to say, the widespread use of computers created amulti-dimensional social environment that allowed potential computer criminalsto discover new opportunities for attack.Internet users worldwide are strongly sex divided; that is, a higherpercentage of males than females use the internet. For example, in 2001, womenmade up 6 percent of internet users in the Arab states, 38 percent in LatinAmerica, 25 percent in the EU, 37 percent in China, 19 percent in Russia, 18percent in Japan, 17 percent in South Africa, and nearly 50 percent in the UnitedStates. 12 However, the gender gap is narrowing, with females constituting themajority of internet users in some countries. In Nordic countries, it was found thatmen constitute a higher percentage of daily users of the internet than women. 13Previous studies showed that cybercrime is far more sex divided than internetuse. According to Levinson, “[i]t is well established that boys commit far morejuvenile crime, particularly violent crime, than girls.” 14 Cybercrime seems lessviolent, but the research indicates that more males commit cybercrimes thanfemales. According to Jiang, males constitute 91.45 percent of the perpetrators,while females constitute only 8.55 percent. 15 He suggested that this was theresult of differences between males and females in computer knowledge andskills combined with attitudes in online interactions. However, the reasons whyfemales are found guilty of cybercrime less often than males are not clear atall. Specific research is needed to address the following questions: Do womencommit less cybercrime? Are cybercrimes committed by women less likely tobe detected? More philosophically, can we measure this criminal phenomenonamong men and women using the same concept? But this study is not intendedto answer these questions.A noteworthy phenomenon is that whether it be individual cybercrime,corporate cybercrime, or organized cybercrime, young perpetrators play acritical part. Although there is no age limit to commit cybercrime, we foundthat, similar to traditional crimes, youth constitute an important proportion ofthe cybercriminals. As LR Shannon reported, in 1993, cybercriminals tend to bebetween the ages of 14 and 30; they are usually bright, eager, highly motivated,adventuresome and willing to accept technical challenges. 16 ong>Theong> age of criminalresponsibility varies from nation to nation. In most countries, children younger9. Martin Wasik, Crime and the Computer (Oxford University Press 1991) at pp. 60–65.10. David Levinson, ed., Encyclopedia of Crime and Punishment, vol. 2. (Sage Publications, 2002) at p. 525.11. George Reynolds, Ethics in Information Technology (Thomson Course Technology 2003) at pp. 58-65.12. Women’s Learning Partnership, “Technology Facts & Figures,” (December 2001),.13. Nordic Council of Ministers, “Nordic Information Society Statistics 2005,” Report, at p. 42.14. Levinson, Encyclopedia, supra note 10 at p. 490.15. Ping Jiang, A Study of Computer Crime (Shang wu yin shu guan, 2000) at pp. 151–152.16. LR Shannon, “ong>Theong> Happy Hacker,” review of Paul Mungo and Bryan Clough, Approaching Zero: ong>Theong>Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard ong>Criminalong>s (Random House, 1993),(21 March 1993) ong>Theong> New York Times G 16, .

128 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.ca*2. LITERATURE REVIEWWhen we talk about subjects <strong>of</strong> cybercrime, we are referring to <strong>the</strong> pr<strong>of</strong>ile<strong>of</strong> <strong>the</strong> perpetrators <strong>of</strong> <strong>the</strong>se crimes. However, <strong>the</strong> cybercriminal is not <strong>on</strong>e singlepers<strong>on</strong>, but represents a class <strong>of</strong> perpetrators. Previous literature has focused <strong>on</strong>who is most likely to commit cybercrime and who is most likely to be a victim <strong>of</strong>cybercrime. Any c<strong>on</strong>clusi<strong>on</strong>s drawn from <strong>the</strong> hundreds or thousands <strong>of</strong> casesmight be premature or even misleading. More than 20 years ago, Bequai pointedout that no <strong>on</strong>e single pr<strong>of</strong>ile could be developed <strong>of</strong> a cybercriminal. 1 Bequai<strong>of</strong>fered a tentative pr<strong>of</strong>ile <strong>of</strong> <strong>the</strong> typical perpetrator <strong>of</strong> computer crime based <strong>on</strong>hundreds <strong>of</strong> cases compiled from statistics by <strong>the</strong> United States Bureau <strong>of</strong>Justice. 2 Like many scholars, he was worried that attempts to oversimplify <strong>the</strong>pr<strong>of</strong>ile <strong>of</strong> cybercriminals could have a misleading effect <strong>on</strong> our understanding <strong>of</strong>cybercrime. Bequai states that:Studies <strong>of</strong> computer criminals usually portray <strong>the</strong>m as young, educated,technically competent, and usually aggressive. Some steal for pers<strong>on</strong>al gain,o<strong>the</strong>rs for <strong>the</strong> challenge, and still o<strong>the</strong>rs because <strong>the</strong>y are pawns in a largerscheme. … Still o<strong>the</strong>r studies typically portray computer criminals as technicians,managers, and programmers. <str<strong>on</strong>g>The</str<strong>on</strong>g>y are usually perceived as jovially challenging<strong>the</strong> machine, and discovery occurs <strong>on</strong>ly through inadvertence. … <str<strong>on</strong>g>The</str<strong>on</strong>g> <strong>the</strong>ftusually involves m<strong>on</strong>ey, services, or trade secrets. However, when caught, <strong>the</strong>computer criminal’s sentence is light compared to that <strong>of</strong> traditi<strong>on</strong>al propertycrimefel<strong>on</strong>s, who usually receive harsh sentences for crimes involving much lessproperty or m<strong>on</strong>ey. 3It is widely recognized that <strong>the</strong>re is no single pr<strong>of</strong>ile that can “capture <strong>the</strong>characteristics <strong>of</strong> a ‘typical’ computer criminal, and many who fit <strong>the</strong> pr<strong>of</strong>ile arenot [necessarily] criminals at all.” 4 D<strong>on</strong>n B Parker presented a brilliant portrait <strong>of</strong>a perpetrator <strong>of</strong> computer crime, stating that “[p]erpetrators are usually bright,eager, highly motivated, courageous, adventuresome, and qualified peoplewilling to accept a technical challenge. <str<strong>on</strong>g>The</str<strong>on</strong>g>y have exactly <strong>the</strong> characteristics thatmake <strong>the</strong>m highly desirable employees in data processing.” 5<str<strong>on</strong>g>The</str<strong>on</strong>g> development <strong>of</strong> computer technology has changed this depicti<strong>on</strong>completely. 6 Becker suggested seven views <strong>of</strong> computer systems: <strong>the</strong> playpen,<strong>the</strong> land <strong>of</strong> opportunity, <strong>the</strong> cookie jar, <strong>the</strong> war z<strong>on</strong>e, <strong>the</strong> soapbox, <strong>the</strong> fairyland,and <strong>the</strong> toolbox. 7 Bequai researched how <strong>the</strong> potential sources <strong>of</strong> computerattack might vary from <strong>on</strong>e to ano<strong>the</strong>r, and found that <strong>the</strong> majority <strong>of</strong> perpetratorscould essentially be grouped into three categories: dish<strong>on</strong>est insiders; outsiders;and users. 8 This implied that every<strong>on</strong>e had an equal chance <strong>of</strong> being involved in1. August Bequai, How to Prevent Computer Crime: A Guide for Managers (John Wiley & S<strong>on</strong>s., 1983) at p. xviii.2. Bequai, How to Prevent, supra note 1 at pp. 42-45.3. August Bequai, Computer Crime (Lexingt<strong>on</strong> Books, 1978) at p. 4.4. Charles P Pfleeger and Shari Lawrence Pfleeger, Security in Computing, 3d ed., (Prentice Hall, 2003) at p. 20.5. D<strong>on</strong>n B Parker, Crime by Computer (Charles Scribner’s S<strong>on</strong>s, 1976) at p. 45.6. Jay Becker, “Who are <strong>the</strong> Computer <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s,” (1981) 25:1 Security Management 18–22.7. Becker, “Computer <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s,” supra note 6 at pp. 18–20.8. Bequai, How to Prevent, supra note 1 at pp. 47–50.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!