The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

12.07.2015 Views

130 university of ottawa law & technology journal www.uoltj.cathan 14 or 15 years of age are not liable for criminal offences, while childrenbetween 15-17 or 14-16 years of age are liable for a limited range of offences. 17In fact, juveniles commit a number of these crimes. In China, individuals betweenthe ages of 19 and 40 make up 80 percent of all internet users, and the averageage of cybercrime perpetrators is 23. 18 Juvenile delinquency and juvenile justicehave become issues closely associated with cybercrime. According to findings ofcriminal psychological research, the reason why children are more likely to commitcrime is not because more and more children will commit crime, but becausemost of the potential offenders will commence to commit crime in childhood andcontinue their criminality for much of their lifetime. After 16-17 years of age, theoffending rates decreases to a plateau. 19Underwood found that cybercriminal behaviour cuts across a broad rangeof society, with the age of most offenders ranging from 10 to 60 years. 20 Peoplebetween the ages of 20 and 59 make up 94 percent of computer criminals, withthe most active being people in their thirties. 21Bequai’s profile of typical computer criminal presented a full portrait ofthe above mentioned features, with other aspects. 22 He stated that the age ofcomputer criminals is between 15 and 45 years old. He found that males wereresponsible for most computer crimes, but that the proportion committed byfemales was increasing. ong>Theong> occupational experience of computer criminals rangedfrom the highly experienced technician to the minimally experienced professional.Both public and private sectors could be victims of computer crimes. Computercriminals had the personal traits of being bright, motivated, and ready to accepttechnical challenges. ong>Theong>y were usually desirable employees who were hard andcommitted workers. Computer crimes were mostly committed by individuals, butconspiracies were increasing. Most offences were committed by insiders whohad easy access to the computer system. ong>Theong> security of the victims’ system wasusually lax.An important topic of research has been the distinction between thesources of offenders and the relationship between offenders and their victims,which can be used to divide offences into those committed by insiders and thosecommitted by outsiders. Shaw, Ruby and Post classified insiders into informationtechnology specialists such as full-time or part-time employees, contractors,consultants, or temporary workers; partners and customers with system access;and former employees retaining system access. 23 ong>Theong>re have been differentfindings as to whether insiders or outsiders constitute the greatest threat tocomputer system security. 2417. For example, in Article 17 of the penal law of China, children under 14 years old of age are not liable; inSection 4, Chapter 3 of the Penal Code of Finland, , theage limit is 15. In some other countries, the liability age is even lower. In England and Wales, the age is10-year-old, while the limited liability ages are between 10-14 years of age.18. B Dong, “Eighty Percent of Net Café Consumers are Youths,” (15 October 2003) China Youth Newspaper19. Dennis Howitt, Forensic and ong>Criminalong> Psychology (Prentice Hall, 2002) at pp. 76–77.20. Jim Underwood, “ong>Criminalong> Profile,” (1999), 21. Jim Underwood, “ong>Criminalong> Profile,” supra note 20.22. Bequai, How to Prevent, supra note 1 at p. 43.23. Eric D Shaw, Keven G Ruby, and Jerrold M Post, “ong>Theong> Insider Threat to Information Systems,” (1998) 2-98Security Awareness Bulletin, .24. For example, ong>Theong> AFCOM’s Data Centre Institute found that the cyber attacks launched by outsiders (52percent) were ten times that of the insiders (5 percent). However, the respondents were more concerned theinsider threats than the outsider ones. See Edward Hurley, “Are Insiders Really a Bigger Threat?” (17 July2003), .

(2008) 5:1&2 UOLTJ 125ong>Theong> ong>Criminalong> ong>Phenomenonong> on the Internet 131Mainstream findings support the view that insiders are more likely to beinvolved in computer crimes against the employers’ systems. ong>Theong> Nordic Councilof Ministers found that students, employees and self-employed people constitutethe highest percentage of internet users. 25 Mackenzie and Goldman reportedthat “some students, particularly computer science and engineering majors,with newly discovered skills attempt to break into the servers” of University ofDelaware. 26 In November 2003, Meta Group found that, of more than 1,600information and communications technology professionals, current employeesrepresent the biggest threat to technology infrastructures. 27 ong>Theong> ComputerSecurity Institute and Federal Bureau of Investigation found that 55 percent ofsurvey respondents reported malicious activity by insiders. 28 Researchers alsorevealed that dissatisfied employees are a major source of computer crimes 29and are the greatest threat to a computer’s security. 30 When Sutherland coinedthe term “white-collar crime” in the late 1930s, he could have hardly imaginedthat crimes would be committed in the process of human-machine interaction, inaddition to human-human interaction, human-organization interaction, or humanaction against machines. Nevertheless, the term “white-collar cybercrime” wasrecently introduced as a contribution to develop Sutherland’s theory. 31Besides the revealed relationship between criminals and victims, othershave also explored the characteristics of victims. Debra Littlejohn Schindersuggests a summary of common cybervictim characteristics: they are new to theinternet; naturally naïve; disabled or disadvantaged; greedy; lonely or emotionallyneedy; pseudo-victims in the sense that they may falsely report being victimized;or are simply unlucky enough to be in the wrong virtual place at the wrong time. 32From the previous literature, the profile of the cybercriminal and thecybervictim can hardly be regarded as settled. In addition, the available literaturedoes not provide detailed sources of materials nor does it clarify the methodsused. Many studies have apparently been based on second-hand materials andmass media reports. ong>Theong>re is still a need for findings about the hallmarks ofcybercriminals and cybervictims drawn from the prosecuted cases.25. “Nordic Information Society Statistics 2005,” supra note 12 at p. 42.26. Elizabeth MacKenzie and Kathryn Goldman, “Computer Abuse, Information Technology, and JudicialAffairs,” in Proceedings of the 28th Annual ACM SIGUCCS Conference on User Services: Building theFuture (ACM Press, 2000) 170–176 at p. 174.27. Meta Group, “Security Spending Spree,” (20 January 2004) 23:1 PC Magazine 25.28. Bill Hancock, “Security Views,” (1999) 18:3 Computers and Security 188-189.29. Michael A Vatis (Director, National Infrastructure Protection Center, Federal Bureau of Investigation),Statement for the Record, NIPC Cyber Threat Assessment, hearing, Senate Judiciary CommitteeSubcommittee on Technology and Terrorism, 106th Congress, 1st session (USA, 6 October 1999) at “InsiderThreat.”30. Eric J Sinrod and William P Reilly, “Cyber-Crimes: A Practical Approach to the Application of FederalComputer Crime Laws,” (2000) 16:2 Santa Clara Computer and High Technology Law Journal 177–232.31. See for example, Victim Assistance Online, “White Collar Cybercrime,” . ong>Theong> term “White-Collar Hacker” is also used, for example, by John Leyden, “ong>Theong> Rise ofWhite Collar Hacker,” (31 March 2004) ong>Theong> Register,.32. Debra Littlejohn Shinder, Scene of the Cybercrime: Computer Forensics Handbook (Syngress Publishing, 2002).

130 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.cathan 14 or 15 years <strong>of</strong> age are not liable for criminal <strong>of</strong>fences, while childrenbetween 15-17 or 14-16 years <strong>of</strong> age are liable for a limited range <strong>of</strong> <strong>of</strong>fences. 17In fact, juveniles commit a number <strong>of</strong> <strong>the</strong>se crimes. In China, individuals between<strong>the</strong> ages <strong>of</strong> 19 and 40 make up 80 percent <strong>of</strong> all internet users, and <strong>the</strong> averageage <strong>of</strong> cybercrime perpetrators is 23. 18 Juvenile delinquency and juvenile justicehave become issues closely associated with cybercrime. According to findings <strong>of</strong>criminal psychological research, <strong>the</strong> reas<strong>on</strong> why children are more likely to commitcrime is not because more and more children will commit crime, but becausemost <strong>of</strong> <strong>the</strong> potential <strong>of</strong>fenders will commence to commit crime in childhood andc<strong>on</strong>tinue <strong>the</strong>ir criminality for much <strong>of</strong> <strong>the</strong>ir lifetime. After 16-17 years <strong>of</strong> age, <strong>the</strong><strong>of</strong>fending rates decreases to a plateau. 19Underwood found that cybercriminal behaviour cuts across a broad range<strong>of</strong> society, with <strong>the</strong> age <strong>of</strong> most <strong>of</strong>fenders ranging from 10 to 60 years. 20 Peoplebetween <strong>the</strong> ages <strong>of</strong> 20 and 59 make up 94 percent <strong>of</strong> computer criminals, with<strong>the</strong> most active being people in <strong>the</strong>ir thirties. 21Bequai’s pr<strong>of</strong>ile <strong>of</strong> typical computer criminal presented a full portrait <strong>of</strong><strong>the</strong> above menti<strong>on</strong>ed features, with o<strong>the</strong>r aspects. 22 He stated that <strong>the</strong> age <strong>of</strong>computer criminals is between 15 and 45 years old. He found that males wereresp<strong>on</strong>sible for most computer crimes, but that <strong>the</strong> proporti<strong>on</strong> committed byfemales was increasing. <str<strong>on</strong>g>The</str<strong>on</strong>g> occupati<strong>on</strong>al experience <strong>of</strong> computer criminals rangedfrom <strong>the</strong> highly experienced technician to <strong>the</strong> minimally experienced pr<strong>of</strong>essi<strong>on</strong>al.Both public and private sectors could be victims <strong>of</strong> computer crimes. Computercriminals had <strong>the</strong> pers<strong>on</strong>al traits <strong>of</strong> being bright, motivated, and ready to accepttechnical challenges. <str<strong>on</strong>g>The</str<strong>on</strong>g>y were usually desirable employees who were hard andcommitted workers. Computer crimes were mostly committed by individuals, butc<strong>on</strong>spiracies were increasing. Most <strong>of</strong>fences were committed by insiders whohad easy access to <strong>the</strong> computer system. <str<strong>on</strong>g>The</str<strong>on</strong>g> security <strong>of</strong> <strong>the</strong> victims’ system wasusually lax.An important topic <strong>of</strong> research has been <strong>the</strong> distincti<strong>on</strong> between <strong>the</strong>sources <strong>of</strong> <strong>of</strong>fenders and <strong>the</strong> relati<strong>on</strong>ship between <strong>of</strong>fenders and <strong>the</strong>ir victims,which can be used to divide <strong>of</strong>fences into those committed by insiders and thosecommitted by outsiders. Shaw, Ruby and Post classified insiders into informati<strong>on</strong>technology specialists such as full-time or part-time employees, c<strong>on</strong>tractors,c<strong>on</strong>sultants, or temporary workers; partners and customers with system access;and former employees retaining system access. 23 <str<strong>on</strong>g>The</str<strong>on</strong>g>re have been differentfindings as to whe<strong>the</strong>r insiders or outsiders c<strong>on</strong>stitute <strong>the</strong> greatest threat tocomputer system security. 2417. For example, in Article 17 <strong>of</strong> <strong>the</strong> penal law <strong>of</strong> China, children under 14 years old <strong>of</strong> age are not liable; inSecti<strong>on</strong> 4, Chapter 3 <strong>of</strong> <strong>the</strong> Penal Code <strong>of</strong> Finland, , <strong>the</strong>age limit is 15. In some o<strong>the</strong>r countries, <strong>the</strong> liability age is even lower. In England and Wales, <strong>the</strong> age is10-year-old, while <strong>the</strong> limited liability ages are between 10-14 years <strong>of</strong> age.18. B D<strong>on</strong>g, “Eighty Percent <strong>of</strong> Net Café C<strong>on</strong>sumers are Youths,” (15 October 2003) China Youth Newspaper19. Dennis Howitt, Forensic and <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> Psychology (Prentice Hall, 2002) at pp. 76–77.20. Jim Underwood, “<str<strong>on</strong>g>Criminal</str<strong>on</strong>g> Pr<strong>of</strong>ile,” (1999), 21. Jim Underwood, “<str<strong>on</strong>g>Criminal</str<strong>on</strong>g> Pr<strong>of</strong>ile,” supra note 20.22. Bequai, How to Prevent, supra note 1 at p. 43.23. Eric D Shaw, Keven G Ruby, and Jerrold M Post, “<str<strong>on</strong>g>The</str<strong>on</strong>g> Insider Threat to Informati<strong>on</strong> Systems,” (1998) 2-98Security Awareness Bulletin, .24. For example, <str<strong>on</strong>g>The</str<strong>on</strong>g> AFCOM’s Data Centre Institute found that <strong>the</strong> cyber attacks launched by outsiders (52percent) were ten times that <strong>of</strong> <strong>the</strong> insiders (5 percent). However, <strong>the</strong> resp<strong>on</strong>dents were more c<strong>on</strong>cerned <strong>the</strong>insider threats than <strong>the</strong> outsider <strong>on</strong>es. See Edward Hurley, “Are Insiders Really a Bigger Threat?” (17 July2003), .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!