12.07.2015 Views

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

132 university <strong>of</strong> ottawa law & technology journal www.<strong>uoltj</strong>.ca*3. METHODS<strong>the</strong> study used a sample <strong>of</strong> 115 typical cases sentenced or <strong>on</strong> trial between18 March 1998 and 12 May 2006 published <strong>on</strong> <strong>the</strong> website <strong>of</strong> <strong>the</strong> United StatesDepartment <strong>of</strong> Justice. <str<strong>on</strong>g>The</str<strong>on</strong>g> study took all <strong>the</strong> cases listed <strong>on</strong> <strong>the</strong> website <strong>of</strong> <strong>the</strong>United States Department <strong>of</strong> Justice Computer Crime & Intellectual Property.<str<strong>on</strong>g>The</str<strong>on</strong>g> webpage notes: “Below is a summary chart <strong>of</strong> recently prosecuted computercases. Many cases have been prosecuted under <strong>the</strong> computer crime statute, 18U.S.C. §1030 [(2000) 18 United States Code s. 1030, ].This listing is a representative sample; it is not exhaustive.” 33<str<strong>on</strong>g>The</str<strong>on</strong>g> study classified <strong>the</strong> sample cases as follows: hacking and illegal access;attack, sabotage and botnet; viruses, worms, spyware and logic bomb; data <strong>the</strong>ftand espi<strong>on</strong>age; ID <strong>the</strong>ft and fraud; and miscellaneous, which includes embezzlementand corrupti<strong>on</strong>. <str<strong>on</strong>g>The</str<strong>on</strong>g> strict legal categorizati<strong>on</strong> is not used in this study. Ra<strong>the</strong>r, <strong>the</strong>classificati<strong>on</strong> is based <strong>on</strong> criminological characteristics <strong>of</strong> <strong>the</strong> behaviours.<str<strong>on</strong>g>The</str<strong>on</strong>g> statistical items c<strong>on</strong>sidered in this study include: <strong>the</strong> demographiccharacteristics <strong>of</strong> <strong>the</strong> cybercriminal (including gender, age, insider or outsider,American citizen or foreigner); <strong>the</strong> nature <strong>of</strong> <strong>the</strong> victims (including private, public,both private and public, and threat to public health or safety); <strong>the</strong> outcomes <strong>of</strong> <strong>the</strong>cases; <strong>the</strong> decided sentence for <strong>the</strong> cybercrime (impris<strong>on</strong>ment and fine), <strong>the</strong> level <strong>of</strong>security <strong>of</strong> <strong>the</strong> victim (classified into str<strong>on</strong>g, medium, and weak); and <strong>the</strong> complexities<strong>of</strong> techniques involved (classified into complicated, medium, and simple).*4. RESULTS4.1. Gender Distributi<strong>on</strong> <strong>of</strong> CybercrimeIn most categories <strong>of</strong> <strong>of</strong>fences, male <strong>of</strong>fenders c<strong>on</strong>stitute <strong>the</strong> absolute majority<strong>of</strong> <strong>the</strong> criminals. Only two female <strong>of</strong>fenders are reported in hacking and illegalaccess and <strong>on</strong>e female <strong>of</strong>fender is reported in miscellaneous <strong>of</strong>fences. Overall,male <strong>of</strong>fenders c<strong>on</strong>stitute more than 98 percent <strong>of</strong> <strong>the</strong> total perpetrators, whilefemales are less than two percent.4.2. Age Distributi<strong>on</strong> <strong>of</strong> Cybercrime<str<strong>on</strong>g>The</str<strong>on</strong>g> report from <strong>the</strong> website is incomplete in providing <strong>of</strong>fenders’ age informati<strong>on</strong>in every category <strong>of</strong> <strong>of</strong>fence. Age data is missing for 73.1 percent <strong>of</strong> ID <strong>the</strong>ft<strong>of</strong>fences; 30.4 percent <strong>of</strong> attack, sabotage and botnet <strong>of</strong>fences; 18.2 percent <strong>of</strong>viruses, worms, spyware and logic bomb <strong>of</strong>fences; 15.9 percent <strong>of</strong> hacking andillegal access <strong>of</strong>fences; 14.3 percent <strong>of</strong> data <strong>the</strong>ft and espi<strong>on</strong>age <strong>of</strong>fences; and14.3 percent <strong>of</strong> miscellaneous <strong>of</strong>fences.33. United States Department <strong>of</strong> Justice, Computer Crime & Intellectual Property Secti<strong>on</strong>, “Computer CrimeCases,” .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!