The Cyber Society PDF - Internet, Cybercrime, and Society

Summary

This document examines The Cyber Society's multifaceted influence, exploring topics like cybercrime, the internet's impact, the digital divide, and concepts like digital natives and immigrants. It delves into societal changes resulting from technology, including the rise of hacker culture and the rise of online fraud.

Full Transcript

The Cyber Society Tuesday, February 11, 2025 9:47 AM The Internet Definition: network of interconnected computers that enables the sharing of information Origins ○ 1950s: Sage ○ 1960s: DARPA and ARPANET ○ 1990s: Popular and communication internet Technology w...

The Cyber Society Tuesday, February 11, 2025 9:47 AM The Internet Definition: network of interconnected computers that enables the sharing of information Origins ○ 1950s: Sage ○ 1960s: DARPA and ARPANET ○ 1990s: Popular and communication internet Technology went through a revolution Face to face communication changed Cyber society Changes the way we live ○ Without internet, cybercrime doesn't exists ○ Internet was a military tool, radar system Advanced communication ○ 1970 ATNT was offered to own it ○ Emerged in 1990 ○ 1995 Internet explorer ○ Chrome is not internet but a browser Internet Penetration rate: world stats (2019) ○ 57% worldwide ○ 89% in North America ○ 87% in Europe ○ Events to which the world has access to the internet Smartphones: spread of smartphones (70% IN N America), access to the internet is increasingly mobile ○ Allows people to access internet faster and in their hand ○ UN declared internet should be a human right Internet impact ○ Economic ▪ New crimes ▪ Theft of information Credit cards ○ Politics ▪ Primary source of information ▪ TikTok, Instagram ▪ Risks and concerns ▪ Theft of information Credit cards ○ Politics ▪ Primary source of information ▪ TikTok, Instagram ▪ Risks and concerns Fake news Racism ○ Social ▪ Produces goods No one buys newspapers now ▪ Impact society Cybercrime emerges because of hate ▪ Primary interaction is now online Internet depth ○ Surface web ▪ Anything you can access on a link right away ▪ Google ○ Depp web ▪ Content you can get so easily ▪ research is needed to get through ○ Dark web ▪ Content you can through search engines unless you have a VPN ▪ Child Porn can be found here Features of society Perpetual contract ○ New feature of society (2000s) ○ Contently able to communicate with people ○ Never fully isolated/ private ○ No such thing as a 9 to 5 now Data performance ○ Activities because we post it or write it ○ Digital footprint ○ Records Immediate access ○ In the past you could not just buy something whenever you'd like, wherever, now you don’t have to drive and go into the store ○ If you need information you don’t need to go to the library ○ More information and knowledge, sometimes can be fake though Mass participation ○ We can now participate any movements now virtually like LA fires and donating money ' ○ Not always good ○ If you need information you don’t need to go to the library ○ More information and knowledge, sometimes can be fake though Mass participation ○ We can now participate any movements now virtually like LA fires and donating money ' ○ Not always good ○ Freedom of speech has increased but there now is more hate Citizens of Our society Digital natives ○ Generation born after 1980s ○ Never lived without access to a computer Digital immigrants ○ Digital immigrant- stressed as the internet is evolving leaving no actual privacy ▪ People who don’t have access to internet are different experiences ▪ Different abilities ▪ Less opportunity, can’t take online classes or online dating ○ Less opportunity, can’t take online classes or online dating Digital Divide ○ Access ○ Skill ○ Opportunity ○ 40% of people don’t have access to the internet putting them at a disadvantage ○ Overtime it will shrink ○ Transitioning, spreading over time ○ Expensive, putting people who can’t afford it at a disadvantage Technological Unconsciousness Definition: tendency to undervalue, ignore or take for granted the pervasive influence of technology in shaping behaviours, perceptions and societal structures Features: Technological Unconsciousness Definition: tendency to undervalue, ignore or take for granted the pervasive influence of technology in shaping behaviours, perceptions and societal structures Features: ○ Neglect technology's role ○ Assume technology's neutrally Tendency in popular culture to ignore the massive impact internet has on our lives We take technology for granted Changed lives Texting affects how and when we communicate Wikepida – heavily influenced by politics What is Cybercrime? Cyberpunk Science Fiction What is cyber ○ Cyberspace and cyberpunk novels ○ Neuomancer (1984) Hacker movies ○ War games ○ Tron ○ The net ○ Snowden ○ Narivates were about high technology and less quality of life ○ Movies took on questions about the human body or technological body Defining Cybercrime Hard to define ○ Technical: criminal activities that exploit technology ○ Bad definition because anything is technology, like a gun ○ Legal: unlawful acts that utilizes technology ○ Wrong definition: the law is not good definition because some crime are not criminalized ○ Law is slow, needs to be found, discussed, enacted and ○ Bad definition because anything is technology, like a gun ○ Legal: unlawful acts that utilizes technology ○ Wrong definition: the law is not good definition because some crime are not criminalized ○ Law is slow, needs to be found, discussed, enacted and then in place Our Definition: Deviant behaviour that utilizes technology to commit acts deemed harmful or illegal by society What’s new about cybercrime Is Cybercrime "old wine in new bottles"?(Grabosky, 2021) Cybercrime's new and unique features: ○ The problem of "who" ○ The problem of "where" Cybercrime- same crime jus different ways to do it Often anonymous Physical crimes occur in a location, we can address it but cybercrime is different ○ Frauds can be in any country and the person being scammed can be in another while the IP address can be located in another ○ Police can’t address this Types of Cybercrime Crimes against the machine (computer integrity crimes) ○ Hacking Crimes using the machine (computer enabled crimes) ○ Catfishing Crimes in the machine (computer content crimes) ○ Creation and spread of murder It is possible for these crimes to intersect Cybercrime rates (2022) Canadian rate: 191/100k (doubled since 2018) Canadian Internet Use Survey (2022) information: ○ 70% (12% INCREASE) of Canadians rteported experience cyber secuirty incidents Overdramatization of cybercrime Sensational media: "Churnalism" (Zakir) ○ 70% (12% INCREASE) of Canadians rteported experience cyber secuirty incidents Overdramatization of cybercrime Sensational media: "Churnalism" (Zakir) Problems with data ○ Lack of reliable data ○ Underreporting Growing, occurring more often, affecting more of us Over exaggerating ○ Fake news ○ Mainstream media ○ Journalism ○ Media used to be slow Today It needs to be posted right away ○ Didn’t have permanent contact Media is driven to get content out ASAP Concept; Moral panic Victims of cybercrime 3 targets ○ Indvidual's ○ Organizations ○ Nation states Cybercrime can ruin a nation's organization Take aways Cyber society: the internet has changed political, social and economic element of society Technological Unconsciousness: we ignore how technology impacts many elements of society – including crimes Cybercrime: the internet has enabled various new forms of crime Hackers and Hacking Thursday, January 23, 2025 3:04 PM Hacking Popular thinking → Fear: ○ Technophobia § What are the harms this is going to create? § EG Frankenstein (1818) → Media: ○ Hacker movies EG WarGames (1983) ○ Hacker shows EG Mr Robot (2015) Crimes Against the Machine → Crimes against the machine (computer integrity crimes): unauthorized breach of computer system → Hacking is a breach, breaking and entering → Themes: ○ Breaking and Entering ○ Trespassing on Networks ○ Taking/Changing/Damaging Digital Property ○ EG: Hacking What is Hacking? → Hacking: unauthorized accessing of digital spaces that belong to others. ○ Digital break in → Goal: Breach and access → Target: individuals, corporations, or governments/states Social Engineering → Social Engineering: the social and manipulative side of hacking → Appear Credible → Target: individuals, corporations, or governments/states Social Engineering → Social Engineering: the social and manipulative side of hacking → Appear Credible → Victims tricked into giving info → Examples: ○ Kevin Mitnick’s The Art of Deception (2002) ○ Phishing Campaigns The History of Hacking → 1950s: Engineering students at MIT use “hacker” to refer to playful tinkering with electronics ○ Around engineering students ○ Notes: § Tech Model Railroad Club § Telephone Phreaking □ Often about how to make phone calls for free and easy → 1980s: growth in hacker community as personal computers are purchased by middle- income families. ○ This evolved because of a microchip ○ Notes: § Personal computing □ Homes and families can have their computers at home □ Hacking now was not just about hacking a corporation but hacking a specific person now § Hacker underground □ People were able to hack in their homes, anywhere essentially now □ Was punky □ Famously apart of the punk culture → Hacker ethics (according to Steven Levy, 2001): ○ Access to computers should be unlimited and total ○ All information should be free ○ Mistrust authority and promote decentralization → Hacker ethics (according to Steven Levy, 2001): ○ Access to computers should be unlimited and total ○ All information should be free ○ Mistrust authority and promote decentralization ○ Hackers should be judged by their hacking, not on bogus criteria ○ You can create art and beauty on a computer ○ Computers can change your life for the better ○ Didn't believe in big corporations or governments → 1990s: Rise of the internet creates Growth new opportunities and methods for hacking ○ Internet changed how humans interact ○ Hackers have new ways to hack because of this ○ Notes: § Criminalization of hacking § Jobs in Computer Security Community § Cult of the dead cow □ Members of this organization got a job with the US government → 2000s: hacking grows, tools advance, politics become central ○ Notes: § Automated Hacking tools □ Identifying info □ Release malware □ Now it is automated which means you don’t need to be a hacker specialist, you can download and application and do it that wait § Rise of state sponsored Hacking □ Often for political reasons § Ideological Hacking (Next week) □ To speared political messages The Hacker Community → Who counts as a hacker: Skill? Culture? → Studies: ○ Age § Tends to be young people → Who counts as a hacker: Skill? Culture? → Studies: ○ Age § Tends to be young people § Digital native and digital immigrant □ Makes sense that the hacker is younger, born into it ○ Gender § Vast majority are men § Technology is a 'masculine space' □ Out dated, now women are good at technology ○ Race and ethnicity § White men, American ○ Note: these trends are likely to change in the immediately future Hacker Culture → Technology: EG Cap’n Crunch (nickname) → Knowledge: ○ EG Capture the Flag (CTF) at DefCon → Secrecy: ○ EG nicknames and private message boards ○ Sometimes on deep or dark web Hacking Ethics → Unethical hackers: black hat hackers ○ Steal credit cards ○ Motivations are usually personal financial gain ○ 'the dangers' of society → Ethical hackers: white hat hackers... blue, red, purple ○ White § Test security § Locate vulnerability § Helping security of society has the expose weaknesses in securities § Employed, security specialized trained § Hired to do this work ○ Blue: § Locate vulnerability § Helping security of society has the expose weaknesses in securities § Employed, security specialized trained § Hired to do this work ○ Blue: § Doing the same but now they are selling the holes, the gaps in the security system ○ Red § Motivated to deal with justice § Combating black hat hackers ○ Purple § Doing it in their own systems § Worried about their own cyber security → Grey hat hackers: light grey and dark grey ○ Who is sometimes ethical and unethical ○ Hacktivist § Break the law by hacking a security system they don’t have access to for ethical or political goals ○ Light grey § Doing things for ethical reasons ○ Dark grey § Using illegal methods but they sell things like expose police brutality → Cyber spies: discrete hackers, often serving the goals of their employers ○ Cyber-warriors ○ Industrial Spies ○ Government Agents ○ Military Agents H Motivations: → H Motivations ○ Thrill ○ Curiosity ○ Security → H Motivations ○ Thrill ○ Curiosity ○ Security ○ Resistance § Hacking is anti power → Criminal motivations: ○ Gains ○ Revenge ○ Challenge ○ Peer response ○ Politics (next week) Hacks → Unauthorized access (the basic part of hacking) ○ EG: Hacking into your social media ○ Types § Social Engineering § Misuse of ID → Find vulnerabilities: ○ EG buffer overflow § Buffer is amount of space for input data ○ Types: § White hat § black hat → Theft of computer resources: ○ Can use your system ○ Types: § Storage of illegal material § Leeching □ When a hacker breaks into wifi and uses it for themselves □ Can slow the wifi process down □ Can do illegal things on your wifi → § Leeching □ When a hacker breaks into wifi and uses it for themselves □ Can slow the wifi process down □ Can do illegal things on your wifi → Theft of computer data (Data Breaches): ○ EG: theft of images and videos → EG: ○ Credit Card information ○ Celebgate → System Alteration: ○ Types: § Evasion: □ To cover their asses § Personal Advantage: □ Maybe their hacking the school system to change their grades § Nefarious Purposes: § Damage computer systems: § Nation State hacking: → Website Defacement and Spoofing: ○ Spoofing § Trying to copy a website ○ EG re-writing or altering social media posts → Denial of Service: ○ Block someone from accessing ○ Types ○ Flooding: Over load the computer service with things making it unable to work ○ DDOS: where you flood using multiple sources of flooding § EG Lizard Squad and PlayStation § EG Anonymous’s Low Orbit Canon → Malware ○ Input or spread malicious software § Virus § EG Anonymous’s Low Orbit Canon → Malware ○ Input or spread malicious software § Virus ○ Prevalence: § IC3: US$6,904,054 in losses (2020) ○ Types of malware: § Worms § Trojan Horses: presents as something else □ Ex: Onthefly § Bots: it infects the computer and allows the hacker to use it for their own purposes § Ransomware (and Spyware): where a hacker breaks into system, insert malware and builds a wall □ Cant do anything until you pay for it Victims of Hacking → Financial Harms: ○ EG attack of Heartland Payment Systems Company → Democratic Harms: ○ EG Russian hackers in Estonia → Legislative Responses to Hacking → Change in approach: ○ Early: overreliance on existing law ○ Later: creation of new laws ○ Example § EG Gold and Schifreen → New laws: ○ US: Counterfeit Access Device and Computer Fraud and Abuse Act. ○ UK: UK Computer Misuse Act ○ Criticisms: § Slap on the wrist § International crime § EG Gary McKinnon ○ Criticisms: § Slap on the wrist § International crime § EG Gary McKinnon Hacktivism & Cyber Terrorism Thursday, January 30, 2025 1:54 PM The Political Internet → Internet and Politics: ○ Government use of Internet § We can know get our government knowledge ○ Online participation in politics ○ We can now get stats on crime ○ Some governments have tried to create e voting □ When you vote online □ This is hard because of potential hacking ○ We can now express our concerns online ○ Concerns on what is said □ Rumors ○ Social movements that are used to create a change in the world □ #blackouttuesday, #metoo, #BLM ○ Social media allowed people who were angry, upset to respond to this ○ Social media was used a lot of expose government corruption → Examples: ○ Arab Spring (2011): a social movement for democratic reform across North Africa and Middle East □ Social movement that was in various middle east and north Africa ○ Milk Tea Alliance (2020): movement featuring online democracy and human rights activists across South East Asia □ Effort by various human rights activist that got together to voice their concerns about human rights violations ○ Milk Tea Alliance (2020): movement featuring online democracy and human rights activists across South East Asia □ Effort by various human rights activist that got together to voice their concerns about human rights violations Hacking ○ Hacking: unauthorized accessing of digital spaces that belong to others. ○ Goal: Breach and access ○ Type: Crimes against the machine ○ Target: political processes, organizations, governments/states Political Hacking Pizza Gate ○ Pizzagate: US intelligence agencies concluded Russian hackers (Cozy Bear and Fancy Bear) interfered in 2016 presidential election. ○ Accessed and leaked emails from top-ranking Democrats damaging Hilary Clinton’s reputation. ○ Hackers began to send fishing emails to political leaders, which if there was a link clicked or email response then hackers had access to political data □ Allowed hackers to spread propaganda □ Hackers said that human trafficking of children was out of pizza shops □ People believed Hilary was involved in human trafficking which was possibly the reason that lead Trump to win and Hilary to lose What is Hacktivism → Hacktivism (HT): the mobilization of hacking (H) in service of political goals. ○ Usually has a progressive lean ○ Leftwing hacking while terrorism is right wing hacking → Advantages of Hacktivism ○ Participants from around the world join and contribute ○ Usually has a progressive lean ○ Leftwing hacking while terrorism is right wing hacking → Advantages of Hacktivism ○ Participants from around the world join and contribute ○ Protection from physical suppression ○ Remain anonymous → Hacktivism does not have any geographical limitation, not physical, not geographical → A lot of privacy tools were designed by hackers → Peekabooty was created by hackers to access internet more freely → Example: Anonymous ○ Anonymous: hacker group widely known for DOS attacks against corporations and political organizations. □ Very politically motivated □ Not unified group, not organizations □ Broken up group of hackers, diverse □ Core ideology is not always fixed □ Considers itself an activist organization that responds to unethical, illegal political organizations □ Scientology and Tom Cruz ○ From Trolling to Activism: Early A described as “Internet motherfuckery” birthed on websites like 4Chan (“asshole of the internet”) □ Known as trolls □ Attention seeking ○ Guy Fawkes symbology: Members known for using vigilantism ideology. ~Hacktivist Tactics~ Hacktivism Tactics → Physical Sit-ins ○ EG Feminist Suffragettes □ Rosa Parks → Virtual Sit-ins Hacktivism Tactics → Physical Sit-ins ○ EG Feminist Suffragettes □ Rosa Parks → Virtual Sit-ins ○ EG DDOS attacks ○ EG Electronic Disturbance Theurer → Hacktivism Tactics ○ Email Bombs: ○ Examples § EG BART (Bay Area Transport) email bomb § EG Subscription bombs → Website defacement: ○ EG: TeaMp0isoN’s attack on the English Defense League EG: EU Website Hack → EU Website hack: EU Presidency website was hacked in 2010. An image of EU president and Spanish Prime Minister Jose Luis Rodriguez Zapatero, was replaced by an image of Mr Bean. → The parody became a hit, with so many viewers that the website crashed. EG: ISIS Twitter Hack → ISIS Twitter Hack: hacks of pro-ISIS twitter pages by Anonymous → Examples: ○ #OPParis Hacktivism Tactics → Doxxing (Dropping Docs): ○ Examples: #OpHoodsOff, #OpChingalaMigra (Fuck Border Patrol) → Whistleblowing: bringing general public and their attention to practices that are usually unknown or hidden ○ Examples: 2010 WikiLeaks, Patrol) → Whistleblowing: bringing general public and their attention to practices that are usually unknown or hidden ○ Examples: 2010 WikiLeaks, § Edward Snowden □ Leaked all kinds of governments that used hackers to invade people's privacy □ When this was exposed there was all sorts of controversy about whether this was legal or not, still ongoing today □ Criminalized and left to Russia ○ Usually about people who have access to a space that could leak information CJS responses to Hacktivism → CJS responses to Hacktivism ○ EG: Arrest of Anonymous (2012) ○ EG: Arrest of Aaron Swartz (2012) → Chilling effect? ○ When you criminalize it, you may discourage it, resulting in the chilling effect → Rise of Hacktivism? ○ New generation The Debate → Utility: ○ Political Empowerment ○ Alternative political perspectives ○ Exposure of misconduct → Concerns ○ Lack of Regulation and Accountability: ○ Criminality: ○ Potential for Misuse: → Concerns ○ Lack of Regulation and Accountability: ○ Criminality: ○ Potential for Misuse: Terrorism → Definition: use of violence, threats, or intimidation too create anxiety and manipulate, intimidate, or coerce targets. → Very debated in terms of its meaning → Targets physical spaces → Examples: ○ Oklahoma City Bombing ○ 911 What is Cyber Terrorism → Cyberterrorism: the exploitation of electronic vulnerabilities by terrorist groups in pursuit of political aims. → Exploitation of cyber vulnerabilities → Features: ○ Non/sub-state actors ○ Targets Critical infrastructure § Digital § Target things like telephone networks, digital spaces that are in charge of energy, internet networks § People reduce the importance because its not physical but a lot of it can have long term implications Advantages of Cyberterrorism → Distance ○ Don’t have to be in the location of the attack → Empowered small agents → Anonymity ○ Don’t have to worry about their identity being exposed § Can use digital spaces (VPN) to hide who they are ○ Don’t have to be in the location of the attack → Empowered small agents → Anonymity ○ Don’t have to worry about their identity being exposed § Can use digital spaces (VPN) to hide who they are → Regulation ○ Lack of this ○ Law lags behind technology Computer Assisted Terrorism → Coordination → Propaganda and recruitment ○ Easy and cheap way to spread propaganda → Gathering information ○ This can sometimes involve hacking ○ Getting information on potential targets ○ Google maps can be used to plan attacks ○ Dark web used to spread/ collect information on how to make bombs → Financing ○ Social media is used to earn the attention of sympathizers § Fundraising → Privacy - can hide information like location Media and Cyberterrorism → Media rhetoric: ○ Cyberterrorism is much rarer than media suggests ○ Poor rhetoric: “electronic pearl harbour” → Risks of Cyberterrorism for the terrorist: ○ EG digital footprints Key Lessons → Hacking is political: hacking is sometimes informed by political goals. → Types: Hacktivism and Cyber Terrorism ○ Not as clear in terms of its politics ○ EG digital footprints Key Lessons → Hacking is political: hacking is sometimes informed by political goals. → Types: Hacktivism and Cyber Terrorism ○ Not as clear in terms of its politics → Tactics: Range of computer assisted tactics. EG doxing EG spreading propaganda Illegal Good and Illicit Market Thursday, February 6, 2025 9:33 AM Crimes using the Machine → Crimes using the machine (computer-enabled crimes): how the system is used, once the offender has excess, to exploit the victims to the offender’s advantage. → Examples: fraud, theft → Once hackers enter your system they will engage in these types of crime → Breaking into your space and use your data, using it to their advantage and disadvantaging the victim → Sometimes you may not notice they entered your system → Stealing something from your computer is an example E Commerce → E commerce: internet improves ease of financial transactions. → In 2019. 51% of Canadians made an online purchase compared to 26% in 2014. → Internet has enabled new ways to engage in transitions ○ Buy things online, sell things online → Bomb making instructions → Not just about crime ○ Now become apart of everyday life ○ Amazon is very popular and many people rely on it → Types of things that are bought online is different now ○ Clothing was before very popular but now you can buy food and have it delivered to you on the same day Illegal Goods and Illicit Markets → Financial Crimes: the sale of illegal and illicit goods and services ranging from narcotics to child sex abuse imagery to bomb making instructions. → Type: Crimes using the Machine + Digital Dependent Illegal Goods and Illicit Markets → Financial Crimes: the sale of illegal and illicit goods and services ranging from narcotics to child sex abuse imagery to bomb making instructions. → Type: Crimes using the Machine + Digital Dependent Crimes → Victims: Individuals + Markets (organizations and businesses) → These crimes are about what you do when you have access Levels of the Web → The Configuration of the Internet ○ The Surface Web: EG Google § Doesn’t have many restrictions on it when on the web ○ The Deep Web. EG URL § Cant get through google § Google doesn’t want a link to these websites ○ The Dark Web: EG Silk Road § Most free space on the internet § Need to have some sort of privacy on it like a VPN § Silk Road most popular in the dark web □ Sell drugs, weapons ○ Note: Illegal Goods and Markets can exist on all three, but in different ways... → A lot of crimes can occur across the web Illegal Drugs on the Surface Web → The Surface Web Drug Trade: ○ One of the first things MIT students did was sell weed online → Sale of: ○ Psychoactive substance § Things that have to do with altering mental function □ Cannabis § Legality of some of these drugs have changed now but at the time they were illegal and § Things that have to do with altering mental function □ Cannabis § Legality of some of these drugs have changed now but at the time they were illegal and often sold online § Could 9 □ Created in a lab □ drug that are harder to criminalized ○ NPS ○ Controlled Pharmaceuticals § Medical use drugs § Restrictive/ regulated □ Like steroids or opioids → Benefits of surface web: ○ Although it has limitations, it is easy to access ○ Easy to advertise ○ Made surface level web popular especially for illegal highs Markets for Other Antiquities → Other Antiquities: ○ Stolen Art: EG looted art § Use of websites like ebay ○ Wildlife: EG endangerd species § Rinho horns Markets for Illegal Digital Goods → Hacker Markets: ○ Cybercrime markets § Hackers can actually sell their services § Customers can buy cyber attacks from them § They can engage in hack attacks for ransom money § Attack can be on the service web but this occurs out of the service web ○ Virtual Hacker Service Economy → Example: DarkSide’s Pipeline Attack Markets for Illegal Digital Goods → Digital Piracy occurs out of the service web ○ Virtual Hacker Service Economy → Example: DarkSide’s Pipeline Attack Markets for Illegal Digital Goods → Digital Piracy ○ What is intellectual property? § Idea that is proposed ○ What is copyright? § Legal tool that protects from being shared ○ What are pirates? § They avoid copyrights and use copy share § Sometimes its done for their entertainment, others entertainment or even for financial § Violation of the law § Civil or legal remedies which can fine or incarcerate people § Pirate usually have to pay damages → Example: Napster (1999) Illicit Markets on the Dark Web → Tools used on the Dark Web: The Onion Router (Tor) ○ Level of privacy ○ Law enforcement wont be on it as much ○ Google can regulate it ○ Network that enables encrypted anonymous communication § Allows users to engage in untraced links ○ Has to go through layers § Cant trace where someone is coming from → Dark Web Markets (AKA Cryptomarkets) ○ Cryptocurrency § Payment with this makes it harder to track these § Don’t have to worry about the bank ○ Crypto markets → Famous Example: The Silk Road → Product usually delivered by mail ○ Protected by security/ privacy rights ○ What was being sent, was packaged to look not suspicious → Famous Example: The Silk Road → Product usually delivered by mail ○ Protected by security/ privacy rights ○ What was being sent, was packaged to look not suspicious → Risks: ○ Quality and Arrival ○ Policing Other Illicit Markets on the Dark Web → Weapons: ○ EG 3D printing files → Counterfeit goods: ○ EG smuggled drugs § Fake branded fashion, counterfeit bank notes, fake ID → Hacker services ○ Selling ransomware ○ Selling peoples information Thefts and Frauds Online Fraud → Fraud (F): criminal acquisition of money or property from victims using deception or cheating ○ How much does a victim bare with these kinds of frauds? → Cyber fraud (CF): fraud which relies on computer technologies and occurs online. ○ Ghosting ○ Victims will provide an offender information § Money or product services ○ Victims will pay offenders for services but they aren't good services → Crime rate: ○ CND’s Anti-Fraud Centre reported CA$269m loss in 2020. ○ There are highs in lows with crimes but cybercrimes are increasing on a day to day → Victimization stats: ○ US National Crime Victimization Survey: 23m people 2020. ○ There are highs in lows with crimes but cybercrimes are increasing on a day to day → Victimization stats: ○ US National Crime Victimization Survey: 23m people reported being a victim of ID theft. (2018) Identity Theft → Pre cyber society to steal and identity you would have to acquire someone's ID but now all you need is your bank number, SIN, passwords and using it for personal benefit → Identity Theft: many CFs involve unlawfully obtaining and using the victim’s personal identifying information. ○ Rates: Statista (2022) reports rate 55.45/100k adults in CND (25.79 in 2012) → Tactics: ○ Tabnapping: breaking into someone's digital space § When people have multiple websites open ○ Spyware: kind of malware that someone can watch what you are doing § What is being typed into your computer ○ Output frauds: setting up a bank account in someone's name, obtain a loan, contracts → Harms are serious and not just economic ○ Although economically, victims pay more when it comes to identity theft ○ There are indirect costs like credit score ○ Missed work ○ Compromised online reputation Types of Online Fraud → Phishing: fraudster gets the victim to voluntarily disclose personal details such as passwords and bank account info. → Advanced Fee Fraud : promise the victim a large sum of money in return for an up-front → Investment Fraud: tricking investors in stocks and businesses to make purchase or sales based on false information. → Online Sales Fraud: Fraudulent use of online of money in return for an up-front → Investment Fraud: tricking investors in stocks and businesses to make purchase or sales based on false information. → Online Sales Fraud: Fraudulent use of online marketplaces to buy, sell, and trade. Types of Online Fraud: Phishing → Phishing: fraudster gets the victim to voluntarily disclose personal details such as passwords and bank account info. → Rate: IC3 (2021) received 324k calls for phishing (USA) → Techniques: Phishing and Spoofing ○ Phishing uses emails ○ Spoofing uses links, website that may look like the original website → Target: Mass target versus specific target ○ Sper phishing § Less likely to know it’s a spam Types of Online Fraud: Romance Fraud → Romance Fraud: feigning romantic interest in a victim and exploiting their emotions to obtain gifts and money → Rate: IC3 (2021): 24k reports, cost of US$956m (USA) → Media: Catfish documentary/tv show → Emotional Harm ○ Preying on someone's emotions ○ Someone who doesn't actually exist → Where someone exploits the victim ○ Tricks the victim ○ Becomes a friend to the victim § Maybe romantically ○ Gives them money or gifts Types of Online Fraud: Advanced Fee Fraud → Advanced Fee Fraud: promise the victim a large sum of money in return for an up-front → Variations: inheritance, lottery, travel, unexpected money → Rate: IC3 (2021): 11k reports, amounting to $US98m in loss (USA)

Use Quizgecko on...
Browser
Browser