4,278 research outputs found

    Transnational Cooperation in Cybersecurity

    Get PDF
    Cybersecurity has become a significant focal point for law enforcement, businesses, and consumers with the significant advancements made in cyber technologies, cyber use, and cybercrimes, [16]. Organized cybercrime includes activities such as skimming, botnets, provision of child pornography and advance fee fraud. Unorganized cybercrime could be simple fraud, downloading child pornography, trolling or uttering threats. Both organized and unorganized activities have grown more prevalent in today’s digital landscape. The media sensationalize breaches, such as the hacking of HBO’s Game of Thrones episodes and the Equifax data breach. These incidents get much fanfare shifting focus to law enforcement agencies their plans to address the crimes. We need to know more about the effectiveness of measures against cybercrime and the cooperation between nations against cybercrime. This manuscript examines this issue by exploring how transnational cooperation succeeded in the apprehension of wanted individuals in Operation Avalanche

    A qualitative exploration of police officers' experiences, challenges, and perceptions of cybercrime

    Get PDF
    Victimization from cybercrime has increased exponentially over the past decade. Frontline police officers are dealing with a variety of crimes different than those existing in an era before the advent of digital technology. Frontline officers are expected to encourage members of the public to report such crimes, to investigate them, as well as keeping up-to-date with the latest developments in this ever-changing landscape. This study explored the issues that frontline officers are dealing with on a daily basis when it comes to cybercrime. Sixteen frontline police officers took part in focus groups exploring key questions around aspects of cybercrime. The key themes discussed in this article include the difficulty of defining what is cybercrime, the contrast between the speed of developments in cybercrime and the speed of investigation, and the ineffectiveness of current training. The results are discussed in the context of a need for clearer training information to be delivered to all officers and staff who come into contact with aspects of cybercrime

    A Comprehensive Analytical Review on Cybercrime in West Africa

    Full text link
    Cybercrime is a growing concern in West Africa due to the increasing use of technology and internet penetration in the region. Legal frameworks are essential for guiding the control of cybercrime. However, the implementation proves challenging for law enforcement agencies due to the absence of a dedicated and effective regional institutional follow-up mechanism. This study conducted a systematic literature review focusing on West Africa's prevalence of cybercrime, governing policies, regulations, and methodologies for combating cybercrime. West-Africa countries face significant cybercrime challenges, exacerbated by inadequate resources and a dearth of security experts. This study pinpoints potential cybercrime prevention strategies, such as leveraging the Triage framework and broadening research to cover pivotal areas like cyber aggression and cyberbullying. Our research findings highlight the urgency for policymakers and law enforcement agencies to devise more efficient prevention strategies and policies. Overall, this study provides invaluable insights into the state of cybercrime in West Africa to guide the formulation of potent prevention and intervention strategies

    Cybercriminal networks and operational dynamics of business email compromise (BEC) scammers: insights from the “Black Axe” Confraternity

    Get PDF
    I explored the relationship between the “Black Axe” Confraternity and cybercrime, with a particular emphasis on the structural dynamics of the Business Email Compromise (BEC) schemes. I investigated whether a conventional hierarchical system governs the membership and remuneration for BEC roles as perpetrators by interviewing an accused “leader” of the “Black Axe” affiliated cybercriminal incarcerated in a prominent Western nation. I supplemented the analysis of interview data with insights from tapped phone records monitored by a law enforcement entity. I merged Actor-network theory and Social Network theory as analytical frameworks and thematically analyzed data to produce six overarching themes: (1) The fluidity of Structure and Adaptive Roles in BEC, (2) Challenges in Visualizing Criminal Networks, (3) Globalization and Transnational Dimensions, (4) Social and Cultural Influences, (5) Internal Cybersecurity Threats and Money Laundering, and (6) Remuneration and Influences of Cryptocurrency, casting a brighter light on the topic. Unlike traditional organized crime, BEC scammers have adopted a nonhierarchical model that is flexible and fluid. I found no evidence of a rigid hierarchy dictating positions and remuneration for BEC roles. Instead, I observed that cybercriminals involved in BEC activities functioned horizontally, promoting fluidity, maneuverability, collaboration, and specialization across various facets of their illicit pursuits. I also highlighted the cross-border links BEC offenders have with other criminal actors facilitated by Black Axe organizational machinery. My research adds value to the existing body of knowledge, utilizing a unique dataset comprising direct testimonies of a high-profile BEC offender affiliated with the ‘hard–to–access,’ Black Axe gang

    Cybercrimes in the aftermath of COVID-19: Present concerns and future directions

    Get PDF
    Cybercrimes are broadly defined as criminal activities carried out using computers or computer networks. Given the rapid and considerable shifts in Internet use and the impact of the COVID-19 pandemic on cybercrime rates, online behaviours have attracted increased public and policy attention. In this article, we map the landscape of cybercrime in the UK by first reviewing legislation and policy, as well as examine barriers to reporting and address investigative challenges. Given the indisputable rise in cybercrime and its mental health impacts, we propose a four-facet approach for research and practice in this field with an eye to systemic shifts and strategies to combat cybercrime holistically: community alliances and social support, state intervention, and infrastructural sensitivity to user diversity. Lastly, empirical evidence from research guides the design of data-driven technology and provision of advice/interventions to provide a safer digital landscape — hence the importance for more informative research

    An Old Crime in a New Context: Maryland’s Need for a Comprehensive Cyberstalking Statute

    Get PDF

    INNOVATIVE NATURE OF THE 21ST CENTURY CRIMINOLOGY

    Get PDF
    The aim of the article is to study the development trends of criminology, including Covid - 19 in a pandemic environment. The rationale for the innovative criminological approach is related to new types of criminal threats and their consequences. Certain forms and types of traditional crime are transforming into the digital environment in postmodern society, including through the use of DarkNet platforms. At the same time, criminological research is insufficient in Latvia, criminology study courses are not included in all law study programs. In the 21st century, new criminological approaches and schools are emerging, including neocriminology, synergistic, narrative, digital, neurocriminology. Appropriate criminological approaches have a specific nature and content. These trends confirm that, despite the importance of criminology, there is a need for research into the development trends of organized crime, cybercrime, trafficking in human beings, drugs and arms, and the possibilities for combating and preventing them. It would also be necessary to develop specialized criminology study programs.publishersversionPeer reviewe

    Advances in Cybercrime Prediction: A Survey of Machine, Deep, Transfer, and Adaptive Learning Techniques

    Full text link
    Cybercrime is a growing threat to organizations and individuals worldwide, with criminals using increasingly sophisticated techniques to breach security systems and steal sensitive data. In recent years, machine learning, deep learning, and transfer learning techniques have emerged as promising tools for predicting cybercrime and preventing it before it occurs. This paper aims to provide a comprehensive survey of the latest advancements in cybercrime prediction using above mentioned techniques, highlighting the latest research related to each approach. For this purpose, we reviewed more than 150 research articles and discussed around 50 most recent and relevant research articles. We start the review by discussing some common methods used by cyber criminals and then focus on the latest machine learning techniques and deep learning techniques, such as recurrent and convolutional neural networks, which were effective in detecting anomalous behavior and identifying potential threats. We also discuss transfer learning, which allows models trained on one dataset to be adapted for use on another dataset, and then focus on active and reinforcement Learning as part of early-stage algorithmic research in cybercrime prediction. Finally, we discuss critical innovations, research gaps, and future research opportunities in Cybercrime prediction. Overall, this paper presents a holistic view of cutting-edge developments in cybercrime prediction, shedding light on the strengths and limitations of each method and equipping researchers and practitioners with essential insights, publicly available datasets, and resources necessary to develop efficient cybercrime prediction systems.Comment: 27 Pages, 6 Figures, 4 Table

    Cybercrime Post-Incident Leadership Model

    Get PDF
    Cybercrimes are facts of the modern technological society. While extant literature proposes a variety of prescriptive practices to combat cybercrimes, there is scant research to address how organizational leaders should minimize the impact of cybercrimes on their companies and the community after they have occurred. This study addresses the steps leaders should take in the aftermath of cybercrimes and proposes a four-stage leadership model consisting of best practices to guide leaders in preparing, responding, and recovering from a digital or cybersecurity attack
    corecore