10 research outputs found

    Banking malware and the laundering of its profits

    Get PDF
    Criminal Justice: Legitimacy, accountability, and effectivit

    The Police Hack Back: Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime

    Get PDF
    In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government proposed new legislation giving police agencies new investigative powers on the Internet. This proposed legislation is controversial as it allows police agencies to hack into computers and install spyware. This paper examines the background and contents of the proposed legislation and tries to answer the question to what extent these new investigative powers may result in infringements of the right to privacy and other fundamental rights of citizens, and whether these infringements are justified. The framework for this evaluation, mainly based on the European Convention on Human Rights, focuses on the legitimacy and necessity of the proposed investigative powers. The most important considerations are that new investigative powers are introduced while existing powers are not used adequately and that there are serious doubts as to whether these new investigative powers will be effective. </p

    Organised Cybercrime in the Netherlands: Empirical findings and implications for law enforcement

    No full text
    This study seeks to explore the characteristics of cyber-organised crime (OC), and focuses on the criminal activities of cyber-OC groups, their modus operandi, the organisational structures, the ‘profiles’ of the involved offenders, and the characteristics of criminal investigation into these cases. For this purpose we will focus on the following research questions: 1.Is organised crime involved in cybercrime? What kind of cybercrime do organised crime groups commit? 2.How do organised crime groups use the Internet to commit ‘traditional crimes’? 3.Does the Internet provide windows of opportunity for the development of new business ideas and for the identification and approaching of new targets? 4.Does the Internet lead to structural changes in organised crime? 5.Is cybercrime organised? How, why and when? 6.How does the criminal investigation of (organised) cybercrime work in practice and which best practices and challenges can be identified

    Organised Cybercrime in the Netherlands

    No full text
    This study seeks to explore the characteristics of cyber-organised crime (OC), and focuses on the criminal activities of cyber-OC groups, their modus operandi, the organisational structures, the ‘profiles’ of the involved offenders, and the characteristics of criminal investigation into these cases. For this purpose we will focus on the following research questions: Is organised crime involved in cybercrime? What kind of cybercrime do organised crime groups commit? How do organised crime groups use the Internet to commit ‘traditional crimes’? Does the Internet provide windows of opportunity for the development of new business ideas and for the identification and approaching of new targets? Does the Internet lead to structural changes in organised crime? Is cybercrime organised? How, why and when?How does the criminal investigation of (organised) cybercrime work in practice and which best practices and challenges can be identified? INHOUD: 1. Introduction and methods 2. Organisation of investigation and prosecution in the Netherlands 3. Characteristics of cyber-OC 4. Criminal investigation of cyber-OC 5. Conclusion and discussio

    De 'zelfmetende' justitiabele

    No full text
    Quantifying personal characteristics with help of technological devices, such as smartwatches and smartphones, has become a common activity among people over the past years. In the field of criminal justice, there is an increasing interest in these techniques. Self-measurement equipment could potentially contribute to tailor-made treatment and supervision and could possibly 'empower' individuals. This report investigates how technological self-measurement equipment could enrich judicial processes. At the same time, potential risks related to technological self-measurement methods are highlighted. See also: Infographic The 'self-measuring' delinquent

    (Verkeerd) verbonden in een slimme samenleving

    No full text
    The Internet of Things (IoT) is a network of ’smart’ devices, sensors and other ob-jects, which are connected with each other and to the Internet. Several IoT applica-tions are widely used in our society and the adoption of IoT will only increase in the coming years. On the one hand, the IoT offers opportunities by introducing new technological possibilities. On the other hand, it also brings new threats, related to cyber security. The key question of this research report is: What are the opportunities and threats of the IoT and how can various stakeholders influence the development of the IoT in the Netherlands in a positive way? To answer this research question, the following sub-questions were formulated.What is the Internet of Things?Which opportunities does the IoT present?What challenges, pitfalls and threats does the IoT bring?What measures can stakeholders take to further the opportunities of the IoT and mitigate the threats

    Verkeerd verbonden in een slimme samenleving: het Internet of Things: kansen, bedreigingen en maatregelen

    No full text
    Het Internet of Things (IoT) is een netwerk van ‘slimme’ apparaten, sensoren en andere objecten die met elkaar en met het internet verbonden zijn. Nu al worden verschillende IoT-toepassingen veelvuldig gebruikt in onze samenleving en in de toekomst zal de adoptie van het IoT alleen nog maar verder toenemen. De centrale vraagstelling in dit onderzoek is: Wat zijn de kansen en bedreigingen van het IoT en hoe kunnen verschillende stakeholders de ontwikkeling van het IoT in Nederland op een positieve manier beïnvloeden

    A conceptual framework for addressing IoT threats: challenges in meeting challenges

    No full text
    The Internet of Things (IoT) is rapidly growing, and offers many economical and societal potentials and benefits. Nevertheless, the IoT also introduces new threats to our Security, Privacy and Safety (SPS). The existing work on mitigating these SPS threats often fails to address the fundamental challenges behind the mitigation measures proposed, and fails to make the relations between different mitigation measures explicit. This paper, therefore, offers a conceptual framework for understanding and approaching the challenges and obstacles that arise in addressing the SPS threats of the IoT. This contribution aims to help policymakers in adopting policies and strategies that stimulate others to develop, deploy and use IoT devices, applications and services in secure, privacy-friendly and safe ways
    corecore