Cybercrime Attacks

Cybercrime Attacks

Cybercrime Attacks

Overview of Cybercrime Attacks in relation to cyber crime: [1]Today hundreds of millions of computers are simultaneously connected to the Internet. This along with weak (although improving) information security practices by organizations and computer users throughout the world make major cybercrime attacks involving sophisticated malware relatively common. Consider, for instance, that in 2007 alone, the People’s Republic of China stands accused by the U.S. Department of Defense of engaging in numerous computer network intrusions of both commercial and government institutions. Other countries such as Great Britain, Germany, and France have made the same allegations. On June 20, 2007, the Department of Defense was forced to take over 1,500 of its workstations offline due to a coordinated cybercrime attack that appeared to have culminated from numerous smaller attacks over a two-year period. There are countless other such examples and their numbers are growing every day. [1]

Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks

Abstract of a paper by Kai Lung Hui, Seung-Hyun Kim, Qiuhong Wang, published in 2017 in MIS Quarterly:

Articles Hacker Forum Posts Article 11 bckc (03-13-2011 05:34 PM): “…and dont worry about the police, there are no “international laws within states governed by independancy”meaning that if shes in a different country the police cant do shit unless its a major offence which it isn’t There are conventions. Also, he can be judged in absentia where the crime has happend. And within European Union borders he can be transported due to the crime, because of the European Unions conventions about partnership in law.” Article 22 flute123 (2010/7/23 20:05): “By Law…ISP’s are not allowed to hand out any information about any IP Number unless it is of a serious crime such as cyber crime. Depends which country your from. They usualy need a court order before they can obtain an ip address.” Article 29 michaeljay (06-11-2011 08:07): “This is a confusing issue. Usually there needs to be “double criminality,” that is, an act must be illegal in both the country harboring a suspect and the country seeking extradition. That’s why the US government couldn’t prosecute some dude in the Philippines several years back for distributing a worm, as that act was not illegal in the Philippines at the time. As for what country claims jurisdiction, there are many factors to consider, such as territoriality (where the suspect and the slave are located, where the servers are located, etc) and nationality. The countries involved work this out themselves….So basically there’s not really a clearcut way to avoid prosecution….Damnit.Thanks for the help.”

Resources

Notes and References

1. By Michael J. Kozak

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Brewin, B. (2008, March 3). Pentagon: Cyberattacks appear to come from China. Government Executive.Com; Fox Newswire. (2007, June 22). Pentagon cyber attack forces 1500 PCs offline; Frantz, D. (2007, January). Spy vs. spy: Corporate espionage’s ugly new twist. Conde Nast Portfolio, 98-103; Krebs, B. (2006, December 22). Cyber crime hits the big time. Washington Post Web site: https://www .washingtonpost.com/wp-dyn/content/article/2006/12/22/AR2006122200367.html; MacNeal, K., & Etges, R. (2007, September). Cyber warfare and defense strategies. ISSA Journal, 6–10.
Introduction : Crime Mapping and Crime Prevention, David L. Weisburd, Tom McEwen2006


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *