Lumping in alleged terrorist activity and major fraud with hamfisted
phishing, Russian love goddesses and Nigerian princes serves to
underplay the actual threat experienced at the sharp end. A sharp end
where harm to the individual, the organisation and the nation state take
place and where the policing resources do not get effectively focused.
As we piece together the picture, it soon becomes clear that
cyber-crimes each have distinct modus operandi, covered by distinct
bodies of law. At one level we have “crimes against the machine”, crimes
that attack the integrity of the computer’s access mechanisms such as hacking and cracking, cyber-vandalism, cyber-spying, DDOS(distributed denial of service) attacks and viruses. In the UK, such offences are mainly covered by the Computer Misuse Act 1990 and the key source of evidence is found in the computer’s login and operating logs.
At another level lie the “crimes that use machines”, such as fraud, but also phishing or advanced fee fraud
which use networked computer systems (often legitimately) to engage
victims with the intention of dishonestly acquiring cash, goods or
services. These crimes are covered by the Fraud Act 2006 and related legislation. The evidence is to be found in computer transaction logs and those of relevant financial systems.
Finally, there are the “crimes in the machine”. These are
computer-content crimes that relate to the illegal content of computer
systems. They include the trade and distribution of extreme pornographic
and hate crime materials or materials that intend to deprave, corrupt
or incite violence. In the UK these are covered by a range of laws
including the Extreme Pornography laws (sections 63 to 67 of the Criminal Justice and Immigration Act 2008) and Hate Speech Laws, Communications Act 2003 and others. The evidence for these crimes is usually located in the computer’s main storage space.
Click here to read more .... http://theconversation.com/high-risk-cyber-crime-is-really-a-mixed-bag-of-threats-34091
No comments:
Post a Comment