Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
Printable Handouts
Navigable Slide Index
- Introduction
- The speaker
- Outline
- Cyber crime
- Motives
- Opportunities
- Internet hosts per 1000 inhabitants, 2003
- Interent users world map, 2015
- The absence of capable guardians
- Potential guardians
- Technological guardianship
- Victims-offenders-guardians intersection
- Cyberspace allows global intersection
- Changing motivation
- Reducing opportunities
- State and private actors role in guardianship
- Illustrative cases
- Book: "Electronic crime" by Peter Grabosky
- Unauthorised access (hacking)
- Book: "The cuckoo's egg" by Clifford Stoll
- Clifford Stoll
- Interference with lawful use of a computer
- "Mafia boy"
- "Distributed denial of service attack"
- Malicious code (worms and viruses)
- Unsolicited mass email (SPAM)
- Forms of SPAM
- Consequences of SPAM
- Dissemination of offensive materials
- Examples of offensive materials
- An image offensive to Chinese authorities
- Dual criminality
- Information piracy, counterfeiting and forgery
- "Drink or die"
- Documents forgery
- Stalking
- Extortion
- Sales and investment fraud
- Electronic funds transfer fraud
- Electronic money laundering
- Electronic vandalism and terrorism
- Original CIA website
- Hacked CIA website
- Terrorism
- Cyberterrorism
- Activities not regarded as cyberterrorism
- Critical infrastructure vulnerable to disruption
- Communications in furtherance of terrorism
- Intelligence
- Example of open source intelligence
- Communications
- Propaganda
- Example: detonation of a road-side bomb (1)
- Example: detonation of a road-side bomb (2)
- Example: detonation of a road-side bomb (3)
- Psychological warfare
- Usage of hostage execution images
- Fund raising and recruitment
- Training
- Trends in cyber crime
- Sophistication, commercialization, integration
- Sophistication
- Schematic diagram of a botnet
- "Phishing"
- Exmaple of a counterfeit website
- Wireless networks: ''war driving"
- Illustration of ''war driving''
- Equipment used for ''war driving''
- Commercialization
- Child pornography
- Rent-a-botnet
- Integration
- The challenge of transnational cybercrime
- The major questions
- Substantive criminal law
- The council of Europe cybercrime convention
- Jurisdiction: where is the crime?
- Nationality
- Protective
- Passive personality
- Universal jurisdiction
- Jurisdiction assertion in Australia
- Jurisdiction assertion in Malaysia
- 24/7 network of contacts
- Political will and legal capacity
- Cross-border searches
- Extradition
- Image of ''Mafia boy'' arrest
- Successful models of co-operation
- Operation cathedral (1998)
- Operation buccaneer (2001)
- Operation falcon (2004)
- Operation firewall (2004)
- Operation site down (2005)
- Conclusions
- Capacity building in less-developed countries
- Private sector and NGO involvement
- Monetary rewards and NGO activity
- NetSafe
- Computer emergency response teams
- AusCERT
- Hotlines
- Speaker's contact details
Topics Covered
- Theories of cyber crime
- Illustrative cases of cross-border offending
- Emerging trends
- Jurisdiction and other legal issues
- Successful investigations
- Pluralistic responses
Links
Series:
Categories:
Talk Citation
Grabosky, P. (2008, November 3). Cyber crime: the global dimension [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved December 21, 2024, from https://doi.org/10.69645/AHLL1513.Export Citation (RIS)