Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
-
1. Money laundering and terrorist finance
- Prof. Nikos Passas
- Archived Lectures *These may not cover the latest advances in the field
-
2. Nigerian organized crime
- Prof. Phil Williams
-
3. Trafficking in diamonds
- Prof. Dina Siegel
-
4. Illicit small arms and light weapons
- Ms. Rachel Stohl
-
5. Nuclear trafficking
- Dr. Lyudmila Zaitseva
-
6. 'Organized crime' in Russia and Eastern Europe: from rhetoric to reality
- Dr. Patricia Rawlinson
-
7. Transnational crime : trafficking in antiquities
- Dr. Simon Mackenzie
-
8. Corruption and transnational crime
- Mr. Rob McCusker
-
9. Tackling transnational crime
- Mr. Rob McCusker
-
10. Trafficking in human beings: phenomenon and counter-measures
- Dr. Andrea Di Nicola
-
12. Organized crime in Asia
- Prof. Richard Ward
- Prof. Daniel Mabrey
-
13. Organized crime in North America
- Prof. Jay Albanese
-
14. Trafficking in human organs in Europe
- Ms. Silke Meyer
-
15. Combating wildlife crime
- Mr. John M. Sellar
-
16. Asset tracing and recovery
- Mr. Alan McQuillan
-
17. Organized crime in Europe
- Dr. Klaus von Lampe
-
18. Drug trafficking in the Golden Triangle
- Prof. Sheldon Zhang
-
19. Defining the relationship of crime and terrorism
- Prof. Louise Shelley
-
20. Transnational environmental crime
- Dr. Lorraine Elliott
-
21. Globalization and the growth of transnational crime
- Prof. David Nelken
-
22. Cyber crime: the global dimension
- Prof. Peter Grabosky
Printable Handouts
Navigable Slide Index
- Introduction
- The speaker
- Outline
- Cyber crime
- Motives
- Opportunities
- Internet hosts per 1000 inhabitants, 2003
- Interent users world map, 2015
- The absence of capable guardians
- Potential guardians
- Technological guardianship
- Victims-offenders-guardians intersection
- Cyberspace allows global intersection
- Changing motivation
- Reducing opportunities
- State and private actors role in guardianship
- Illustrative cases
- Book: "Electronic crime" by Peter Grabosky
- Unauthorised access (hacking)
- Book: "The cuckoo's egg" by Clifford Stoll
- Clifford Stoll
- Interference with lawful use of a computer
- "Mafia boy"
- "Distributed denial of service attack"
- Malicious code (worms and viruses)
- Unsolicited mass email (SPAM)
- Forms of SPAM
- Consequences of SPAM
- Dissemination of offensive materials
- Examples of offensive materials
- An image offensive to Chinese authorities
- Dual criminality
- Information piracy, counterfeiting and forgery
- "Drink or die"
- Documents forgery
- Stalking
- Extortion
- Sales and investment fraud
- Electronic funds transfer fraud
- Electronic money laundering
- Electronic vandalism and terrorism
- Original CIA website
- Hacked CIA website
- Terrorism
- Cyberterrorism
- Activities not regarded as cyberterrorism
- Critical infrastructure vulnerable to disruption
- Communications in furtherance of terrorism
- Intelligence
- Example of open source intelligence
- Communications
- Propaganda
- Example: detonation of a road-side bomb (1)
- Example: detonation of a road-side bomb (2)
- Example: detonation of a road-side bomb (3)
- Psychological warfare
- Usage of hostage execution images
- Fund raising and recruitment
- Training
- Trends in cyber crime
- Sophistication, commercialization, integration
- Sophistication
- Schematic diagram of a botnet
- "Phishing"
- Exmaple of a counterfeit website
- Wireless networks: ''war driving"
- Illustration of ''war driving''
- Equipment used for ''war driving''
- Commercialization
- Child pornography
- Rent-a-botnet
- Integration
- The challenge of transnational cybercrime
- The major questions
- Substantive criminal law
- The council of Europe cybercrime convention
- Jurisdiction: where is the crime?
- Nationality
- Protective
- Passive personality
- Universal jurisdiction
- Jurisdiction assertion in Australia
- Jurisdiction assertion in Malaysia
- 24/7 network of contacts
- Political will and legal capacity
- Cross-border searches
- Extradition
- Image of ''Mafia boy'' arrest
- Successful models of co-operation
- Operation cathedral (1998)
- Operation buccaneer (2001)
- Operation falcon (2004)
- Operation firewall (2004)
- Operation site down (2005)
- Conclusions
- Capacity building in less-developed countries
- Private sector and NGO involvement
- Monetary rewards and NGO activity
- NetSafe
- Computer emergency response teams
- AusCERT
- Hotlines
- Speaker's contact details
Topics Covered
- Theories of cyber crime
- Illustrative cases of cross-border offending
- Emerging trends
- Jurisdiction and other legal issues
- Successful investigations
- Pluralistic responses
Links
Series:
Categories:
Talk Citation
Grabosky, P. (2008, November 3). Cyber crime: the global dimension [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved December 30, 2024, from https://doi.org/10.69645/AHLL1513.Export Citation (RIS)