Open Access Publisher and Free Library
01-crime.jpg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged Cybercrime
Optimized Combined-Clustering Methods for Finding Replicated Criminal Websites

By Jake M. Drew and Tyler Moore

To be successful, cybercriminals must figure out how to scale their scams. They duplicate content on new websites, often staying one step ahead of defenders that shut down past schemes. For some scams, such as phishing and counterfeit goods shops, the duplicated content remains nearly identical. In others, such as advanced-fee fraud and online Ponzi schemes, the criminal must alter content so that it appears different in order to evade detection by victims and law enforcement. Nevertheless, similarities often remain, in terms of the website structure or content, since making truly unique copies does not scale well. In this paper, we present a novel optimized combined clustering method that links together replicated scam websites, even when the criminal has taken steps to hide connections. We present automated methods to extract key website features, including rendered text, HTML structure, file structure, and screenshots. We describe a process to automatically identify the best combination of such attributes to most accurately cluster similar websites together. To demonstrate the method’s applicability to cybercrime, we evaluate its performance against two collected datasets of scam websites: fake escrow services and high-yield investment programs (HYIPs). We show that our method more accurately groups similar websites together than those existing general-purpose consensus clustering methods.

• Smugglers were the top source of information for those who obtained information prior to starting their journey (50%), even more so for women (60%).This high percentage likely stems from the unique sampling criteria, in which all respondents used a smuggler. • However, 28% of migrants overall considered smugglers to be the most reliable source of information, and less so among women (21%).

London: Mixed Migration Centre, 2025. 12p.

Identifying trends and patterns in offending and victimization on Snapchat: A rapid review

By Kelly Huie, Michelle Butler, & Andrew Percy

Few studies have examined crime on Snapchat despite its popularity and growing accounts of victimization occurring on the application. This study addresses this gap in knowledge by conducting a rapid review of crime on Snapchat across 18 databases. The findings indicate this area is under-researched, with only 35 articles eligible for inclusion and fve focusing solely on crime on Snapchat. Nevertheless, eleven types of crimes were identified as occurring on Snapchat, including: blackmail; the sharing of private, sexual material without consent; grooming/solicitation of minors; stalking; posting threatening, intimidating or harassing material; hate crime; sharing offensive, menacing or obscene content; obtaining illicit goods; identity theft; fraud; and hacking. The findings additionally revealed some patterns in offending and victimization that are also discussed.

Security Journal (2024) 37:903–920

Phishing Risks in a University Student Community

By Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias and Yuguang Ipsen

In an exploratory quasi-experimental study, 138 students recruited during a university orientation week were exposed to social engineering directives in the form of fake emails, or phishing, over several months in 2017. The study assessed the risks of cybercrime for students by observing their responses. Three types of scam emails were distributed that varied in the degree of individualisation: generic, tailored, and targeted or ‘spear’. The study explored the influence of scam type, cybercrime awareness, gender, IT competence and perceived internet safety on susceptibility to email scams.Although tailored and individually crafted email scams were more likely to induce engagement than generic scams, differences were not significant. Analysis of the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students.


Trends & issues in crime and criminal justice no. 587. Canberra: Australian Institute of Criminology. 2020. 16p.

Responding to Cybercrime: Results of a Comparison Between Community Members and Police Personnel 

By Cassandra Cross, Thomas Holt, Anastasia Powell and Michael Wilson 

Advancements in information technology are sources of both opportunity and vulnerability for citizens. Previous research indicates that there are significant challenges for police in investigating cybercrime, that community expectations about police responses are based largely on media representations, and that victims experience high levels of frustration and stigmatisation. This paper examines the views of the Australian community and law enforcement officers about the policing of cybercrime. Results suggest that police personnel are more likely to view cybercrime as serious, and community members are more likely to ascribe blame to victims. Results also indicate a discrepancy between police and community members in their views of the efficacy of police responses. These discrepancies contribute to public dissatisfaction. Therefore, the paper covers some general strategies for short- and long-term cybercrime prevention.

Trends & issues in crime and criminal justice no. 635. Canberra: Australian Institute of Criminology. 2021. 20p.

The Rise of Cybercrime as a Service: Implications and Countermeasures

By Prithwish Ganguli      

The rise of Cybercrime-as-a-Service (CaaS) represents a new frontier in the evolution of cybercrime, where sophisticated tools and malicious services are made readily available to a broad range of users through online marketplaces, often on the dark web. CaaS has democratized cybercrime, enabling even low-skilled attackers to launch powerful cyberattacks such as Distributed Denial of Service (DDoS), phishing campaigns, and ransomware attacks with ease. This paper explores the operational structure of CaaS, including the use of cryptocurrencies for transactions and the global reach of these illicit platforms. The implications of this shift extend beyond economic losses, threatening national security, corporate stability, and personal privacy. While governments and law enforcement agencies are struggling to keep pace with the rapid evolution of these services, the paper examines legal and regulatory challenges in combating CaaS, as well as the role of international cooperation. Furthermore, it discusses technological countermeasures, including artificial intelligence and machine learning, as potential solutions to mitigate the threat. Ethical considerations surrounding the surveillance and control of online spaces are also addressed. The paper concludes by highlighting future trends in CaaS and stressing the need for a balanced approach between innovation and security to effectively counter this growing threat.

International Journal for Multidisciplinary Research (IJFMR), 2024.

Industry of Anonymity: Inside the Business of Cybercrime

By Jonathan Lusthaus

Human Element in Cybercrime: The book emphasizes the human aspect of cybercrime, using the story of Roman Seleznev to illustrate how cyber criminals operate within specific social settings.

Industrialization of Cybercrime: Cybercrime has evolved from individual hackers to a sophisticated, profit-driven industry with specialized roles and professionalization.

Trust and Cooperation: Despite the anonymity and inherent distrust among cybercriminals, they have developed ways to cooperate and build trust, often through online forums and referrals.

Research and Methodology: The book is based on extensive field research over seven years, including 238 interviews, to provide a detailed overview of the cybercrime industry.

Harvard University Press, 2018, 289 pages

Digital Crime and Digital Terrorism

MAY CONTAIN MARKUP

ROBERT W. TAYLOR, TORY J.CAETI, D. KALL LOPER, ERIC J. FRITSCH, and JOHN LIEDERBACH

FROM THE PREFACE: “The first section of the book covers the etiology of the digital crime and digital terrorism problem. The focus in this section is on the types of crimes and acts of terrorism that are committed using computers, networks, and the Internet. Additionally, the reasons why offenders commit these types of crimes are examined in relation to current criminological theories and explanations. As the reader will find, applying criminological theory to digital crime and terrorism is a relatively recent conception. Finally, the section concludes with a chapter on digital criminals and hackers. Chapter I provides an introduction and overview of computer crime. In particular, a categorization of types of computer crimes is presented including I) the computer as the target, 2) the computer as an instrument of a crime, 3) the computer as incidental to crime, and 4) crimes associated with the prevalence of computers. Chapter 2 provides a definition and overview of two key areas of concern in regards to computer crimes, specifically "information warfare" and "cyber-terrorism." Chapter 3 reviews criminological theories that can explain digital crime. Since few theories have been applied directly to digital crime, this chapter focuses on the classic criminological theories that can be applied to digital crime. In other words, the theories discussed in this chapter were developed to explain crime in general, not digital crime specifically. In particular, this chapter focuses on choice, deterrence, psychological. social structure, and social process theories. Finally, Chapter 4 presents an overview of the hacker subculture and presents a typology of hacker types based on relative levels of skill, resources, and enculturation in the values of the hacker subculture. The chapter closes with a discussion of contemporary hacker roles and terminology.”

Prentice Hall. Upper Saddle River, New Jersey. 2006. 413p.

The Best Damn Cybercrime and Digital Forensics Book Period

MAY CONTAIN MARKUP

By Kevin Cardwell, Timothy Clinton, Tyler Cohen, Edward Collins, James "Jim" Cornell, Michael Cross, Larry Depew, Art Ehuan, Michael Gregg, Captain Benjamin R. Jean, Kevin O'Shea, Kevin Reis ,Anthony Reyes, Sondra Schneider ,Amber Schroader, Karen Schuler, Jesse Varsalone ,Jack Wiles and Craig Wright

INTRODUCTION: “As is often the case with security compromises, it's not a matter of if your company will be compromised, but when. If I had known the employee I hired was going to resign, break into my office, and damage my computers in the span of three days, hindsight being 20/20,I would have sent notification to the security guards at the front door placing them on high alert and made sure he was not granted access to the building after he resigned. Of course, I in hindsight, I should have done a better job of hiring critical personnel .He was hired as a computer security analyst and security hacker instructor; and was (or should have been) the best example of ethical conduct.

Clearly, we see only what we want to see when hiring staff and you won't know whether an employee is ethical until a compromise occurs. Even if my blinders had been off, I would have never seen this compromise coming. It boggles the mind to think that anyone would ruin or jeopardize his career in computer security for so little. But he did break into the building and he did damage our computers, and therefore he will be held accountable for his actions, as detailed in the following forensic information. Pay attention when the legal issues are reviewed.You will learn bits and pieces regarding how to make your life easier by knowing what you really need to know "when" your computer security compromise occurs.

Computer forensics is the preservation, identification, extraction, interpretation, and documentation of computer evidence. In Chapter 9 of Cyber Crime Investigations, digital forensics is referred to as "the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law"

Syngress Publishing. Inc. Elsevier, Inc.. Burlington, MA. 2007. 727p.