The Open Access Publisher and Free Library
08-Global crime.jpg

GLOBAL CRIME

GLOBAL CRIME-ORGANIZED CRIME-ILLICIT TRADE-DRUGS

Posts tagged internet
net.wars

By Wendy Grossman 

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as Wired, The Guardian, and The Telegraph, assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

New York; London: NYU Press, 1998. 256p.

Fear, Lies and Lucre: How Criminal Groups Weaponise Social Media in Mexico

By International Crisis Group

What’s new? Mexico’s criminal groups use social media to garner popular support, denigrate rivals, glorify narco-culture and coordinate violence. Social media is also crucial for providing timely information about flare-ups of violence, particularly since journalists face major threats to their safety, which heavily circumscribes their ability to report from many crime-affected municipalities.

Why does it matter? These criminal groups are recruiting and spreading disinformation online, making them stronger and creating a glut of unverified information that puts civilians at greater risk. Platforms have struggled to respond appropriately.

What should be done? Platforms should boost resources for online monitoring, especially when violence is spiking. Given social media’s importance in disseminating information, platforms should modify their algorithms to demote posts supporting criminal groups and work with civil society to identify trusted accounts, including anonymous ones. Mexico’s government should also invest in protecting journalists.

Brussels: Crisis Group, 2024

Online African organised crime from surface to darkweb

By INTERPOL

With the increase in Internet coverage, online trade of illicit goods is likely increasing on the African continent. In recent years, cyber-enabled crimes have increased on the African continent. This has been a result of a combination of factors, including, the improvement of Internet coverage, the wide availability of cyber-tools and the growing flexibility of cybercriminals. As a consequence, online crime nowadays represents a bigger security issue for law enforcement in African member countries than ever before. In this framework, INTERPOL, under the European Union funded ENACT Project, examines through this assessment the issue of cyber and cyber-enabled crimes in Africa in order to help drive a more strategic law enforcement response.

Lyon, France: INTERPOL, 2020. 79p.

Internet Organised Crime Threat Assessment (IOCTA) 2023

By EUROPOL

Cybercrime, in its various forms, represents an increasing threat to the EU. Cyber-attacks, online child sexual exploitation, and online frauds are highly complex crimes and manifest in diverse typologies. Meanwhile the perpetrators behind these crimes are becoming increasingly agile, exploiting new situations created by geopolitical and technological changes. The Internet Organised Crime Assessment (IOCTA) is Europol’s assessment of the cybercrime landscape and how it has changed over the last 24 months. Accompanying this report will be a series of spotlight reports released later this year, each of which examines a specific crime area relating to cybercrime.

Luxembourg: Publications Office of the European Union, 2023 14p.

Internet Crime Report 2021

By the Federal Bureau of Investigation (FBI)

In 2021, America experienced an unprecedented increase in cyber attacks and malicious cyber activity. These cyber attacks compromised businesses in an extensive array of business sectors as well as the American public. As the cyber threat evolves and becomes increasingly intertwined with traditional foreign intelligence threats and emerging technologies, the FBI continues to leverage our unique authorities and partnerships to impose risks and consequences on our nation’s cyber adversaries. The FBI’s Internet Crime Complaint Center (IC3) provides the American public with a direct outlet to report cyber crimes to the FBI. We analyze and investigate the reporting to track the trends and threats from cyber criminals and then share this data with our intelligence and law enforcement partners. The FBI, alongside our partners, recognizes how crucial information sharing of cyber activities is to prepare our partners to combat the cyber threat, through a whole-of-government approach. Critical to that approach is public reporting to IC3 - enabling us to fill in the missing pieces with this valuable information during the investigatory process. Not only does this reporting help to prevent additional crimes, it allows us to develop key insights on the ever-evolving trends and threats we face from malign cyber actors. In 2021, IC3 continued to receive a record number of complaints from the American public: 847,376 reported complaints, which was a 7% increase from 2020, with potential losses exceeding $6.9 billion. Among the 2021 complaints received, ransomware, business e-mail compromise (BEC) schemes, and the criminal use of cryptocurrency are among the top incidents reported. In 2021, BEC schemes resulted in 19,954 complaints with an adjusted loss of nearly $2.4 billion.

Washington, DC: FBI, 2022. 33p.

Ranking Trust Factors Affecting Risk Perception in Illicit Drug Purchase on the Darknet: A Large-Scale Survey Study in Hungary

By Tibor Kiss & Ákos Szigeti

The process of illicit drug trafficking on darknet markets is highly affected by various trust factors. Although the factors potentially affecting customers’ risk perception can be identified based on previous research, cyber criminology has not produced empirical research ranking the importance of the specific factors. This study was designed to fill this gap by developing a tool that measures the importance of the various trust factors. To test out the measurement tool, a large-scale survey with projective situational questions was conducted among university students in Hungary. The sample (n = 5481) was compiled to include potential darknet market customers, respondents with above-average computer skills needed to access the darknet, and taking into account that university students are a group of society particularly exposed to drug consumption. The end product of this research is a trust matrix ranking the factors affecting illicit drug purchases on darknet markets. Among the factors, the survey’s target group ranked reliable and undamaged delivery of goods and the reliability of vendors as the most important. The measurement tool developed in this research will facilitate further criminological research on vendor reputation. Its findings also point to the need for further research on delivery providers and predict that influencing the delivery-related risk perception of potential customers could effectively reduce demand.

May 2023 European Journal on Criminal Policy and Research

Constructing Crime: Risks, Vulnerabilities and Opportunities in Africa's Communications Infrastructure

By Edward Wanyonyi and Lucia Bird

As the development of communications infrastructure accelerates, good governance and security are often sacrificed in the interest of a speedy rollout.

While Africa’s growing communications infrastructure and increasing internet penetration offer significant developmental benefits, they offer parallel opportunities to organised crime, which exploit the continent’s enhanced connectivity. These opportunities are set to grow with nascent research already indicating that the continent is an increasingly important source of both cyber-dependent and cyber-enabled crime. It is a crucial and already tardy moment to take stock of how these vulnerabilities manifest, and how they can best be addressed. If they remain ignored and unmitigated, organised crime will increasingly undermine progress and development, compromising the achievement of the very goals that enhanced infrastructure seeks to achieve.

ENACT-Africa, 2021. 20p.