Abstract
Cybercrime is the newest securitythreat in the world today, and is distinct from anyother threat facing the world. This paper attempts toplace cybercrime in relation to other securitythreats, as well as illustrate the uniquecharacteristics of cybercrime. First, aninvestigation of the major elements of cybercrime willbe conducted. After the parameters of cybercrime havebeen laid out, cybercrime will be analyzed as asecurity threat on both domestic and internationallevels. Finally, current security structures will beexamined for their effectiveness in controlling thethreat posed by cybercrime.
Article PDF
Similar content being viewed by others
References
Becker, Elizabeth, “Pentagon Sets Up New Center forWaging Cyberwarfare,” New York Times 1 Oct 1999.
Brewin, Bob, “Government Wooing Best and Brightest for Cyberdefense Mission,” Federal Computer Week 17 Jan 1999.
Buzan, Barry, Wæver, Ole, and de Wilde, Jaap, Security: A New Framework for Analysis (Boulder, CO: Lynne Rienner Publishers, 1998).
Carter, David L., Computer Crime Categories: How Techno-criminals Operate. Accessed 4 Nov. 1999. http://nsi.org/Library/Compsec/crimecom.html.
stats.html, (4) www.cert.org/tech_tips/incident_response.html.
Cilluffo, Frank J., Berkowitz, Bruce D., Lanz, Stephanie, Cybercrime... Cyberterrorism... Cyberwarfare...: Averting an Electronic Waterloo (Washington, D.C.: The CSIS Press, 1998).
Computer Fraud and Abuse Act 1986 (US) 18 USC 1030. Accessed 7 Dec. 1999. http://www.austlii.edu.au/au/other/crime/123.html.
Computer Misuse Act 1990 (UK) Accessed 7 Dec. 1999. http://www.austlli.edu.au/au/other/crime/125.html.
de Bony, Elizabeth, EC Takes Countries to Court on Data Privacy 17 Jan 1999. Accessed 18 Jan. 1999. http://www.idg.net.
Denning, Dorothy E., Information Warfare and Security (New York: ACM Press; Reading, MA: Addison-Wesley, 1999).
Ehud Tenebaum (AKA “analyzer”) Arrested in Israel Associated Press 18 Mar 1998.
European Union, Committee of Ministers to the Member States. “Recommendation No. R (95) 13” 11 Sept 1995. http://www.usdoj.gov/criminal/cybercrime/cryoe.htm.
Federal Bureau of Investigation Nation Computer Crime Squad. Home Page. Accessed 4 Nov. 1999. http://www.fbi.gov.
Fijnaut, Cyrille, Marx, Gary T. Undercover: Police Surveillance in Comparative Perspective (The Hague: Kluwer Law International, 1995).
Friman, Richard H., Andreas, Peter, The Illicit Global Economy and State Power (Lanham: Rowman & Littlefield Publishers Inc., 1999).
Fonseca, Brian. “$12.1 billion reportedly spent to ward off computer viruses in 1999,” InfoWorld 18 Jan 1999.
G8 Birmingham Summit 1998. Homepage. Accessed 4 Nov 1999. http://www.g8summit.gov.uk/
G8 Denver Summit 1997 document, Communiqué Annex: Action Plan to Combat High-Tech Crime Accessed 4 Nov 1999. http://www.usdoj.gov/criminal/cybercrime/action.htm.
G8 Denver Summit 1997 document, Communiqué Annex: Principles to Combat High-Tech Crime Accessed 4 Nov 1999. http://www.usdoj.gov/criminal/cybercrime/principles.htm.
“India to Police Internet Abuse, Cyber Crimes,” Reuters 25 Feb 1999.
Joubert, Chantal, Bevers, Hans, Schengen Investigated (The Hague: Kluwer Law International, 1996).
Lipschitz, Ronnie D., On Security (New York: Colombia University Press, 1995).
Markoff, John “New Center Will Combat Computer Security Threats,” New York Times 1 Oct 1999.
Meeting of the Justice and Interior Ministers of the Eight December 9-10, 1997, Communiqué Accessed 4 Nov 1999. http://www.usdoj.gov/criminal/cybercrime/communique.htm.
“Modem on the Desk Earns a Pink Slip at Sun,” Network Week 18 Mar 1998.
Nadelmann, Ethan A, Cops Across Borders: the Internationalization or US Criminal Law Enforcement (University Park, PA: Pennsylvania State University Press, 1993).
Nadelmann, Ethan A, “Global Prohibition Regimes: the Evolution of Norms in International Security,” International Organization Autumn 1990, 479-526.
Platt, Charles, Anarchy Online: Net Crime/Net Sex (New York: HaperPaperbacks, 1996).
RSA convention, Homepage. Accessed 4 Nov 1999. http://www.rsa.com/conf99/overview.html.
Schwartau, Winn, “Striking Back Corporate Vigilantes go on the Offensive to Hunt Down Hackers,” Network World 11 Jan 1999.
Tillett, L. Scott, “IT Key to FBI's Future,” Federal Computer Week 24 Mar 1999. http://www.idg.net accessed 19 Jan 2000.
“UK Reportedly to Launch National Cybercrime Squad,” Reuters 17 Jan 1999.
Woody, Todd, “The SEC's Internet Ranger John Reed Stark, Internet Enforcement Chief, Surfs the Web for Scams,” www.thestandard.com 16 Nov. 1998. Accessed 18 Jan. 1999.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Speer, D.L. Redefining borders: The challenges of cybercrime. Crime, Law and Social Change 34, 259–273 (2000). https://doi.org/10.1023/A:1008332132218
Issue Date:
DOI: https://doi.org/10.1023/A:1008332132218