it can be difficult to trace a perpetrator after the crime is committed
Cybercrime

References

Due to easily exploitable laws, cybercriminals use developing countries in order to evade detection and prosecution from law enforcement.
Due to easily exploitable laws, cybercriminals use developing countries in order to evade detection and prosecution from law enforcement.

Moore, R. (2005) « Cyber crime: Investigating High-Technology Computer Crime, » Cleveland, Mississippi: Anderson Publishing.
« cybercrime | Definition, Statistics, & Examples ». Encyclopedia Britannica. Retrieved 25 May 2021.
Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN 978-0-201-70719-9.
Bossler, Adam M.; Berenblum, Tamar (20 October 2019). « Introduction: new directions in cybercrime research ». Journal of Crime and Justice. 42 (5): 495–499. doi:10.1080/0735648X.2019.1692426. ISSN 0735-648X.
« BUFFETT: This is ‘the number one problem with mankind' ». Business Insider. Retrieved 17 May 2021.
« Warren Buffett: ‘Cyber poses real risks to humanity' ». finance.yahoo.com. Retrieved 17 May 2021.
« Cyber crime costs global economy $445 billion a year: report ». Reuters. 9 June 2014. Retrieved 17 June 2014.
« Cybercrime To Cost The World $10.5 Trillion Annually By 2025 ». Cybercrime Magazine. 4 March 2018. Retrieved 17 May 2021.
« #Cybercrime— what are the costs to victims – North Denver News ». North Denver News. 17 January 2015. Retrieved 16 May 2015.
Lewis, James (February 2018). « Economic Impact of Cybercrime – No Slowing Down » (PDF).
« The Global Risk Report 2020 » (PDF). World Economic Forum. 15th Edition: 102. 15 January 2020.
Netherlands, Statistics. « Less traditional crime, more cybercrime ». Statistics Netherlands. Retrieved 17 May 2021.
Gordon, Sarah (25 July 2006). « On the definition and classification of cybercrime ». Journal in Computer Virology. 2: 13–20. doi:10.1007/s11416-006-0015-z. S2CID 3334277.
« Computer and Internet Fraud ». LII / Legal Information Institute. Retrieved 1 November 2020.
Laqueur, Walter; C., Smith; Spector, Michael (2002). Cyberterrorism. Facts on File. pp. 52–53. ISBN 9781438110196.
« Cybercriminals Need Shopping Money in 2017, too! – SentinelOne ». sentinelone.com. 28 December 2016. Retrieved 24 March 2017.
Lepofsky, Ron. « Cyberextortion by Denial-of-Service Attack » (PDF). Archived from the original (PDF) on 6 July 2011.
Mohanta, Abhijit (6 December 2014). « Latest Sony Pictures Breach : A Deadly Cyber Extortion ». Archived from the original on 25 September 2015. Retrieved 20 September 2015.
« Kaspersky Security Bulletin 2016. The ransomware revolution ». securelist.com. Retrieved 17 May 2021.
« Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021 ». Cybercrime Magazine. 19 October 2018. Retrieved 17 May 2021.
Carback, Joshua T. (2018). « Cybersex Trafficking: Toward a More Effective Prosecutorial Response ». Criminal Law Bulletin. 54 (1): 64–183. p. 64.
« IJM Seeks to End Cybersex Trafficking of Children and #RestartFreedom this Cyber Monday and Giving Tuesday ». PR Newswire. 28 November 2016.
« Cybersex Trafficking ». IJM. 2020.
« Cyber-sex trafficking: A 21st century scourge ». CNN. 18 July 2013.
« Senator warns of possible surge in child cybersex traffic ». The Philippine Star. 13 April 2020.
« Duterte’s drug war and child cybersex trafficking ». The ASEAN Post. 18 October 2019.
« Norwegian national, partner nabbed; 4 rescued from cybersex den ». Manila Bulletin. 1 May 2020.
« Cheap tech and widespread internet access fuel rise in cybersex trafficking ». NBC News. 30 June 2018.
« Senate to probe rise in child cybersex trafficking ». The Philippine Star. 11 November 2019.
« Global taskforce tackles cybersex child trafficking in the Philippines ». Reuters. 15 April 2019.
« Webcam slavery: tech turns Filipino families into cybersex child traffickers ». Reuters. 17 June 2018.
« How the internet fuels sexual exploitation and forced labour in Asia ». South China Morning Post. 2 May 2019.
« 1st Session, 42nd Parliament, Volume 150, Issue 194 ». Senate of Canada. 18 April 2018.
« Cybersex trafficking spreads across Southeast Asia, fuelled by internet boom. And the law lags behind ». South China Morning Post. 11 September 2019.
« What is ‘Nth Room’ case and why it matters ». Korea Herald. 24 April 2020.
Dennis Murphy (February 2010). « War is War? The utility of cyberspace operations in the contemporary operational environment » (PDF). Center for Strategic Leadership. Archived from the original (PDF) on 20 March 2012.
« Cybercrime definition ». http://www.crime-research.org. Retrieved 3 August 2019.
« Save browsing ». google.
* Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9
« Federal CyberStalking Bill Info ». http://www.haltabuse.org. Retrieved 4 December 2019.
« China has more internet users than any other country, according to Mary Meeker’s Internet Trends Report ». World Economic Forum. Retrieved 4 December 2019.
Solutions, Madison Web. « Chinese Authorities Address Online Bullying – Cybersmile ». Retrieved 2 November 2019.
Solutions, Madison Web. « Legal Perspective – Cybersmile ». Retrieved 2 November 2019.
Participation, Expert. « Malicious Communications Act 1988 ». http://www.legislation.gov.uk. Retrieved 2 November 2019.
AG. « Criminal Code Act 1995 ». http://www.legislation.gov.au. Retrieved 2 November 2019.
« U.S. internet users who have experienced online harassment 2020 ». Statista. Retrieved 5 April 2021.
« All the Latest Cyber Bullying Statistics and What They Mean In 2021 ». BroadbandSearch.net. Retrieved 5 April 2021.
« We talked to the opportunist imitator behind Silk Road 3.0 ». 7 November 2014. Retrieved 4 October 2016.
Arora, Beenu. « Council Post: Five Key Reasons Dark Web Markets Are Booming ». Forbes. Retrieved 23 June 2020.
« Guide: What is Bitcoin and how does Bitcoin work? – CBBC Newsround ». Retrieved 23 June 2020.
Christian, Jon (4 February 2015). « The ‘Exit Scam’ Is the Darknet’s Perfect Crime ». Vice. Retrieved 23 June 2020.
« The ‘Exit Scam’ Is the Darknet’s Perfect Crime ». http://www.vice.com. Retrieved 14 July 2020.
Brandom, Russell (17 February 2019). « The golden age of dark web drug markets is over ». The Verge. Retrieved 23 June 2020.
« 7 Ways the Cops Will Bust You on the Dark Web ». http://www.vice.com. Retrieved 14 July 2020.
CDC (24 March 2020). « America’s Drug Overdose Epidemic: Data to Action ». Centers for Disease Control and Prevention. Retrieved 14 July 2020.
« The Consequences of Mailing Drugs and Other Banned Substances ». http://www.cottenfirm.com. Retrieved 23 June 2020.
« Darknet drug vendor sentenced to 10 years prison ». http://www.dea.gov. Retrieved 23 June 2020.
« Feds Crack Down on Darknet Vendors of Illicit Goods ». http://www.bankinfosecurity.com. Retrieved 14 July 2020.
Weitzer, Ronald (2003). Current Controversies in Criminology. Upper Saddle River, New Jersey: Pearson Education Press. p. 150.
David Mann And Mike Sutton (6 November 2011). « >>Netcrime ». British Journal of Criminology. 38 (2): 201–229. CiteSeerX 10.1.1.133.3861. doi:10.1093/oxfordjournals.bjc.a014232.
Aaron Gershwin (26 June 2019). « Flame: The Most Sophisticated Cyber Espionage Tool Ever Made ». hackernoon.com. Retrieved 1 July 2019.
« A walk on the dark side ». The Economist. 30 September 2007. Archived from the original on 10 November 2007. Retrieved 11 May 2011.
« Spanish police crack massive ‘zombie computer’ network ». France 24. 3 March 2010.
« DHS: Secretary Napolitano and Attorney General Holder Announce Largest U.S. Prosecution of International Criminal Network Organized to Sexually Exploit Children ». Dhs.gov. 3 August 2011. Retrieved 10 November 2011.
DAVID K. LI (17 January 2012). « Zappos cyber attack ». New York Post.
Salvador Rodriguez (6 June 2012). « Like LinkedIn, eHarmony is hacked; 1.5 million passwords stolen ». Los Angeles Times.
Rick Rothacker (12 October 2012). « Cyber attacks against Wells Fargo « significant, » handled well: CFO ». Reuters.
« AP Twitter Hack Falsely Claims Explosions at White House ». Samantha Murphy. 23 April 2013. Retrieved 23 April 2013.
« Fake Tweet Erasing $136 Billion Shows Markets Need Humans ». Bloomberg. 23 April 2013. Retrieved 23 April 2013.
« Unprecedented cyber attacks wreak global havoc ». Straits Times. 13 May 2017.
https://www.washingtontimes.com, The Washington Times. « Israeli spyware found on phones in 45 countries, U.S. included ». The Washington Times.

Source : https://en.wikipedia.org/wiki/Cybercrime