it can be difficult to trace a perpetrator after the crime is committed

References

Due to easily exploitable laws, cybercriminals use developing countries in order to evade detection and prosecution from law enforcement.

Moore, R. (2005) « Cyber crime: Investigating High-Technology Computer Crime, » Cleveland, Mississippi: Anderson Publishing.
« cybercrime | Definition, Statistics, & Examples ». Encyclopedia Britannica. Retrieved 25 May 2021.
Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN 978-0-201-70719-9.
Bossler, Adam M.; Berenblum, Tamar (20 October 2019). « Introduction: new directions in cybercrime research ». Journal of Crime and Justice. 42 (5): 495–499. doi:10.1080/0735648X.2019.1692426. ISSN 0735-648X.
« BUFFETT: This is ‘the number one problem with mankind' ». Business Insider. Retrieved 17 May 2021.
« Warren Buffett: ‘Cyber poses real risks to humanity' ». finance.yahoo.com. Retrieved 17 May 2021.
« Cyber crime costs global economy $445 billion a year: report ». Reuters. 9 June 2014. Retrieved 17 June 2014.
« Cybercrime To Cost The World $10.5 Trillion Annually By 2025 ». Cybercrime Magazine. 4 March 2018. Retrieved 17 May 2021.
« #Cybercrime— what are the costs to victims – North Denver News ». North Denver News. 17 January 2015. Retrieved 16 May 2015.
Lewis, James (February 2018). « Economic Impact of Cybercrime – No Slowing Down » (PDF).
« The Global Risk Report 2020 » (PDF). World Economic Forum. 15th Edition: 102. 15 January 2020.
Netherlands, Statistics. « Less traditional crime, more cybercrime ». Statistics Netherlands. Retrieved 17 May 2021.
Gordon, Sarah (25 July 2006). « On the definition and classification of cybercrime ». Journal in Computer Virology. 2: 13–20. doi:10.1007/s11416-006-0015-z. S2CID 3334277.
« Computer and Internet Fraud ». LII / Legal Information Institute. Retrieved 1 November 2020.
Laqueur, Walter; C., Smith; Spector, Michael (2002). Cyberterrorism. Facts on File. pp. 52–53. ISBN 9781438110196.
« Cybercriminals Need Shopping Money in 2017, too! – SentinelOne ». sentinelone.com. 28 December 2016. Retrieved 24 March 2017.
Lepofsky, Ron. « Cyberextortion by Denial-of-Service Attack » (PDF). Archived from the original (PDF) on 6 July 2011.
Mohanta, Abhijit (6 December 2014). « Latest Sony Pictures Breach : A Deadly Cyber Extortion ». Archived from the original on 25 September 2015. Retrieved 20 September 2015.
« Kaspersky Security Bulletin 2016. The ransomware revolution ». securelist.com. Retrieved 17 May 2021.
« Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021 ». Cybercrime Magazine. 19 October 2018. Retrieved 17 May 2021.
Carback, Joshua T. (2018). « Cybersex Trafficking: Toward a More Effective Prosecutorial Response ». Criminal Law Bulletin. 54 (1): 64–183. p. 64.
« IJM Seeks to End Cybersex Trafficking of Children and #RestartFreedom this Cyber Monday and Giving Tuesday ». PR Newswire. 28 November 2016.
« Cybersex Trafficking ». IJM. 2020.
« Cyber-sex trafficking: A 21st century scourge ». CNN. 18 July 2013.
« Senator warns of possible surge in child cybersex traffic ». The Philippine Star. 13 April 2020.
« Duterte’s drug war and child cybersex trafficking ». The ASEAN Post. 18 October 2019.
« Norwegian national, partner nabbed; 4 rescued from cybersex den ». Manila Bulletin. 1 May 2020.
« Cheap tech and widespread internet access fuel rise in cybersex trafficking ». NBC News. 30 June 2018.
« Senate to probe rise in child cybersex trafficking ». The Philippine Star. 11 November 2019.
« Global taskforce tackles cybersex child trafficking in the Philippines ». Reuters. 15 April 2019.
« Webcam slavery: tech turns Filipino families into cybersex child traffickers ». Reuters. 17 June 2018.
« How the internet fuels sexual exploitation and forced labour in Asia ». South China Morning Post. 2 May 2019.
« 1st Session, 42nd Parliament, Volume 150, Issue 194 ». Senate of Canada. 18 April 2018.
« Cybersex trafficking spreads across Southeast Asia, fuelled by internet boom. And the law lags behind ». South China Morning Post. 11 September 2019.
« What is ‘Nth Room’ case and why it matters ». Korea Herald. 24 April 2020.
Dennis Murphy (February 2010). « War is War? The utility of cyberspace operations in the contemporary operational environment » (PDF). Center for Strategic Leadership. Archived from the original (PDF) on 20 March 2012.
« Cybercrime definition ». http://www.crime-research.org. Retrieved 3 August 2019.
« Save browsing ». google.
* Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9
« Federal CyberStalking Bill Info ». http://www.haltabuse.org. Retrieved 4 December 2019.
« China has more internet users than any other country, according to Mary Meeker’s Internet Trends Report ». World Economic Forum. Retrieved 4 December 2019.
Solutions, Madison Web. « Chinese Authorities Address Online Bullying – Cybersmile ». Retrieved 2 November 2019.
Solutions, Madison Web. « Legal Perspective – Cybersmile ». Retrieved 2 November 2019.
Participation, Expert. « Malicious Communications Act 1988 ». http://www.legislation.gov.uk. Retrieved 2 November 2019.
AG. « Criminal Code Act 1995 ». http://www.legislation.gov.au. Retrieved 2 November 2019.
« U.S. internet users who have experienced online harassment 2020 ». Statista. Retrieved 5 April 2021.
« All the Latest Cyber Bullying Statistics and What They Mean In 2021 ». BroadbandSearch.net. Retrieved 5 April 2021.
« We talked to the opportunist imitator behind Silk Road 3.0 ». 7 November 2014. Retrieved 4 October 2016.
Arora, Beenu. « Council Post: Five Key Reasons Dark Web Markets Are Booming ». Forbes. Retrieved 23 June 2020.
« Guide: What is Bitcoin and how does Bitcoin work? – CBBC Newsround ». Retrieved 23 June 2020.
Christian, Jon (4 February 2015). « The ‘Exit Scam’ Is the Darknet’s Perfect Crime ». Vice. Retrieved 23 June 2020.
« The ‘Exit Scam’ Is the Darknet’s Perfect Crime ». http://www.vice.com. Retrieved 14 July 2020.
Brandom, Russell (17 February 2019). « The golden age of dark web drug markets is over ». The Verge. Retrieved 23 June 2020.
« 7 Ways the Cops Will Bust You on the Dark Web ». http://www.vice.com. Retrieved 14 July 2020.
CDC (24 March 2020). « America’s Drug Overdose Epidemic: Data to Action ». Centers for Disease Control and Prevention. Retrieved 14 July 2020.
« The Consequences of Mailing Drugs and Other Banned Substances ». http://www.cottenfirm.com. Retrieved 23 June 2020.
« Darknet drug vendor sentenced to 10 years prison ». http://www.dea.gov. Retrieved 23 June 2020.
« Feds Crack Down on Darknet Vendors of Illicit Goods ». http://www.bankinfosecurity.com. Retrieved 14 July 2020.
Weitzer, Ronald (2003). Current Controversies in Criminology. Upper Saddle River, New Jersey: Pearson Education Press. p. 150.
David Mann And Mike Sutton (6 November 2011). « >>Netcrime ». British Journal of Criminology. 38 (2): 201–229. CiteSeerX 10.1.1.133.3861. doi:10.1093/oxfordjournals.bjc.a014232.
Aaron Gershwin (26 June 2019). « Flame: The Most Sophisticated Cyber Espionage Tool Ever Made ». hackernoon.com. Retrieved 1 July 2019.
« A walk on the dark side ». The Economist. 30 September 2007. Archived from the original on 10 November 2007. Retrieved 11 May 2011.
« Spanish police crack massive ‘zombie computer’ network ». France 24. 3 March 2010.
« DHS: Secretary Napolitano and Attorney General Holder Announce Largest U.S. Prosecution of International Criminal Network Organized to Sexually Exploit Children ». Dhs.gov. 3 August 2011. Retrieved 10 November 2011.
DAVID K. LI (17 January 2012). « Zappos cyber attack ». New York Post.
Salvador Rodriguez (6 June 2012). « Like LinkedIn, eHarmony is hacked; 1.5 million passwords stolen ». Los Angeles Times.
Rick Rothacker (12 October 2012). « Cyber attacks against Wells Fargo « significant, » handled well: CFO ». Reuters.
« AP Twitter Hack Falsely Claims Explosions at White House ». Samantha Murphy. 23 April 2013. Retrieved 23 April 2013.
« Fake Tweet Erasing $136 Billion Shows Markets Need Humans ». Bloomberg. 23 April 2013. Retrieved 23 April 2013.
« Unprecedented cyber attacks wreak global havoc ». Straits Times. 13 May 2017.
https://www.washingtontimes.com, The Washington Times. « Israeli spyware found on phones in 45 countries, U.S. included ». The Washington Times.

Source : https://en.wikipedia.org/wiki/Cybercrime

Publié par

Alain STEVENS - Pacta

IT consultant - Cybercrime - Cybersecurity - Hacking - Webmaster Afficher tous les articles par Alain STEVENS - Pacta