Note
"Prepared for Research and National Coordination, Organized Crime Division, Law Enforcement and Policy Branch, Public Safety Canada."
"August 2011"
"Report no. 020, 2011"
Authors affililated with: Simon Fraser University.
Issued also in French under title: Évaluation de l'ampleur de la cyberfraude : document de travail sur les méthodes potentielles et les sources de données.
Available also in electronic format.
Résumé
How can information be collected, evaluated, and reported on cyber-fraud offences in a more efficient manner? Clearly, the first step is to identify and define exactly what is being measured. The law typically takes a technology neutral stance to offences (i.e. fraud is fraud whatever the method). Defining criminal phenomena is important because it enables all stakeholders, including police, prosecutors, and judges to have a common understanding. A universal definition also facilitates the aggregation of statistics, which can be used to create an accurate picture of current cyber-fraud related threats and developments. First, a general overview and definition of cybercrime are provided, followed by a discussion of cyber-fraud in all of its many manifestations.
Contenu
1. Introduction -- 1.1. The definition and classification of cybercrime -- 1.2. Defining ‘the victims’ of cyber-fraud -- 1.3. The most common types of cyber-fraud -- Phishing scams -- Online auction fraud -- Phony website fraud -- Online dating fraud -- Nigerian/419 fraud -- Securities and investment fraud -- Identity-related fraud -- Credit card fraud -- Insider fraud -- 2. The prevalence and cost of cyber-fraud -- 3. Cyber-fraud, organized crime and the online underground economy -- 4. Cyber-fraud legislation in Canada and elsewhere -- 4.1. The Canadian legal framework -- 4.2. The legal framework in the United States -- 4.3. British and Australian legal frameworks -- 5. Jurisdictional issues related to the investigation and prosecution of cyber-fraud -- 6. Additional issues for law enforcement and prosecutors -- 7. Estimations of the hidden population of cyber-fraud offenders -- 8. Establishing the characteristics of cyber-fraud offenders, investigation and networks -- 9. Methodology -- 9.1. Sample -- 9.2. Results -- 9.2.1. Methods and means of commission -- 9.2.2. Harm caused to the victim -- 9.2.3. Offender characteristics -- 9.2.4. Network structure and function -- 9.2.5. Enforcement activities -- 9.2.6. Problems with data and reporting -- 9.2.7. Suggestions for data sources and solutions to current issues – 10. Conclusion and recommendations.