MotivationsForCybercrime S
MotivationsForCybercrime S
net/publication/280204406
CITATIONS READS
0 431
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Troy E Smith on 21 July 2015.
16/08/2013
A CONCEPTUAL REVIEW AND EXPLORATORY EVALUATION OF THE
INTRODUCTION
Technology and the Internet play pivotal roles in all aspects of society -
business, finance, politics and communication. The migration of society to the digital
age has seemingly come with the movement of conventional attacks to the cyber-
world1. Terrorists, criminals, cartels, activists and cultural extremists all employ
would be attackers; one such is the asymmetric nature of attacks. The Internet can be
the cyberworld poses unique challenges for law enforcement, namely; anonymity that
is intrinsic to the cyberworld, flexible identities and the ineffectiveness of local and
globally with access only limited by the reach of the Internet itself4. Therefore,
conventional crime would be very small. These advantages are important to note, as
they will form the foundation for research into the motivations for choosing
according to the parameters of this research relates to the drivers that propel the
person to commit a cybercrime rather than the rationale in choosing to use
anonymity associated with the Internet, which can act as an enabler to persons
encouraging them to commit acts of crime or aggressions in the virtual world that
networks etc) as well as use of the Internet to commit crimes. In July 2012, Keith
Alexander head of the National Security Agency and U.S. cyber-command said cyber-
attacks increased by forty-four (44%) percent in 2011 and now account for the
"greatest transfer of wealth in history." The 2012 Cost of Cybercrime Study discovered
that cybercrime was costing some companies over 8.9 million U.S. dollars per year5,
time and the need for system repairs. In addition to direct financial damage,
businesses must also consider indirect cost due to loss in sales, loss of confidence by
current and potential customers, staff time and other resources that must be used to
fix the damage left by attacks and to implement new security measures. Given the
increase in cyber-attacks and the large financial loss associated with it, cybercrime is
this is the technologies used and how they interact with networks and computing
eliminating the immediate threat, but identifying the attackers’ motives” 6.Combating
cybercrime calls for a focus on the very foundation of conflict and crime, which is
therefore, there must be suitable motivation for a person to engage in this type of
understand cybercrimes and categorize them. The analysis of motivations for cyber-
integral in profiling the attacker [goal, method, victim and capability]. The distinction
understanding the motivation or criminal intent, cyber criminals and other malicious
actors may appear to be similar, causing confusion when legislators or the judiciary
seek to categorize an activity as a cybercrime. All these factors support the importance
of criminal profiling in crime prevention and suppression. Related, specific acts can
be organized into groups making it easier to collect relevant statistics and allow law
system. In any criminal cast the court must demonstrate means, motive and
phase of criminal investigation; when creating a profile to identify the suspect and
when the case is being presented to the court. Understanding motives is also
and their vulnerabilities. Planners and policymakers can use this information to
develop strategies to educate specific groups and to create awareness among would-
be victims.
nature of cybercrime, the fact that cybercrime represents a new and distinct crime
perpetrated within the unique medium of cyberspace, creates challenges to the direct
use of general crime theories on both psychological and spatial levels. Within
compared to the physical world as they feel empowered by the anonymity the
This paper will identify cybercrimes into four (4) broad categories of
motivation. These build upon the Federal Bureau of Investigation’s three primary
categories of cyber threat actors; organized crime groups, state sponsors and
financial gain, while the “state sponsors” category deals with the use of cyber attacks
Service states that the third category of actors is motivated by ideologies7. This
provides three categories for the motivation for cybercrime, namely; economics,
politics and ideology. However, another motivation must be added, which is not
accounted for in the FBI analysis to account for hackers, stalkers and online child
criminal acts. Once the categories are established the relationship of motivation to the
wider profile will be demonstrated in a tabular format. This will serve to demonstrate
a result of its role in social dissidence and warfare. However, there has not been a
Categorization tends to focus on the digital side rather than on the human aspect for
As the use of cyber-attacks has become more prevalent there has been a paradigm
attacker rather than the methodology. Recently, cyber-security experts and scholars
Also the current inadequate profiling of cyber-attackers may be one key hindrance in
one of the few motivation-based models for cybercrime classification. She writes that
with cybercrime like conventional crime there is a need to understand three factors:
itself, and that crime whether cyber or conventional share the same motivations.
Roy expressed similar views to Ngafeeson in regards to the relationship
between cyber and conventional crime as both crimes result in some loss to one of the
parties; the only real difference is the medium (Roy 2008). Liu who suggested that
the motivation for specific areas of cyber-attacks such as cyber-crime remained the
of criminals and crime groups to the benefits of crime in the cyber-sphere vs.
conventional crime.
Cross identifies the following as the main reasons for committing cybercrime:
restricted or copyrighted material (Cross 2008). This generally overlaps with other
Shinder believes that profiling is an essential tool for law enforcement, and in
knowledge, level of disregard for the law/ ability to rationalize an unlawful act,
tolerance to risk /need for thrill and motive (Shinder 2010). Motive being a key factor
in narrowing the profile and potentially making a case against an attacker. The
possible motives for cybercrime that were highlighted are money, emotion, sexual
cybercrime; motivation theories and profiling that can be mirrored to this research.
The Literature provides a basis to determine what is the consensus by academics and
professionals towards motivations as a factor in committing cybercrimes. This initial
classification will encourage additional research to determine which aspects are truly
applicable.
ANALYSIS
forget that cybercriminals are people. Therefore, one way of analyzing cybercrimes is
to interpret them as digital versions of conventional, real world offenses i.e. they can
People commit crime when contributing factors cause them to become motivated to
vulnerabilities are present according to the Routine Activity theory1 a crime will not
occur.
the factors that “push” individuals to commit cybercrime. These motives are as a
poverty, wage inequality, social status, oppression, sexual depravity etc9. There is an
innate desire to overcome these determinants in order to fulfill or satisfy “needs” such
1Rational choice theory is based on the fundamental tenets of classical criminology, which hold that
people freely choose their behavior and are motivated by the avoidance of negative stimuli and the
pursuit of positive stimuli.
motivates individuals to commit crime and can be used in many cases as justification
for their actions. The identification of the main and sub-categories are the result of a
Due to the dynamic nature of the human psyche any action is generally
Table 1 shows some of the main variables, which affect the motivation behind
committing the crime. This table helps to demonstrate the important role that
motivation plays in crime and its relation to identifiable elements, which can be
other variables will be introduced as they relate to the four (4) categories.
Table 1. Main variables affected by the motivation of the person engaging in
cybercrime
Some cybercriminals are motivated by ideal(s) or belief(s) they hold dear. These
ideals or beliefs can come from religion or a societal construct. They tend to use a
supporting their ideology. In this paper ideology is subdivided into religion and
causes in order to analyze the two main groups motivated by ideology, which are
Religion
systems, networks and electronic information to create fear, chaos with the goal of
their interpretation of religion as justification for their actions and can escalate to
compel persons not normally associated with violent behavior to elevated levels of
deviant behaviour. These terrorists are well funded and have developed a wide range
of skills that can prove formidable to cyber-security systems. This is the result of
Terrorists much like other criminals have discovered the advantages of the
technology into critical infrastructure has made it a prime target for terrorists.
Terrorists utilize the Internet to acquire and learn about weapons, launch cyber-
attacks, spread propaganda and to recruit new members. However, this is not the
only use of cyber-attacks by terrorist. Cyber-attacks are also used to gain finances that
can be used to purchase weapons and fund general terrorist activity. Terrorist will
normally claim responsibility for their cyber-attacks, as anonymity in this case, would
defeat the goal of creating fear and forcing coerce of governments. The attacks must
cause, as much disruption as possible, and the victim must know that they areat the
mercy of terrorists.
Terrorist groups such as Hezbollah are ranked high internationally for their
ability to carry out cyber attacks12. This shift to cyber-attacks by militant groups such
as Hezbollah is due to ease of use, increased range and availability of targets, the
asymmetric nature of cyber-attacks and anonymity when they use it for raising funds
for terrorist activities. The asymmetric nature of the Internet and its range are
especially enticing as terrorist can now affect a large number of systems/ create major
disruption with limited human resources from relatively anywhere in the world.
and Israeli websites as allowed by Islamic law and an acceptable form of jihad14.
According to the chief of the U.S. Cyber Command Al-Qaeda is also seeking the
While cyber-attacks by terrorist are of great concern they are not currently the
major threat, as their ability to cause significant damage has not yet been realized.
The greatest threat is the use of the Internet for recruitment through the spread of
strategy16. In the United States this is covered under 18 USC § 2339B, which makes
for his involvement in activities that posed a potential terrorist threat. Zamri was self-
radicalized by radical propaganda on the Internet. Terrorists have found the Internet
to be very useful in recruiting people who were generally neutral about terrorist
causes. They use the Internet to portray themselves as victims that use violence as a
last resort against aggressive oppressors. Such was the case with Zamri, who became
so radicalized that he left his home in Singapore and attempted to join a ‘mujahidin
network’, which he hoped would allow him to receive training so that he could wage
Cause
interests that can extend pass their nation’s borders. They tend to take direct and
aggressive actions against computers and computer networks to achieve a social goal.
They use their skills, and the power of the Internet to battle causes such as hegemony,
being done they will attack individuals, companies and even nation states19. The term
hacktivist when coined in 1998 was meant to symbolize the use of technology to
advance human rights and freedom of information. Two of the most famous
hacktivist groups Anonymous and Lulzsec claim their actions support Article 19 of the
United Nations Universal Declaration of Human Rights20. This broad goal to advance
political or social agendas that do not necessarily relate to their country of
residence/citizenship is the key difference between hacktivist and the closely related
Hacktivists tend to use web defacement and Denial of Service Attacks as their major
weapons of choice. Denial of Service attacks can be considered virtual sit-ins, which
serve to disrupt industry and civil practices or temporarily dismantle production and
access points e.g. ATM and point-of-sale machines, they have the potential to
systemically disrupt marketing and sale of commodities. They also put their talents to
work by organizing piracy, DNS hijacking and replacing homepages with ideological
messages22. They tend to make their attacks as public as possible and usually take
credit for their actions. Their attacks are normally grand and short-lived as they aim
to draw attention to their cause and not necessarily inflict long-term damage. They
demonstrate their power as ‘watch dogs’ against injustice, willing to punish those they
The major concern for law enforcement is the increasing use of information
program for unpaid traffic tickets in Alabama along with the personal information of
law enforcement officers from Arizona. The results of a study by Verizon stated that
58 percent of the data thefts in 2011 were committed by hacktivists23. This revelation
has made cyber security professionals and law enforcement begin to consider
hacktivists potential national security threats, since they appear to be an even greater
threat to data security than organized crime groups and nation states combined.
POLITICAL
Political motivation for cybercrime can be viewed at two levels, the level of the state
actor and at the level of the non-state actor. At the non-state actor level political
motivations are closely related to emotions, as people can become very passionate
about politics. Political motivation at this level is often associated with right wing
groups. At the state actor level politics and foreign policy motivates countries to use
sabotage and espionage to maintain political and/or military advantage. This category
Political Resistance
The Internet has altered the manner in which political discourse and advocacy
take place, particular as it relates to affecting foreign policy. The Internet has given
increased power to grass roots resistance through its asymmetric nature. Private
citizens can now act on their own initiative against an enemy of the state, which they
nationalist hackers, who believe they are fighting a war for their country or the rights
of a set group within the country. Unlike hacktivists who have a cosmopolitan agenda,
fighting for international right of freedom and other liberties, nationalist hackers
nationalistic terms such as Israeli, Palestinian and Iranian25. They can be compared to
classic right wing activist wanting to stifle opposition through a show of force. They
are only concerned with nationalism and patriotism and are willing to inflict
Denial of Service attacks, deface websites or leak data. These methods are used since
they are cheap, widely available and call for relatively little technical skill, while
serving to multiply the force of the attacker. The computers used in political cyber-
unusable, with the intent of inflicting damage or to silence opponents by making their
resources inaccessible26. The hacker groups used to launch these Distributed Denial
when needed.
Cyber-attacks used for political resistance are less frequent than other types of
attacks, as they are used to treat with a specific grievance. They are normally
identified based on internal information, such as the nature of the victim and the
attack commands seen. They are then validated by comparing them chronologically
with reports of diplomatic grievances and intended redress via online attacks.
Cyber-warfare/Espionage
Cyber-warfare is the use of politically motivated cyber attacks on adversary
their adversaries. They can either utilize home grown hackers or hackers for hire to
launch these attacks. Nation-state actors have an advantage over other types of cyber-
attackers due to their larger budgets and availability of resources. They can
dedicate time and personnel to cyber based efforts to produce highly skilled hackers
with the best cyber weapons. The scale of effort, choice of victims and the technical
sophistication of the cyber weapons are used to identify attacks sponsored by nation-
states.
other nations, sabotage systems and steal information with relatively no possibility of
access to sensitive information with so little physical effort and low probability of
attribution. In the cyber realm, offensive measures are facilitated by the priority given
world using an enemy’s integration and dependence on technology to spy and attack
Many of the same political objectives formally achieved through physical warfare and
As stated in the definition for cyber warfare, nation-state cyber attacks focus
on the two main goals; sabotage and espionage. Sabotage was the goal during the
alleged attacks by the Democratic Republic of Korea on the United States and South
cyber warfare. China and Russia have been identified as leaders in this form of cyber
the notable espionage efforts of China is “Titan Rain”. Titan Rain is the collective term
2002. The Chief of War-fighting Integrations indicated that China had downloaded 10
security officials as methods become more efficient and have increased in frequency.
FINANCIAL GAIN
This category includes anyone who uses cybercrime for financial gain. This can be a
assisted. Some of their criminal endeavors utilize cyber attacks while others use
Cybercrime for financial gain can be subdivided into two categories, namely;
Corporate Espionage
Throughout this section, corporate cyber espionage will be defined as the use
data held by private organizations. The non-state actors launching these attacks tend
invitations from known suppliers. These emails contained a Trojan that could be used
to steal sensitive information about plans and designs from the target companies.
government agencies. In 2012, the number of targeted attacks was approximately 101
per day an increase of 24 percent from 2011 and a 32 percent increase from 2010 31.
Numerous cyber- espionage campaigns against the petroleum industry, NGOs and the
chemical industry were discovered in 2011. One of these attacks was against a US
defense contractor, which resulted in the loss of 24,000 files. The files contained
sensitive information related to weapons system being developed for the Department
of Defense (DoD).
espionage i.e. a shift from attacking large organization to smaller companies. A 2013
Internet security threat report issued by Symantec indicated that businesses with
fewer than 250 employees are the fastest growing target of cyber-attacks. This change
to increase security. In order to acquire the same information with the limited
or being dismissed. Being treated unfairly or the perception of being treated unfairly
can lead to a desire for retribution, which they use as justification for criminal acts
against the organizations. Insiders can be more problematic than corporate entities;
although they do not have the resources and expertise as professional hackers they
insider attacks tend to increase during times of recessions when jobs are being lost,
persons are overworked and there is a general dissatisfaction among workers who
information and/or intellectual property to sell a rival company or may have been
for a Wall Street company was found guilty of theft of trade secrets. Aleynikov
insiders accounted for 21 percent of attacks against businesses in the United States.
Criminal Enterprise
Criminals have discovered that technology has created many opportunities for
illegally gaining wealth. Both individual criminals and organized crime groups utilize
the Internet and computers in their criminal activity. There are essentially three
ways criminals use the Internet in their criminal efforts. First, cyber-attacks are used
to penetrate computers and networks to steal personal data and extort businesses
Thirdly, the Internet is used to facilitate illegal enterprises and enterprises that
facilitate illegal activity. No matter the way the Internet is used the goal remains the
generally throw a broad net of online scams and phishing expeditions in the hope of
getting as many victims as possible. They use these scams and social engineering to
steal identities, get banking information and to siphon money out of bank accounts.
Identity theft complaints in the United States have moved from 1.4 million to 2
million an increase of 41 percent in the period 2010 to 2012. The Federal Trade
fraud (10%), and bank fraud (6%), employment-related fraud (5%) and fraud (2%)33.
Victims of identity theft either had their credit accounts used fraudulently or their
Organized crime groups in Eastern Europe and numerous other locations are
corporate data unless they are paid large sums of money. Their weapon of choice
websites, online scams and online gambling websites. Two known cases of Internet
crimes related to pornography are the Delhi BalBharati case and the Bombay case,
where two Swiss couple would force slum children to appear in obscene photographs.
Commission in 2012 said organized crime groups rely on online gambling sites to
launder money35. Online gambling sites are ideal for money laundering due to the
multiple payment methods and the anonymity possible for users and owners.
EMOTION
These attackers use the Internet as a means of acquiring fame, getting revenge,
unplanned and in many cases consequences are not assessed. Generally, with the
exception of crimes motivated by the subcategory of sexual impulse, the attacker does
not intend any major damage, although this sometimes results. To better analyze this
Notoriety/Challenge
intrusions, theft of intellectual property and deface websites. They do not launch
attacks with malice, although the victim who incurs the cost of their fun may have a
different opinion. These hackers have often only wanted to prove that they can
popularity. Since they act without a code of ethics like hacktivists, strict ideals or
allegiances, they are very unpredictable. Choosing a target can be based on access, not
wanting to pay for software, a dare or a bad experience on a website. However, similar
to hacktivists, they will take credit for any attack they commit. It should be noted that
they may become motivated by possible financial gain at any time and may
connecting with hackers online he met the self-assigned challenge to unlock the
iPhone. He achieved his goal by scrambling the code on the phone and then writing a
program to use the phone on any network. Proud of his achievement he broadcasted
his work on YouTube to the delight of over two (2) million viewers 37. This is a
common series of events for this category of hacker, who hack to achieve a personal
goal/benefit and seek as much recognition as possible for their triumph. Hotz wanted
an unlocked phone because he thought he had the right to use the phone he paid for
as he liked, the potential millions of dollars lost to AT&T by other persons using his
Revenge/Anger
grade, to name a few. Even a loss during online gaming can cause someone to launch
contributors to this phenomenon. Anyone can become a hacker overnight and have
the ability to launch a cyber-attack on anyone they believe did them wrong with little
effort or fear of being caught. These attackers steal personal information, hijack
emails, deface websites or social media accounts and launch Denial of Service attacks.
some cases. Attacks against gaming sites and forums, where player-on-player attacks
attacks can even be based on moral standpoints, such as attacks on gambling and
pornography sites.
Anger motivated attacks can be person-to-person, rather than person-to-
cyber-attack on one person for reasons of anger, revenge or control. The term can also
apply to a “traditional” stalker who uses technology to trace and locate their victim
and their movements more easily39. Cyber-stalkers aim to harass, embarrass and
humiliate their chosen victim. Cyber-stalkers never reveal their identity to prevent
any repercussions and to enjoy the fear and anxiety that an unknown attacker creates.
attacker can use cyber-bullying to air his/her grievances, hatred and anger. The
reasons for this anger can vary, ranging from the victim offending the attacker to a
Sexual Impulse
sometimes unrestricted access to social network sites and the Internet in general, to
Pedophiles are the major criminals in this category as the prey on the naivety
of children to the open approach they adopt when on social network websites. As
at2007, approximately 93 percent of all Americans between 12 and 17 years old are
Internet users. One in five U.S. teenagers has received an unwanted request to engage
in sexual activities or sexual talk, or to give out personal sexual information on the
web41. Pedophiles use chat rooms, social network services and instant messaging as
sources for potential victims. These places are targeted as they encourage free sharing
of information, communication with new people and provide anonymity to the users.
Dr. Kimberly Young in her 2005 article entitled, Profiling Online Sex Offenders,
in their lives, acknowledging the exploitative features and harm or pain they
control, revenge, or anger, denying the exploitative features and harm and
Serial rapists use similar methods, however, the choice of website can vary. To
find adults they target social networking websites and dating sights. Dating websites
are especially good as they can do research and portray themselves as a perfect match
for women who are eager to find love. The women using these websites can naively
assume everything on a person’s profile is true and make dates with predators. This
method of acquiring victims allows the predator to entice the victim to him. The
predator can control meeting location and time to create the best scenario for his/her
escape.
The best defense against these types of attacks is awareness, as the attacks
while utilizing technology are not technical, but based on social engineering. Potential
targets must be made aware of the risks and informed of practices to safeguard
themselves.
PROFILING
motives and reasons why such attacks occur. This must be based on critical analysis of
Profiling is the art and science of identifying relationships, which has in the past
profiling has been based on five characteristics; level of technical expertise, level of
disregard for the law/ ability to rationalize an unlawful act, tolerance to risk /need for
the thrill and motive43. Motive being a key factor in narrowing the profile and
potentially making a case against an attacker. The possible motives for cybercrime
that have been highlighted are money, emotion, sexual impulses, politics/religion and
fun.
knowledge of psychology, criminology and law44. This unique approach would entail
identifying key factors based on the aforementioned areas of study that are necessary
for developing a cyber-criminal profile. Table 1 is a generalized example of a sectional
approach to profiling using the previously proposed motivation categories as the base
of its construction. Other factors considered in the model are selection of victim,
nature of attack, goals, technical resources and motivation. The motivation of the
attacker is closely related to the selection of victims and modus operandi of the
attacker. The motive of the attacker can dictate the type of attack utilized, whether he
takes responsibility for the attack, the duration of the attack and the amount of
damage done. The technological resources bring the digital aspect of cybercrime back
into the profiling process. This factor deals with the level of technical skill and the
effort.
Table 1
2
This information may occasionally vary based on the needs of the attacker.
CONCLUSION
held the entire world at ransom. Their effect is destructive and extremely costly, with
even nation states. Methods to identify attackers and potential attackers are essential
to maintaining the rule of law in cyberspace and the physical world. As earlier
highlighted, cybercrime at its core has similar motivations to conventional crime as the
perpetrator is still human; only the medium for committing crime has changed.
attackers and the weapons used and their relationship is critical to dealing with the
scourge of cybercrime. This paper utilized traditional categories for the motivation
behind committing crime, which were based on activity in the physical realm and
mapped them unto cybercrime, which allowed a glimpse into the human aspect of
cybercrimes.
Apart from that the works of Furnell (2001), Ngafeeson (2009), Shinder (2010)
and Grzybowski (2012), previous work was biased towards classifications that focused
this analysis is designed toward a holistic view of cybercrime for law enforcement. The
sociological view point presented in this work favors efforts of law enforcement to
implement cybercrime prevention methods rather than just cybercrime security. The
Routine Activity Theory proposes that the occurrence of crime depends upon the
convergence of (i) a motivated offender, (ii) a suitable target, and (iii) absence suitable
account for two of the factors considered in the Routine Activity Theory. Therefore, to
crimes may prove to be more beneficial in the fight against cybercrime than traditional
approaches, which have so far fallen short. In criminal law, motive is a key
consideration in any case, as it can prove plausibility in favour of the accused of the
intent for committing a crime. Therefore, this categorization can serve as a valuable
tool to legal professionals and lawmakers in building cases and developing legal
frameworks for dealing with cybercrimes. The incorporation of the concept and theory
behind this research may positively change the way law enforcement conducts
investigations, looks at evidence and builds cases. This can be done by identifying how
and to what degree traditional criminology theories can explain why persons commit
cybercrimes. It can also provide the basis for further investigation of the factors that
have led to an increase use of the cyberspace as a medium for criminal activity.
Quantitative analysis into motivation and other sociological variables, will aid
attribution problems within the legal frame work or lack thereof. The use of
profiling.
However, the problem with the use of quantitative methods in cybercrime
research has been, and remains, the unavailability of information. A large portion of
can potentially affect the legitimacy of data45. Organizations in particular do not report
incidents; as they fear negative financial repercussions due to loss of trust by investors
and customers. Therefore, knowledge of the types of companies not reporting must be
obtained from quantitative measures being skewed. The latter option can be achieved
by implementing a secure system for reporting cybercrime incidents that protects the
identity of the reporting entities. This combined with communication with the
and future protection of their assets would prove effective. Since evidence gained in
factors as possible are taken into consideration when developing a final profiling
model.
1Kristin M.Finklea, and Catherine A. Theohary. “Cybercrime conceptual issues for Congress and U.S.
law enforcement”.2012. [Washington, DC]: Congressional Research Service, Library of Congress.
http://www.cq.com/pdf/crsreports-4096596
2Avinash Rajput, “Cybercrime”.LokNayakJayprakeshNarayana National Institute ofCriminology and
http://www.crs.gov.
6Jill Aitoro,Determining the Motives for Cyberattacks Canbe Tricky.Nextgov. February 23. 2010,
http://www.nextgov.com/cybersecurity/2010/02/determining-the-motives-for-cyberattacks-can-
be-tricky/46029/.
7
Kristin M.Finklea, and Catherine A. Theohary. “Cybercrime conceptual issues for Congress and U.S.
law enforcement” ,pg 7.2012. [Washington, DC]: Congressional Research Service, Library of
Congress. http://www.cq.com/pdf/crsreports-4096596
8
Ibid
9 Paolo Buonanno, “The Socioeconomic Determinants of Crime: a Review of the Literature.” University
of Bergamo, 2006.
10 Scott Newton, “Can Cyberterrorists Actually Kill People?.” SANS InstituteInfoSec Reading
Room.Vancouver, 2002.
11 Carol Cratty, “FBI on Guard Against Terrorist Cyber Attacks.” CNN. March 16.2012,
http://edition.cnn.com/2012/03/15/us/cyber-attacks/index.html?iref=allsearch.
12 Rachel Rudolph, “Understanding Cyber Warfare. From Cyber Warfare to Cyber Resistance.” Global
http://edition.cnn.com/WORLD/blogs/security.files/2008/03/hezbollah-and-cyber-war.html.
14 Gabriel Weimann, “Cyber-Fatwas and Terrorism.” Studies in Conflict & Terrorism 34 (10), 2011: 765–
781.
15 Tony Capaccio, “Al-Qaeda Seeks Cyber-Attack Skills, U.S. Official Says.” Bloomberg Businessweek.
https://blog.bit9.com/2011/06/12/cyber-attack-at-imf-why-motivations-matter/.
20Michael Dahan, “Hacking for the Homeland: Patriotic Hackers Versus Hacktivists.”, 2013: In, 51–57.
Associates, 2011.
29EamonJavers, “Secrets and Lies: the Rise of Corporate Espionage in a Global Economy.” Georgetown
http://news.heartland.org/newspaper-article/cyber-hacking-latest-tool-corporate-espionage.
31“Symantec Intelligence Report: June 2012.” 2012. “Symantec Intelligence Report: June 2012.”
Symantec.
32ZaitonHamin, Zaiton. “Insider Cyber-Threats: Problems and Perspectives.” International Review of
http://www.naavi.org/pati/pati_cybercrimes_dec03.htm.
35“Online Gambling: a Perfect Tool for Money Laundering.”, “Online Gambling: a Perfect Tool for
http://womensissues.about.com/od/violenceagainstwomen/f/Cyberstalking.htm.
40K Jaishankar, International Perspectives on Crime and Justice. Newcastle: Cambridge Scholars,
2009.
41 Amanda Lenhart and Mary Madden, “Teens, Privacy and Online Social Networks.” Pew Internet.