Future directions in technology-enabled crime: 2007-09

The aim of this report was to identify the crime risks which will arise between 2007-09 out of the environment in which Australians use information and communications technologies. The aim of this report was to identify the crime risks which will arise over the next two years (2007-09) out of the environment in which Australians use information and communications technologies. In identifying future risk areas, particular focus is placed on the impact these will have for law enforcement, the need for additional resources, law reform, development of cooperative arrangements between Australian and overseas public and private sector organisations, and development of public information and educational resources to minimise the risk of widespread harm to the community. The report begins by identifying developments that will take place over the next two years that will be likely to facilitate technology-enabled crime. These include: changes arising from globalisation of business and the emergence of new economies in China and India; developments in digitisation of information, especially relating to the widespread use of broadband services and mobile and wireless technologies; the evolution of electronic payment systems, especially those being used in connection with online gambling and auctions; and changes in the use governments make of technology to allow members of the public to conduct transactions with government agencies securely and even to aloe participation in democracy online. These, and other developments, create not only benefits for the community but also risks. This report identifies the most likely areas in which opportunities for illegality may arise including fraud, identity-related crime, computer vandalism, theft of information, dissemination of objectionable material online, and risks of organised crime and terrorism. The implications for these developments are then assessed in terms of their impact for policing, policy making and legislation.

[1]  A. Cohen,et al.  Crime and Criminal Justice , 1941 .

[2]  A. Bandura Social cognitive theory of personality. , 1999 .

[3]  S. Rennie 21st Century Technologies: Promises and Perils of a Dynamic Future; OECD Forum for the Future , 2000 .

[4]  Tadayoshi Kohno,et al.  Trust (and mistrust) in secure applications , 2001, CACM.

[5]  Robert Deyoung,et al.  The Internet's place in the banking industry , 2001 .

[6]  Richard Silberglitt,et al.  The Global Technology Revolution 2020, In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications , 2002 .

[7]  Ronggong Song,et al.  Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan , 2004, PST.

[8]  Evangelos A. Kiountouzis,et al.  The insider threat to information systems and the effectiveness of ISO17799 , 2005, Comput. Secur..

[9]  A Letter from the Council of Europe: Cybercrime and Organised Crime , 2005 .

[10]  Janis Wolak,et al.  Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working? , 2005, Sexual abuse : a journal of research and treatment.

[11]  Mosad Zineldin,et al.  European Business Review , 2006 .

[12]  Zhendong Su,et al.  Temporal search: detecting hidden malware timebombs with virtual machines , 2006, ASPLOS XII.

[13]  Richard Walton,et al.  Balancing the insider and outsider threat , 2006 .

[14]  George Lawton Working Today on Tomorrow's Storage Technology , 2006, Computer.

[15]  Edward W. Felten,et al.  Lessons from the Sony CD DRM Episode , 2006, USENIX Security Symposium.

[16]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[17]  Nick Yee,et al.  The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments , 2006, PRESENCE: Teleoperators and Virtual Environments.

[18]  Markus Jakobsson,et al.  Invasive browser sniffing and countermeasures , 2006, WWW '06.

[19]  Roderic Broadhurst,et al.  Developments in the global law enforcement of cyber‐crime , 2006 .

[20]  Gabriela Kennedy,et al.  Outsourcing to China - Risks and benefits , 2006, Comput. Law Secur. Rev..

[21]  Randall F. Trzeciak,et al.  Common Sense Guide to Prevention and Detection of Insider Threats , 2006 .

[22]  Barry Blundell,et al.  Google Desktop as a Source of Digital Evidence , 2006, Int. J. Digit. EVid..

[23]  Deli Yang The Impact of Business Environments on Software Piracy , 2007 .

[24]  Jennifer Jie Xu,et al.  Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..

[25]  Kevin Fu,et al.  Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.

[26]  Russell G. Smith,et al.  Consumer Scams in Australia: An Overview , 2007 .

[27]  Anny Wong,et al.  The global technology revolution China, in-depth analyses : emerging technology opportunities for the Tianjin Binhai new area (TBNA) and the Tianjin economic-technological development area (TEDA) , 2009 .