The Evolution of Cybercrime, 2004-2014

This article reviews developments in cybercrime in the ten years to 2014. It observes that in the basic substance of cybercrime offences is essentially the same as in the past. However, cybercrimes are now executed with greater sophistication, increasingly for purposes of financial gain, and by an increased diversity of organizational structures, including government agencies and state proxies. The article concludes with a discussion of applications of digital technology that have emerged over the past decade, and their potential for criminal exploitation.

[1]  T. Holt Examining the Forces Shaping Cybercrime Markets Online , 2013 .

[2]  Ronaldo M. Salles,et al.  Botnets: A survey , 2013, Comput. Networks.

[3]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[4]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[5]  M. Soudijn,et al.  Cybercrime and virtual offender convergence settings , 2012, Trends in Organized Crime.

[6]  Mary Gail Frawley-O'Dea,et al.  Who's Doing What to Whom? , 1997 .

[7]  William C. Ashmore Impact of Alleged Russian Cyber Attacks , 2009 .

[8]  Richard Jones Crime in the Digital Age , 2003, Int. J. Law Inf. Technol..

[9]  L. Demause,et al.  Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power , 2013 .

[10]  Gary Stix,et al.  Fighting Future Wars , 1995 .

[11]  J. Wolpaw,et al.  Brain-Computer Interfaces: Principles and Practice , 2012 .

[12]  Benoit Dupont Cybersecurity Futures: How Can We Regulate Emergent Risks? , 2013 .

[14]  Rajesh P. N. Rao Brain-Computer Interfacing: An Introduction , 2010 .

[15]  Jim Giles Scareware: the inside story , 2010 .

[16]  Michael Stohl Dr. Strangeweb: Or How They Stopped Worrying and Learned to Love Cyber War , 2014 .

[17]  Clive Davidson,et al.  Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .

[18]  Paul A. Watters,et al.  Cybercrime: The Case of Obfuscated Malware , 2011, ICGS3/e-Democracy.

[19]  Parmy Olson We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency , 2012 .

[20]  Janice C. Sipior,et al.  Unintended invitation: organizational wi-fi use by external roaming users , 2007, CACM.

[21]  Misha Glenny,et al.  DarkMarket: Cyberthieves, Cybercops and You , 2011 .