‘Cybercrime – Now This Changes Everything!’

advertisement
‘Cybercrime – Now This Changes Everything!’
Presented by Commander Barbara Etter
Director, Australasian Centre for Policing Research, and
Chair, Australasian Police Commissioners’ Conference E-Crime Working Party
to the Growing Australia Online Conference
in Canberra 3 to 4 December 2002
2
ABSTRACT
The Internet is often described as a wonderful tool, an engaging place and a liberating
experience … but for whom? There is the potential for many of us to become victims to the
growing pool of criminals who skilfully navigate the Net, preying on the young, the trusting
and commercial enterprises alike. Cyberspace is an environment that is intangible, dynamic
and unlike any previously known. This is especially true in law enforcement. In some
respects, the growth in the uptake of Information and Communications Technology (ICT),
including the Internet, presents as great a challenge for policing as the introduction of the
telephone and the motor vehicle. The paper argues that cybercrime or e-crime1 presents as a
new form of business that will require a fundamental paradigm shift in policing. This ‘new
business’ will be characterised by new forms of crime, a far broader scope and scale of
offending and victimisation, the need to respond in a much more timely way, and
challenging technical and legal complexities.
Law enforcement agencies around the world are working together to develop new
partnerships, new forensic methodologies and new responses to cybercrime in order to
ensure safety and security on the Internet.
This paper explores some of the known risks and dangers of the Internet, discusses the
continually emerging and changing nature of the problem, highlights the unique challenges
and response issues, and outlines how the safety and security of our community is being
protected by policing agencies in partnership with a range of key stakeholders.
INTRODUCTION
Policing the physical world, whilst challenging, is relatively well understood, generally
localised and low-tech, and underpinned by many well-established practices and
procedures. But Cybercrime – Now This Changes Everything!
The policing of cybercrime will be enormously challenging. As one of the Commissioners
from the US Commission on Child Online Protection commented (Balkam 2000):
The Internet changes everything. It upsets our notions of how things should
be, how countries should be governed, how companies should be run, how
teachers teach and children learn. It mixes up our conceptual framework of
what we think we know about the world, about each other and about
ourselves. It is liberating, exciting, challenging and terrifying all at the same
time … To a majority of the world’s people, the Internet remains mysterious,
forbidding, incomprehensible and frightening.
The vision for Australasian policing, as stated in its strategic directions document for 2002
to 2005 (APMC 2002), is:
‘A safer and more secure community’
1
The term electronic crime is used to refer to offences where a computer is used as a tool in the commission of the
offence, or as a target. It also encompasses the use of a computer as a storage device. Cybercrime, on the other hand,
involves the commission of crime involving cyberspace.
3
Given the ubiquitous nature of technology, and the fact that the Internet is now an integral
part of most of our lives, ‘community’ in the vision statement must equally apply to the
new and ethereal dimension of cyberspace. Police must ensure safety and security in
various environments including the home, schools, business and the workplace, whether
online or offline.
New and innovative responses are required to the issue of cybercrime or electronic crime,
particularly given its global dimensions and borderless nature. In some respects, the growth
in the uptake of ICT, including the Internet, presents as great a challenge for policing as the
introduction of the telephone and the motor vehicle. Some argue that such crime is merely a
case of the ‘same old wine in new bottles’. However, this paper argues that e-crime, and
particularly ‘hi-tech crime’2, presents as a new form of business that will require a
fundamental paradigm shift in policing. This ‘new business’ will be resource-intensive and
will be characterised by:

new forms of crime;

a far broader scope and scale of offending and victimisation;

the need to respond in a much more timely way; and

challenging technical and legal complexities.
The objectives of the paper are to:

Discuss the risks and dangers of the Internet, as well as the nature of the cybercrime
problem;

Identify and discuss the new and unique challenges and response issues which may be
encountered during the prevention, detection and investigation of such crime; and

Outline in broad terms what Australasian policing is doing to prevent and reduce the
incidence of this type of crime and enhance the safety and security of our communities.
KNOWN RISKS AND DANGERS OF THE INTERNET
There are enormous economic and social benefits to be gained from embracing ICT and the
Internet. However, there clearly are a number of dangers or risks involved, for instance, in
utilising the Internet. They include (Etter 2002):

Invasions of privacy;

Fraud and theft, including the potential use of your credit card details by others to
purchase goods and services, and the possibility of identity theft, a fast growing crime;

Harassment, including spamming, stalking etc;

Exposure to material considered to be pornographic, violent, hate-filled, racist or
generally offensive;

Ready availability of information to assist people with bomb-making and other
dangerous activities;

Temptation and ability to participate in on-line gambling;

Vulnerability to exploitation, such as the physical or emotional abuse of children;

Loss of business and reputation, due to denial of service attacks, web graffiti etc.; and
2
Used to refer to more sophisticated electronic crime, particularly where it is multijursidictional.
4

Loss of data and damage to systems, through malicious code, such as worms and
viruses.
Recent research conducted by the Australian Broadcasting Authority (ABA 2001) found
that most adults believed using the Internet involved some risk, with the main areas of
perceived risk being (ABA 2001, p.6):

Financial dangers e.g. fraud and credit card number theft (54%);

Personal data misuse and privacy issues (45%);

Content exposure concerns (39%); and

Viruses (21%).
The most common content concern was the perceived risk of children accessing unsuitable
content (27%). Access to pornographic material, and the receipt of such content through
unsolicited emails or accidental discovery, were the key concerns. The difference in the
level of regulation of the Internet compared with other media was the most common theme
raised by parents, when asked why they were concerned about access on the Internet (ABA
2001, p.43). The core differences between the Internet and other media, perceived by
parents who were more concerned with Internet content, were:

Regulatory differences;

Monitoring difficulty – individual versus group nature of the viewing;

The unwanted, unexpected nature of access to unsuitable content; and

The interactive nature of the medium and the human dimension.
When considering the safety of the Internet, an interesting analogy is that of what is in
place to ensure safety on our roads. Whilst the roads can certainly be a dangerous place,
there are a myriad of established mechanisms to enhance safety and minimise trauma.
These include (Etter 2002):

A system of licensing drivers and registering cars to ensure driver competence and
vehicle roadworthiness;

A complex legislative and regulatory regime which outlines the type of driver
behaviour expected on the roads;

Careful attention to standards, road design and construction, as well as vehicle design,
including the provision of air bags, seat belts etc.;

Regular patrolling of our roads by police officers, including practices such as random
breath testing;

Technological checks and safeguards such as radars, speed cameras, red light cameras
and video surveillance;

Availability of maps, weather forecasts, advisory signs etc. to assist in planning and/or
executing journeys; and

Regular and high profile prosecutions of offenders.
When you compare this to what is currently in place to ensure safety on the Internet, where
admittedly the risk of immediate physical injury or death is much lower, the situation is
quite alarming, particularly when one considers the ease with which one can become a
victim. Policing at the moment does not have the physical presence or degree of visibility in
5
cyberspace that it has in the physical world. There simply isn’t, and never will be, a
‘bobby’ standing at every ‘cybercorner’.
Criminal behaviour on the Internet, or cybercrime, presents as one of the major challenges
of the future to Australasian and international law enforcement. As ICT becomes even more
pervasive, aspects of electronic crime will feature in all forms of criminal behaviour, even
those matters currently regarded as more ‘traditional’ offences. It already features in many
transnational crimes involving drug trafficking, people smuggling, terrorism and money
laundering. Digital evidence will become more commonplace, even in traditional crimes,
and we must be prepared to deal with this new challenge.
THE NATURE OF THE E-CRIME PROBLEM
The computer has become an integral part of our way of life. However, as our connectivity
and dependency on ICT increases, so too does our vulnerability. This vulnerability was
clearly demonstrated in recent times with:

The distributed denial of service attacks on Yahoo, eBay and other major Internet
players during February 2000;

The ‘Love Bug’ virus (or ILOVEYOU worm), SirCam, Code Red and ‘Bugbear’ (and
others), with the cost of virus attacks in 2001 said to be $US10.7 billion ($A20.5
billion) (Gengler 2001, p.36);

The reported denial of service attacks on the St George Bank in Sydney in September
2000 (Kaye 2000, p.1; Spencer & O’Brien 2000, p.29);

The hacking of Microsoft where an attacker apparently gained access to the source code
for a future product (Gliddon 2000; Weiss 2000);

The large scale theft of over a million credit card details from various US e-commerce
sites by Russian and Ukrainian crime gangs (Hellaby 2001);

Attacks on government websites in the US, UK and Australia by Pentaguard in January
2001, said to be one of the largest most systematic defacements of worldwide
government servers on the web (Legard 2001);

The largest identity theft case in Internet history involving 200 of the 400 richest people
in America listed in Forbes magazine (Weiss 2001);

The recent arrest of an identity theft ring in the US involving the theft of more than
30,000 people’s identities through the acquisition of data from credit reporting
agencies, with losses to date at $A4.8 million (Festa 2002; Sullivan 2002; The
Australian 2002);

An international Internet ticketing scam involving a cloned website of the Sydney
Opera House whereby people ordered expensive non-existent tickets with their credit
cards – the investigation has involved the FBI, US Secret Service, Scotland Yard, the
ACCC here in Australia, as well as bank and credit card fraud investigators (Lamont
2002);

The theft of telephone services by tapping into the telephone switchboards of 12 of
Australia’s largest corporations and the running up of untraceable calls costing around
$2 million (The Australian IT Section 2001);

The Nimda or ‘swiss army-knife’ worm which impacted on the operations of the
National Australia Bank, Parliament House in Canberra, SA Government agencies and
others (Bryan & Lekakis 2001; Field 2001); and
6

The hijacking or hacking of the account details of 400,000 Optus Internet dial-up
customers, said to have launched the biggest computer crime investigation undertaken
by the New South Wales Police (Rossi 2002).
Some of these incidents also demonstrate the capacity for a single individual to perpetrate
major and widespread criminal harm (with a young Canadian named ‘Mafia Boy’, the
offender in the February 2000 denial of service attacks, a New York bus boy and high
school drop-out allegedly responsible for the large scale Forbes ID theft scam and a
university student from the Philippines the offender in the Love Bug incident). One can
only wonder about the extent of damage that could occur in the case of highly skilled, well
orchestrated and maliciously motivated attacks.
Global connectivity means that havoc can occur, in a very short timeframe, throughout the
world. The abuse of computer technology may threaten national security, public safety and
community well-being, and devastate the lives of affected individuals. There is also the
spectre of cyberterrorism or a cyber dimension to a terrorist attack (Gellman 2002; Verton
2002a & b).
New ‘criminal’ opportunities have also been created by the development of electronic
media. They include:

Denial of service attacks;

Viruses, worms, trojans and other forms of malicious code;

Unauthorised entry;

Information tampering;

Cyberstalking;

Spamming (sending unsolicited bulk email);

Mouse-trapping (where clicking the browser’s back button with the mouse does not
lead out of the unwanted site but only to the viewing of further unwanted pages (eg.
pornography). To escape, the user may need to close the browser or even restart the
operating system);

Phreaking (breaking into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines); and

Computer damage.
The above are relatively new types of offending or undesirable behaviour that did not exist
in the pre-computing environment. Likewise, the development of computers has created
new opportunities for services theft, manipulation of the stockmarket (through ramping up
of stock prices and ‘pump and dump’ schemes3 using the Internet), software piracy, and
other thefts of intellectual property.
It was believed a few years ago that only several thousand people in the US had the
capabilities to launch a cyber-attack. Recently, it was estimated that there are 17 million
such people in the US alone (O’Brien & Nusbaum 2000). Computer Industry Analysts,
Gartner Group, also estimate that by 2003, 20 million people worldwide will be actively
hacking (Bell 2002).
3
Where someone undertakes actions which falsely inflate a share price and then sells their shareholdings at the inflated
price.
7
In relation to the tools of crime, the box below is enlightening as to how much assistance
would-be criminals can obtain by simply downloading easily accessible tools that are often
available free from the Internet. There are said to be some 30,000 websites that post hacker
codes, which can be downloaded to break passwords, crash systems and steal data (Adams
2001). One study recently found that of 3 million sites tested world-wide, about 80%
displayed a vulnerability that could be exploited by tools readily available on the Internet
(Van Dijk 2001, p.5).
New tools, such as ‘autorooters’4, are also emerging, which automate the hacking and
cracking5 process and make it even easier to compromise systems (Tanase 2002). They are
regarded as a new and very serious threat to network security (Tanase 2002).
TOOLS FREELY AVAILABLE ON THE INTERNET

Anonymous re-mailers: Machines on the Internet configured to receive and re-send
traffic by replacing the original source address of the sender with the address of the
anonymous re-mailer machine. Used by intruders to mask their identities.

Internet packet filters or ‘sniffers’: Software that allows intruders to intercept network
traffic.

Nukers: Software tools used by intruders to destroy system log trails.

Password crackers: Software that allows intruders to ‘break’ encrypted password files
stolen from a victim's network server.

Scanners: Automated software that helps intruders identify services running on network
machines that might be exploited.

Spoofers: Software tools that allow intruders to masquerade as other users.

Steganography: A method of encrypting and hiding data in graphics or audio files. Used
by intruders to spy, steal, or traffic in information via electronic dead drops, for
example, in Web pages.

Trojan programs: A legitimate program altered by the injection of unauthorised code
into that program causing it to perform unknown (and hidden) functions to the
legitimate user/system owner. Intruders use them to create undocumented ‘backdoors’
into network systems.
(Source: KPMG 2000, p.10)
People who commit computer crimes vary widely in skills, knowledge, resources, authority
and motives. In addition, motives are said to include greed, need (to solve personal
problems such as gambling debts), inability to recognise the harm done to others,
personification of computers (seeing computers as adversaries in a game) and the Robin
Hood syndrome (seeing corporations as so rich that stealing from them is morally justified)
The term ‘autorooter’ is based on security lingo for successfully cracking and gaining privileged access to a machine (or
‘rooting’ a system). The ‘auto’ prefix stems from the fact that these devices essentially package, or automate, the cracking
process from start to finish. They can be designed to scan a network for vulnerable machines or attack everything they
come across. Once a machine is successfully compromised, any type of malicious code can be installed and configured,
data might be captured (using a sniffer), web pages defaced, or servers installed.
4
5
Hacking with malicious intentions.
8
(Kabay 2000, citing Parker). Offenders can range from juveniles operating out of their
bedrooms, to disgruntled employees or insiders, traditional criminals, organised crime
rings, and even foreign intelligence organisations.
There is growing evidence that organised crime groups are exploiting the new opportunities
offered by the Internet (Williams 2002). It has been reported that the Chinese triads have
been employing computer programmers since 1998 (Galeotti 2000). In addition, the Aum
Shinriko sect which was responsible for the deadly sarin nerve gas attack in a Tokyo
subway in 1995 diversified into the IT industry and reportedly was responsible for the
installation of over 100 computer systems into Japanese government ministries and major
companies, thus raising fears over how the Aum could exploit its cyberwarfare potential
through its access to government computers (O’Ballance 2001). The Colombian drug
cartels have also been utilising cutting edge ICT to assist them in their operations (Kaihla
2002), as have some Outlaw Motor Cycle Gangs (Edwards & Shephard 2002).
Cybercrime is variable in its manifestations, so it is difficult to discuss in terms of
aggregate incidence and impact. This inability to accurately define the nature of the
problem is not helped by the fact that currently no comprehensive statistics on e-crime are
maintained by Australasian police. Unfortunately, definitive information on the present
extent and impact of electronic crime both in Australia and overseas is not available. A
significant amount of this crime is simply not reported and much may not even be detected.
UNIQUE CHALLENGES
While computer technology will be used in many traditional crimes, the nature and
particular features of e-crime or cybercrime will pose new and unique challenges for
policing because of characteristics such as (Police Commissioners’ Conference Electronic
Crime Working Party 2000, p.4):

Anonymity;

Global reach (including issues of jurisdiction, disparate criminal laws and the potential
for large scale victimisation);

The speed at which crimes can be committed;

The potential for deliberate exploitation of sovereignty issues and cross-jurisdictional
differences by criminals and organised crime;

The volatility or transient nature of evidence, including no collateral or forensic
evidence such as eyewitnesses, fingerprints, trace evidence or DNA; and

The high cost of investigations.
The ability for criminals to remain anonymous on the Internet presents a huge challenge for
police and policy makers. Anonymity is assisted by a proliferation of Internet cafes and
web kiosks, the emergence of data havens, prepaid Internet packages, the availability of
tools for ‘spoofing’6 and the presence of anonymising services on the Internet (e.g.
www.anonymizer.com).
6
Spoofing is a technique used to gain unauthorised access to computers, whereby the intruder sends messages to a
computer with an Internet Protocol (IP) address indicating that the message is coming from a trusted host. The person
modifies the packet headers so that it appears that the packets or message are coming from someone else.
9
The challenges of the digital age and for the investigation of e-crime are numerous and
diverse, and include (Police Commissioners’ Conference Electronic Crime Working Party
2000, pp. 25-28; Rees 2000, pp.16-19):

Bridging multi-jurisdictional boundaries;

Retaining and preserving evidence;

Acquiring appropriate powers;

Decoding encryption;

Proving identity;

Knowing where to look for evidence;

Tackling the tools of crime and developing tools to counter crime;

Rethinking the costs and priorities of investigation;

Responding to crime in real time;

Coordinating investigative activities;

Improving training at all levels of the organisation;

Developing strategic partnerships and alliances;

Improving the reporting of electronic crime;

Enhancing the exchange of information and intelligence;

Acquiring, developing and retaining specialist staff; and

Avoiding ‘tech-lag’ (or getting access to cutting edge technology).
The forensic challenges, in particular, are considerable (Etter 2001). The US Department of
Justice in a recent report (2001, p.23) identified four major challenges in relation to forensic
evidence collection and analysis:

Finding evidence in the ‘information ocean’ – Finding important evidence can be
nearly impossible. Separating valuable information from irrelevant information also
requires extraordinary technical efforts. Determining the location where evidence is
stored can also be quite difficult.

Anonymity – Computer networks permit persons to easily maintain anonymity and
most web surfers have a ‘handle’, a false name or identity.

Traceability – Related to anonymity, traceability refers to how difficult it is to establish
the source and destination of communications on computers and communication
networks, such as the Internet. Traceability is becoming even more difficult because of
the proliferation and easy availability of multiple communications providers.
Communications on the Internet, for example, can easily pass through 10 different
Internet Service Providers (ISP’s), each of which must provide information (often in
real time) to trace a communication.

Encryption – Shortly, the vast majority of data and communications will be encrypted.
Encryption can hinder law enforcement investigations and increase costs because of the
problems associated with cracking the encryption.
10
HOW AUSTRALASIAN POLICING IS PROTECTING CYBERSPACE
The issue of ‘computer crime’ has been on the policing agenda for a number of years now.
One longstanding initiative is the ACPR’s Australasian Computer Crime Program (ACCP),
which incorporates the Australasian Computer Crime Managers’ Group (ACCMG).
New impetus was provided in March 2000, when, at their annual Conference, the theme of
which was ‘Crime @ the speed of thought’, Australasian Commissioners of Police,
recognising the complexity and immediacy of the cybercrime issue, formed a Steering
Committee of four Commissioners of Police.7 They also established an E-Crime Working
Party (ECWP) chaired by the Director of the ACPR.
The major task of the ECWP was to prepare a draft Australasian law enforcement strategy
on electronic crime and a related task was to evaluate the current law enforcement response
capacity.
The Working Party was requested, as a first step, to scope out the nature of the electronic
crime problem. In September 2000, the Working Party finalised and published a
comprehensive and detailed report entitled ‘The Virtual Horizon: Meeting the Law
Enforcement Challenges’ (Police Commissioners’ Conference Electronic Crime Working
Party 2000).
Following on from the scoping exercise, an analysis was undertaken by the ECWP and a
strategy developed. At this stage, the strategy identifies 5 important focus areas which are
inextricably linked and will have limited impact unless dealt with collectively. They are:





Prevention;
Partnerships;
Education and Capability;
Resources and Capacity; and
Regulation and Legislation.
Complementary workplans which address each of these focus areas were developed and
action is being taken to implement priority taskings, as resources allow. Every effort is
being made to ensure that the strategy leverages off a variety of important initiatives
already in place.
At the March 2001 Police Commissioners’ Conference, Commissioners also established an
E-Crime Law Reform Working Party (ECLRWP) in recognition of the importance of law
reform issues. The ECLRWP is currently chaired by the Australian Federal Police (AFP)
and works closely with the legislative update group of the Commonwealth’s Action Group
into the law enforcement implications of Electronic Commerce (AGEC). A range of issues
is currently being examined including interception and surveillance capacities, police
access to stored emails, the legislative response to identity crime, privacy issues, and data
retention and preservation.
A major thrust of the E-crime strategy is prevention, which will involve a whole of
government approach to a range of issues. For instance, community education, particularly
involving children, parents and teachers, along with the development of cyberethics, will be
7
Currently Commissioner Matthews (WA) as Chair, Commissioner Keelty (AFP), Commissioner Hyde (SAPOL) and
Commissioner Robinson (NZ).
11
important in responding to Internet safety concerns and in raising the barriers to crime. It is
of concern that juvenile offenders are becoming increasingly involved in e-crime.
Addressing victim issues will also be important, particularly in relation to identity crimes
(including the traumatic experience of identity take-over).
A major challenge will be successfully engaging the private sector. Clearly, it will be
necessary to persuade CEO’s and other business leaders that the issue of online security and
resistance to e-crime is a matter of good corporate governance which needs to be integrated
throughout any business strategy. Unfortunately, it would seem that too many corporate
leaders currently regard the matter as a technical issue to be dealt with by IT departments,
or a cost of doing business which is often simply passed on to the broader pool of
customers.
One important development within Australian policing is a recent decision by the
Australasian Police Ministers’ Council (APMC) to establish an Australian Hi-Tech Crime
Centre (AHTCC). The Centre is to be hosted by the AFP and will be co-located with its
Transnational Crime Coordination Centre (TCCC). The focus of such a centre will be on
serious, organised and multi-jurisdictional crime with a hi-tech dimension.
It became increasingly apparent that it was necessary to develop both a ‘centre of
excellence’ and a ‘single point of contact’, within Australia to represent law enforcement
interests if policing was to be effective across the spectrum of major crime.
Crime is simply becoming more complex and there is a need to ensure the continual
enhancement of forensic, interception and other technical capabilities, particularly as
organised crime, including terrorists, utilise new technologies. There is also a definite need
for enhanced coordination in relation to assessment/prioritisation, tasking, intelligence
collection and exchange, and law reform.
A national centre will be particularly useful given the borderless nature of cybercrime and
the need for Australia to assist other nations in accordance with international arrangements.
A centre will be well placed to provide a highly responsive and expert 24 hour/7 day
response capacity where required and will develop a capacity for real time assistance and
online investigation.
CONCLUSION
Law enforcement agencies around the world are working together to develop new
partnerships, new forensic methodologies and new responses to cybercrime.
The nature of Internet crimes presents complex new challenges for law enforcement with
regard to investigating crimes, collecting, analysing and presenting evidence, identifying,
apprehending and prosecuting offenders, and assisting victims and their families.
Cybercrime is truly a global issue and there will be an unprecedented need for international
commitment, coordination and cooperation. It will also be important to more fully
understand the nature of the problem and to address the significant under-reporting of the
phenomenon. Prevention and partnerships with a broad range of stakeholders will be
essential.
In some respects, the growth in the uptake of ICT, including the Internet, presents as great a
challenge for policing as the introduction of the telephone and the motor vehicle. While
there will always be a role for traditional investigative techniques, cybercrime presents as a
12
new form of business that may require a fundamental paradigm shift in policing. Dealing
with the global and immediacy aspects of the issue will be extremely challenging.
New skills, technologies and investigative techniques, applied in a global context, will be
required to detect, prevent and respond to cybercrime. This is not just about a realignment
of existing effort. This ‘new business’ will be characterised by new forms of crime, a far
broader scope and scale of offending and victimisation, the need to respond in a much more
timely way, and challenging technical and legal complexities. Innovative responses such as
the creation of ‘cybercops’, ‘cybercourts’ and ‘cyberjudges’ may eventually be required to
overcome the significant jurisdictional issues.
Addressing the issues outlined will be essential in establishing a secure and trusted
electronic environment and in ‘Growing Australia Online’.
REFERENCES
Adams, J. 2001, ‘The Weakness of a Superpower’, Foreign Affairs, May/June.
APMC 2002, Directions in Australasian Policing 2002-2005 (in press).
Australian Broadcasting Authority (ABA) 2001, The Internet at Home: A report on Internet
use in the home, December, Sydney.
Bell, S. 2002, ‘The web’s most wanted’, 1 August,
http://www.guardian.co.uk/Archive/Article/0,4273,4472989,00.html.
Bryan, M. & Lekakis, G. 2001, ‘Nimda computer virus hits NAB’, The Australian
Financial Review, 20 September, p.50.
Edwards, P. & Shephard, M. 2002, ‘Biker gangs putting Web to deadly use’, The Star, 7
July, http://www.thestar.ca/NASApp/cs/ContentServer?GXHC_gx_session_id_=
fd492cf53c7fefeb&page, visited 11 July 2002.
Etter, B. 2001, The Forensic Challenges of E-crime, Current Commentary No.3, 10/2001,
Australasian Centre for Policing Research, Adelaide.
Etter, B. 2002, The Challenges of Policing Cyberspace, Presented to the Netsafe: Society,
Safety and the Internet Conference, 10-12 February, Auckland, New Zealand.
Festa, P. 2002, ‘Feds charge 3 men with identity theft’, CNET News.com, 25 November,
http://news.com.com/2100-1023-971196.html?tag=fd_top.
Field, R. 2001, ‘Nimda forces network shutdowns’, Computerworld, 1 October, Vol.25
No.12, p.3.
Galeotti, M. 2000, ‘Chinese crime’s global reach’, Jane’s Intelligence Review, November,
pp.10-11.
Gellman, B. 2002, ‘Cyber-Attacks by Al Qaeda Feared’, Washington Post, 27 June,
http://www.washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26?language=printer,
visited 28 June 2002.
Gengler, B. 2001, ‘Virus costs hit $20.5bn’, The Australian, 11 September, p.36.
Gliddon, J. 2000, ‘Cracks in the Armour’, The Bulletin, 7 November, p.86.
Hellaby, D. 2001, ‘Warning over Credit Card Sting’, The Australian, IT section, 20 March,
p.32.
13
Kabay, M.E. 2000. ‘Studies and Surveys of Computer Crime’, Focus, 11 December,
http://securityportal.com/cover/coverstory20001211.html, visited 13 December 2000.
Kaihla, P. 2002, ‘The Technology Secrets of Cocaine Inc.’, July, http://www.business2.
com/ articles/mag/0,1640,41206,00.html.
Kaye, B. 2000, ‘St George still a ‘sitting duck’’, Computerworld, Vol.24 No.11, 11
September, pp.1 & 4.
KPMG 2000, E-Commerce and Cyber Crime: New Strategies for Managing the Risks of
Exploitation, USA.
Lamont, L. 2002, ‘Opera victims duped by world wide web of fraud’, The Sydney Morning
Herald, 11 November, p.8.
Legard, D. 2001, ‘Hackers Hit Government Sites’, Computerworld, Vol.24 No.26, 29
January, p.12.
O’Ballance, E. 2001, ‘From Sarin to Cyber Warfare: The Aum Doomsday Sect’, Intersec,
Vol.11 Issue 2, February, pp.52-53.
O’Brien, K. & Nusbaum, J. 2000, ‘Intelligence Collection for Asymmetric Threats – Part
Two’, Jane’s Intelligence Review, November, pp.50-55.
Police Commissioners’ Conference Electronic Crime Working Party 2000, The Virtual
Horizon: Meeting the Law Enforcement Challenges. Developing an Australasian law
enforcement strategy for dealing with electronic crime. Scoping Paper, Australasian
Centre for Policing Research, Report Series No: 134.1, Adelaide.
Rees, A. 2000, ACPR Technology Environment Scan, Report Series No: 133.1,
Australasian Centre for Policing Research, Adelaide.
Rossi, S. 2002, ‘Hackers hit Optus accounts’, Computerworld, Vol.25 No.24, pp.1 & 4.
Spencer, S. & O’Brien, S. 2000, ‘Internet banking service attacked’, The Advertiser, 2
September, p.29.
Sullivan, B. 2002, ‘Huge identity theft ring busted’, MSNBC News,
http://www.msnbc.com/news/839678.asp?0si=Tanase, M. 2002, ‘Introduction to Autorooters: Crackers Working Smarter, not Harder’, 21
August, http://online.securityfocus.com/infocus/1619.
The Australian IT Section 2001, ‘Gangs tap into phone system’, 29 March.
The Australian 2002, ’30,000 fleeced by identity scammers’, 27 November, p.9.
US Department of Justice 2001, Electronic Crime Needs Assessment for State and Local
Enforcement, National Institute of Justice Research Report, NCJ 186276, March,
Washington DC.
Van Dijk, S. 2001, ‘Technology Alone No Match for Security Risks’, Computerworld,
Vol.24 No.39, 14 May, p.5.
Verton, D. 2002a, ‘Experts predict major cyberattack coming’, Computerworld, 8 July,
http://www.computerworld.com/securitytopics/security/story/0,10801,72533,00.html,
visited 25 November 2002.
Verton, D. 2002b, ‘Experts: Don’t dismiss cyberattack warning’, Computerworld, 18
November, http://www.computerworld.com/securitytopics/security/story/
0,10801,76000,00.html, visited 25 November 2002.
Weiss, T. 2000, ‘Microsoft Says it Tracked Intruder for 12 Days’, Computerworld, Vol.24
No.18, p.3.
14
Weiss, M. 2001, ‘How the NYPD Cracked the Ultimate Cyberfraud’,
NYPOST/FOXNEWS, 20 March.
Williams, P. 2002, Organized Crime and Cyber-Crime: Implications for Business, CERT
Coordination Centre, www.isalliance.org/resources/papers/cybercrime-business.pdf,
visited 17 June 2000.
Download