Abstract
The prevalence, definitions, and scope of cybercrime including the dual role of ‘weaponed’ malware are reviewed in this chapter. Also outlined are the history and role of hackers and online criminal networks in the dissemination of malicious software. Various forms of cybercrime are described including the use of deception or social engineering in the exploitation of computer systems or acquisition of identities. The importance of international cooperation in the suppression of cybercrime is illustrated by the coordination required in response to the proliferation of child exploitation materials (CEM). This chapter concludes with a summary of the challenges for law enforcement and the pressing need for broad partnerships in the prevention of cybercrime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ABS. 2016. Personal Fraud 2014/15. Cat. no. 4528.0. Canberra: ABS.
ACORN. 2016. Statistics Report. https://www.acorn.gov.au/resources. Accessed 8 Oct.
ACSC. 2015. Threat Report. Canberra: The Australian Cyber Security Centre.
Alazab, Mamoun, and Roderic Broadhurst. 2016. Spam and Criminal Activity. Canberra: AIC.
Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. 2013. Measuring the Cost of Cybercrime. In The Economics of Information Security and Privacy, ed. Rainer Böhme, 265–300. Berlin: Springer.
Broadhurst, Roderic. 2006. Developments in the Global Law Enforcement of Cyber-Crime. Policing 29 (3): 408–433.
Broadhurst, Roderic, and Peter Grabosky. 2005. Cybercrime: The Challenge in Asia. Hong Kong: Hong Kong University Press.
Broadhurst, Roderic, Peter Grabosky, Mamoun Alazab, and Steve Chon. 2014. An Analysis of the Nature of Groups Engaged in Cyber Crime. International Journal of Cyber Criminology 8 (1): 1–20.
Chabinsky, Steven R. 2010. The Cyber Threat: Who’s Doing What to Whom? Paper presented at Government Security/FOSE Conference, March 23, in Washington, DC.
Chon, Ki Hong. 2016. Cybercrime Precursors: Towards a Model of Offender Resources. PhD dissertation, Australian National University.
Commonwealth of Australia. 2016. Australia’s Cyber Security Strategy. Canberra: Department of the Prime Minister and Cabinet.
Duffy, Conor. 2015. Law Agencies Look to Recruit Hackers as Cyber Attacks Increase. ABC News, June 15.
Global Initiative. 2014. GIN Interview: Gavin Corn, Federal Prosecutor in FBI’s Cybercrime Taskforce. www.globalinitiative.net/gin-gavincorn.
Grabosky, Peter N., and Russell G. Smith. 1998. Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities. London: Transaction Publishers.
Herzog, Stephen. 2011. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security 4: 49–60.
Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. 2015. Cybercrime and Digital Forensics: An Introduction. London: Routledge.
Jayawardena, Kasun, and Roderic Broadhurst. 2007. Online Child Sex Solicitation: Exploring the Feasibility of a Research ‘Sting’. International Journal of Cyber Criminology 1 (2): 228–248.
Levy, Stephen. 1984. Hackers: Heroes of the Computer Revolution. New York, NY: Anchor Press.
Martin, James. 2014. Lost on the Silk Road: Online Drug Distribution and the ‘Cryptomarket’. Criminology and Criminal Justice 14 (3): 351–367.
McAfee. 2014. Net Losses: Estimating the Global Cost of Cybercrime. http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf.
McGuire, Michael. 2012. Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security.
McWorther, Dan. 2013. Mandiant Exposes Apti: One of China’s Espionage Units and Releases 3,000 Indicators. Fireeye, February 19.
Miniwatts. 2015. Internet Usage and 2015 Population in Oceania. Internet World Stats. http://www.internetworldstats.com/stats6.htm.
Nakashima, Ellen. 2012. When is a Cyberattack an Act of War? Washington Post, October 26.
Rid, Thomas. 2016. Rise of the Machines: The Lost History of Cybernetics. New York, NY: Scribe.
Rubinstein, Maria. 2013. Your Nigerian Inheritance is Waiting! Securelist, January 10.
Sanger, David E. 2012. Obama Order Sped Up Wave of Cyberattacks Against Iran. The New York Times, June 1.
Shackelford, Scott, Scott Russell, and Jeffrey Haut. Forthcoming. Bottoms up: A Comparison of Voluntary Cybersecurity Frameworks. UC Davis Business Law Journal.
Smith, Russell G., and Alice Hutchings. 2014. Identity Crime and Misuse in Australia: Results of the 2013 Online Survey. Canberra: AIC.
UNODC. 2013. Comprehensive Study on Cybercrime. UN: New York, NY.
UNODC. 2015. Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children. UN: New York, NY.
Urbas, Gregor. 2015. Cybercrime Legislation, Cases and Commentary. Chattswood: Butterworths.
US Department of Justice. 2015. Major Computer Hacking Forum Dismantled. Justice News, July 15.
US Department of Justice. 2016. Computer Crime and Intellectual Property Section (CCIPS). https://www.justice.gov/criminal-ccips. Accessed 8 Sep.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Broadhurst, R. (2017). Cybercrime in Australia. In: Deckert, A., Sarre, R. (eds) The Palgrave Handbook of Australian and New Zealand Criminology, Crime and Justice. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-55747-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-55747-2_15
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-55746-5
Online ISBN: 978-3-319-55747-2
eBook Packages: Law and CriminologyLaw and Criminology (R0)