NCJ Number
221088
Date Published
2007
Length
162 pages
Annotation
This report examines opportunities for the criminal exploitation of ever-expanding technologies in information and communications in Australia and internationally and their implications for policing, policy, and legislation.
Abstract
Globalization and the new economy, enabled by the latest Internet-based technologies and e-commerce, have created new and greater opportunities for fraud against both businesses and consumers. Computer-facilitated frauds include advanced fee scams, online auction fraud, fraudulent lottery schemes, modem and Web-page hijacking, and identity theft. Also, criminals will seek to gain unauthorized access to computers and networks in order to disable security and alarm systems or design "malware" programs that circumvent existing security controls. Malware authors will continue to explore ways in which to deny or delay victims' access to information regarding the source or nature of malware infection. The transfer of technology to countries with less advanced protections for intellectual property as part of investment and outsourcing projects will increase the risk of counterfeiting, piracy, illegal transfer of technology, and the facilitation of industrial espionage. There will also be increased opportunities for the circulation of child pornography, the targeting of young Internet users, the expanded use of the Internet by organized crime and terrorists to plan and pursue their crimes, and threats to national information infrastructure. In Australia, the growing body of law relating to computer technology is likely to increase. Investigations and prosecutions are likely to become more complex and lengthy, as well as involve multiple suspects. This will have resource and training implications nationally and internationally. Issues of multiple jurisdictions in a given case will also become more frequent. New and sophisticated defenses for technology-enabled crime will emerge, including challenges to the legality of electronic searches by law enforcement officers. New evidence presentation and sentencing issues will also arise. 9 tables and 288 references