digital crime — Criminal violence - Property Crime: Fraud - Money laundering - theft and robbery - homicide - rape - extortion - arson — Read-Me.Org -Open Access to All
Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts tagged digital crime
Common Challenges in Cybercrime: 2024 Review

By Eurojust and Europol

This report is a collaborative effort between Eurojust and Europol that addresses persistent and emerging challenges in cybercrime and investigations involving digital evidence. Key challenges include management of massive volumes of data, legal uncertainties following the invalidation of the Data Retention Directive, and technologies that create barriers to accessing data.

Just like in the previous edition, this 2024 review identifies and categorises challenges from both the law enforcement and judicial perspectives. However, this report includes a second part focusing on legislative tools that could alleviate those challenges and their practical application.

Europol, 2025. 18p

Organised Crime Groups in Cyberspace: A Typology

By Kim-Kwang Raymond Choo

Three categories of organised groups that exploit advances in information and communications technologies (ICT) to infringe legal and regulatory controls: (1) traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; (2) organised cybercriminal groups which operate exclusively online; and (3) organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct are described in this article. The need for law enforcement to have in-depth knowledge of computer forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques will become more pronounced with the increased likelihood of digital content being a source of disputes or forming part of underlying evidence to support or refute a dispute in judicial proceedings. There is also a need for new strategies of response and further research on analysing organised criminal activities in cyberspace.

Springer Science + Business Media, LLC, 2008, 26p.

Digital Vigilantism, Social Media And Cyber Criminality

By Karen Allen and Isel van Zyl

This paper explores the links between digital vigilantism and organised crime in South Africa and Kenya.

Social media platforms have become powerful tools to amplify and share narratives. Like many evolving technologies, platforms such as Twitter or Facebook may be used for social good or for ill. Digital vigilantism (whereby social media platforms are used for organised shaming, hounding or doxing of a target deemed by the online community to have transgressed norms) may have real-world consequences. In extreme cases this may result in acts of ‘terrorism’ or other forms of unlawful killing. Yet while digital vigilantism may appropriate traditional law enforcement mechanisms, in some cases it may also try to hold law enforcement to account.

ENACT-Africa, 2020. 16p.

The Dark Web as a Phenomenon: A Review and Research Agenda

By Abhineet Gupta 

The internet can broadly be divided into three parts: surface, deep and dark among which the latter offers anonymity to its users and hosts. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. The more restrictions placed upon the free exchange of information, goods and services between people the more likely there exist hidden spaces for it to take place. The ‘black market’ of the internet – the dark web - represents such a hidden space. This review looks at the purposes it is widely used for with an emphasis on cybercrime, and how the law enforcement plays the role of its adversary. The review describes these hidden spaces, sheds light on their history, the activities that they harbour – including cybercrime, the nature of attention they receive, and methodologies employed by law enforcement in an attempt to defeat their purpose. More importantly, it is argued that these spaces should be considered a phenomenon and not an isolated occurrence to be taken as merely a natural consequence of technology. The review is conducted by looking at existing literature in academic journal databases. It contributes to the area of the dark web by serving as a reference document and by proposing a research agenda.  

Melbourne: University of Melbourne, 2018.  46p.