Правовые справочные документы 5 страница



[327] GAO, File Sharing, "Selected Universities Report Taking Action to Reduce Copyright Infringement", available at: http://www.gao.gov/new.items/d04503.pdf; Ripeanu/Foster/Iamnitchi, Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design, available at: http://people.cs.uchicago.edu/~matei/PAPERS/ic.pdf. United States Federal Trade Commission, Peer-to-Peer File-Sharing Technology: Consumer Protection and Competition Issues, page 3, available at: http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf; Saroiu/Gummadi/Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems, available at: http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf.

[328] In 2005, 1.8 million users used Gnutella. See Mennecke, "eDonkey2000 Nearly Double the Size of FastTrack", available at: http://www.slyck.com/news.php?story=814.

[329] See Cisco" Global IP Traffic Forecast and Methodology", 2006-2011, 2007, page 4, available at: http://www.cisco.com/application/pdl/en/us/guest/netsol/ns537/c654/cdccont_0900aecd806a81aa.pdf.

[330] See: "OECD Information Technology Outlook 2004", page 192, available at: http://www.oecd.org/dataoecd/22/18/37620123.pdf.

[331] One example is Germany, where a regularly updated report of the Federation of the phonographic businesses pointed out that, in 2006, 5.1 million users in Germany downloaded music in file-sharing systems. The report is available at: http://www.ifpi.de/wirtschaft/brennerstudie2007.pdf. Regarding the United States see: Johnson/McGuire/Willey, "Why File-Sharing Networks Are Dangerous", 2007, available at: http://oversight.house.gov/documents/20070724140635.pdf.

[332] Apart from music, videos and software, even sensitive personal documents are often found in file-sharing systems. See: Johnson/McGuire/Willey, "Why File-Sharing Networks Are Dangerous", 2007, available at: http://oversight.house.gov/documents/20070724140635.pdf.

[333] While in 2002, music files made up more than 60% of all files exchanged in file-sharing systems in OECD countries, this proportion dropped in 2003 to less than 50%. See: "OECD Information Technology Outlook 2004", page 192, available at: http://www.oecd.org/dataoecd/22/18/37620123.pdf.

[334] Schoder/Fischbach/Schmitt, "Core Concepts in Peer-to-Peer Networking", 2005, page 11, available at: http://www.idea- group.com/downloads/excerpts/Subramanian01.pdf; Cope, Peer-to-Peer Network, Computerworld, 8.4.2002, available at: http://www.computerworld.com/networkingtopics/networking/story/0,10801,69883,00.html; Fitch, From Napster to Kazaa: What the Recording Industry did wrong and what options are left, Journal of Technology Law and Policy, Vol. 9, Issue 2, available at: http://grove.ufl.edu/~techlaw/vol9/issue2/fitch.html.

[335] Regarding Napster and the legal response see: Rayburn, After Napster, Virginia Journal of Law and Technology, Vol. 6, 2001, available at: http://www.vjolt.net/vol6/issue3/v6i3-a16-Rayburn.html. Penn, Copyright Law: Intellectual Property Protection in Cyberspace, Journal of Technology Law and Policy, Vol. 7, Issue 2, available at: http://grove.ufl.edu/~techlaw/vol7/issue2/penn.pdf.

[336] Regarding the underlying technology see: Fischer, The 21st Century Internet: A Digital Copy Machine: Copyright Analysis, Issues, and Possibilities, Virginia Journal of Law and Technology, Vol. 7, 2002, available at: http://www.vjolt.net/vol7/issue3/v7i3_a07-Fisher.pdf; Sifferd, The Peer-to-Peer Revolution: A Post-Napster Analysis of the Rapidly Developing File-Sharing Technology, Vanderbilt Journal of Entertainment Law & Practice, 2002, 4, 93; Ciske, For Now, ISPs must stand and deliver: An analysis of In re Recording Industry Association of America vs. Verizon Internet Services, Virginia Journal of Law and Technology, Vol. 8, 2003, available at: http://www.vjolt.net/vol8/issue2/v8i2_a09-Ciske.pdf; Herndon, Who's watching the kids? - The use of peer-to-peer programs to Cyberstalk children, Oklahoma Journal of Law and Technology, Vol. 12, 2004, available at: http://www.okjolt.org/pdf/2004okjoltrev12.pdf; Fitch, From Napster to Kazaa: What the Recording Industry did wrong and what options are left, Journal of Technology Law and Policy, Vol. 9, Issue 2, available at: http://grove.ufl.edu/~techlaw/vol9/issue2/fitch.html.

[337] For more information on investigations in peer-to-peer networks, see: "Investigations Involving the Internet and Computer Networks", NIJ Special Report, 2007, page 49 et seqq., available at: http://www.ncjrs.gov/pdffiles1/nij/210798.pdf.

Chothia/Chatzikokolakis, "A Survey of Anonymous Peer-to-Peer File-Sharing", available at: http://www.spinellis.gr/pubs/jrnl/2004- ACMCS-p2p/html/AS04.pdf; Han/Liu/Xiao;Xiao, "A Mutual Anonymous Peer-to-Peer Protocol Desing", 2005.

[339] Regarding the motivation of users of peer-to-peer technology see: Belzley, Grokster and Efficiency in Music, Virginia Journal of Law and Technology, Vol. 10, Issue 10, 2005, available at: http://www.vjolt.net/vol10/issue4/v10i4_a10-Belzley.pdf.

[340] For more examples, see: Supreme Court of the United States, Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd, I. B., available at: http://fairuse.stanford.edu/MGM_v_Grokster.pdf.

[341] Regarding the economic impact, see: Liebowitz, "File-Sharing: Creative Destruction or Just Plain Destruction", Journal of Law and Economics, 2006, Volume 49, page 1 et seqq.

[342] The latest analysis regarding file-sharing activities in Germany identify up to 7.3 million users who download music files from the Internet. Up to 80% of these downloads are related to file-sharing systems. Source: GfK, Brennerstudie 2005.

[343] "The Recording Industry 2006 Privacy Report", page 4, available at: http://www.ifpi.org/content/library/piracy-report2006.pdf.

[344] One example is the movie, "Star Wars - Episode 3", that appeared in file-sharing systems hours before the official premiere. See: http://www.heise.de/newsticker/meldung/59762 that is taking regard to a MPAA press release.

[345] Regarding anonymous file-sharing systems, see: Wiley/ Hong, "Freenet: A distributed anonymous information storage and retrieval system", in Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability, 2000.

[346] Content Scrambling Systems (CSS) is a Digital Rights Management system that is used is most DVD videos discs. For details about the encryption used, see Stevenson, "Cryptanalysis of Contents Scrambling System", available at: http://www.dvd- copy.com/news/cryptanalysis_of_contents_scrambling_system.htm.

[347] Regarding further responses of the entertainment industry (especially lawsuits against Internet user) see: Fitch, From Napster to Kazaa: What the Recording Industry did wrong and what options are left, Journal of Technology Law and Policy, Vol. 9, Issue 2, available at: http://grove.ufl.edu/~techlaw/vol9/issue2/fitch.html.

[348] Digital Rights Management describes access control technology used to limit the usage of digital media. For more information, see: Cunard/Hill/Barlas, "Current developments in the field of digital rights management", available at:

http://www.wipo.int/documents/en/meetings/2003/sccr/pdf/sccr_10_2.pdf; Lohmann, "Digital Rights Management: The Skeptics' View", available

[349] at: http://www.eff.org/IP/DRM/20030401_drm_skeptics_view.pdf.

358 Bloom/Cox/Kalker/Linnartz/Miller/Traw, "Copy Protection for DVD Videos"", IV 2, available at: http://www.adastral.ucl.ac.uk/~icox/papers/1999/ProcIEEE1999b.pdf

[350] Sieber, Council of Europe Organised Crime Report 2004, page 152.

[351] See: http://www.golem.de/0112/17243.html.

[351] Regarding the similar discussion with regard to tools used to design viruses, see below: Chapter 2.7.4.

[352] See Bakken, Unauthorised use of Another's Trademark on the Internet, UCLA Journal of Law and Technology Vol. 7, Issue 1; Regarding trademark violations as a consequence of online-criticism see: Prince, Cyber-Criticism and the Federal Trademark Dilution act: Redefining the Noncommercial use Exemption, Virginia Journal of Law and Technology, Vol. 9, 2004, available at: http://www.vjolt.net/vol9/issue4/v9i4_a12-Prince.pdf;

[353] The term "phishing" describes an act that is carried out to make targets disclose personal/secret information. The term originally described the use of e-mails to "phish" for passwords and financial data from a sea of Internet users. The use of "ph" linked to popular hacker naming conventions. See Gercke, The criminalisation of Phishing and Identity Theft, Computer und Recht, 2005, 606; Ollmann, "The Phishing Guide: Understanding & Preventing Phishing Attacks", available at: http://www.nextgenss.com/papers/NISR-WP-Phishing.pdf. For more information, see below: Chapter 2.8.d.

[354] For an overview about what phishing mails and the related spoofing websites look like, see: http://www.antiphishing.org/phishing_archive/phishing_archive.html

[355] Re the connection with trademark-related offences, see for example: "Explanatory Report to the Convention on Cybercrime", No. 42.

[356] Another term used to describe the phenomenon is "domain grabbing". Regarding cyber-squatting see: Hansen-Young, Whose Name is it, Anyway? Protecting Tribal Names from Cybersquatters, Virginia Journal of Law and Technology, Vol. 10, Issue 6; Benoliel, Cyberspace Technological Standandization: An Institutional Theory Retrospective, Berkeley Technology Law Journal, Vol. 18, page 1259 et seq.; Struve/Wagner, Realspace Sovereignty in Cyberspace: Problems with the Anticybersquatting Consumer Protection Act, Berkeley Technology Law Journal, Vol. 17, page 988 et seq.; Travis, The Battle for Mindshare: The Emerging Consesus that the First Amendment Protects Corporate Criticism and Parody on the Internet, Virginia Journal of Law and Technology, Vol. 10, Issue 3, 2003;

[357] See: Lipton, "Beyond cybersquatting: taking domain name disputes past trademark policy", 2005, available at: http://www.law.wfu.edu/prebuilt/w08-lipton.pdf.

[358] This happens especially with the introduction of new top-level-domains. To avoid cyber-squatting, the introduction of a new first-level domain is often accompanied by a period where only parties with trademarks can register a domain name. At the end of this phase (often called the "sunrise period"), other users can register their domain.

[359] For case examples, see: Sieber, Council of Europe Organised Crime Report 2004, page 113.

[360] In 2006, the United States Federal Trade Commission received nearly 205,000 Internet-related fraud complaints. See Consumer Fraud and Identity Theft Complaint Data, January - December 2006, Federal Trade Commission, available at: http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf.

[361] Regarding the related challenges see below: Chapter 3.2.8.

[362] In 2006, Nearly 50% of all fraud complaints reported to the United States Federal Trade Commission were related to amounts paid between 0-25 US Dollars See Consumer Fraud and Identity Theft Complaint Data, January - December 2006, Federal Trade Commission, available at: http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf.

[363] Regarding the related automation process: Chapter 3.2.8.

[364] The term "advance fee fraud" describes offences in which offenders seek to convince targets to advance a small sum of money in the hope of receiving a much larger sum afterwards. For more information, see: Reich, Advance Fee Fraud Scams in-country and across borders, Cybercrime & Security, IF-1, page 1. For more information, see: Reich, Advance Fee Fraud Scams in-country and across borders, Cybercrime & Security, IF-1, page 1; Smith/Holmes/Kaufmann, Nigerian Advance Fee Fraud, "Trends & Issues in Crime and Criminal Justice", No. 121, available at: http://www.aic.gov.au/publications/tandi/ti121.pdf; Oriola, "Advance fee fraud on the Internet: Nigeria's regulatory response", "Computer Law & Security Report", Volume 21, Issue 3, 237.

[365] For more information, see below: Chapter 6.1.13.

[366] The term auction fraud describes fraudulent activities involving electronic auction platforms over the Internet. Regarding auction fraud see: Bywell/Oppenheim, Fraud on Internet Auctions, Aslib Proceedings, 53 (7), page 265 et seq., available at:

http://www.aslib.co.uk/proceedings/protected/2001/jul-aug/03.pdf; Snyder, Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud, Federal Communications Law Journal, 52 (2), page 453 et seq.; Chau/Falooutsos, Fraud Detection in Electronic Auction, available at: http://www.cs.cmu.edu/~dchau/papers/chau_fraud_detection.pdf; Dolan, Internet Auction Fraud: The Silent Victims, Journal of Economic Crime Management, Vol. 2, Issue 1, available at: https://www.utica.edu/academic/mstitutes/ecii/publications/articles/BA2DF0D2-

[367] D6ED-10C7-9CCB88D5834EC498.pdf.

378 See http://www.ebay.com.

[368] See Goodman/Brenner, The Emerging Consensus on Criminal Conduct in Cyberspace, UCLA Journal of Law and Technology, Vol. 6, Issue 1;

[369] The United States Internet Crime Complaint Centre (IC3) (a partnership between the FBI and the National White Collar Crime Centre) reported that around 45% of complaints refer to Auction Fraud. See: "IC3 Internet Crime Report 2006", available at: http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf

[370] "Law Enforcement Efforts to combat Internet Auction Fraud", Federal Trade Commission, 2000, page 1, available at: http://www.ftc.gov/bcp/reports/int-auction.pdf.

[371] See: Beales, Efforts to Fight Fraud on the Internet, Statement before the Senate Special Committee on aging, 2004, page 7, available at:

[372] http://www.ftc.gov/os/2004/03/bealsfraudtest.pdf.

383 For more information, see for example: http://pages.ebay.com/help/feedback/feedback.html.

[373] Regarding the criminalisation of "account takeovers", see Gercke, Multimedia und Recht 2004, issue 5, page XIV.

[374] See "Putting an End to Account-Hijacking Identity Theft", Federal Deposit Insurance Corporation, 2004, available at: http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf.

[375] The term "advance fee fraud" describes offences in which offenders seek to convince targets to advance a small sum of money in the hope of receiving a much larger sum afterwards. For more information, see: Reich, Advance Fee Fraud Scams in-country and across borders, Cybercrime & Security, IF-1, page 1. For more information, see: Reich, Advance Fee Fraud Scams in-country and across borders, Cybercrime & Security, IF-1, page 1; Smith/Holmes/Kaufmann, Nigerian Advance Fee Fraud, "Trends & Issues in Crime and Criminal Justice", No. 121, available at: http://www.aic.gov.au/publications/tandi/ti121.pdf; Oriola, "Advance fee fraud on the Internet: Nigeria's regulatory response", "Computer Law & Security Report", Volume 21, Issue 3, 237; Beales, Efforts to Fight Fraud on the Internet, Statement before the Senate Special Committee on aging, 2004, page 7, available at: http://www.ftc.gov/os/2004/03/bealsfraudtest.pdf.

[376] Advance Fee Fraud, Foreign & Commonwealth Office, available at: http://www.fco.gov.uk/servlet/Front?pagename=OpenMarket/Xcelerate/ShowPage&c=Page&cid=1044901630595.

[377] For an overview of estimated losses, see Reich, "Advance Fee Fraud Scams in-country and across borders", "Cybercrime & Security", IF-1, page 3 et seqq.

[378] For more information see the Ultrascan Survey "419 Advance Fee Fraud", version 1.7, 19.02.2008, available at: http://www.ultrascan.n1/assets/applets/2007_Stats_on_419_AFF_feb_19_2008_version_1.7.pdf.

[379] See: ITU Global Cybersecurity Agenda / High-Level Experts Group, Global Strategic Report, 2008, page 39, available at: http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html.

[380] Regarding phishing, see Dhamija/Tygar/Hearst, "Why Phishing Works", available at: http://people.seas.harvard.edu/~rachna/papers/why_phishing_works.pdf; "Report on Phishing", A Report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States, 2006, available at: http://www.usdoj.gov/opa/report_on_phishing.pdf

[381] The term "phishing" originally described the use of e-mails to "phish" for passwords and financial data from a sea of Internet users. The use of "ph" linked to popular hacker naming conventions. See Gercke, Computer und REcht, 2005, page 606; Ollmann, "The Phishing Guide Understanding & Preventing Phishing Attacks", available at: http://www.nextgenss.com/papers/NISR-WP-Phishing.pdf.

[382] "Phishing" scams show a number of similarities to spam e-mails. It is likely that those organised crime groups that are involved in spam are also involved in phishing scams, as they have access to spam databases. Regarding spam, see above: Chapter 2.5.g.

[383] Regarding related trademark violations, see above: Chapter 2.6.2.

[384] For more information about phishing scams see below: Chapter 2.8.4.

[385] One technical solution to ensure the integrity of data is the use of digital signatures.

[386] Peeters, Identity Theft Scandal in the U.S.: Opportunity to Improve Data Protection, Multimedia und Recht 2007, page 415; ITU Global Cybersecurity Agenda / High-Level Experts Group, Global Strategic Report, 2008, page 39, available at:

http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html; Regarding the different definitions of Identity Theft see: Gercke, Internet-related Identity Theft, 2007, available at: http://www.coe.int/t/e/legal_affairs/legal_co- operation/combating_economic_crime/3_Technical_cooperation/CYBER/567%20port%20id-d-

[387] identity%20theft%20paper%2022%20nov%2007.pdf.

399 One of the classic examples is the search for personal or secret information in trash or garbage bins ("dumpster diving"). For more information about the relation to Identity Theft see: Putting an End to Account-Hijacking identity Theft, page 10, Federal Deposit insurance Corporation, 2004, available at: http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf; Paget, Identity Theft - McAfee White Paper, page 6, 2007, available at: http://www.mcafee.com/us/threat_center/white_paper.html.

[388] Javelin Strategy & Research 2006 Identity Fraud Survey points out that although there were concerns over electronic methods of obtaining information, most thieves still obtain personal information through traditional rather than electronic channels. In the cases where the methods were known, less than 15% obtained online by electronic means. See Javelin Strategy & Research 2006 Identity Fraud Survey, Consumer Report, available at: http://www.javelinstrategy.com/products/99DEBA/27/delivery.pdf. For further information on other surveys see Chawki/Abdel Wahab, Identity Theft in Cyberspace: Issues and Solutions, page 9, Lex Electronica, Vol. 11, No. 1, 2006, available at: http://www.lex-electronica.org/articles/v11-1/ chawki_abdel-wahab.pdf.

[389] Gercke, Internet-related Identity Theft, 2007, available at: http://www.coe.int/tZe/legal_affairs/legal_co- operation/combating_economic_crime/3_Technical_cooperation/CYBER/567%20port%20id-d- identity%20theft%20paper%2022%20nov%2007.pdf; For an approach to divide between four phases see: Mitchison/Wilikens/Breitenbach/Urry/Portesi - Identity Theft - A discussion paper, page 21 et seq., available at: https://www.prime- project.eu/community/furtherreading/studies/IDTheftFIN.pdf.

[390] In some cases perpetrators used the data they obtained to hide their real identity. Regarding this aspect see: Gercke, Internet-related Identity Theft, 2007, available at: http://www.coe.int/t/e/legal_affairs/legal_co-

operation/combating_economic_crime/3_Technical_cooperation/CYBER/567%20port%20id-d-

[391] identity%20theft%20paper%2022%20nov%2007.pdf.

403 Chawki/Abdel Wahab, Identity Theft in Cyberspace: Issues and Solutions, page 17, Lex Electronica, Vol. 11, No. 1, 2006, available at: http://www.lex-electronica.org/articles/v11-1/ chawki_abdel-wahab.pdf.

[392] See: 2005 Identity Theft: Managing the Risk, Insight Consulting, page 2, available at: http://www.insight.co.uk/files/whitepapers/Identity%20Theft%20(White%20paper).pdf.

[393] Consumer Fraud and Identity Theft Complain Data, January - December 2005, Federal Trade Commission, 2006, page 3, available at: http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf.

[394] Consumer Fraud and Identity Theft Complain Data, January - December 2005, Federal Trade Commission, 2006, page 3 -available at: http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf.

[395] Putting an End to Account-Hijacking identity Theft, page 10, Federal Deposit insurance Corporation, 2004, available at: http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf; Paget, Identity Theft - McAfee White Paper, page 6, 2007, available at: http://www.mcafee.com/us/threat_center/white_paper.html.

[396] This method is not considered as an Internet-related approach.

[397] For more information see: Long/Skoudis/van Eijkelenborg, Google Hacking for Penetration Testers, 2005; Dornfest/Bausch/Calishain, Google Hacks: Tips & Tools for Finding and Using the World's Information, 2006.

[398] See: Nogguchi, Search engines lift cover of privacy, The Washington Post, 09.02.2004, available at: http://www.msnbc.msn.eom/id/4217665/print/l/displaymode/1098/.

[399] See: Congress of the United States, Committee on Oversight and Government Reform, 17.10.2007, available at: http://oversight.house.gov/documents/20071017134802.pdf.

[400] The CSI Computer Crime and Security Survey 2007 analysed among other issues the economic impact of Cybercrime businesses. It is based on the responses of 494 computer security practitioners from in U.S corporations, government agencies and financial institutions. The Survey is available at: http://www.gocsi.com/'

[401] See Granger, Social Engineering Fundamentals, Part I: Hacker Tactics, Security Focus, 2001, available at: http://www.securityfocus.com/infocus/1527.

[402] For more details see: Gercke, Legal Approaches to Criminalize Identity Theft, Commission on Crime Prevention and Criminal Justice, Document No: E/CN.15/2009/CRP.13, page 8 et seq.

[403] Garfinkel, Database nation: The Death of privacy in the 21st Century, 2000, page 33-34; Sobel, The Demeaning of Identity and personhood in National Identification Systems, Harvard Journal of Law & Technology, Vol. 15, Nr. 2, 2002, page 350.

[404] See Givens, Identity Theft: How It Happens, Its Impact on Victims, and Legislative Solutions, 2000, available at: http://www'privacyrights'0rg/ar/id_theft'htm'

[405] Emigh, Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures, 2005, page 6; Givens, Identity Theft: How It Happens, Its Impact on Victims, and Legislative Solutions, 2000, available at: http://www'privacyrights'0rg/ar/id_thefthtm'

[406] Examples is the online community Facebook, available at http://wwW'facebook'Com'

[407] See for example Art. 5 of the Directive 2000/31/Ec Of The European Parliament And Of The Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (Directive on electronic commerce).

[408] Putting an End to Account-Hijacking identity Theft, page 10, Federal Deposit insurance Corporation, 2004, available at: http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf.

[409] Regarding forensic analysis of e-mail communication see: Gupta, Digital Forensic Analysis of E-Mail: A Trusted E-Mail Protocol, International Journal of Digital Evidence, Vol. 2, Issue 4, available at: https://www.utica.edu/academic/institutes/ecii/publications/articles/A0B4342D-E76E-F8F2- AC926AB64EC719B8.pdf.

[410] "Identity Theft, Prevalence and Cost Appear to be Growing", GAO-02-363.

[411] United States Bureau of Justice Statistics, 2004, available at http://www.ojp.usdoj.gov/bjs/pub/pdf/it04.pdf.

[412] See Identity Theft: Do you know the signs?, The Fraud Advisory Panel, page 1, available at:

[413] http://www.fraudadvisorypanel.org/newsite/PDFs/advice/Identity%20Theft%20Final%20Proof%2011-7-03.pdf.

425 Paget, Identity Theft - McAfee White Paper, page 10, 2007, available at: http://www.mcafee.com/us/threat_center/white_paper.html.

[414] See Javelin Strategy & Research 2006 Identity Fraud Survey, Consumer Report, available at: http://www.javelinstrategy.com/products/99DEBA/27/delivery.pdf.

[415] See: Mitchison/Wilikens/Breitenbach/Urry/Poresi, "Identity Theft - A discussion paper", 2004, page 5, available at: https://www.prime- project.eu/community/furtherreading/studies/IDTheftFIN.pdf.

[416] The United States Federal Bureau of Investigation (FBI) requested companies not to keep quiet about phishing attacks and attacks on company IT systems, but to inform authorities, so that they can be better informed about criminal activities on the Internet. The Head of the FBI office in New York is quoted as saying: "It is a problem for us that some companies are clearly more worried about bad publicity than they are about the consequences of a successful hacker attack". See: Heise News, available at: http://www.heise-security.co.uk/news/80152.

[417] See: Mitchison/Wilikens/Breitenbach/Urry/Poresi, "Identity Theft - A discussion paper", 2004, page 5, available at: https://www.prime- project.eu/community/furtherreading/studies/IDTheftFIN.pdf.

[418] The availability of tools to commit cybercrime is one of the key challenges in the fight against cybercrime. For more information, see below: Chapter 3.2.h.

[419] "Websense Security Trends Report 2004", page 11, available at: http://www.websense.com/securitylabs/resource/WebsenseSecurityLabs20042H_Report.pdf; "Information Security - Computer Controls over Key Treasury Internet Payment System", GAO 2003, page 3, available at:

http://www.globalsecurity.org/security/library/report/gao/d03837.pdf. Sieber, Council of Europe "Organised Crime Report 2004", page 143.


Дата добавления: 2015-12-19; просмотров: 8; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!