{"id":8454,"date":"2019-05-23T16:55:34","date_gmt":"2019-05-23T16:55:34","guid":{"rendered":"http:\/\/www.firstlinepractitioners.com\/towards-a-conceptualisation-of-cloud-cybercrime\/"},"modified":"2025-01-08T08:21:51","modified_gmt":"2025-01-08T08:21:51","slug":"towards-a-conceptualisation-of-cloud-cybercrime","status":"publish","type":"post","link":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/","title":{"rendered":"Towards a conceptualisation of cloud cybercrime"},"content":{"rendered":"<p>The term \u2018Cloud\u2019 is actually a distracting misnomer that obfuscates attempts to systematically understand the impact of the cloud technologies, which have driven services that provide \u2018on-demand\u2019 computing resources with increasing effect since the mid-2000s. Moreover, \u2018Cloud\u2019 lacks the conceptual clarification needed to understand the implications of cloud technologies upon criminal behavior, crime analysis and also law enforcement. Many commentators refer to \u2018the Cloud\u2019 as a \u2018thing\u2019, an object, whereas others see it as simply a technological method of increasing computer storage and power &#8211; others deny its existence at all. \u2018Cloud technologies\u2019 \u2013 the preferred descriptor over \u2018Cloud\u2019\u2013 have impacted upon computing by <em>increasing power<\/em> and <em>storage<\/em> and delivering large scale computing<em> much cheaper<\/em> and <em>on-demand<\/em>. All are qualities that have not been lost on offenders, much to the frustration of law enforcement officers.<\/p>\n<p>Cybercrime (with or without cloud technologies) takes place in a cyberspace; an \u2018imaginary\u2019 space created by the social reaction to the combination of Digital and Network technologies across distributed networks of communication. These technologies have created offending behaviours that are <em>global, informational<\/em>, and <em>distributed, <\/em>though while this space may be essentially imaginary, the consequences of criminal actions in cyberspace have very real consequences in the physical world. Moreover, internet technologies have given offenders considerable agility and scalability, effectively democratizing crimes such as fraud and hacking that were crimes of the powerful and the knowledgeable, respectively. The average person could, in theory, now commit many crimes simultaneously in ways not previously imagined possible, and on a global scale. There is, therefore, no longer any need for criminals to commit a large crime at great risk to themselves, because one person can now commit many small crimes with lesser risk to themselves. The (cyber) difference is that financial criminals no longer needed to commit a high risk $50 million robbery when they could commit 50 million low risk $1 robberies using a networked computer.<\/p>\n<p>So, the \u2018cyber\u2019 aspect of cybercrime needs to be understood as a process of transformation rather than a thing (The Transformation Test). If the cybercrime disappears when digital and networked technologies are removed, then it is not a \u2018true\u2019 cybercrime, but in reality there are many variations. We therefore need to consider both the \u2018cyber\u2019, the level of <em>technological mediation, <\/em>and also the \u2018crime\u2019 aspect (<em>modus operandi)<\/em>.<\/p>\n<p>In terms of technological mediation \u2018<em>cyber-dependent<\/em>\u2019 crimes, such as DDoS attacks, spamming, piracy etc. would not disappear if the internet was removed. On the other hand, \u2018<em>Cyber-assisted<\/em>\u2019 crimes (e.g. a murderer web searching \u2018how to kill someone\u2019) would still take place. In between the two are hybrid \u2018<em>cyber-enabled<\/em>\u2019 crimes which include most types of frauds and deception. They existing crimes that are given a global, informational and distributed lift that is characteristic of \u2018cyber\u2019. Remove it and they still happen, but locally and small scale.<\/p>\n<p>At the \u2018crime\u2019 end of cybercrime are various <em>modus operandi<\/em> (objectives and intents); rarely commented upon in the literature. We therefore need to distinguish \u2018<em>cybercrimes committed against the machine<\/em>\u2019, such as hacking and DDOS attacks etc., from \u2018<em>cybercrimes that use the machine<\/em>\u2019, such as frauds etc. Both of these also differ from \u2018<em>cybercrimes in the machine<\/em>\u2019 (content crime) such as extreme pornography, hate speech and imagery and social networking offences etc.<\/p>\n<p>As indicated earlier, Cloud technologies have a <em>quantitative<\/em> \u2018force multiplier effect\u2019 upon cybercrime enabling a large volume of more complex crimes to take place &#8211; so, the 50 million $1 robberies would become 50 billion robberies of 0.1 cent. But they also have had a <em>qualitative<\/em> effect by introducing new types of cybercrime such as data breaches, DDoS attacks, Mass Spams, cryptojacking. plus, a range of cybercrime-as-a-service facilities that enable offending.<\/p>\n<p>To understand or explain the impact of cloud technologies a <em>cloud mediation<\/em> aspect could be added to the above cybercrime model. Using the \u2018transformation\u2019 test what would be left of the cybercrime if cloud technology were to be removed. <em>Cloud dependent<\/em> cybercrimes such as big data-theft (data breaches) or cryptojacking would disappear without cloud technologies. <em>Cloud assisted<\/em>, assisted by cloud technologies, for example, where the public will increasingly source illegal items from the darkweb, would still take place by other means. In between the two, <em>cloud enabled<\/em> cybercrimes such as mass scam spams would (in estimation) reduce in scale from 10 billion every 10 seconds to 10 million every 10 minutes if the cloud technologies were removed.<\/p>\n<p>In summary, whilst digital and networked technologies transformed criminal behaviour to create a range of cybercrimes, cloud technologies have since provided a further force multiplier effect that has also created new opportunities for offending to further expands the reach of offenders whilst also generating new challenges for law enforcement. The CRITiCal project will explore three cloud enabled or dependent forms of cybercrime: big data theft, mass DDoS attacks, and bulk spamming, each of which, play key roles in constructing the cybercrime ecosystem and also delivering Ransomware (EMPHASIS Project).<\/p>\n<p><em>Excerpted from<\/em> Wall, D.S. (2017) \u2018Towards a conceptualization of cloud (cyber)crime\u2019, <em>5th International Conference on Human Aspects of Information Security, Privacy and Trust, <\/em>Vancouver 9-14 July 2017. <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3038866\">https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3038866<\/a> \u2013 Funded by EPSRC EP\/M020576\/1 &amp; EP\/P011772\/1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term \u2018Cloud\u2019 is actually a distracting misnomer that obfuscates attempts to systematically understand the impact of the cloud technologies, which have driven services that provide \u2018on-demand\u2019 computing resources with increasing effect since the mid-2000s. Moreover, \u2018Cloud\u2019 lacks the conceptual clarification needed to understand the implications of cloud technologies upon criminal behavior, crime analysis and also law enforcement. <\/p>\n","protected":false},"author":9,"featured_media":7281,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148,87],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Towards a conceptualisation of cloud cybercrime - FIRST-LINE PRACTITIONERS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Towards a conceptualisation of cloud cybercrime - FIRST-LINE PRACTITIONERS\" \/>\n<meta property=\"og:description\" content=\"The term \u2018Cloud\u2019 is actually a distracting misnomer that obfuscates attempts to systematically understand the impact of the cloud technologies, which have driven services that provide \u2018on-demand\u2019 computing resources with increasing effect since the mid-2000s. Moreover, \u2018Cloud\u2019 lacks the conceptual clarification needed to understand the implications of cloud technologies upon criminal behavior, crime analysis and also law enforcement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"FIRST-LINE PRACTITIONERS\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-23T16:55:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T08:21:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstlinepractitioners.com\/wp-content\/uploads\/2018\/04\/reports-e1523531730504.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Florian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/\",\"url\":\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/\",\"name\":\"Towards a conceptualisation of cloud cybercrime - FIRST-LINE PRACTITIONERS\",\"isPartOf\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#website\"},\"datePublished\":\"2019-05-23T16:55:34+00:00\",\"dateModified\":\"2025-01-08T08:21:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firstlinepractitioners.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Towards a conceptualisation of cloud cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#website\",\"url\":\"https:\/\/www.firstlinepractitioners.com\/el\/\",\"name\":\"FIRST-LINE PRACTITIONERS\",\"description\":\"Curricula - Knowledge - Navigation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firstlinepractitioners.com\/el\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3\",\"name\":\"Florian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g\",\"caption\":\"Florian\"},\"url\":\"https:\/\/www.firstlinepractitioners.com\/de\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Towards a conceptualisation of cloud cybercrime - FIRST-LINE PRACTITIONERS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/","og_locale":"de_DE","og_type":"article","og_title":"Towards a conceptualisation of cloud cybercrime - FIRST-LINE PRACTITIONERS","og_description":"The term \u2018Cloud\u2019 is actually a distracting misnomer that obfuscates attempts to systematically understand the impact of the cloud technologies, which have driven services that provide \u2018on-demand\u2019 computing resources with increasing effect since the mid-2000s. Moreover, \u2018Cloud\u2019 lacks the conceptual clarification needed to understand the implications of cloud technologies upon criminal behavior, crime analysis and also law enforcement.","og_url":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/","og_site_name":"FIRST-LINE PRACTITIONERS","article_published_time":"2019-05-23T16:55:34+00:00","article_modified_time":"2025-01-08T08:21:51+00:00","og_image":[{"width":2000,"height":1330,"url":"https:\/\/www.firstlinepractitioners.com\/wp-content\/uploads\/2018\/04\/reports-e1523531730504.jpg","type":"image\/jpeg"}],"author":"Florian","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Florian","Gesch\u00e4tzte Lesezeit":"4 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/","url":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/","name":"Towards a conceptualisation of cloud cybercrime - FIRST-LINE PRACTITIONERS","isPartOf":{"@id":"https:\/\/www.firstlinepractitioners.com\/el\/#website"},"datePublished":"2019-05-23T16:55:34+00:00","dateModified":"2025-01-08T08:21:51+00:00","author":{"@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3"},"breadcrumb":{"@id":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstlinepractitioners.com\/de\/towards-a-conceptualisation-of-cloud-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firstlinepractitioners.com\/de\/"},{"@type":"ListItem","position":2,"name":"Towards a conceptualisation of cloud cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#website","url":"https:\/\/www.firstlinepractitioners.com\/el\/","name":"FIRST-LINE PRACTITIONERS","description":"Curricula - Knowledge - Navigation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstlinepractitioners.com\/el\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/b34843a12defd8503efa62cbb39edbd3","name":"Florian","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5193b32cfd0b1df3bedd57dc497af30e?s=96&d=mm&r=g","caption":"Florian"},"url":"https:\/\/www.firstlinepractitioners.com\/de\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/posts\/8454"}],"collection":[{"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/comments?post=8454"}],"version-history":[{"count":1,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/posts\/8454\/revisions"}],"predecessor-version":[{"id":8464,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/posts\/8454\/revisions\/8464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/media\/7281"}],"wp:attachment":[{"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/media?parent=8454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/categories?post=8454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/de\/wp-json\/wp\/v2\/tags?post=8454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}