Acknowledgements
Extraction of data and preparation of text: Lance Smith and Holly Johnson.
Note
Because of rounding, some percentages may not sum to 100.
Acknowledgements
Extraction of data and preparation of text: Lance Smith and Holly Johnson.
Note
Because of rounding, some percentages may not sum to 100.
Acknowledgements
Extraction of data and preparation of text: Max Kwiatkowski and Janet Smith.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Tina Houliaras and Samantha Bricknell.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Jack Dearden and Samantha Bricknell.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Samantha Bricknell and Jack Dearden.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Wendy Bonython and Kym Dossetor.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Georgina Fuller.
Note
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Georgina Fuller.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Georgina Fuller.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Simon Ng.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
Acknowledgements
Extraction of data and preparation of text: Willow Bryant.
Notes
Because of rounding, some percentages may not sum to 100.
Minor revisions are occasionally made to publications after release. The online version available on the AIC website will include any revisions made since printing.
The rapidly expanding capabilities of information and communications technologies (ICT) have created new crimes and new ways to commit old crimes. Criminal threats include: computer intrusions, distributed denial of service attacks, malware (the insertion of malicious software code into a computer), stealing ICT services, online child pornography and the misuse of email. This brief examines some of the terminology and sets out a definitional framework for measuring and analysing high tech crime.
The uptake of information and communication technologies (ICT) has led to new criminal activities and new ways of committing traditional crimes. This is the first in a series of high tech crime briefs looking at the impact of ICT on criminal activities. High tech or ICT-related crime is divided into offences where ICT is the object or target of an offence and where ICT is a tool for committing an offence.
This brief looks at high tech copyright offending. Information and communications technologies (ICT) make it increasingly easy to copy, swap and trade in copyrighted material such as software, and audio and video content in digital format. It is beyond the scope of this paper to consider the additional problem of the use of the internet to create a worldwide marketplace for the exchange of counterfeited goods.
While the computer is sometimes likened to a smoking gun, it is much more a silent witness. Careful investigation is required to uncover and preserve what it might say, and sophisticated forensic analysis must be applied to relay that to the court. In fact, despite the impression sometimes conveyed in the media, it is not always easy to investigate or prosecute high tech crime. The main evidential difficulties are the ephemeral nature of records such as ISP data logs and the capacity for the internet to be used anonymously (AGEC 2000).