Skip to main content

Abstract

The prevalence, definitions, and scope of cybercrime including the dual role of ‘weaponed’ malware are reviewed in this chapter. Also outlined are the history and role of hackers and online criminal networks in the dissemination of malicious software. Various forms of cybercrime are described including the use of deception or social engineering in the exploitation of computer systems or acquisition of identities. The importance of international cooperation in the suppression of cybercrime is illustrated by the coordination required in response to the proliferation of child exploitation materials (CEM). This chapter concludes with a summary of the challenges for law enforcement and the pressing need for broad partnerships in the prevention of cybercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • ABS. 2016. Personal Fraud 2014/15. Cat. no. 4528.0. Canberra: ABS.

    Google Scholar 

  • ACORN. 2016. Statistics Report. https://www.acorn.gov.au/resources. Accessed 8 Oct.

  • ACSC. 2015. Threat Report. Canberra: The Australian Cyber Security Centre.

    Google Scholar 

  • Alazab, Mamoun, and Roderic Broadhurst. 2016. Spam and Criminal Activity. Canberra: AIC.

    Google Scholar 

  • Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. 2013. Measuring the Cost of Cybercrime. In The Economics of Information Security and Privacy, ed. Rainer Böhme, 265–300. Berlin: Springer.

    Chapter  Google Scholar 

  • Broadhurst, Roderic. 2006. Developments in the Global Law Enforcement of Cyber-Crime. Policing 29 (3): 408–433.

    Article  Google Scholar 

  • Broadhurst, Roderic, and Peter Grabosky. 2005. Cybercrime: The Challenge in Asia. Hong Kong: Hong Kong University Press.

    Google Scholar 

  • Broadhurst, Roderic, Peter Grabosky, Mamoun Alazab, and Steve Chon. 2014. An Analysis of the Nature of Groups Engaged in Cyber Crime. International Journal of Cyber Criminology 8 (1): 1–20.

    Google Scholar 

  • Chabinsky, Steven R. 2010. The Cyber Threat: Who’s Doing What to Whom? Paper presented at Government Security/FOSE Conference, March 23, in Washington, DC.

    Google Scholar 

  • Chon, Ki Hong. 2016. Cybercrime Precursors: Towards a Model of Offender Resources. PhD dissertation, Australian National University.

    Google Scholar 

  • Commonwealth of Australia. 2016. Australia’s Cyber Security Strategy. Canberra: Department of the Prime Minister and Cabinet.

    Google Scholar 

  • Duffy, Conor. 2015. Law Agencies Look to Recruit Hackers as Cyber Attacks Increase. ABC News, June 15.

    Google Scholar 

  • Global Initiative. 2014. GIN Interview: Gavin Corn, Federal Prosecutor in FBI’s Cybercrime Taskforce. www.globalinitiative.net/gin-gavincorn.

  • Grabosky, Peter N., and Russell G. Smith. 1998. Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities. London: Transaction Publishers.

    Google Scholar 

  • Herzog, Stephen. 2011. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security 4: 49–60.

    Article  Google Scholar 

  • Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. 2015. Cybercrime and Digital Forensics: An Introduction. London: Routledge.

    Google Scholar 

  • Jayawardena, Kasun, and Roderic Broadhurst. 2007. Online Child Sex Solicitation: Exploring the Feasibility of a Research ‘Sting’. International Journal of Cyber Criminology 1 (2): 228–248.

    Google Scholar 

  • Levy, Stephen. 1984. Hackers: Heroes of the Computer Revolution. New York, NY: Anchor Press.

    Google Scholar 

  • Martin, James. 2014. Lost on the Silk Road: Online Drug Distribution and the ‘Cryptomarket’. Criminology and Criminal Justice 14 (3): 351–367.

    Article  Google Scholar 

  • McAfee. 2014. Net Losses: Estimating the Global Cost of Cybercrime. http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf.

  • McGuire, Michael. 2012. Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security.

    Google Scholar 

  • McWorther, Dan. 2013. Mandiant Exposes Apti: One of China’s Espionage Units and Releases 3,000 Indicators. Fireeye, February 19.

    Google Scholar 

  • Miniwatts. 2015. Internet Usage and 2015 Population in Oceania. Internet World Stats. http://www.internetworldstats.com/stats6.htm.

  • Nakashima, Ellen. 2012. When is a Cyberattack an Act of War? Washington Post, October 26.

    Google Scholar 

  • Rid, Thomas. 2016. Rise of the Machines: The Lost History of Cybernetics. New York, NY: Scribe.

    Google Scholar 

  • Rubinstein, Maria. 2013. Your Nigerian Inheritance is Waiting! Securelist, January 10.

    Google Scholar 

  • Sanger, David E. 2012. Obama Order Sped Up Wave of Cyberattacks Against Iran. The New York Times, June 1.

    Google Scholar 

  • Shackelford, Scott, Scott Russell, and Jeffrey Haut. Forthcoming. Bottoms up: A Comparison of Voluntary Cybersecurity Frameworks. UC Davis Business Law Journal.

    Google Scholar 

  • Smith, Russell G., and Alice Hutchings. 2014. Identity Crime and Misuse in Australia: Results of the 2013 Online Survey. Canberra: AIC.

    Google Scholar 

  • UNODC. 2013. Comprehensive Study on Cybercrime. UN: New York, NY.

    Google Scholar 

  • UNODC. 2015. Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children. UN: New York, NY.

    Google Scholar 

  • Urbas, Gregor. 2015. Cybercrime Legislation, Cases and Commentary. Chattswood: Butterworths.

    Google Scholar 

  • US Department of Justice. 2015. Major Computer Hacking Forum Dismantled. Justice News, July 15.

    Google Scholar 

  • US Department of Justice. 2016. Computer Crime and Intellectual Property Section (CCIPS). https://www.justice.gov/criminal-ccips. Accessed 8 Sep.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roderic Broadhurst .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Broadhurst, R. (2017). Cybercrime in Australia. In: Deckert, A., Sarre, R. (eds) The Palgrave Handbook of Australian and New Zealand Criminology, Crime and Justice. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-55747-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55747-2_15

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-55746-5

  • Online ISBN: 978-3-319-55747-2

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics