Cybercrime Investigations and Prosecutions
- LAST MODIFIED: 26 February 2020
- DOI: 10.1093/obo/9780195396607-0276
- LAST MODIFIED: 26 February 2020
- DOI: 10.1093/obo/9780195396607-0276
Introduction
Official crime statistics from around the globe suggest that violent and property crime rates have steadily decreased since the early 1990s. At the same time, it seems that the volume of cybercrime incidents against individuals and organizations, both public and private, has dramatically increased according to the FBI in 2018. In an effort to mitigate online users’ potential victimization to cybercrime, government, private, and public organizations have embraced a wide range of policies aimed at regulating users’ behaviors in cyberspace. Simultaneously, to deter offenders from initiating online crimes, government authorities and law enforcement agencies revised existing criminal laws and enacted specific cybercrime laws. These new laws clearly define online users’ illegitimate behaviors with computers and computer networks, the potential penalties for initiating such behaviors, and the legal procedures that govern official investigations and prosecutions of online crimes. Still, due to the unique nature of cybercrime, investigating cybercrime incidents and prosecuting cybercriminals pose significant challenges to law enforcement agencies. Those challenges manifest themselves in new types of investigation practices, types of evidence, and legal responsibilities, and require law enforcement agencies to adapt better to the online dimension of crime. This reference list provides a guide to the key themes and sources within the topic of cybercrime investigations and prosecutions, which are performed under the realm of criminal procedural law.
General Overviews
Brown 2015 provides a summary of criminal justice investigatory efforts and prosecution-related responses to cybercrime incidents, which are launched in countries that follow the common law model. Grabosky 2016 summarizes key issues encountered by cybercrime investigators and prosecutors when dealing with cybercrime cases, as well as discussing the details of several known operations and court cases led by US legal authorities since the 1980s. Downing 2004 provides an overview of substantive and procedural cybercrime laws in several countries around the world. Orton 2011 presents a comprehensive review of investigative and prosecution approaches employed by law enforcement agencies in the United States to respond to system trespassing, data destruction, and cyber-harassment cases. The 2018 Internet Crime Report (Federal Bureau of Investigation 2018) is the latest annual cybercrime report by the FBI. Finally, Malby, et al. 2013 presents an overview of investigative and procedural issues reported by sixty-nine member states in the United Nations in dealing with cybercrime cases.
Brown, C. 2015. Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology 9.1: 55–119.
An overview paper that aims to introduce readers to technical, legal, and enforcement-related activities and challenges faced by law enforcement while investigating and prosecuting cybercrime cases.
Downing, R. W. 2004. Shoring up the weakest link: What lawmakers around the world need to consider in developing comprehensive laws to combat cybercrime. Columbia Journal of Transitional Law 43.3: 705–762.
A review of key substantive and procedural laws enacted by several countries to deter and punish attacks on computer networks and online information, along with a list of necessary components for increasing the effectiveness of these laws.
Federal Bureau of Investigation. 2018. 2018 Internet crime report.
These annual reports by the FBI offer a look into the various cybercrimes reported to the FBI over time.
Grabosky, P. 2016. Cybercrime. New York: Oxford Univ. Press.
This book provides an introductory overview of cybercrime and the legal efforts dedicated to its control.
Malby, S., R. Mace, A. Holterhof, C. Brown, S. Kascherus, and E. Ignatuschtschenko. 2013. Comprehensive study on cybercrime. United Nations Office on Drugs and Crime.
A report prepared by the United Nations to capture the magnitude of cybercrime around the world and understand different countries’ legal responses to these crimes.
Orton, I. 2011. The investigation and prosecution of a cybercrime. In Cybercrime: The investigation, prosecution and defense of a computer-related crime. Edited by Ralph D. Clifford, 105–200. 3d ed. Durham, NC: Carolina Academic Press.
A chapter reviewing the practical issues associated with investigating and prosecuting different types of cybercrime (hacking, data destruction, and cyber harassment).
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Active Offender Research
- Actus Reus
- Adler, Freda
- Adversarial System of Justice
- Adverse Childhood Experiences
- Aging Prison Population, The
- Airport and Airline Security
- Alcohol and Drug Prohibition
- Alcohol Use, Policy and Crime
- Alt-Right Gangs and White Power Youth Groups
- Animals, Crimes Against
- Anomie
- Arson
- Art Crime
- Back-End Sentencing and Parole Revocation
- Bail and Pretrial Detention
- Batterer Intervention Programs
- Bentham, Jeremy
- Big Data and Communities and Crime
- Biosocial Criminology
- Blackmail
- Black's Theory of Law and Social Control
- Blumstein, Alfred
- Boot Camps and Shock Incarceration Programs
- Burglary, Residential
- Bystander Intervention
- Capital Punishment
- Chambliss, William
- Chicago School of Criminology, The
- Child Maltreatment
- Chinese Triad Society
- Civil Protection Orders
- Collateral Consequences of Felony Conviction and Imprisonm...
- Collective Efficacy
- Commercial and Bank Robbery
- Commercial Sexual Exploitation of Children
- Communicating Scientific Findings in the Courtroom
- Community Change and Crime
- Community Corrections
- Community Disadvantage and Crime
- Community-Based Justice Systems
- Community-Based Substance Use Prevention
- Comparative Criminal Justice Systems
- CompStat Models of Police Performance Management
- Confessions, False and Coerced
- Conservation Criminology
- Consumer Fraud
- Contextual Analysis of Crime
- Control Balance Theory
- Convict Criminology
- Co-Offending and the Role of Accomplices
- Corporate Crime
- Costs of Crime and Justice
- Courts, Drug
- Courts, Juvenile
- Courts, Mental Health
- Courts, Problem-Solving
- Crime and Justice in Latin America
- Crime, Campus
- Crime Control Policy
- Crime Control, Politics of
- Crime, (In)Security, and Islam
- Crime Prevention, Delinquency and
- Crime Prevention, Situational
- Crime Prevention, Voluntary Organizations and
- Crime Trends
- Crime Victims' Rights Movement
- Criminal Career Research
- Criminal Decision Making, Emotions in
- Criminal Justice Data Sources
- Criminal Justice Ethics
- Criminal Justice Fines and Fees
- Criminal Justice Reform, Politics of
- Criminal Justice System, Discretion in the
- Criminal Records
- Criminal Retaliation
- Criminal Talk
- Criminology and Political Science
- Criminology of Genocide, The
- Critical Criminology
- Cross-National Crime
- Cross-Sectional Research Designs in Criminology and Crimin...
- Cultural Criminology
- Cultural Theories
- Cybercrime
- Cybercrime Investigations and Prosecutions
- Cycle of Violence
- Day Fines
- Deadly Force
- Defining "Success" in Corrections and Reentry
- Desistance
- Deterrence
- Developmental and Life-Course Criminology
- Digital Piracy
- Driving and Traffic Offenses
- Drug Control
- Drug Trafficking, International
- Drugs and Crime
- Elder Abuse
- Electronically Monitored Home Confinement
- Employee Theft
- Environmental Crime and Justice
- Experimental Criminology
- Extortion
- Family Violence
- Fear of Crime and Perceived Risk
- Felon Disenfranchisement
- Femicide
- Feminist Theories
- Feminist Victimization Theories
- Fencing and Stolen Goods Markets
- Firearms and Violence
- Forensic Science
- For-Profit Private Prisons and the Criminal Justice–Indust...
- Fraud
- Gambling
- Gangs, Peers, and Co-offending
- Gender and Crime
- Gendered Crime Pathways
- General Opportunity Victimization Theories
- Genetics, Environment, and Crime
- Green Criminology
- Halfway Houses
- Harm Reduction and Risky Behaviors
- Hate Crime
- Hate Crime Legislation
- Healthcare Fraud
- Hirschi, Travis
- History of Crime in the United Kingdom
- History of Criminology
- Homelessness and Crime
- Homicide
- Homicide Victimization
- Honor Cultures and Violence
- Hot Spots Policing
- Human Rights
- Human Trafficking
- Identity Theft
- Immigration, Crime, and Justice
- Incarceration, Mass
- Incarceration, Public Health Effects of
- Income Tax Evasion
- Institutional Anomie Theory
- Integrated Theory
- Intermediate Sanctions
- Interpersonal Violence, Historical Patterns of
- Interrogation
- Intimate Partner Violence, Criminological Perspectives on
- Intimate Partner Violence, Police Responses to
- Investigation, Criminal
- Juvenile Delinquency
- Juvenile Justice System, The
- Kidnapping
- Kornhauser, Ruth Rosner
- Labeling Theory
- Labor Markets and Crime
- Land Use and Crime
- Lead and Crime
- Legitimacy
- LGBTQ Intimate Partner Violence
- LGBTQ People in Prison
- Life Without Parole Sentencing
- Local Institutions and Neighborhood Crime
- Lombroso, Cesare
- Longitudinal Research in Criminology
- Mandatory Minimum Sentencing
- Mapping and Spatial Analysis of Crime, The
- Mass Media, Crime, and Justice
- Measuring Crime
- Mediation and Dispute Resolution Programs
- Mental Health and Crime
- Merton, Robert K.
- Meta-analysis in Criminology
- Middle-Class Crime and Criminality
- Migrant Detention and Incarceration
- Money Laundering
- Motor Vehicle Theft
- Multi-Level Marketing Scams
- Murder, Serial
- Narrative Criminology
- National Deviancy Symposia, The
- Nature Versus Nurture
- Neighborhood Disorder
- Neutralization Theory
- New Penology, The
- Offender Decision-Making and Motivation
- Offense Specialization/Expertise
- Organized Crime
- Outlaw Motorcycle Clubs
- Panel Methods in Criminology
- Peacemaking Criminology
- Peer Networks and Delinquency
- Performance Measurement and Accountability Systems
- Personality and Trait Theories of Crime
- Persons with a Mental Illness, Police Encounters with
- Phenomenological Theories of Crime
- Plea Bargaining
- Poaching
- Police Administration
- Police Cooperation, International
- Police Discretion
- Police Effectiveness
- Police History
- Police Militarization
- Police Misconduct
- Police, Race and the
- Police Use of Force
- Police, Violence against the
- Policing and Law Enforcement
- Policing, Body-Worn Cameras and
- Policing, Broken Windows
- Policing, Community and Problem-Oriented
- Policing Cybercrime
- Policing, Evidence-Based
- Policing, Intelligence-Led
- Policing, Privatization of
- Policing, Proactive
- Policing, School
- Policing, Stop-and-Frisk
- Policing, Third Party
- Polyvictimization
- Positivist Criminology
- Pretrial Detention, Alternatives to
- Pretrial Diversion
- Prison Administration
- Prison Classification
- Prison, Disciplinary Segregation in
- Prison Education Exchange Programs
- Prison Gangs and Subculture
- Prison History
- Prison Labor
- Prison Visitation
- Prisoner Reentry
- Prisons and Jails
- Private Security
- Probation Revocation
- Procedural Justice
- Property Crime
- Prosecution and Courts
- Prostitution
- Psychiatry, Psychology, and Crime: Historical and Current ...
- Psychology and Crime
- Public Criminology
- Public Opinion, Crime and Justice
- Public Order Crimes
- Public Social Control and Neighborhood Crime
- Punishment Justification and Goals
- Qualitative Methods in Criminology
- Queer Criminology
- Race and Sentencing Research Advancements
- Race, Ethnicity, Crime, and Justice
- Racial Threat Hypothesis
- Racial Profiling
- Rape and Sexual Assault
- Rape, Fear of
- Rational Choice Theories
- Rehabilitation
- Religion and Crime
- Restorative Justice
- Risk Assessment
- Routine Activity Theories
- School Bullying
- School Crime and Violence
- School Safety, Security, and Discipline
- Search Warrants
- Seasonality and Crime
- Self-Control, The General Theory:
- Self-Report Crime Surveys
- Sentencing Enhancements
- Sentencing, Evidence-Based
- Sentencing Guidelines
- Sentencing Policy
- Sex Crimes
- Sex Offender Policies and Legislation
- Sex Trafficking
- Sexual Revictimization
- Situational Action Theory
- Snitching and Use of Criminal Informants
- Social and Intellectual Context of Criminology, The
- Social Construction of Crime, The
- Social Control of Tobacco Use
- Social Control Theory
- Social Disorganization
- Social Ecology of Crime
- Social Learning Theory
- Social Networks
- Social Threat and Social Control
- Solitary Confinement
- South Africa, Crime and Justice in
- Sport Mega-Events Security
- Stalking and Harassment
- State Crime
- State Dependence and Population Heterogeneity in Theories ...
- Strain Theories
- Street Code
- Street Robbery
- Substance Use and Abuse
- Surveillance, Public and Private
- Sutherland, Edwin H.
- Technology and the Criminal Justice System
- Technology, Criminal Use of
- Terrorism
- Terrorism and Hate Crime
- Terrorism, Criminological Explanations for
- Testimony, Eyewitness
- Therapeutic Jurisprudence
- Trajectory Methods in Criminology
- Transnational Crime
- Truth-In-Sentencing
- Urban Politics and Crime
- US War on Terrorism, Legal Perspectives on the
- Victimization, Adolescent
- Victimization, Biosocial Theories of
- Victimization Patterns and Trends
- Victimization, Repeat
- Victimization, Vicarious and Related Forms of Secondary Tr...
- Victimless Crime
- Victim-Offender Overlap, The
- Violence Against Women
- Violence, Youth
- Violent Crime
- White-Collar Crime
- White-Collar Crime, The Global Financial Crisis and
- White-Collar Crime, Women and
- Wilson, James Q.
- Wolfgang, Marvin
- Women, Girls, and Reentry
- Wrongful Conviction