Cybercrime TEACHING GUIDE - United Nations Office On Drugs And Crime

1y ago
9 Views
2 Downloads
786.55 KB
62 Pages
Last View : 18d ago
Last Download : 3m ago
Upload by : Elisha Lemon
Transcription

UNIVERSITY MODULE SERIESCybercrimeTEACHING GUIDE

UNITED NATIONS OFFICE ON DRUGS AND CRIMEEDUCATION FOR JUSTICEUNIVERSITY MODULE SERIESCybercrimeTEACHING GUIDEUNITED NATIONSVienna, 2019

This Teaching Guide is a resource for lecturers.Developed under the Education for Justice (E4J) initiative of the United Nations Office on Drugs and Crime(UNODC), a component of the Global Programme for the Implementation of the Doha Declaration, this Guideforms part of the E4J University Module Series on Cybercrime. The full range of E4J materials includes universitymodules on integrity and ethics, crime prevention and criminal justice, anti-corruption, organized crime, firearms,trafficking in persons / smuggling of migrants, wildlife, forest and fisheries crime, counter-terrorism as well ascybercrime.All the modules in the E4J University Module Series provide suggestions for in-class exercises, student assessments,slides and other teaching tools that lecturers can adapt to their contexts, and integrate into existing universitycourses and programmes. Each Module provides an outline for a three-hour class, but can be used for shorter orlonger sessions.All E4J university modules engage with existing academic research and debates, and may contain information,opinions and statements from a variety of sources, including press reports and independent experts. Links toexternal resources were tested at the time of publication. However, as third-party websites may change, pleasecontact us if you come across a broken link or are redirected to inappropriate content. Please also inform us if younotice that a publication is linked to an unofficial version or website.Terms and conditions of use of the Module can be found on the E4J website. United Nations, September 2019. All rights reserved, worldwide.The designations employed and the presentation of material in this publication do not imply the expression ofany opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of anycountry, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries.This publication has not been formally edited.

ContentWelcome message . 2Executive summary . 3Introduction. 6Teaching and learning methods . 10Learning styles . 11Multiple modalities of learning . 13Learning outcomes and assessment tools . 16Module adaptation and design guidelines . 18Localizing the content . 18Integrating within an existing course . 18Changing the timeframe. 19Developing a stand-alone course. 19Overview of the Cybercrime Modules . 20Module 1: Introduction to Cybercrime. 20Module 2: General Types of Cybercrime . 21Module 3: Legal Frameworks and Human Rights . 22Module 4: Introduction to Digital Forensics. 23Module 5: Cybercrime Investigation . 24Module 6: Practical Aspects of Cybercrime Investigations and Digital ForensicsIntroduction . 25Module 7: International Cooperation against Cybercrime . 27Module 8: Cybersecurity and Cybercrime Prevention: Strategies, Policies and Programmes. 28Module 9: Cybersecurity and Cybercrime Prevention: Practical Applications and Measures. 29Module 10: Privacy and Data Protection. 30Module 11: Cyber-Enabled Intellectual Property Crime . 32Module 12: Interpersonal Cybercrime . 33Module 13: Cyber Organized Crime . 341

Module 14: Hacktivism, Terrorism, Espionage, Disinformation Campaigns, and Warfare inCyberspace . 35Conclusion . 37References . 37Acknowledgements . 38Appendix A: Glossary of Terms . 40Welcome messageWelcome to the Education for Justice (E4J) University Module Series on Cybercrime. TheCybercrime University Module Series development team has worked hard to find the mostrelevant, cross-cultural resources. Cybercrime is a growing, global problem. Whether you area small business, a fortune 500 company, buying your first smartphone, or studying to be acybersecurity expert, you need to be aware of cybercrime.The Internet affords education and economic opportunities beyond anything the world hasever seen. This same tool, however, gives unprecedented opportunities to cause harm. Byabusing technology, cybercriminals can ruin businesses and even lives. Many organizationsaround the world are fighting to stop cybercriminals and help to make systems more secure.However, one of the best methods of prevention is education.The E4J University Module Series on Cybercrime brings together resources from around theworld related to cybercrime, legislation, investigation and prevention. These Modules covermany aspects of this complex and fascinating field and include both theoretical concepts, aswell as practical knowledge. The Modules provide themes and resources required for arounded education on the various aspects of cybercrime, including cybercrime investigationand prevention.The Modules are written with lecturers in mind by practicing educators. We have aimed todesign a structure that provides the most support for building a new course, or a new series ofcourses, with as little effort as possible. We know building a new course on your own is difficult,especially in new areas of study like cybercrime. These Modules will give educators all the toolsthey need to build a great curriculum.We envision an educator using these Modules to construct a course that best fits the needs ofhis or her students. We strive for each Module to be as self-contained as possible, while fitting2

into an overarching theme. Educators are encouraged to use Modules from all availableteaching guides to create a custom course that meets the educator’s individual teaching goals.For example, Modules from the E4J University Module Series on Integrity and Ethics could becombined with some of the Cybercrime Modules in a practical cybersecurity and anticyberbullying course for students.Technology and cybercrime evolve quickly. These Modules include core concepts needed tounderstand the problem of cybercrime. However, an educator should be aware of changes inthe cybercrime landscape. This is especially true for local cybercrime legislation which isconstantly being created and revised. For example, cyberbullying is such a new concept thatmany countries have not yet passed related legislation. More people than ever before haveaccess to technologies such as smartphones, and if online harassment is not yet an issue beingexplored by lawmakers in your country, it likely will be in the future. Now is the time to teachthe future generation how to respond to current and upcoming types of cybercrime in ahealthy and safe way.Further, states are examining their cyberwarfare options, and just like traditional warfarecyberwarfare will have negative consequences for civilians. Education on cybercrime issues canfacilitate informed dialogue and peaceful resolutions of cyberconflict. The world, therefore,desperately needs a better understanding of the current state of cybercrime, cybersecurity,and cyberspace in general.Cybercrime poses many challenges, but by working together we can make the Internet a safer,secure and more productive place. We would like to thank you, educators, for helping to teachthe next generations about cybercrime and prevention.Executive summaryThe E4J University Module Series on Cybercrime provides lecturers with guidance andresources to build a comprehensive, cross-discipline course on cybercrime. The Moduleswithin the series provide the themes and resources required for a rounded education on thevarious aspects of cybercrime and cybercrime investigation. The Modules cover cybercrimetrends, theories, perspectives, laws, measures, and practices through a multidisciplinary lens.The Teaching Guide and 14 Modules are the result of collaborative work from leading expertsand academics from over 25 countries on six different continents. The Modules cover manyaspects of this highly pertinent field and include both theoretical concepts as well as practicalknowledge:3

Module 1 serves as an introduction to cybercrime, including key concepts relating tocomputing, global connectivity, technology usage, and cybercrime trends, and the technical,legal, ethical, and operational challenges related to cybercrime, and cybercrime prevention.Module 2 covers general categories of cybercrime, particularly offences against theconfidentiality, integrity and availability of computer data and systems, computer-relatedoffences, and content-related offences, and the types of cybercrimes included within thesecategories.Module 3 describes the legal landscape relating to cybercrime, highlights the need forharmonized legislation, and outlines the relationship between cybercrime laws and humanrights. Special attention is paid to the need for cybercrime laws to comply with human rightslaw, and any limitation of human rights to be in accordance with human rights standards andprinciples.Module 4 provides an overview of digital forensics and electronic evidence, looking in particularat the digital forensics process, common digital forensics practices, standards for digitalforensics and electronic evidence, and good practices in digital forensics.Module 5 examines a multitude of stakeholders (i.e., agencies, organizations, businesses, andindividuals) and their roles in cybercrime investigations, as well as the reporting of cybercrime,the challenges posed by cybercrime investigations, and the role of knowledge management incybercrime investigations.Module 6 discusses digital forensics and cybercrime investigations. This Module explores thelegal and ethical obligations of cybercrime investigators and digital forensics professionals,good practices in the handling of digital evidence, its analysis, the reporting of digital forensicsresults, and the assessment of digital evidence.Module 7 provides an in-depth exploration of international cooperation as it relates tocybercrime, particularly issues of sovereignty and jurisdiction, factors influencing internationalcooperation, formal and informal international cooperation mechanisms, extraterritorialevidence collection, and the national deficits in capacity to conduct cybercrime investigations.Module 8 critically explores the cybersecurity strategies countries use to protect informationand communication technology (ICT), the features and life cycles of these strategies, theframeworks used to assess these strategies and countries’ cyber-related security and crimeprevention efforts, and the nature and extent of countries’ abilities to protect ICT.4

Module 9 covers cybersecurity risks and risk-related concepts, cybersecurity research andvulnerability disclosure, situational crime prevention strategies and techniques, and usablecybersecurity measures that are designed to identify threats and vulnerabilities, and prevent,detect, respond to, and recover from materialized threats.Module 10 critically examines the impact of data aggregation, as well as the impact of datacollection, storage, analysis, use, and sharing, on privacy and security. Specifically, this Modulecovers privacy as a human right, the relationship between privacy and security, the ways inwhich cybercrime compromises privacy and data security, and data protection and breachnotification laws, as well as the ways in which data is (and can be) protected to secure persons,property, and information.Module 11 examines intellectual property and its cyber-enabled unauthorized access,distribution, and use. Specifically, this Module examines what intellectual property is, types ofintellectual property, the causes, reasons, and perceived justifications for cyber-enabledcopyright and trademark offences, and protective and preventive measures against suchoffences.Module 12 focuses on interpersonal cybercrimes, including online child sexual abuse material,cyberstalking, cyberharassment, image-based sexual abuse, and cyberbullying, looking inparticular at the gendered dimensions of these cybercrimes, the ways in which thesecybercrimes are perpetrated, the laws targeting these cybercrimes, and global response andprevention efforts.Module 13 examines the types of crimes that are considered as cyber organized crime and thetypes of organized criminal groups that engage in cybercrime. This Module further exploresthe measures used to counter cyber organized crime.Module 14 examines topics, such as hacktivism, terrorism, espionage, disinformationcampaigns, and warfare in cyberspace, as well as national and international perspectives andresponses to these cyber activities. The purpose of this Module is to discuss these topics andidentify current debates and conflicting views on these topics within and between countries.The Modules, by design, contain elements that can be customized by lecturers from anycountry to suit their educational needs. While the E4J University Module Series on Cybercrimeattempts to be as comprehensive as possible, one course can only lay the foundation of keyconcepts related to cybercrime. Each subtopic within the Module can be explored in muchfurther detail and can even be expanded into its own course. Therefore, we have includedoptional resources for educators to advance their knowledge in related areas. The goal of theseModules is to advance global knowledge about cybercrime, including cybercrime investigationand prevention. While these Modules provide a strong foundation of cybercrime knowledge,5

we encourage educators to add their own experiences and customize teaching material andexamples to suit their local context in order to build the best possible educational content.The purpose of this Teaching Guide is to explain the thought process behind the developmentof the Modules and what principles guided their development.IntroductionEducation for Justice (E4J) was developed as part of UNODC’s Global Programme to supportkey objectives of the Doha Declaration on Integrating Crime Prevention and Criminal Justiceinto the Wider United Nations Agenda to Address Social and Economic Challenges and toPromote the Rule of Law at the National and International Levels, and Public Participation (theDoha Declaration), which was adopted by the Thirteenth United Nations Congress on CrimePrevention and Criminal Justice in 2015 and endorsed by the United Nations General Assemblyin its Resolution 70/174 (A/RES/70/174). The Declaration recognizes the fundamentalimportance of universal education for children and youth as key to the prevention of crime,terrorism, and corruption, as well as to promote sustainable development.The E4J initiative is aimed at building a culture of lawfulness among children and youth throughthe provision of age-appropriate educational materials on topics related to criminal justice,crime prevention, and the rule of law, and the integration of those materials into the curriculaof all education levels. At the university level, E4J provides support to academics in theirteaching and research activities related to UNODC mandate areas, including crime preventionand criminal justice, anti-corruption, organized crime, trafficking in persons and smuggling ofmigrants, firearms, cybercrime, wildlife, forest and fisheries crime, counter-terrorism as wellas integrity and ethics. This Module Series covers one of these mandate areas; namelycybercrime.Few personal and professional activities have remained unaffected by information andcommunication technology (ICT). For this reason, the education of users of ICT is essential.Education of users is also critical considering the current worldwide deficit in capacity to dealwith cybercrime and cybersecurity-related issues (UNODC, 2013; Frost & Sullivan ExecutiveBriefing, 2017). Assessment tools and frameworks that have been developed to assess thecybersecurity capabilities of countries, organizations, and businesses clearly demonstrate this(see Cybercrime Module 8 for more information).Cybercrime requires a multifaceted response combining education, laws, social awareness,training of law enforcement agencies, and the cooperation of Internet intermediaries, among6

others. Accordingly, the deficits in national capacity need to be filled by educating current andnext generations of professionals and opening up cybercrime and cybersecurity education toprofessionals outside of the fields of criminal justice, law, and computer science. In fact, thecurrent deficit exists because of a lack of multidisciplinary focus on cybercrime andcybersecurity. To fill this void, the Cybercrime Module Series utilizes a multidisciplinaryapproach to analyse core cybercrime issues, cybersecurity strategies and measures, digitalevidence, digital forensics, cybercrime laws, and investigative practices. Particularly, theModules cover good cybercrime prevention and cybersecurity practices identified by countriesaround the world in the 2013 UNODC Draft Comprehensive Study on Cybercrime. These bestpractices include the development of a strong cybercrime and cybersecurity knowledge base;education and awareness campaigns; criminal justice capacity, in general, and lawenforcement capacity, in particular; national, regional, and international cybercrime legalframeworks and their harmonization; and international cooperation between national,regional, and international agencies and organizations, as well as the private sector, oncybercrime matters.The interconnectedness and interdependency of societies has provided immeasurableopportunities for economic growth, employment, and interpersonal communications andconnections. And yet, this interconnectedness and interdependency has created numerousvulnerabilities that can (and have been) exploited by a variety of actors no longer restricted bytime and space in committing illicit activity. These cybercriminals can commit cybercrimeirrespective of geographic location at any time and any place anywhere in the world with anInternet connection. For these reasons, cybercrime prevention and cybersecurity are ofparamount importance.In addition to exploring cybercrime prevention and cybersecurity, the Modules also cover corecybercrime-related topics, such as privacy and data protection. Not only does privacy and dataprotection safeguard individuals from cybercrime by shielding them and their data fromcybercriminals, but they also facilitate and enable individuals’ exercise of their human rightsonline. These Modules also introduce critical cybercrime and cybersecurity issues, causes ofand factors influencing cybercrime, and the motives, tactics, targets, and methods of operationof cybercriminals, as well as what makes individuals, businesses, and governments targets ofcybercrime, and what can be done to prevent cybercrimes and protect these targets fromcybercrime.The E4J University Module Series on Cybercrime includes the following Modules: Module 1: Introduction to cybercrimeModule 2: General types of cybercrimeModule 3: Legal frameworks and human rightsModule 4: Introduction to digital forensics7

Module 5: Cybercrime investigationModule 6: Practical aspects of cybercrime investigations and digital forensicsModule 7: International cooperation against cybercrimeModule 8: Cybersecurity and cybercrime prevention: strategies, policies, and programsModule 9: Cybersecurity and cybercrime prevention: practical applications andmeasuresModule 10: Privacy and data protectionModule 11: Cyber-enabled intellectual property crimeModule 12: Interpersonal cybercrimeModule 13: Cyber organized crimeModule 14: Hacktivism, terrorism, espionage, disinformation campaigns, and warfarein cyberspacePlease note that the Module sequence is designed to provide a foundational knowledge andcan be changed in a flexible and modular manner depending on the expected level of the class.The Modules blend theories, research, and practice and were developed in consultation witha group of educational experts. All Modules combine practical and theoretical approaches tothe specific cybercrime topics and follow the same basic structure:Introduction. Each Module includes an introduction, which is used to establish the interest,need and purpose of the content, and provides an overview of the topic or topics covered.Learning Objectives. Each Module includes the expected module objectives in the form oflearning outcomes, which cover the observable expected outcomes of learning (learningobjectives are explored in greater detail in the next section of this Teaching Guide, “5.3.Learning Outcomes and Assessment Tools”).Key Issues. Each Module highlights fundamental topics regarding the Module. Boxes withinteresting cases and research topics and questions that highlight critical cybercrime issues(e.g., thematic and “Did you know?” boxes), as well as laws, interesting examples, and noteson the topics are included in the Modules. This section of the Module also includes referencelists for academic and professional literature and research cited within the Module, as well asa list of cases and laws referenced within the Modules.Exercises. The exercises in each Module are designed to stimulate students’ problem solvingand critical thinking skills. They are also used to assess student learning and enable students toapply what they learned in the class (these exercises are explored in greater detail in the nextsection of this Teaching Guide, “5.3. Learning Outcomes and Assessment Tools”). There isscope for lecturers to adapt and customize these exercises to match their local requirementsand context.8

Core and Advanced Reading. Each Module has core and advanced reading. The core readingcontains prescribed core literature on the subject and the material covered in the Module andare to be used for the class or course development. The advanced reading includes furtherinformation on the topics covered in the Module, which can be used to explore topics in moredepth, supplement core reading, develop other classes or entire courses on the topics covered,and/or to tailor the content to the academic backgrounds of the students in the class and/orthe academic discipline associated with the course. Lecturers can mix and match readingsbased on their needs, abilities, and preferences, as well as their access to the readings.Did you know?UNODC’s Education for Justice (E4J) initiative has a Library of Resources, which includesopen access educational material. For more information, visit:http://www.unodc.org/e4j-library.These core and advanced reading include open and closed source publications. Open sourcepublications are available for free and without the need of a special license or purchase of thework. These core and advanced readings include the links where the publication can beaccessed. Closed source publications include academic journal articles and books that are onlyavailable through subscriptions to academic journal databases (e.g., Taylor and Francis, Sage,Jstor, Springer, and Wiley, to name a few) or for purchase. There are, however, exceptions tothis. For academic journal articles, the authors of the articles can be contacted, and a requestcan be made for the work (authors’ contact details are included in the articles). These articlesmay also be posted on research sharing sites like ResearchGate and Academic.edu. If the fulltext of the articles are not posted on these sites, authors on these sites may be contacted torequests this information as long as the requests respect national intellectual property laws.For books, the authors of these books can be contacted to request a copy of their book fordonation to a university or college library.NoteMost of the core and advanced readings are in English. UNODC can be contacted forassistance on the translation of these publications into other languages.Possible Class Structure. Every Module includes a possible class structure that incorporatesmultiple modalities of learning and the suggested sequence of topics and activities. The lectureis meant to reinforce what students learned in the readings and the exercises and otherstudent assessment activities are designed to apply what they learned in the readings. Thebreakdown in the Modules is designed based on a three-hour class. The lecturers can adaptthe structure based on their needs and the class times. Each Module was designed to9

incorporate approximately twelve notional hours of learning (roughly six hours of preparationtime, three hours of class attendance, and three hours of assessment/assignments). However,it is possible for individual lecturers to extend the content into more than one class or an entirecourse.Student Assessment. In addition to the exercises, each Module includes review questions toassess students’ learning, and other forms of assessment, such as homework assignments, casestudies, group assignments, and “Knowledge Check” prompts, which ask students to answer aquestion based on information provided to assess students’ recall and comprehension ofinformation (students assessment is explored in greater detail in the next section of thisTeaching Guide, “5.3. Learning Outcomes and Assessment Tools”).Additional Teaching Tools. Each Module contains additional teaching tools that can be usedwithin the course, such as important websites, which include background information to thematerial covered in the Module, similar material to that covered in the Module, and/or furtherinformation than that covered in the Module, and videos, which are meant to highlight certainparts of the Module and can be used at the lecturer’s discretion to highlight key issuesidentified in the Module and/or to illustrate topics covered in the Module (these teaching toolsare explored in greater detail in the next section of this Teaching Guide, “5. Teaching andLearning Methods”).The Modules are not all-inclusive in content. The Modules are simply designed to highlight keyissues relating to the topics covered in the Modules and to assist lecturers in teaching thosetopics by providing a basic framework for the lecture and recommending exercises,assignments, and core and advanced readings for faculty, students, and others interested inlearning about cybercrime and related topics. The Modules have not been designed specificallyfor cybercrime majors, but for every lecturer who is interested in integrating cybercrimerelated materials into courses of other academic disciplines and/or adding and/or creating newcybercrime-related courses to academic programmes. The Modules can be used by lecturersfrom multiple disciplines at the undergraduate and graduate level.Teaching and learning methodsThe E4J University Modules on Cybercrime provide materials and pedagogical tools to helplecturers teach classes on cybercrime and cybercrime-related topics. The Modules weredesigned with learning styles, multiple modalities of learning, learning outcomes, and studentassessment tools in mind.10

Learning stylesIndividuals learn and retain information differently. Because of this, courses shouldaccommodate various forms of learning. The Cybercrime Modules are designed toa

Module 6 discusses digital forensics and cybercrime investigations. This Module explores the legal and ethical obligations of cybercrime investigators and digital forensics professionals, good practices in the handling of digital evidence, its analysis, the reporting of digital forensics results, and the assessment of digital evidence.

Related Documents:

hacking. Concept of Cybercrime. Concept of Cybercrime Underground Economy . Concept of Cybercrime. Concept of Cybercrime Phishing. Hacktivism Concept of Cybercrime. Cyberwar: Estonia Case Concept of Cybercrime "I felt the country was under attack by an invisible enemy. . . . It was

study.2 The collection of topics for consideration within a comprehensive study on cybercrime included the problem of cybercrime, legal responses to cybercrime, crime prevention and criminal justice capabilities and other responses to cybercrime, international organizations, and technical assistance.

UNFICYP United Nations Peacekeeping Force in Cyprus UNIDO United Nations Industrial Development Organization UNIFIL United Nations Interim Force in the Lebanon UNIKOM United Nations Iraq-Kuwait Observation Mission UNMOGIP United Nations Military Observer Group in India and Pakistan

UN DKPO United Nations Department of Peacekeeping Operations UNAMID African Union/United Nations Hybrid operation in Darfur UNAMSIL United Nations Mission in Sierra Leone . XIV UNEF 1 United Nations Emergency Force in Egypt UNHCR Office of the United Nations High Commissioner for Refugees UNISFA

UN United Nations UNCCD United Nations Convention to Combat Desertification UNCED United Nations Conference on Environment and Development (‘The Earth Summit’, 1992) UN DESD United Nations Decade of Education for Sustainable Development (2005 2014) UNDP United Nations Development Programme UNEP United Nations Environment Programme

United Nations University Office in North America 2 United Nations Plaza, Room DC2-2062, New York, NY 10017, USA Tel: þ1-212-963-6387 Fax: þ1-212-371-9454 E-mail: unuona@ony.unu.edu United Nations University Press is the publishing division of the United Nations University. Cover design by Joyce C. Weston Photograph by Pacific Press Service .

United Nations Nations Unies United Nations Organization Stabilization Mission in the Democratic Republic of the Congo . We strongly recommend all companies to register at least at Level 1 under the United Nations Secretariat prior to participating in any solicitations. . UN post-employment restrictions

Pile designers therefore looked at calculation based on theoretical soil mechanics. 16 Geotechnical Design to EC7 13 January 2017 Layer 1 Layer 2 Layer 3 L 1 L 2 L 3 Q s1 Q s2 Q s3 Q b Ultimate pile resistance Q u Q s Q b Traditional Pile Design to BS 8004. 17 Geotechnical Design to EC7 13 January 2017 Traditional Pile Design to BS 8004 The usual approach is to divide the ground into .