Landing : Athabascau University

Week 7 - Cybercrimes

  • Public
By Merdan Hojanepesov in the group COMP 607: Fall 2015 cohort November 17, 2015 - 8:00pm

Modern crime tend to be shifting to cyber space as information technologies evolve it offer tools to remotely and anonymously carry out criminal activities (Brenner, 2012). According to (Ablon & Libicki, 2015) 2014 was the year of cybercrimes going viral as many giant retailers got hacked and stolen financial and personal data was available on the hacker market. Various technological tools, communication channels and social networks are utilized for cybercrimes. As technology advances, more services transition into online world, more devices get connected to the internet as part of Internet of Things the more it attracts the criminals into digital world (Ablon & Libicki, 2015). The increase in cybercrimes trigger the response on government level to enact laws and regulations to prevent cybercrimes from occurring and punishing the criminals after the criminal activities are carried out.

Commonwealth of Independent States (CIS) consists of former Soviet Union countries and on June 1, 2001 representatives have signed a collaboration agreement to fight crimes related to computer information. While each of those countries has some kind of law to fight cybercrimes, the collaboration is needed to uniformly apply across these countries. The collaboration agreement clarified the terminology and specifies the area of focus:

  1. Unauthorized access to computer information that is protected by the law, and if the actions caused damage, blocking, modification or copying of information, damaged IT equipment or systems or networks

  2. Creation, use or spread of malicious software

  3. Misuse of IT equipment or IT networks by person who has lawful access that caused the damaged, destroyed, blocked or modified the lawfully protected IT information

  4. Illegal use of software, database that are not their intellectual property or caused a significant damage

In the above collaboration agreement important areas of the Information Technologies are protected by the law. Agreement tried to cover the IT intellectual property, access to computer information and misuse of IT equipment. However the last one referred to a damage cause by someone who already has an access to the system or network. The law missed to cover the IT technology as a tool to commit a crime by someone outside of organization who does not have legal access to the system or network. Yet, it tried to cover it under use of malicious software.



Ablon, L., & Libicki, M. (2015). Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data. Defense Counsel Journal, 82(2), 143-152.


Brenner, S. W. (2012). Cybercrime and the law [electronic resource] : challenges, issues, and outcomes. Boston : Northeastern University Press, c2012.


Collaboration Agreement of members of CIS in fight against crimes related computer information. (n.d.). Retrieved 11 11, 2015, from Acting Committee for CIS:



These comments are moderated. Your comment will not be visible unless accepted by the content owner.

Only simple HTML formatting is allowed and any hyperlinks will be stripped away. If you need to include a URL then please simply type it so that users can copy and paste it if needed.