A3-Cybercrime Blog Post and Poster
.docx
keyboard_arrow_up
School
Griffith University *
*We aren’t endorsed by this school
Course
7055
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
9
Uploaded by JusticeMeerkat3185
7055CCJ: Understanding and Preventing Cyber Fraud Byte Sized Issues
Swipe Left To Romance Scams 💔
With the advancement of technology within the last decade, millions of people across the globe use online social media networks and platforms to meet other people. Despite many
users seeking to develop meaningful and authentic connections with other humans, numerous
if not thousands fall victim to online scams every year. One particular online scam is romance
scams, which is one of the most common online scams in Australia, with the Australian Scamwatch estimating a financial loss of more than $40.5 million and 3,698 reports were made in the year 2022 (Australian Competition and Consumer Commission, 2023). Romance scams are defined by a scam artist creating a fake profile on any social networking platform with a fake identity and seeking to establish a trusting relationship with any user they interact with, in the hopes of asking for money after telling a sad story (Federal Trade Commission Consumer Advice, 2019). In 2020, an Australian-based online matchmaking service called H2H (Heart 2 Heart) was launched and grew to a membership of over 5 million users. It differentiated itself from other online matchmaking platforms through how they collected user details by preferring to focus on user’s passions, lifestyle preferences and personal interests to develop genuine connections. In 2023, an extensive international romance fraud ring was revealed to be operating within H2H with an approximate of over 10,000 users to have been defrauded and an estimated financial loss of over $20 million. A deep dive on how the Routine Activities Approach can explain romance scams will be undertaken and applied in understanding the offenders, victims and possible preventions and guardianship. Routine Activities Approach
Criminologists frequently cite the Routine Activities Approach in seeking to understand crime and is one of the main “environmental criminology” theories (NSW Government, 2011). It was first proposed in 1979 by Marucs Felson and Lawson Cohen 1
Shekinah Aloalii (s5058183)
7055CCJ: Understanding and Preventing Cyber Fraud Byte Sized Issues
which follows three main elements that must be met in any given space and time in order for a crime to occur (Grabosky, 2001). These are: an accessible target, the absence of capable guardians that could intervene and the presence of a motivated offender (Reyns, 2017). An accessible target can be considered a place, person or object that could have VIVA: value, inertia, visibility, access or CRAVED: concealable, removable, available, valuable, enjoyable, disposable. The absence of a capable guardian that could intervene is the majority the time in the form of a human who through their presence alone deters any potential offenders. On the other hand, the capable guardian could be in the form of CCTV. A motivated offender comes from the perspective of the perpetrator who assess whether the target is suitable and if there is a capable guardian within target’s vicinity and only then will it be determined if crime is to occur. As the approach was developed before the daily use of technology, this application will enable further understandings in the establishment of its applicability on cybercrime. Offenders of Romance Scams
Offenders who commit romance scams are experts at investing significant time in establishing genuine and caring relationships with victims (FBI, n.d.). Perpetrators main methods of communication are conducted online through social media platforms or emails, text messaging and telephone (Cross, 2021). Scammers are willing to invest into these intimate relationships as the victim is likely to bend to their demands and requests of money. The Australian Federal Police published a list of common red flags for the public to be mindful and aware of when interacting with profiles online. These are: a person who says they live overseas, a large investment of time spent communicating with you, a quick profession of love for you which leads to feeling special, makes excuses to not video call or meet in person, and they say they are in major crisis and need money desperately (Australian 2
Shekinah Aloalii (s5058183)
7055CCJ: Understanding and Preventing Cyber Fraud Byte Sized Issues
Federal Police, 2023). Other characteristics that are common amongst offenders are, if communication is first made through an official dating service or main social media, scammer will quickly try move the conversation offsite to a different form of communication,
for example Viber or Whatsapp. Perpetrators will also influence victims to trust them only and encourage secrecy to ensure they are isolated from their friends and family (ACCC, 2023). It is common for offenders to target specific demographics as victims to ensure the victim vulnerability is all time high and less risk of threat or consequence. Victims of Romance Scams
Scamwatch reports the most targeted individuals of romance scams are middle aged individuals, 35-44 age group whilst victims over 65 years experienced the most financial loss ($12 million) to romance scams in 2022 (Consumer and Business Services, 2023). Typically, this age range has the financial means to meet the demands of scammers with their life savings, mortgages, super funds and any current employment or investments. Key characteristics of victims are the strong idealization of romantic partners, trusting, vulnerable and naïve, minimal to bare knowledge of cybersecurity, and access to finances (Whitty, 2018). Victim vulnerability can be increased depending on the age of victim as older victims who are living alone or grieving the loss of a spouse may seek for mental and emotional support online (U.S. Immigration and Customs Enforcement, 2023). It is crucial to have guardians in place to protect potential victims from being scammed. Guardians & Preventions
As cybercrime’s guardians and prevention are dependent upon contextual awareness (Vakhitova & Reynald, 2014), the same guardianship can be applied in the case of romance scams. National governments and federal institutions emphasise prevention in the form of 3
Shekinah Aloalii (s5058183)
7055CCJ: Understanding and Preventing Cyber Fraud Byte Sized Issues
informing victims and potential victims with knowledge on the warning signs and red flags when interacting online. A physical guardian maybe a family member or friend who has access to potential target’s phone and will routinely check in with them. Another potential guardian could be the bank of the target who can implement security measures to put constraints on amounts withdrawn or confirm receiver’s identity is legitimate. Time and Space Enactment
Victims will generally not limit what they share online and post personal information that is easily accessible. Offenders will conduct extensive research for potential victims through social media and dating sites and review all accessible information on their lives, personal interests, and personalities (Office of Communication and Media Relations, n.d.). Their findings allow them to create fake profiles with ideal partner characteristics and traits. Dr Cassandra Cross from QUT explores the seven stages of interaction in romance fraud. Stage one- potential victim is willing to find their ideal partner and open to being contacted. Stage two- presented with the fake profile, stage three- grooming process: the victim and offender connect, and a relationship of trust and rapport is built with the aim to confidently request for money. Stage four- the sting: offender asks for money with urgency and desperation, stage five- continuation of the scam: initial request has been meant and the escalation of amount and frequency will occur. Stage six- sexual abuse: small percentage of cases will drive offender to ‘sextortion’ and lastly stage seven, revictimisation (Cross, 2021). Despite the Routines Activities Approach being developed for conventional crime and
not cybercrime, it was able to unpack and understand the interactions of romance scams. Offenders were found to say they live overseas, invest significant time into building trusting relationship, quickly confess their love, make excuses to not meet or video call and lastly urgently share they were experiencing a major crisis and needed money desperately 4
Shekinah Aloalii (s5058183)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Computer hacking's impact on e-commerce
arrow_forward
How and why have internet scammers altered their tactics?
arrow_forward
Hacktivists are a unique group of individuals who are differentiated from cybercriminals and terrorists.
arrow_forward
Databases' widespread usage threatens privacy and rights.
arrow_forward
Why and how did internet scammers alter their tactics?
arrow_forward
Fingerprinting, according to several cybersecurity experts, is abusive and exposes the privacy concerns of users. Some browsers came up with ways to prevent browser fingerprinting. Browsers have tried several efforts to protect themselves against fingerprint recognition.
arrow_forward
Why are some Internet search engine features and apps controversial in terms of privacy?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Databases' widespread usage threatens privacy and rights.arrow_forwardWhy and how did internet scammers alter their tactics?arrow_forwardFingerprinting, according to several cybersecurity experts, is abusive and exposes the privacy concerns of users. Some browsers came up with ways to prevent browser fingerprinting. Browsers have tried several efforts to protect themselves against fingerprint recognition.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning