Definitions

5G

The next cellular communications standard in development to replace existing 4G technology. Most commonly associated with providing wireless internet services to electronic devices. 5G is predicted to be in common use by 2020.[1]

Artificial intelligence (AI)

The simulation of intelligence processes by machines, especially computer systems.

Australian Cybercrime Online Reporting Network (ACORN)

An Australian government initiative to provide information to the public on how to identify cybercrime and methods of mitigating the risk of being affected by common cybercrime.

Backdoor

A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

Bitcoin

A digital currency and payment system underpinned by blockchain technology. Bitcoins can be used for online purchases, or converted into traditional currency.

Blockchain

A distributed database that maintains a continuously growing list of records, called blocks, secured from tampering and revision.

Botnet

'Backdoors' are a category of malware that enable a cybercriminal to remotely control an infected computer over a network. Such an infected computer is often called a robot or ‘bot’ computer. When several computers are infected with a backdoor and become bots, they can be simultaneously controlled from a single remote mechanism. These remotely controlled networks of bot computers are known as ‘botnets’.

Cloud computing

Provides for storing and potential processing of data offsite from a person's or entity's main premises.

Computer Network Operation (CNO)

A form of extraterritorial police activity used to investigate the 'dark web'.

Critical infrastructure

Critical systems, services and facilities underpinning the operation of society and the economy, such as electricity and transportation networks, water services, healthcare systems and banking.

Cryptocurrency

A form of digital currency where encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds.

Cybercrime

Cybercrime relates to criminal activities carried out by means of computers or via the internet. Cybercrime is also referred to as 'computer crime'. It encompasses a wide range of criminal activities encompassing:

(a)         crimes where computers or other ICTs are an integral part of an existing offence (such as online fraud or online child sex offences); and

(b)        crimes directed at computers or ICTs (such as illegally modifying electronic data or seeking a ransom to unlock a computer affected by malicious software).[2]

Cyber security

Broadly encapsulates measures relating to the confidentiality, availability and integrity of information that is processed, stored and communicated by electronic or similar means.[3]

Dark web

The dark web is made up of sites that are not indexed by search engines and are only accessible through specialty networks such as Tor. Often, the dark web is used by website operators who want to remain anonymous. The ‘dark web’ is a subset of the ‘deep web’.

Deep web

The part of the internet that is not indexed by search engines. Includes websites that are password-protected and pay walled, encrypted networks and databases, and dynamic data such as social media feeds. Also includes the dark web.

Digital currency

A digital representation of value that can be digitally traded and functions as (1) a medium of exchange; and/or (2) a unit of account; and/or (3) a store of value, but does not have legal tender status.

Digital evidence

Also called 'electronic evidence'. Any information stored or transmitted in digital form that a party to a court case may use at trial.[4]

Encryption

The conversion of electronic plaintext data into unreadable cipher text using algorithms. Encryption protects the confidentially of data at rest and in transit. Both encryption and decryption are functions of cryptography.

End to end encryption

A method of secure communication where only the communicating users can read data transferred from one end system or device to another.

Going dark

A term often used by users of social media to describe situations where digital communications that appear to have ceased are moved from the public sphere into a private communication channel that prevents others from monitoring it.

Hacking

‘Hacking’ is a term with multiple meanings. It can refer to testing and exploring computer systems, highly skilled computer programming or the practice of accessing and altering other people’s computers. Hacking may be carried out with honest aims or with criminal intent.

Five Eyes Alliance

An intelligence alliance involving the United Kingdom, United States, Canada, Australia and New Zealand.

Information and communications technology (ICT)

Any device that can process, store or communicate electronic information.

Internet

The global system of interconnected computer networks that use standardised communication protocols to link devices and provide a variety of information and communication facilities.

Internet of Things (IoT)

A term to describe the way in which the internet is transforming the way in which people work, live and play by combining internet connectivity and data analytic capabilities with consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects.[5]

Internet Protocol (IP)

The technology that allows computers and other electronic devices to connect to the internet.

Malware

Malware is a general term used for software designed to damage or subvert a computer or information system.

Mesh network

A wireless mesh network combining multiple routers into a single and larger local network.

Mutual Legal Assistance Treaty (MLAT)

An agreement between governments to facilitate the exchange of information relevant to an investigation in at least one of those countries.

Network Investigation Technique (NIT)

A form of extraterritorial police activity used to investigate the 'dark web'.

Silk Road

A now defunct illicit marketplace located on the dark web.

Technology-enabled crime

The use of computers or other ICTs to commit or facilitate the commission of traditional crimes.[6]

Telephone interception (TI)

TI 'consists of listening to or recording, by any means, such a communication in its passage over that telecommunications system without the knowledge of the person making the communication'.[7]

The Onion Router (Tor)

Free software used to anonymise access to the internet by routing data through multiple anonymised networks, allowing users to mask their usage and location. It is the most commonly used means to access the dark web.

Virtual Private Network (VPN)

An encrypted communication that creates a safe connection between a device and a network over a less secure network.

Navigation: Previous Page | Contents | Next Page