Controle de crimes cibernéticos. Análise exploratória de sentenças e medidas de fiscalização

Autores

DOI:

https://doi.org/10.22335/rlct.v15i2.1768

Palavras-chave:

cibercrime, crime informático, exploração infantil, CSAM, condenação

Resumo

Processar e sentenciar indivíduos que tenham violado a lei levam em consideração diversos fatores, entre os quais estão as diretrizes de condenação, que fornecem um guia para os juízes tomarem suas decisões. No entanto, a variedade de crimes e a evolução dos crimes cibernéticos exigem que esses critérios sejam aplicados de forma diferente, especialmente quando estão envolvidas novas tecnologias; no caso de crimes cibernéticos com material de abuso sexual infantil, esses critérios podem diferir nas diretrizes que se aplicam às demais formas de cibercrime. Por essa razão, o presente estudo analisou 14 casos documentados, a fim de caracterizar as diferenças nas aplicações das sentenças e investigar las formas de supervisão para cibercriminosos em liberdade condicional. Por fim, este estudo nos convida a refletir sobre os desafios colocados pelos avanços tecnológicos no controle do crime e a necessidade de medidas proativas para melhorar a resposta das instituições na contenção e investigação de crimes cibernéticos que envolvam material de abuso sexual infantil.

Downloads

Os dados de download ainda não estão disponíveis.

Referências

Ahn, M. J. (2022). Navigating beyond the lodestar: Borrowing the federal sentencing guidelines to provide fee-shifting predictability. Dickinson Law Review, 127(1), 101-161. https://ideas.dickinsonlaw.psu.edu/dlr/vol127/iss1/4

Akhgar, B., & Brewster, B. (Eds.). (2016). Combatting cybercrime and cyberterrorism. Challenges, trends and priorities. Springer International Publishing Switzerland. https://doi.org/10.1007/978-3-319-38930-1

Alford, F. (2000). What would it matter if everything Foucault said about prison were wrong? Discipline and punishment after twenty years. Theory and Society, 29(1), 125-146. https://doi.org/10.1023/A:1007014831641

Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., …, & Zhou, Y. (2017). Understanding the mirai botnet. In 26th [USENIX] security symposium ([USENIX] Security 17) (pp. 1093-1110).

Bailey, D. E. (2022). Emerging technologies at work: Policy ideas to address negative consequences for work, workers, and society. ILR Review, 75(3), 527-551. https://doi.org/10.1177/00197939221076747

Bonnart, S., Capurso, A., Carlo, A., Dethlefsen, T. F., Kerolle, M., Lim, J., …, & Zarkan, L. C. (2023). Cybersecurity threats to space: From conception to the aftermaths. In Space law in a networked world (pp. 39-101). Brill Nijhoff.

Cascavilla, G., Tamburri, D. A., & Van Den Heuvel, W. J. (2021). Cybercrime threat intelligence: A systematic multi-vocal

literature review. Computers & Security, 105, 102258. https://research.tue.nl/en/publications/cybercrime-threat-intelligencea-systematic-multi-vocal-literatur

Chawla, A. (2022, October 24). The rise of internet child pornography. https://doi.org/10.2139/ssrn.4256854

Choi, K. (2015). Cybercriminology and digital investigation. LFB Scholarly Publishing LLC.

Choi, K. S., & Toro-Álvarez, M. M. (2017). Cibercriminología: Guía para la Investigación del Cibercrimen y Mejores Prácticas en Securidad Digital. Fondo Editorial Universidad Antonio Nariño.

Choi, K., Back, S., & Toro-Álvarez, M. M. (2022). Digital forensics & cyber investigation. Cognella Academic.

Choi, K. S., & Lee, H. (2023). The trend of online child sexual abuse and exploitations: a profile of online sexual offenders and criminal justice response. Journal of Child Sexual Abuse, 16(1), 1-20. https://doi.org/10.1080/10538712.2023.2214540

Choo, K. K. R. (2011). Cybercrime: An overview of the legal challenges. In Jaishankar, S. (Ed.). Cyber criminology: Exploring Internet crimes and criminal behavior (pp. 227-244). Routledge.

Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’policing and law enforcement. The Police Journal, 0(0), Ahead of Print. https://doi.org/10.1177/0032258X221107584

Departamento de Justicia de los Estados Unidos. (2010, December 17). PRO IP Act: Annual Report 2010. Washington, D.C.: Author. www.cyber crime.gov/proipreport2010.pdf

Dodge, C., & Burruss, G. (2019). Policing cybercrime: Responding to the growing problem and considering future solutions. In Leukfeldt, R., & Holt, T.J. (Eds.). The human factor of cybercrime (pp. 339-358). Routledge.

Estado v. Brown, No. 2: 18-CR-00037-FL-2 (D.N.C. July 26, 2019).

Estado v. Ferber, 458 U.S. 747, 102 S. Ct. 3348, 73 L. Ed. 2d 1113 (1982).

Estado v. Green, 954 F. 3d 1119 (8th Cir. 2020).

Estado v. Knight, No. 81837-6-I (Wash. Ct. App. Nov. 9, 2020).

Estado v. O’NEAL, 17 F.4th 236 (1st Cir. 2021).

Europol, E. C. C. (2021). The Internet organized crime threat assessment (IOCTA). European cybercrime center. https://www.europol.europa.eu/about-europol/europeancybercrime-centre-ec3

Fonseca, C. C., Moreira, S., & Guedes, I. (2023). The prevention and control of online consumer fraud. In Don Hummer, T & James, B. (Eds.). Handbook on crime and technology (pp. 395-410). Edward Elgar Publishing.

Frase, R. S. (2019). Sentencing guidelines in American courts: A forty-year retrospective. Federal Sentencing Reporter, 32(2), 109-123.

Gillespie, A. A. (2015). Cybercrime: Key issues and debates. Routledge.

Helton v. Estado, 595 S. W. 3d 128 (Ky. 2020).

Holt, T. J. (2012). Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence, 24(2), 337-354. https://doi.org/10.1080/09546553.2011.648350

Hofer, P. J. (2019). Federal sentencing after Booker. Crime and Justice, 48(1), 137-186.

Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge. https://doi.org/10.4324/9781315775944

Hummer, D. (2023). Techno-crime cause, prevention, and control: Issues to consider. In Don Hummer, T & James, B. (Eds.). Handbook on crime and technology (pp. 1-15). Edward Elgar Publishing.

Internet Crime Complaint Center. (2022). Federal Bureau of Investigation Internet Crime (FBI). https://www.fbi.gov/contactus/field-offices/springfield/news/internetcrime-complaint-center-releases-2022-statistics

Jones, T., & Newburn, T. (2002). Policy convergence and crime control in the USA and the UK. Criminal Justice, 2(2), 173-203. https://doi.org/10.1177/17488958020020020401

Lee, H., & Wildeman, C. (2021). Assessing mass incarceration’s effects on families. Science, 374(6565), 277-281.

Lee, S. W., & Koo, M. J. (2022). PRISMA 2020 statement and guidelines for systematic review and meta-analysis articles, and their underlying mathematics: Life Cycle Committee Recommendations. Life Cycle, 2(e9), 1-10. https://doi.org/10.1126/science.abj7777

Luknar, I. M. (2020). Cybercrime-emerging issue. Archibald Reiss Days, Thematic Conference Proceedings of International Significance (Vol. 10, p. 621- 628). Beograd: Kriminalističko-policijski univerzite

Lusthaus, J., Bruce, M., & Phair, N. (2020). Mapping the geography of cybercrime: A review of indices of digital offending by country. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 448-453). Conference paper.

Marcum, C. D., Higgins, G. E., & Tewksbury, R. (2011). Doing time for cybercrime: An examination of the correlates of sentence length in the United States. International Journal of Cyber Criminology,5(2), 824–835.

Moneva, A., Leukfeldt, E. R., & Romagna, M. (2023). Fieldwork experiences researching cybercriminals. In Díaz, A., Del-Real, C., & Molnar, L. (Eds.). Criminology and security: Methods, ethics, and emotions. (In press), Springer Nature.

Nadolna, M., & Rudenko, A. (2021). Interpol activities to coordinate cooperation to fight cybercrime. Topical issues of humanities. Technical and Natural Sciences, 299-302. https://jti.donnu.edu.ua/article/view/12014

Peters, A., & Hindocha, A. (2020, June 26). US global cybercrime cooperation: A brief explainer. Third Way. https://www.thirdway.org/memo/us-global-cybercrimecooperation-a-brief-explainer

Samia, A. S. (2021). Crime and punishment in William Davenant’s Macbeth: A stoic perception. Journal of Early Modern Studies, 10, 151-171. https://doi.org/10.13128/jems-2279-7149-12545

Septianto, D., & Mahawan, B. (2021). USB flash drives forensic analysis to detect Crown Jewel data breach in PT. XYZ (coffee shop retail-case study). In 9th International Conference on Information and Communication Technology (ICoICT) (pp. 286-290). IEEE.

Singh, M., Singh, M., & Kaur, S. (2019). Issues and challenges in DNS based botnet detection: A survey. Computers & Security, 86, 28-52. https://doi.org/10.1016/j.cose.2019.05.019

SonicWall. (2022). Sonicwall cyber threat report. https://acortar.link/SSgDh6

Stalans, L. J., & Horning-Ruf, A. (2023). Internet sex crimes. In Handbook on crime and technology (pp. 116-137). Edward Elgar Publishing.

Steinmetz, K. F., & Yar, M. (2019). Cybercrime and society. Cybercrime and Society. SAGE Publications.

Strasburger, V. C., Zimmerman, H., Temple, J. R., & Madigan, S. (2019). Teenagers, sexting, and the law. Pediatrics, 143(5), e20183183. https://doi.org/10.1542/peds.2018-3183

Toro-Álvarez, M. M. (2023). Hacking. In Don Hummer, T & James, B. (Eds.). Handbook on crime and technology (pp. 334-357). Edward Elgar Publishing.

Toro-Álvarez, M. M., & Motta-Castaño, D. (2017). Articuladores de innovación social para contrarrestar amenazas a la

seguridad ciudadana. Revista Logos, Ciencia & Tecnología, 8(2), 24-34. https://doi.org/10.22335/rlct.v8i2.315

Tuan, T. A., Long, H. V., Son, L. H., Kumar, R., Priyadarshini, I., & Son, N. T. K. (2020). Performance evaluation of Botnet DDoS attack detection using machine learning. Evolutionary Intelligence, 13, 283-294.

Wall, D. S. (2008). Cybercrime, media, and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers & Technology, 22(1-2), 45-63. https://ssrn.com/abstract=1124662

Young, K. M., & Pearlman, J. (2022). Racial disparities in lifer parole outcomes: The hidden role of professional evaluations. Law & Social Inquiry, 47(3), 783-820. https://doi.org/10.1017/lsi.2021.37

Publicado

2023-07-28

Edição

Seção

Artigos de revisão

Como Citar

Controle de crimes cibernéticos. Análise exploratória de sentenças e medidas de fiscalização. (2023). Revista Logos Ciencia & Tecnología, 15(2), 162-173. https://doi.org/10.22335/rlct.v15i2.1768