BEFORE YOU NOMINATE…
Before submitting your nomination, please review how the ECC defines cybercrime and make note of the terms and conditions a winning submission must agree to in order to receive their EPIC award.
The ECC has adopted the definition of cybercrime as that developed in the Royal Canadian Mounted Police’s Cybercrime Strategy published in 2015. Only nominations that fit these definitions will be considered.
Cybercrime is interpreted as a crime where cyber – the Internet and information technologies, such as computers, tablets, personal digital assistants or mobile devices – has a substantial role in the commission of a criminal offence. There are two primary forms of cybercrime:
- Technology-as-target – Crimes which were only made possible by the advent of the Internet and related digital technologies, which includes hacking and spamming banks, governments, and individual Canadians. These are sophisticated attacks against computer hardware and software that are conducted via the Internet.
- Technology-as-instrument – It’s about “old crimes committed in new ways”, such as online forums where criminals can readily, and often anonymously buy, sell and exchange illicit commodities and criminal services on an unprecedented scale. Interpol defines this as “cyber-enabled crime”: transformation of “traditional” crimes with the advent of the Internet i.e. crimes against children, financial crimes, cyberterrorism.
Examples of cybercrime
- Mischief to data such as destroying or altering data; rendering data meaningless, useless, or ineffective; obstructing, interrupting, or interfering with the lawful use of data; obstructing, interrupting, or interfering with any person in the lawful use of data or denying access to data to any person who is entitled to access that is conducted through external means via the Internet
- Unauthorized use of a computer such as fraudulently obtaining, directly or indirectly, any computer service; by means of an electro-magnetic, acoustic, mechanical or other device, intercepting or causing to be intercepted, directly or indirectly, any function of a computer system; using or causing to be used, directly or indirectly, a computer system with intent to commit an offence in relation to data or a computer system that is orchestrated via external access via the Internet
- Computer-Assisted Crimes such as drug trafficking, national security threats, smuggling of illegal immigrants, distribution of child pornography, cyberbullying, online death threats/criminal harassment; money laundering; intellectual property infringements; financial fraud that were enabled through the use of the Internet