Sort By:

Abstract In this note, we introduce some concepts from Graph Theory in the description of the geometry of cybercriminalgroups, and we use the work of Broadhurst et al, a piece from 2014, as a foundation of reasoning. We are also worried aboutsuggesting or even creating, if necessary, mathematical jargon, so that also mathematicians, and those who have similarthinking processes, can connect to Broadhurst et al’s work, and create even more ways to deal with cybercrime data. This is alight note, with the sole intent of suggesting ways to go to Broadhurst et al, so that there is even more intersection betweentheir work and ours. What happens with the creation of bridges between Cyber Crime and Mathematics is that we can speakmore objectively about things, and, through Mathematics, perhaps optimize the efforts of the computer scientists, or even ofthe systems analysts, who try to create perfect tools for those who work in such a niche.

Abstract: In this paper, we worry about investigating the use of Virtual Private Networks for the commission ofcrimes involving pedophilia. Recent political decisions in China seem to point at the world leaders connecting itto organized crime. The overall impression of professionals from Information Technology is that Virtual PrivateNetworks are excellent tools for any sort of establishment or individual that depend on non-physicalcommunications. The Australian government seems to have no concerns whatsoever with pedophilia and the useof VPNs. We here want to determine the effects on non-criminalization of the use of VPNs in what comes topedophilia. On the way to that, we provide a good introduction to the topic and a good collection of intelligencetokens.