The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age by Kirstie Ball & Frank Webster
Author:Kirstie Ball & Frank Webster [Ball, Kirstie & Webster, Frank]
Language: eng
Format: epub, mobi
Tags: Political Science, Security (National & International)
ISBN: 9780745319957
Google: fAQwAQAAIAAJ
Publisher: Pluto Press
Published: 2003-09-20T15:57:09+00:00
nography
rading sexual materials
Obscenity/
Por
T
Online sex trade/
Child pornography
Cyber-sex/
Cyber-pimping
rade
Acquisition
(Theft/Deception)
Frauds/Pyramid schemes
Multiple frauds/T
secret thefts
Intellectual property
piracy/Gambling/
Information theft/
Identity theft
m
crimes â level of impact by type of crime with selected examples respass/Access/HarT
Phreaking/Cracking/
Hacking
Issue based hactivism/
protest/
Cyber-vandalism
Information
warfare/Cyber-terrorism
tunities for
tunities for
all, 2002a, p. 192 â subsequently amended ce: W
able 7.1: The Matrix of CyberT
Crime type
Impact level
Facilitating
traditional crime
New oppor
engaging in
traditional crime
New oppor
new types of criminal
behaviour
Sour
115
Ball 02 chap 6 30/7/03 9:23 Page 116
116
The Intensification of Surveillance
these same types of criminal activity would probably still occur through the use of other means of communication.
Second, the Internet has provided offenders with a range of new opportunities for committing âtraditionalâ criminal activities on a global scale. Examples of these âhybridâ criminal activities might include the global trade in sexually explicit materials; the proliferation of multiple frauds and other economic crimes (see Grabosky & Smith, 2001, p. 30; Levi, 2001, p. 44); online protest against the www sites of online organizations, such as hate speech campaigns, issue-based hactivism; and globally organized paedophile abuse rings. In short, without the Internet these criminal activities would exist but not on such a global scale.
They are also characterized by a symmetry in the relationship between the offender and the victim; and by a degree of consensus about the nature of the offence.
Third, the Internet has created some entirely new criminal opportunities which have generated novel forms of behaviour â
the âtrueâ cybercrimes â on a global scale. Like the hybrid cybercrimes, these activities simply would not exist without Internet technologies. But unlike the hybrid cybercrimes, these activities are the specific product of the Internet. Typically characterized by a lack of symmetry and clarity in the relationship between the offender and the victim, they also lack the consensual understanding of the nature of the offence that is found with traditional crimes. Examples would include the unauthorized acquisition of intellectual property; the piracy of software tools, music and film products (see further Wall, 2001, p. 3); information warfare and cyber-terrorism (Walker, 2002, ch. 1); but most importantly the various deceptive and harmful payloads distributed by unsolicited bulk e-mails (UBEs) (Wall, 2002b).
In practice, cybercrimes will often display aspects of each of the above, and the latterly mentioned unsolicited bulk e-mails (UBEs) (or spamming) provide a good example. Not only are UBEs super-efficient methods for offenders to ensnare victims, they can also constitute crimes in themselves, as can the unpleasant payloads they deliver. Furthermore, they can simultaneously convey information about the victim to the offender and about the offender to the victim. Spamming is discussed later in greater detail.
Ball 02 chap 6 30/7/03 9:23 Page 117
Mapping out Cybercrimes
117
Types of cybercrime
The very qualities of the Internet that have popularized it have also engendered new criminal opportunities. So, not only has the Internet had different levels of impact upon criminal behaviour, it has also fostered specific groups of offending behaviour, which are currently raising public concern (discussed more fully in Wall, 1999; 2001, p. 3). Each of these âcybercrimeâ groups suggests a range of behaviours rather than specific offences, although they do reflect specific courses of public debate and respective areas of law.
Download
The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age by Kirstie Ball & Frank Webster.mobi
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
| Anthropology | Archaeology |
| Philosophy | Politics & Government |
| Social Sciences | Sociology |
| Women's Studies |
The Secret History by Donna Tartt(19006)
The Social Justice Warrior Handbook by Lisa De Pasquale(12178)
Thirteen Reasons Why by Jay Asher(8874)
This Is How You Lose Her by Junot Diaz(6859)
Weapons of Math Destruction by Cathy O'Neil(6251)
Zero to One by Peter Thiel(5770)
Beartown by Fredrik Backman(5719)
The Myth of the Strong Leader by Archie Brown(5482)
The Fire Next Time by James Baldwin(5414)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(5200)
Promise Me, Dad by Joe Biden(5132)
Stone's Rules by Roger Stone(5066)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4941)
100 Deadly Skills by Clint Emerson(4901)
Rise and Kill First by Ronen Bergman(4764)
Secrecy World by Jake Bernstein(4729)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4687)
The Farm by Tom Rob Smith(4490)
The Doomsday Machine by Daniel Ellsberg(4475)