The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age by Kirstie Ball & Frank Webster

The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age by Kirstie Ball & Frank Webster

Author:Kirstie Ball & Frank Webster [Ball, Kirstie & Webster, Frank]
Language: eng
Format: epub, mobi
Tags: Political Science, Security (National & International)
ISBN: 9780745319957
Google: fAQwAQAAIAAJ
Publisher: Pluto Press
Published: 2003-09-20T15:57:09+00:00


nography

rading sexual materials

Obscenity/

Por

T

Online sex trade/

Child pornography

Cyber-sex/

Cyber-pimping

rade

Acquisition

(Theft/Deception)

Frauds/Pyramid schemes

Multiple frauds/T

secret thefts

Intellectual property

piracy/Gambling/

Information theft/

Identity theft

m

crimes – level of impact by type of crime with selected examples respass/Access/HarT

Phreaking/Cracking/

Hacking

Issue based hactivism/

protest/

Cyber-vandalism

Information

warfare/Cyber-terrorism

tunities for

tunities for

all, 2002a, p. 192 – subsequently amended ce: W

able 7.1: The Matrix of CyberT

Crime type

Impact level

Facilitating

traditional crime

New oppor

engaging in

traditional crime

New oppor

new types of criminal

behaviour

Sour

115

Ball 02 chap 6 30/7/03 9:23 Page 116

116

The Intensification of Surveillance

these same types of criminal activity would probably still occur through the use of other means of communication.

Second, the Internet has provided offenders with a range of new opportunities for committing ‘traditional’ criminal activities on a global scale. Examples of these ‘hybrid’ criminal activities might include the global trade in sexually explicit materials; the proliferation of multiple frauds and other economic crimes (see Grabosky & Smith, 2001, p. 30; Levi, 2001, p. 44); online protest against the www sites of online organizations, such as hate speech campaigns, issue-based hactivism; and globally organized paedophile abuse rings. In short, without the Internet these criminal activities would exist but not on such a global scale.

They are also characterized by a symmetry in the relationship between the offender and the victim; and by a degree of consensus about the nature of the offence.

Third, the Internet has created some entirely new criminal opportunities which have generated novel forms of behaviour –

the ‘true’ cybercrimes – on a global scale. Like the hybrid cybercrimes, these activities simply would not exist without Internet technologies. But unlike the hybrid cybercrimes, these activities are the specific product of the Internet. Typically characterized by a lack of symmetry and clarity in the relationship between the offender and the victim, they also lack the consensual understanding of the nature of the offence that is found with traditional crimes. Examples would include the unauthorized acquisition of intellectual property; the piracy of software tools, music and film products (see further Wall, 2001, p. 3); information warfare and cyber-terrorism (Walker, 2002, ch. 1); but most importantly the various deceptive and harmful payloads distributed by unsolicited bulk e-mails (UBEs) (Wall, 2002b).

In practice, cybercrimes will often display aspects of each of the above, and the latterly mentioned unsolicited bulk e-mails (UBEs) (or spamming) provide a good example. Not only are UBEs super-efficient methods for offenders to ensnare victims, they can also constitute crimes in themselves, as can the unpleasant payloads they deliver. Furthermore, they can simultaneously convey information about the victim to the offender and about the offender to the victim. Spamming is discussed later in greater detail.

Ball 02 chap 6 30/7/03 9:23 Page 117

Mapping out Cybercrimes

117

Types of cybercrime

The very qualities of the Internet that have popularized it have also engendered new criminal opportunities. So, not only has the Internet had different levels of impact upon criminal behaviour, it has also fostered specific groups of offending behaviour, which are currently raising public concern (discussed more fully in Wall, 1999; 2001, p. 3). Each of these ‘cybercrime’ groups suggests a range of behaviours rather than specific offences, although they do reflect specific courses of public debate and respective areas of law.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.