10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

and facilitated by an explosion in connectivity due to the open and almost cost-free<br />

exchange <strong>of</strong> information. 156<br />

In technology-intensive industries, it has been suggested that the ability to govern <strong>of</strong>ten<br />

rests in intangible competences (such as R&D and design) into which it is difficult for<br />

other firms to break. 157 Inherent to cybercrime is the constant search <strong>of</strong> new<br />

technologies for exploitation; however, this requires substantial investment in R&D,<br />

training and human resources, which is where traditional organised crime may have a<br />

significant role as investors.<br />

Organised criminal groups are gradually diversifying from traditional criminal activities to<br />

more lucrative and less risky e-crimes by co-opting a diverse array <strong>of</strong> technically<br />

competent cybercriminals. Although traditional criminal organisations generally lack the<br />

technical skills to generate crimeware, they have vast funds from traditional criminal<br />

activities to recruit highly skilled individuals and pay for their services, even sponsoring<br />

university degrees.<br />

Organised crime syndicates are in a position to fund computer science courses at<br />

university in return for cybercrime expertise after the course has finished. The chief<br />

information security <strong>of</strong>ficer for a large multinational recently said: "[cybercrime rings]<br />

have research and development programmes, they are putting people through<br />

university, 158 they are calculating return on investment and they have better quality<br />

assurance. By comparison, the legitimate security industry is under-funded, under-<br />

resourced and constantly on the back foot." 159<br />

The preliminary findings for this overview indicate that we can find examples <strong>of</strong> each <strong>of</strong><br />

these value chains for various segments <strong>of</strong> the cybercrime ‘industry’. In certain criminal<br />

156 Gereffi, G., (2001): “Beyond the Producer-driven/Buyer-driven Dichotomy. The Evolution <strong>of</strong> Global Value<br />

Chains in the Internet Era”, IDS Bulletin Vol 32 No 3 2001.<br />

157 Kaplinsky R, and Morris M., (2001), A Handbook for Value Chain Research. International Development<br />

Research Centre: Ottawa.<br />

158 Interview with a Tamil who had been charged with credit card fraud.<br />

159 Paul Simmonds <strong>of</strong> AstraZeneca, quoted in Marshall Kirkpatrick, (23 rd June 2008): Students: The New Hiring<br />

Frontier <strong>Online</strong>, for Good and Evil. See:<br />

http://www.readwriteweb.com/archives/students_the_new_hiring_frontier.php.<br />

Page 53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!