10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

no dominant force. Unlike traditional organised crime models, ethnicity appears to be<br />

neither a barrier nor an advantage. Cybercriminals will make common cause with<br />

anyone where such links are <strong>of</strong> mutual benefit. Age, sex, religion, location, ethnicity all<br />

seem to be irrelevant which could define the world <strong>of</strong> cybercrime as a pure form <strong>of</strong><br />

meritocracy. As the opportunities for qualitative and quantitative expansion occur, the<br />

only barrier to entry will be the skills required. The implications for victims, analysts and<br />

law enforcers could not be more daunting.<br />

<strong>Crime</strong>s such as electronic theft and fraud will occur more rapidly, reducing the likelihood<br />

<strong>of</strong> being caught. Information about how to compromise a system will be available more<br />

quickly and to more people, which means that opportunistic criminals linked into<br />

organised networks <strong>of</strong> will no longer be controlled by organised crime – if indeed they<br />

ever were - and these components will come to dominate and define the ecosystem.<br />

The education and ability <strong>of</strong> criminals to use new technology will also have a major<br />

impact on the nature <strong>of</strong> crime. In cyberspace, we can expect this to be further<br />

magnified. The relationship between the <strong>of</strong>fender and victim may change, as neither<br />

sees the other as a person. The lack <strong>of</strong> such awareness may see online <strong>of</strong>fenders<br />

committing more extreme crimes. Equally, if victims have no contact with the <strong>of</strong>fender,<br />

their attitudes to punishment may change. Whether this will see a reduction in demands<br />

for punishment, or an increase in those for harsher penalties, is not clear. 228<br />

The constraints upon cybercrime are unlikely to be as comprehensive as for some other<br />

forms <strong>of</strong> crime. Whereas narcotics and human trafficking have immense implications for<br />

the welfare and safety <strong>of</strong> vulnerable groups, this is not perceived to be the case with low<br />

level fraud. When identities and credit cards are stolen, the relevant authorities tend to<br />

react quickly to replace and compensate. As such, the resources available to law<br />

enforcement agencies will tend to be channelled into programmes to combat the types<br />

<strong>of</strong> illegal activity that pose the greatest threat to vulnerable groups. Therefore, the<br />

environment in which cybercriminals operate is likely to remain benign and increasingly<br />

attractive to a growing number <strong>of</strong> people, not least from within states and regions where<br />

law enforcement is weak.<br />

228 Davis, R. and K. Pease, (2000), <strong>Crime</strong> Technology and the Future, Security Journal, p.62.<br />

Page 81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!