Policing, Technology and Hate Crime Flashcards
Untangling the Web: Defining Cybercrime
Spatial and Temporal Dimensions
Traditional crimes:
Static
Crimes often socially, politically and legally rationalised
Offenders are often socio-economically marginalised
Cybercrimes:
Distanciated (Giddens 1990)
Lack of social, political and legal recognition
Offender most likely to be socio-economically privileged
Untangling the Web: Defining Cybercrime
3 categories of Cybercrime (Wall 1998)
Facilitates existing criminal activity
New crimes recognised by existing laws
New ‘harms’ unrecognised by laws
Counting Cybercrime
Cyber-enabled (existing crimes transformed e.g. hate)
Cyber-dependent (new crimes, e.g. viruses, ddos)
Personal Cybercrime across Europe
- Eurobarometer Cybersecurity Survey (ID Theft)
Personal Cybercrime Eurobarometer Cybersecurity Survey (ID Theft) Increased chance of victimisation: Selling on auction sites Using university computers Using public computers (Library) Younger Poorer Countries with lower Internet penetration
Cybercrime laws
Computer Misuse Act 1990
Hacking
Malware
Denial of Service (including terrorism)
Offences Against the Person Act 1861, Malicious Comms Act 1988
Threats of violence or messages of menacing character
Protection from Harassment Act 1997
Online stalking (fear of violence or serious alarm or distress)
Criminal Justice and Courts Act 2015
Disclosing private sexual images without consent
Sexual Offences Act 2003
Online Grooming
Online Hate Speech laws
Crime and Disorder Act 1998, Malicious Communications Act 1998 and the Communications Act 2003
Hateful social media posts (other than those which amount to specific offences in their own right such as making threats to kill, blackmail, stalking etc.) will be considered to be criminal if:
Their content is grossly offensive
Their content is threatening or abusive and is intended to or likely to stir up racial hatred
Their content is threatening and is intended to stir up hatred on the grounds of religion or sexual orientation
It is important to note that when considering cases involving hateful communications, prosecutors operate a high threshold at the evidential stage and consider whether a prosecution is in the public interest based on the nature of the communication and the impact upon the targeted victim.
They must also be satisfied that the communication is not protected under the free speech principle (under Article 10) of the European Convention on Human Rights, that provides the freedom to cause offence.
Regulatory Mechanisms
More useful to speak of Governance
“regulation of relationships in complex systems”
Mix of public/private, state/non-state, national/inter-national institutions and practices
Diverse, dynamic, decentralised approach
Current Policy Initiatives in the UK
UK National Security Strategy (HM Government, 2015)
Cybercime a tier one threat (above organised crime)
UK Cyber Security Strategy (Cabinet Office, 2016-2021)
Invest £1.9 billion over next 5 years (lots of graduate jobs!)
DEFEND against attacks
DETER via detection, investigation, disruption & prosecution
DEVELOP cyber security skills
INTERNATIONAL ACTION via partnerships
GCHQ National Cyber Security Centre
Supports Gov, industry and SMEs
Education/Training
University Academic Centres of Excellence
UK first response to national cyber threats (e.g. WannaCry)
Cyber Security Information Sharing Partnership (CiSP)
Current Police Initiatives in the UK
National Crime Agency
CEOP Command
- Coordinates child protection online and offline
Economic Crime Command
- Money laundering; International corruption; Fraud; Counterfeit Currency
National Cybercrime Unit
- Investigate; Target hardening; Intelligence; Partnership.
Action Fraud & National Fraud Intelligence Bureau (City of London Police)
National Online Hate Crime Hub
True Vision
Public/private partnerships
Nhan and Huey (2008)
“nodal clusters” that form the cybercrime reduction network
government (including international and national criminal justice, non-criminal justice and local) law enforcement (from international to the local) private industry (across all sectors, large, medium, small and micro) general public (civil society groupings both on and offline)
Public/private partnerships
Dupont (2004)
> Five forms of capital that shape nodal networks
- social capital (foster and sustain mutually beneficial social relations with other nodes)
- cultural capital (knowledge possessed by a node that can be used and offered up to other nodes)
- political (theoretical and/or working knowledge of local, national and international political structures)
- economic (knowledge of international markets and purchasing power)
- Symbolic capital (overarching form that affords organisational legitimacy)
Public/private partnerships
eCrime Partnership Mapping Study (Levi & Williams 2011)
Perceptions and measures of
eCrime prevalence largely
symmetrical
Significant gaps in cooperation
frequency and quality between
government and finance sector
and private sector other (SMEs?)
Third sector organisations and
local government on the
periphery of the UKIA network
Public/private partnerships
Explanations for poor cooperation:
over-crowded cybersecurity space
criminal justice system’s poor record in apprehension and prosecution
inhibiting legislation and historically poor engagement with SMEs
difficult to justify a business case for spending in austere times
low levels of network capital
Technology as Regulator
Williams (2015) Guardians Upon High
Applied RAT to Online ID Theft
Offender, Opportunity, Lack of Guardianship
Eurobarometer Special Cybersecurity Survey
Interested in effectiveness of 3 types of guardianship
Guardianship (Williams 2015)
Heightened positive effect of country Internet penetration on both avoidance personal and passive physical guardianship.
Those residing in countries with low Internet penetration (and hence possibly under-developed infrastructure), who adopt these types of guardianship were likely to experience more incidents of online identity theft, compared to those adopting these types of guardianship in countries with higher Internet penetration (and hence possibly better developed infrastructure)
Maturity of cyber security strategy moderated differences in incidents of online identity theft between adopters of different types of individual guardianship
Adopters of passive guardianship residing in countries with more mature cyber security strategies experienced decreased levels of online identity theft.
Technology as Regulator
Tri-modal regulation > Law - retroactive > Market/Social – retroactive > Technical – proactive - Situational preventative methods - Increasing the perceived effort, increasing the perceived risks and reducing anticipated rewards