Advertisement

Crime and the Cyber Periphery: Criminological Theory Beyond Time and Space

  • Murray Lee
Chapter

Abstract

The internet and social media have opened the world to new forms of personal, social and political expression, ranging from ambiguous deviancy (e.g. sexting) to promising democratic advances (social justice campaigns, the Arab spring) and to extremism (e.g. ISIS or far right propaganda). These alternative and amorphous public (and semipublic) spheres require new conceptualization that push criminology’s epistemological gaze into extraterritoriality. Information and communication technologies (ICT) are now engrained into the fabric of our daily lives, yet criminological theory seems hopelessly trapped in the terrestrial world. This chapter explores the capacities and limits of criminology to comprehend crime and deviance in the age of the internet and asks whether ideas derived from Southern criminology might usefully be applied to in in these cyber contexts.

Keywords

Cybercrime Crime drop Dark Web Sexting Online fraud Fake news 

References

  1. Aas, K. F. (2007). Beyond ‘the desert of the real’: Crime control in a virtual(ised) reality. In Y. Jewkes (Ed.), Crime Online (pp. 160–177). London: Routledge.Google Scholar
  2. Australian Bureau of Statistics. (2013). Victims of personal fraud: A statistical snapshot. In Focus: Crime and Justice Statistics, June 19. Retrieved March 17, 2017, from http://abs.gov.au/ausstats/abs@.nsf/Previousproducts/4524.0Main%20Features3June%202013?opendocument&tabname=Summary&prodno=4524.0&issue=June%202013&num=&view=
  3. Australian Competition and Consumer Commission. (2016). Scam statistics. Scamwatch. Retrieved May 17, 2017, from https://www.scamwatch.gov.au/about-scamwatch/scam-statistics
  4. Australian Institute of Criminology. (2016). Victims of violent crime (n per year). Facts & Figures Online Data Tool. Retrieved May 17, 2017, from http://www.aic.gov.au/dataTools/facts/vicViolentCol.html
  5. Beesley, J. (2010). Organised chaos: Seeing with new eyes. Current Issues in Criminal Justice, 21(3), 443–464.Google Scholar
  6. Bradbury, D. (2014). Unveiling the dark web. Network Security, 4, 14–17.CrossRefGoogle Scholar
  7. Carrington, K., Hogg, R., & Sozzo, M. (2016). Southern criminology. British Journal of Criminology, 56(1), 1–20. https://doi.org/10.1093/bjc/azv083.CrossRefGoogle Scholar
  8. Castells, M. (2002). The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford University Press.CrossRefGoogle Scholar
  9. Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.CrossRefGoogle Scholar
  10. Cohen, S. (1972). Folk Devils and Moral Panics: The Creation of the Mods and Rockers. London: Paladin.Google Scholar
  11. Connell, R. (2007). Southern Theory: The Global Dynamics of Knowledge in the Social Science. Crows Nest: Allen & Unwin.Google Scholar
  12. Cox, J. (2015, June 18). The dark web as you know it is a myth. Wired. Retrieved March 10, 2017, from https://www.wired.com/2015/06/dark-web-know-myth/
  13. Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and Young People. Basingstoke, UK: Palgrave Macmillan.CrossRefGoogle Scholar
  14. Database and Network Journal (DNJ). (2016). New report exposes the dark web. Database & Network Journal, 46(2). Retrieved March 10, 2017, from https://books-journals.vlex.co.uk/vid/new-report-exposes-the-638652593?_ga=2.13349438.867752461.1495671220-1831874017.1495671161
  15. de Certeau, M. (1984). The Practice of Everyday Life. Berkeley, CA: University of California Press.Google Scholar
  16. de Graaf, D., Shosha, A. F., & Gladyshev, P. (2013). Bredolab: Shopping in the cybercrime underworld. In M. Rogers & K. C. Seigfried-Spellar (Eds.), Digital Forensics and Cybercrime (pp. 302–313). Racine, WA: Springer.Google Scholar
  17. DiNucci, D. (1999). Fragmented future. Print, 53(4), 32–33.Google Scholar
  18. Eisner, M. (2015, February 4). Why violent crime is plummeting in the rich world. New Scientist. Retrieved March 20, 2017, from https://www.newscientist.com/article/mg22530073-200-why-violent-crime-is-plummeting-in-the-rich-world/
  19. Findley, M. (1999). Governing Through Globalised Crime: Futures for International Criminal Justice. Milton Park: Routledge.Google Scholar
  20. Fisher, D. (2017, February 22). Kim Dotcom’s next step: ‘I’ll get the whole case thrown out’. NZ Herald. Retrieved May 20, 2017, from http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11805415
  21. Ford, M. (2016, April 15). What caused the great crime decline in the U.S.? The Atlantic. Retrieved January 10, 2017, from https://www.theatlantic.com/politics/archive/2016/04/what-caused-the-crime-decline/477408/
  22. Funnell, N. (2016, August 17). Exclusive: Students from 71 Australian schools targeted by sick pornography ring. News.com. Retrieved January 10, 2017, from http://www.news.com.au/lifestyle/real-life/news-life/students-from-70-australian-schools-targeted-by-sick-pornography-ring/news-story/53288536e0ce3bba7955e92c7f7fa8da
  23. Garzón, J., & Muggah, R. (2017, March 31). Venezuela’s raging homicide epidemic is going unrecorded. LA Times. Retrieved May 9, 2017, from http://www.latimes.com/opinion/op-ed/la-oe-garzon-muggah-venezuela-violent-crime-statistics-20170331-story.html
  24. Giddens, A. (1991). Modernity and Self-Identity: Self and Society in the Late Modern Age. Stanford: Stanford University Press.Google Scholar
  25. Gies, H., & Mychalejko, C. (2015, February 11). Social media coup? The vile virality of Venezuela’s opposition. TeleSUR. Retrieved May 9, 2017, from http://www.telesurtv.net/english/analysis/Social-Media-Coup-The-Vile-Virality-of-Venezuelas-Opposition-20150210-0029.html
  26. Henry, N., Powell, A., & Flynn, A. (2017). Not Just ‘Revenge Pornography’: Australians’ Experiences of Image Based Abuse. A Summary Report. Melbourne: RMIT University.Google Scholar
  27. Herman, E., & Chomsky, N. (1988). Manufacturing Consent. New York: Pantheon Books.Google Scholar
  28. Holt, T. (2013). Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft and Harassment. San Diego: Cognella.Google Scholar
  29. Intelliagg. (2016). DeepLight: Shining a Light on the Dark Web. London: Intelliagg.Google Scholar
  30. International Telecommunications Union. (2016). ICT Facts and Figures 2016. Retrieved May 10, 2017, from http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2016.pdf
  31. Jewkes, Y. (2007). Crime Online. London: Routledge.Google Scholar
  32. Ladegaard, I. (2017). We know where you are, what you are doing and we will catch you: Testing deterrence theory in digital drug markets. British Journal of Criminology. https://doi.org/10.1093/bjc/azx021/3760066.
  33. LaFrance, A. (2015, September 30). How many websites are there? The Atlantic. Retrieved May 17, 2017, from https://www.theatlantic.com/technology/archive/2015/09/how-many-websites-are-there/408151/
  34. Latour, B. (2005). Reassembling the Social. An Introduction to Actor-Network-Theory. Oxford: University Press.Google Scholar
  35. Lee, M., & Crofts, T. (2015). Gender, pressure, coercion and pleasure: Untangling motivations for sexting between young people. The British Journal of Criminology, 55(3), 454–473.CrossRefGoogle Scholar
  36. Lee, M., Crofts, T., McGovern, A., & Milivojevic, S. (2015). Sexting and Young People: Report to Criminology Research Council. Canberra: Australian Institute of Criminology.Google Scholar
  37. Lee, M., Crofts, T., Salter, M., Milivojevic, S., & McGovern, A. (2013). ‘Let’s get sexting’: Risk, power, sex and criminalisation in the moral domain. International Journal for Crime, Justice and Social Democracy, 2(1), 35–49. https://doi.org/10.5204/ijcjsd.v2i1.89.CrossRefGoogle Scholar
  38. Leukfeldt, E., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409.CrossRefGoogle Scholar
  39. Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime Law Social Change, 67(1), 3–20. https://doi.org/10.1007/s10611-016-9645-3.CrossRefGoogle Scholar
  40. Mann, M., & Warren, I. (2017). The digital and legal divide: Silk Road, transnational online policing and Southern criminology. In K. Carrington, R. Hogg, J. Scott, & M. Sozzo (Eds.), Southern Criminology. Palgrave Macmillan.Google Scholar
  41. Mason, G., & Czapski, N. (2017). Regulating cyber racism. Melbourne University Law Review, 41(1), 284–340.Google Scholar
  42. Mauss, M. (1969). The Gift: Forms and Functions of Exchange in Archaic Societies. London: Routledge.Google Scholar
  43. McGovern, A. M., Crofts, T., Lee, M., & Milivojevic, S. (2016). Media, legal and young people’s discourses around sexting. Global Studies of Childhood, 6(4), 428–441. https://doi.org/10.1177/2043610616676028.CrossRefGoogle Scholar
  44. Mitchell, A., Kiley, J., Gottfried, J., & Guskin, K. (2013, October 24). The role of news on Facebook: Common yet incidental. Journalism and Media. Pew Research Centre. Retrieved May 17, 2017, from http://www.journalism.org/2013/10/24/the-role-of-news-on-facebook/
  45. Newburn, T. (2017). Criminology (3rd ed.). London: Routledge.Google Scholar
  46. Palmer, D., & Warren, I. (2013). Global policing and the case of Kim Dotcom. International Journal for Crime, Justice and Social Democracy, 2(3), 105–119. https://doi.org/10.5204/ijcjsd.v2i3.105.CrossRefGoogle Scholar
  47. PricewaterhouseCoopers (PwC). (2016). Global Economic Crime Survey 2016: Adjusting the Lens on Economic Crime: Preparation Brings Opportunity Back into Focus. Retrieved May 20, 2017, from http://www.pwc.com/gx/en/economic-crime-survey/pdf/GlobalEconomicCrimeSurvey2016.pdf
  48. Tarquin. (2016, September 20). How to access the Dark Web. Dark Web News. Retrieved May 15, 2017, from https://darkwebnews.com/help-advice/access-dark-web/
  49. Tor Project. (2017). Tor: Overview. Retrieved April 21, 2017, from https://www.torproject.org/about/overview.html.en
  50. Smith, R., Chak-Chung Cheung, R., & Yiu-Chung Lau, L. (2015). Introduction. In R. Smith, R. Chak-Chung Cheung, & L. Yiu-Chung Lau (Eds.), Cybercrime Risks and Responses Eastern and Western Perspectives (pp. 1–9). London: Palgrave.CrossRefGoogle Scholar
  51. Soukieh, K. (2011). Cybercrime—The shifting doctrine of jurisdiction. Canberra Law Review, 10, 221–238.Google Scholar
  52. United Nations Office on Drugs and Crime (UNODC). (2014, April 14). Some 437,000 people murdered worldwide in 2012, according to new UNODC study. Press Release. Vienna: United Nations. Retrieved May 17, 2017, from https://www.unodc.org/unodc/en/press/releases/2014/April/some-437000-people-murdered-worldwide-in-2012-according-to-new-unodc-study.html
  53. van der Wagen, W., & Pieters, W. (2015). From cybercrime to cyborg crime: Botnets as hybrid criminal actor-networks. British Journal of Criminology, 55(3), 578–595. https://doi.org/10.1093/bjc/azv009.CrossRefGoogle Scholar
  54. Warren, I., & Palmer, D. (2015). Global Criminology. Pyrmont, New South Wales: Thomson Reuters.Google Scholar
  55. Zimring, F. (2007). The Great American Crime Decline. Oxford: Oxford University Press.Google Scholar

Cases

  1. Dotcom v Attorney General [2012] NZHC 1494.Google Scholar
  2. Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255, 10 December.Google Scholar

Legislation

  1. Judiciary Act 1903 (Cth).Google Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Murray Lee
    • 1
  1. 1.University of Sydney Law SchoolSydneyAustralia

Personalised recommendations