Skip to main content

Cybercrime 4.0: Now What Is to Be Done?

  • Chapter
  • First Online:
What is to Be Done About Crime and Punishment?
  • 1065 Accesses

Abstract

There has been widespread agreement about the scale of the cybercrime problem—that it represents one of the most serious of all contemporary criminal threats (Cabinet Office 2011; Cowley 2012). From the mid-1990s onwards this conclusion has driven significant shifts in legislation, policing powers and policy across most national jurisdictions. But how effective have these been? Perhaps more significantly, do these responses offer any kind of template for dealing with future developments in the cybercrime threat? In this chapter I review the health of our defences against online offending in the light of what may be its latest mutation, an emerging complex of technical opportunity which, for convenience, will be termed Cybercrime 4.0. I ask if what worked in previous contexts is likely to continue to work, or if this latest shift represents another permutation of the old maxim that crime control is always one step behind the (cyber)criminal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Computer viruses offer one example, piracy and illicit copying provide another.

  2. 2.

    This suggests that computing power roughly doubles every two years.

  3. 3.

    ‘Whitelisting’ of favoured sites, or creating a ‘sinkhole’ which diverts malicious traffic to a spoof site where it can be analysed (Bruneau 2010) offer other examples.

  4. 4.

    If other costs, such as cleaning up an infection are incorporated, Anderson et al. estimate this figure could rise to over $25,000 m globally—around $1200 m for the UK.

  5. 5.

    In Louisiana LA. REV. STAT. ANN. § 14:90.3 (West 1997).

  6. 6.

    18 U.S.C. 1030. Both have been subject to ongoing revision and amendment—for example via other legislation such as the Police and Justice Act 2006.

  7. 7.

    These occur where there is no attempt to decrypt but simply to check through every permutation or candidate for a code or password.

  8. 8.

    Based on an analysis of over 1300 data-breach incidents investigated by Verizon.

References

  • ABI Research. (2014, August 20). Internet of Everything market tracker.

    Google Scholar 

  • Anderson, R., et al. (2012). Measuring the cost of cybercrime. Available at: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf

  • Arthur. (2014, September 1). Naked celebrity hack: Security experts focus on iCloud backup theory. Guardian.

    Google Scholar 

  • Bachelor, L. (2015, July 23). Contactless card fraud is too easy, says Which? Guardian.

    Google Scholar 

  • BBC. (2012, October 17). The Pirate Bay moves to the cloud to avoid shutdown. BBC.

    Google Scholar 

  • Bequai, A. (1986). Techno-Crimes: The computerization of crime and terrorism. D.C. Heath and Company.

    Google Scholar 

  • Booth, R. (2013, October 25). Vigilante paedophile hunters ruining lives with internet stings. Guardian.

    Google Scholar 

  • Bruneau, G. (2010). DNS Sinkhole’ SANS Institute Reading Room, White Paper.

    Google Scholar 

  • Cabinet Office. (2011). The UK cyber security strategy. HMSO, 201.

    Google Scholar 

  • Cellan-Jones. (2015, January 29). Office puts chips under staff’s skin. BBC.

    Google Scholar 

  • Constantin, L. (2014b, December 9). More than 30 vulnerabilities found in Google App Engine. Computerworld.

    Google Scholar 

  • Cowley, S. (2012, March 2). FBI Director: Cybercrime will eclipse terrorism. CNN-Money.

    Google Scholar 

  • CPNI. (2015). Critical Security Controls guidance, Centre for Protection of National Infrastructure guidelines.

    Google Scholar 

  • CSIS/McAfee. (2014, June). Net losses: Estimating the global cost of cybercrime. Centre for Strategic and International Studies.

    Google Scholar 

  • CTIA. (2013, May 22). Wireless consumers aware of cyberthreats and know they should protect themselves, yet many don’t. Press Release.

    Google Scholar 

  • DoJ. (2015, July 15). Major computer hacking forum dismantled, Department of Justice Press Re lease.

    Google Scholar 

  • Dyson, R. (2013, October 31). Engineers claim to prove risks of ‘contactless’ bank cards. Daily Telegraph.

    Google Scholar 

  • Europol. (2014). Internet Organised Crime Threat Assessment 2014.

    Google Scholar 

  • FFA. (2014). Fraud, the facts, Financial Fraud Action Annual Report.

    Google Scholar 

  • Fortinet. (2013). Happy birthday, Mobile Malware! White paper.

    Google Scholar 

  • Galante, J. (2011, May 16). Sony network breach shows Amazon cloud’s appeal for hackers, Bloomberg.

    Google Scholar 

  • Galperin, E., & Quintin, C. (2015, February 19). Russian researchers uncover sophisticated NSA malware EFF.

    Google Scholar 

  • Goodin, D. (2011, January 11). Researcher cracks Wi-Fi passwords with Amazon cloud. Register.

    Google Scholar 

  • Goodman, M. (2015). Future crimes. New York: Doubleday.

    Google Scholar 

  • Greenberg, A. (2014, July 24). How hackers hid a money-mining botnet in the clouds of amazon and others. Wired.

    Google Scholar 

  • GSMA. (2014). Mobile economy report, 2014, GSMA Intelligence.

    Google Scholar 

  • GSO/Vision Critical. (2014). Survey on Internet security, summary at https://www.gov.uk/government/news/top-10-online-enabled-frauds-hitting-british-wallets-to-the-tune-of-670-million-with-high-emotional-cost

  • Hallevy, G. (2010). The Criminal Liability of Artificial Intelligence Entities. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1564096

  • Harris, M. (2014, July 16). FBI warns driverless cars could be used as ‘lethal weapons’. Guardian.

    Google Scholar 

  • Home Office. (2015, March 10). Internet of things: Potential risk of crime and how to prevent it. HO.

    Google Scholar 

  • IBM. (2010). X-Force Mid-year Trend Report.

    Google Scholar 

  • IBM. (2015). Cyber Security Security Intelligence Index.

    Google Scholar 

  • Internet Watch Foundation. (2012). Internet Watch Foundation Annual and Charity Report 2012.

    Google Scholar 

  • Ipsos Mori. (2013). Public attitudes to internet security, Details in McGuire and Dowling.

    Google Scholar 

  • Krebs, C. (2014, May). Antivirus is dead: Long live antivirus! Krebs on Security.

    Google Scholar 

  • Krishnan, A. (2009). Killer robots: Legality and ethicality of autonomous weapons. Farnham: Ashgate.

    Google Scholar 

  • Maass, P., & Rajagopalan, M. (2012, March 1). Does cybercrime really cost $1 Trillion? Propublica.

    Google Scholar 

  • Marion, N. (2010). The council of Europe’s cyber crime treaty: An exercise in symbolic legislation. International Journal of Cyber Criminology, 4(1&2), 699–712.

    Google Scholar 

  • McElroy, D. (2012, May 28). Flame: world’s most complex computer virus exposed. Daily Telegraph.

    Google Scholar 

  • McGuire, M. (2005). Hypercrime: The new geometry of harm. Abingdon: Routledge.

    Google Scholar 

  • McGuire, M. (2013). Policing responses to Cybercrime, Unpublished interview research.

    Google Scholar 

  • McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence.

    Google Scholar 

  • Meeker, M. (2013, May 29). Internet Trends Report, KPCB.

    Google Scholar 

  • Met Police. (2013, September 27). Cyber investigations save UK £1.01 billion, Press Release.

    Google Scholar 

  • Norton. (2014). Annual report.

    Google Scholar 

  • O’Toole, J. (2014, March 28). Mobile apps overtake PC Internet usage in U.S. CNN Money.

    Google Scholar 

  • Ofcom. (2007). The Communications Market 2007.

    Google Scholar 

  • Ofcom. (2014). Adult media use & attitudes report.

    Google Scholar 

  • Ofcom. (2015). Adult media use & attitudes report.

    Google Scholar 

  • Pagallo. (2013). The laws of robots: Crimes, contracts, and torts. Dordrecht: Springer.

    Book  Google Scholar 

  • Park, S., & Jayaraman, S. (2003). Enhancing the quality of life through wearable technology. IEEE Engineering in Medicine and Biology Magazine, 22(3), 41–48.

    Article  Google Scholar 

  • Parker, D. (1976). Crime by computer. New York: Charles Scribner’s Sons.

    Google Scholar 

  • Pentland, A. (2005). Healthwear: Medical technology becomes wearable. Studies in Health Technology and Informatics, 118, 55–65.

    Google Scholar 

  • Perez, S. (2014, April 1). Mobile app usage increases in 2014, as mobile web surfing declines. Tech Crunch.

    Google Scholar 

  • Perlroth, N. (2012, December 31). Outmaneuvered at their own game, antivirus makers struggle to adapt. New York Times.

    Google Scholar 

  • Peterson, A. (2013, October 21). Yes, terrorists could have hacked Dick Cheney’s heart. Washington Post.

    Google Scholar 

  • Ponemon. (2010–2014). Cost of data breach reports, Ponemon Institute.

    Google Scholar 

  • Press, G. (2014, August 22). Internet of things by the numbers. Forbes.

    Google Scholar 

  • Sanger, D. (2013, May 6). U.S. blames China’s military directly for cyberattacks. New York Times.

    Google Scholar 

  • Schmidt, et al. (2009). Smartphone malware evolution revisited: Android next target? In MALWARE, 2009 4th International Conference.

    Google Scholar 

  • Scholberg, S. (2014) The history of cybercrime: 1976–2014, Cybercrime Research Institute.

    Google Scholar 

  • Snow, G. (2011, April 12). Statement before the Senate Judiciary Committee.

    Google Scholar 

  • Spencer, L. (2015, February 13). 16 million mobile devices hit by malware in 2014. ZDnet.

    Google Scholar 

  • Strohm, C. (2015, June 23). Most-wanted cybercriminal extradited to U.S. from Germany. Bloomberg.

    Google Scholar 

  • Tuomi, A. (2002). The lives and death of Moores Law. First Monday, 7(11), 4.

    Article  Google Scholar 

  • UNODC. (2013). Comprehensive study on cybercrime. Available at: http://www.unodc.org/documents/organizedcrime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

  • Vaughn-Nichols, S. (2014, March 29). Hypervisors: The cloud’s potential security Achilles heel. ZDNet.

    Google Scholar 

  • Venezia, P. (2014, June 23). Murder in the Amazon cloud. Infoworld.

    Google Scholar 

  • Verizon. (2015). Data Breach Investigations Report.

    Google Scholar 

  • Versprille, A. (2015). Researchers hack into driverless car system, take control of vehicle. National Defense Magazine, May.

    Google Scholar 

  • VisionMobile. (2014). Developer economics Q1 2015: State of the developer nation. Available at: https://www.developereconomics.com/reports/developer-economics-q1-2015/#key-insights

  • Wall, D. (2013). Cybercrime and the culture of fear: Policing the reassurance gap in cybersecurity. Berlin: Springer.

    Google Scholar 

  • Wasik. (2013, December 17). Why wearable tech will be as the smartphone. Wired.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2016 The Author

About this chapter

Cite this chapter

McGuire, M.R. (2016). Cybercrime 4.0: Now What Is to Be Done?. In: Matthews, R. (eds) What is to Be Done About Crime and Punishment?. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-57228-8_10

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-57228-8_10

  • Published:

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-1-137-57227-1

  • Online ISBN: 978-1-137-57228-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics