Abstract
There has been widespread agreement about the scale of the cybercrime problem—that it represents one of the most serious of all contemporary criminal threats (Cabinet Office 2011; Cowley 2012). From the mid-1990s onwards this conclusion has driven significant shifts in legislation, policing powers and policy across most national jurisdictions. But how effective have these been? Perhaps more significantly, do these responses offer any kind of template for dealing with future developments in the cybercrime threat? In this chapter I review the health of our defences against online offending in the light of what may be its latest mutation, an emerging complex of technical opportunity which, for convenience, will be termed Cybercrime 4.0. I ask if what worked in previous contexts is likely to continue to work, or if this latest shift represents another permutation of the old maxim that crime control is always one step behind the (cyber)criminal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Computer viruses offer one example, piracy and illicit copying provide another.
- 2.
This suggests that computing power roughly doubles every two years.
- 3.
‘Whitelisting’ of favoured sites, or creating a ‘sinkhole’ which diverts malicious traffic to a spoof site where it can be analysed (Bruneau 2010) offer other examples.
- 4.
If other costs, such as cleaning up an infection are incorporated, Anderson et al. estimate this figure could rise to over $25,000 m globally—around $1200 m for the UK.
- 5.
In Louisiana LA. REV. STAT. ANN. § 14:90.3 (West 1997).
- 6.
18 U.S.C. 1030. Both have been subject to ongoing revision and amendment—for example via other legislation such as the Police and Justice Act 2006.
- 7.
These occur where there is no attempt to decrypt but simply to check through every permutation or candidate for a code or password.
- 8.
Based on an analysis of over 1300 data-breach incidents investigated by Verizon.
References
ABI Research. (2014, August 20). Internet of Everything market tracker.
Anderson, R., et al. (2012). Measuring the cost of cybercrime. Available at: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
Arthur. (2014, September 1). Naked celebrity hack: Security experts focus on iCloud backup theory. Guardian.
Bachelor, L. (2015, July 23). Contactless card fraud is too easy, says Which? Guardian.
BBC. (2012, October 17). The Pirate Bay moves to the cloud to avoid shutdown. BBC.
Bequai, A. (1986). Techno-Crimes: The computerization of crime and terrorism. D.C. Heath and Company.
Booth, R. (2013, October 25). Vigilante paedophile hunters ruining lives with internet stings. Guardian.
Bruneau, G. (2010). DNS Sinkhole’ SANS Institute Reading Room, White Paper.
Cabinet Office. (2011). The UK cyber security strategy. HMSO, 201.
Cellan-Jones. (2015, January 29). Office puts chips under staff’s skin. BBC.
Constantin, L. (2014b, December 9). More than 30 vulnerabilities found in Google App Engine. Computerworld.
Cowley, S. (2012, March 2). FBI Director: Cybercrime will eclipse terrorism. CNN-Money.
CPNI. (2015). Critical Security Controls guidance, Centre for Protection of National Infrastructure guidelines.
CSIS/McAfee. (2014, June). Net losses: Estimating the global cost of cybercrime. Centre for Strategic and International Studies.
CTIA. (2013, May 22). Wireless consumers aware of cyberthreats and know they should protect themselves, yet many don’t. Press Release.
DoJ. (2015, July 15). Major computer hacking forum dismantled, Department of Justice Press Re lease.
Dyson, R. (2013, October 31). Engineers claim to prove risks of ‘contactless’ bank cards. Daily Telegraph.
Europol. (2014). Internet Organised Crime Threat Assessment 2014.
FFA. (2014). Fraud, the facts, Financial Fraud Action Annual Report.
Fortinet. (2013). Happy birthday, Mobile Malware! White paper.
Galante, J. (2011, May 16). Sony network breach shows Amazon cloud’s appeal for hackers, Bloomberg.
Galperin, E., & Quintin, C. (2015, February 19). Russian researchers uncover sophisticated NSA malware EFF.
Goodin, D. (2011, January 11). Researcher cracks Wi-Fi passwords with Amazon cloud. Register.
Goodman, M. (2015). Future crimes. New York: Doubleday.
Greenberg, A. (2014, July 24). How hackers hid a money-mining botnet in the clouds of amazon and others. Wired.
GSMA. (2014). Mobile economy report, 2014, GSMA Intelligence.
GSO/Vision Critical. (2014). Survey on Internet security, summary at https://www.gov.uk/government/news/top-10-online-enabled-frauds-hitting-british-wallets-to-the-tune-of-670-million-with-high-emotional-cost
Hallevy, G. (2010). The Criminal Liability of Artificial Intelligence Entities. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1564096
Harris, M. (2014, July 16). FBI warns driverless cars could be used as ‘lethal weapons’. Guardian.
Home Office. (2015, March 10). Internet of things: Potential risk of crime and how to prevent it. HO.
IBM. (2010). X-Force Mid-year Trend Report.
IBM. (2015). Cyber Security Security Intelligence Index.
Internet Watch Foundation. (2012). Internet Watch Foundation Annual and Charity Report 2012.
Ipsos Mori. (2013). Public attitudes to internet security, Details in McGuire and Dowling.
Krebs, C. (2014, May). Antivirus is dead: Long live antivirus! Krebs on Security.
Krishnan, A. (2009). Killer robots: Legality and ethicality of autonomous weapons. Farnham: Ashgate.
Maass, P., & Rajagopalan, M. (2012, March 1). Does cybercrime really cost $1 Trillion? Propublica.
Marion, N. (2010). The council of Europe’s cyber crime treaty: An exercise in symbolic legislation. International Journal of Cyber Criminology, 4(1&2), 699–712.
McElroy, D. (2012, May 28). Flame: world’s most complex computer virus exposed. Daily Telegraph.
McGuire, M. (2005). Hypercrime: The new geometry of harm. Abingdon: Routledge.
McGuire, M. (2013). Policing responses to Cybercrime, Unpublished interview research.
McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence.
Meeker, M. (2013, May 29). Internet Trends Report, KPCB.
Met Police. (2013, September 27). Cyber investigations save UK £1.01 billion, Press Release.
Norton. (2014). Annual report.
O’Toole, J. (2014, March 28). Mobile apps overtake PC Internet usage in U.S. CNN Money.
Ofcom. (2007). The Communications Market 2007.
Ofcom. (2014). Adult media use & attitudes report.
Ofcom. (2015). Adult media use & attitudes report.
Pagallo. (2013). The laws of robots: Crimes, contracts, and torts. Dordrecht: Springer.
Park, S., & Jayaraman, S. (2003). Enhancing the quality of life through wearable technology. IEEE Engineering in Medicine and Biology Magazine, 22(3), 41–48.
Parker, D. (1976). Crime by computer. New York: Charles Scribner’s Sons.
Pentland, A. (2005). Healthwear: Medical technology becomes wearable. Studies in Health Technology and Informatics, 118, 55–65.
Perez, S. (2014, April 1). Mobile app usage increases in 2014, as mobile web surfing declines. Tech Crunch.
Perlroth, N. (2012, December 31). Outmaneuvered at their own game, antivirus makers struggle to adapt. New York Times.
Peterson, A. (2013, October 21). Yes, terrorists could have hacked Dick Cheney’s heart. Washington Post.
Ponemon. (2010–2014). Cost of data breach reports, Ponemon Institute.
Press, G. (2014, August 22). Internet of things by the numbers. Forbes.
Sanger, D. (2013, May 6). U.S. blames China’s military directly for cyberattacks. New York Times.
Schmidt, et al. (2009). Smartphone malware evolution revisited: Android next target? In MALWARE, 2009 4th International Conference.
Scholberg, S. (2014) The history of cybercrime: 1976–2014, Cybercrime Research Institute.
Snow, G. (2011, April 12). Statement before the Senate Judiciary Committee.
Spencer, L. (2015, February 13). 16 million mobile devices hit by malware in 2014. ZDnet.
Strohm, C. (2015, June 23). Most-wanted cybercriminal extradited to U.S. from Germany. Bloomberg.
Tuomi, A. (2002). The lives and death of Moores Law. First Monday, 7(11), 4.
UNODC. (2013). Comprehensive study on cybercrime. Available at: http://www.unodc.org/documents/organizedcrime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
Vaughn-Nichols, S. (2014, March 29). Hypervisors: The cloud’s potential security Achilles heel. ZDNet.
Venezia, P. (2014, June 23). Murder in the Amazon cloud. Infoworld.
Verizon. (2015). Data Breach Investigations Report.
Versprille, A. (2015). Researchers hack into driverless car system, take control of vehicle. National Defense Magazine, May.
VisionMobile. (2014). Developer economics Q1 2015: State of the developer nation. Available at: https://www.developereconomics.com/reports/developer-economics-q1-2015/#key-insights
Wall, D. (2013). Cybercrime and the culture of fear: Policing the reassurance gap in cybersecurity. Berlin: Springer.
Wasik. (2013, December 17). Why wearable tech will be as the smartphone. Wired.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2016 The Author
About this chapter
Cite this chapter
McGuire, M.R. (2016). Cybercrime 4.0: Now What Is to Be Done?. In: Matthews, R. (eds) What is to Be Done About Crime and Punishment?. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-57228-8_10
Download citation
DOI: https://doi.org/10.1057/978-1-137-57228-8_10
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-57227-1
Online ISBN: 978-1-137-57228-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)