Skip to main content

Policing the Virtual Community: The Internet, Cyberspace and Cyber-Crime

  • Chapter
Policing Futures

Abstract

The 1980s and 1990s has witnessed the development of an exciting new domain which, warts and all, is potentially free of conventional politics, social order and social regulation. Never before has there been so much ready access to such a broad range of human knowledge and experience. However this ‘cyberspace’, which has been created by the Internet,2 is not without its contradictions. The optimism arising from its potential to democratize access to hitherto restricted knowledge and thus level out some of the social boundaries that have developed both within and across societies is tempered by the nature of this revolutionary new resource. In addition to the considerable benefits that the Internet creates, there are also many opportunities for new types of offending and new forms of anti-social behaviour. Moreover, cyberspace undermines economic, social and political boundaries, posing a considerable threat to traditional forms of governance and creating a challenge to traditional understandings of order.

The following discussion focuses primarily upon policing in the United Kingdom, but draws upon the experiences of the United States and other jurisdictions where appropriate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Akdeniz, Y. (1996a) ‘Computer pornography: a comparative study of US and UK obscenity laws and child pornography laws in relation to the internet’, International Review of Law, Computers and Technology, vol. 10, no. 2, pp. 235–61.

    Article  Google Scholar 

  • Akdeniz, Y. (1996b) ‘Section 3 of the Computer Misuse Act 1990: An antidote for computer viruses’, Web Journal of Contemporary Legal Issues, vol. 3,

    Google Scholar 

  • Arthur, C. (1996) ‘New crackdown on child porn on the internet’, The Independent, 23 September.

    Google Scholar 

  • Barlow, J. P. (1990) ‘Crime and puzzlement: in advance of the law on the electronic frontier’, Whole Earth Review, Fall, p. 44.

    Google Scholar 

  • Barlow, J. P. (1994) ‘The economy of ideas: a framework for rethinking patents and copyrights in the digital age (Everything you know about intellectual property is wrong)’, Wired, vol. 2, no. 3, p. 84.

    Google Scholar 

  • Battcock, R. (1995) ‘Computer Misuse Act 5 years on’ [http://www.strath.ac.uk/Departments/Law/student/PERSONAL/R_BATTCOCK/].

    Google Scholar 

  • Bauman, Z. (1992) Intimations of Post-Modernity (London: Routledge).

    Google Scholar 

  • Benedikt, M. (ed.) (1991) Cyberspace: The First Steps (Cambridge, Mass.: MIT Press).

    Google Scholar 

  • Blakey, D. (1996) ‘Policing cyberspace’, Policing Today, vol. 2, no. 1, pp. 19–21.

    Google Scholar 

  • Braithwaite, J. (1992) Crime, Shame and Reintegration (Cambridge, Cambridge University Press).

    Google Scholar 

  • Braverman. H. (1976) Labour and Monopoly Capital (New York: Monthly Review Press).

    Google Scholar 

  • Burrell, I. (1996) ‘Leak reveals contempt for British FBI’, The Independent, 11 October, p. 1.

    Google Scholar 

  • Byassee, W. S. (1995) ‘Jurisdiction of Cyberspace: applying real world precedent to the virtual community’, Wake Forest Law Review, vol. 30, pp. 197–220.

    Google Scholar 

  • Caden, M. L. and Lucas, S. E. (1996) ‘Accidents on the Information Superhighway: on-line liability and regulation’, Richmond Journal of Law & Technology, vol. 2, no. 1.

    Google Scholar 

  • Chandler, A. (1996) ‘The changing definition and image of hackers in popular discourse’, International Journal of the Sociology of Law, vol. 24, pp. 229–51.

    Article  Google Scholar 

  • Charlesworth, A. (1995) ‘Between flesh and sand: rethinking the Computer Misuse Act 1990’, International Year book of Law, Computers and Technology (Oxford: Carfax Publishing) vol. 9, pp. 31–46.

    Google Scholar 

  • Cohen, S. (1980) Folk Devils and Moral Panics (Oxford: Basil Blackwell).

    Google Scholar 

  • Critchley, T. A. (1967) A History of the Police in England and Wales 1900–1966 (London: Constable).

    Google Scholar 

  • DTI (1992) Dealing with Computer Misuse (London: HMSO).

    Google Scholar 

  • Duff, L. and Gardiner, S. (1996) ‘Computer crime in the global village: strategies for control and regulation — in defence of the hacker’, International Journal of the Sociology of Law, vol. 24, pp. 211–28.

    Article  Google Scholar 

  • Elmer-Dewitt, P. (1994) ‘Battle for the soul of the Internet’, Time, 25 July, pp. 50, 52.

    Google Scholar 

  • Escobar, A. (1996) ‘Welcome to Cyberia: Notes on the anthropology of cyberculture’, in Z. Saradar and J. R. Ravetz (eds), Cyberfutures: Culture and Politics on the Information Superhighway (London: Pluto Press).

    Google Scholar 

  • European Commission Select Committee (1996) Green Paper on the Protection of Minors and Human Dignity in Audio-Visual and Information Services (Brussels—Luxembourg).

    Google Scholar 

  • Evans, J. (1994) ‘Cruising the Internet: what’s in it for lawyers?’, Cal. Lawyer, July, p. 67.

    Google Scholar 

  • Fraser, B. T. (1996) ‘Computer Crime Research Resources’, School of Library and Information Studies, Florida State University [http://mailer.fsu.edu/~btf1553/ccrr/search1.htm].

    Google Scholar 

  • Gash, N. (1961) Mr Secretary Peel (London: Longman).

    Google Scholar 

  • Gibson, W. (1984) Neuromancer (London: HarperCollins).

    Google Scholar 

  • Giddens, A. (1990) The Consequences of Modernity (London: Polity Press).

    Google Scholar 

  • Gottfredson, G. and Hischi, T. (1990) A General Theory of Crime (Stanford California: Stanford University Press).

    Google Scholar 

  • Grossman, W. (1996) ‘A grip on the new’, Electronic Telegraph, 1 October, no. 496.

    Google Scholar 

  • Hafner, K. and Markoff, J. (1995) Cyberpunk: Outlaws and Hackers on the Computer Frontier (New York: Simon & Schuster).

    Google Scholar 

  • The Herald (1996) ‘Inquiry into pornography on Tory students’ Internet page’, The (Glasgow) Herald, 19 August, p. 6.

    Google Scholar 

  • Hermer, J. and Hunt, A. (1996) ‘Official graffiti of the everyday’, Law and Society Review, vol. 30, no. 3, pp. 455–80.

    Article  Google Scholar 

  • Itzen, C. (ed.) (1993) Pornography: Women, Violence and Civil Liberties (Oxford: Oxford University Press).

    Google Scholar 

  • Johnson, D. and Post, D. G. (1996) ‘Law and borders: the rise of law in cyberspace’ [http://www.law.syr.edu/Course.Materials/Chon/borders.html].

    Google Scholar 

  • Kumar, K. (1978) Prophecy and Progress: The Sociology of Post-Industrial Society (Harmondsworth: Penguin).

    Google Scholar 

  • Lloyd, I. (1994) ‘Shopping in Cyberspace’, International Journal of Law and Information Technology, vol. 1, no. 3, pp. 335–48.

    Article  Google Scholar 

  • Mandel, T. F. (1993) Surfing the Wild Internet, SCAN; Business Intelligence Program, SRI International, Menlo Park, No. 2109, March.

    Google Scholar 

  • Manning, P. K. (1977) Police Work (Cambridge, Mass.: MIT Press).

    Google Scholar 

  • McBarnet, D. (1979) ‘Arrest: the legal context of policing’, in S. Holdaway (ed.), The British Police (London: Arnold).

    Google Scholar 

  • McCormack, N. (1996b) ‘Criminals slip through the net’, Electronic Telegraph, 5 November, p. 3.

    Google Scholar 

  • National Computing Centre. (1996) The Information Security Breaches Survey 1996 (The National Computing Centre Limited).

    Google Scholar 

  • National Heritage Committee (1996) The Structure and Remit of the Department of National Heritage (London: HMSO).

    Google Scholar 

  • Post, D. (1995) ‘Encryption vs. the alligator clip: the feds worry that encoded messages are immune to wiretaps’, New Jersey Law Journal, 23 January, p. 8.

    Google Scholar 

  • Pretzlik, C. (1996) ‘Firm accused of fraud on the Internet’, Daily Telegraph, 9 November.

    Google Scholar 

  • Reiner, R. (1992) The Politics of the Police (Sussex: Wheatsheaf).

    Google Scholar 

  • Reno, J. Hon (1996) ‘Law enforcement in cyberspace’, address to the Commonwealth Club of California, San Francisco Hilton Hotel, 14 June [http://pwp.usa.pipeline.com/~jya/addres.txt].

    Google Scholar 

  • Rheingold, H. (1993) The Virtual Community: Homesteading the Electronic Frontier (London: Secker & Warburg).

    Google Scholar 

  • Rimm, M. (1995) ‘Marketing pornography on the information superhighway: a survey of 917,410 images, descriptions, short stories, and animations downloaded 8.5 million times by consumers in over 2000 cities in forty countries, provinces, and territories’, Georgetown Law Journal, vol. 83, no. 5, pp. 1849–1934.

    Google Scholar 

  • Rose, P. (1995) ‘Internet police crack child porn network’, Daily Mail, 27 July, p. 16.

    Google Scholar 

  • Ross, A. (1990) ‘Hacking away at the counterculture’, Postmodern Culture, vol. 1, no. 1: [http://jefferson.village.virginia.edu/pmc/issue.990%ontents.990.htmI].

    Google Scholar 

  • Sacks, H. (1972) ‘Notes on police assessment of moral character’, in D. Sudnow (ed.), Studies in Social Interaction (New York: Free Press).

    Google Scholar 

  • Saradar, Z. and Ravetz, J. R. (1996) ‘Reaping the technological whirlwind’, in Z. Saradar and J. R. Ravetz (eds), Cyberfutures: Culture and Politics on the Information Superhighway (London: Pluto Press).

    Google Scholar 

  • Savage, S. P., Charman, S. and Cope, S. (1996) ‘Police governance: the Association of Chief Police Officers and constitutional change’, Public Policy and Administration, vol. 11, no. 2, pp. 92–106.

    Article  Google Scholar 

  • Schlozberg, S. (1983) Computers and Penal Legislation (Oslo: Norwegian Research Centre for Computers and Law).

    Google Scholar 

  • Select Committee on Science and Technology (1996) Information Society: Agenda for Action in the UK, Fifth Report, Select Committee on Science and Technology, H. L. 1995–1996.

    Google Scholar 

  • Shearing, C. (1995) ‘Transforming the culture of policing: thoughts from South Africa’, in D. Dixon (ed.), Crime, Criminology and Public Policy, Special Supplementary Issue of the Australian and New Zealand Journal of Criminology (Sydney: Butterworths).

    Google Scholar 

  • Shearing, C. and Ericson, R. (1991) ‘Culture as figurative action’, British Journal of Sociology, vol. 42, no. 4, pp. 481–506.

    Article  Google Scholar 

  • Standage, T. (1996) ‘Web access in a tangle as censors have their say’, Electronic Telegraph, 10 September, no. 475.

    Google Scholar 

  • Steele, J. (1996) ‘Howard denies the national police squad will be like FBI’, Electronic Telegraph, 3 July, no. 419.

    Google Scholar 

  • Sterling, B. (1994) The Hacker Crackdown (London: Penguin Books).

    Google Scholar 

  • Sterling, B. (1995) ‘Good cop, bad hacker’, speech to the High Technology Crime Investigation Association, Wired, vol. 3, no. 5, p. 122.

    Google Scholar 

  • Sussman, V. (1995) ‘Policing Cyberspace’, U.S. News 38; World Rep., Jan. 23, 1995, at 54, Lexis, News library, Usenews file, 1995 WL 3113171.

    Google Scholar 

  • Szafranski, Col. R. (1995) ‘A theory of Information Warfare: preparing for 2020,’ Air Chronicles, vol. 1, pp. 56–65 [http://www.cdsar.af.mil/apj/szfran.html].

    Google Scholar 

  • Tendler, S. (1996a) ‘Hi-tech cheats use supermarket cards to fake credit sales’, The Times, 26 June, p. 6.

    Google Scholar 

  • Tendler, S. (1996b) ‘Public to help police curb internet porn’, The Times, 2 December.

    Google Scholar 

  • Tribe, L. H. (1991) ‘The constitution in cyberspace: law and liberty beyond the electronic frontier’, The Humanist, 26 March, p. 15.

    Google Scholar 

  • Uhlig, R. (1996a) ‘Hunt is on for Internet dealer in child porn’, Electronic Telegraph, 23 October, no. 518.

    Google Scholar 

  • Uhlig, R. (1996b) ‘Minister’s warning over Internet porn’, Electronic Telegraph, 16 August.

    Google Scholar 

  • Uhlig, R. (1996c) ‘“Safety Net” on Internet will catch child porn’, Electronic Telegraph, 23 September, no. 488.

    Google Scholar 

  • Uhlig, R. (1996d) ‘Hackers sabotage Blair internet page’, Electronic Telegraph, 10 December, no. 566.

    Google Scholar 

  • United Nations (1995), International Review of Criminal Policy No. 43 and 44 — United Nations Manual on the Prevention and Control of Computer-Related Crime [http://www.ifs.univie.ac.at/~pr2gql/rev4344.htm1#crime].

    Google Scholar 

  • Wall, D. S. (1995) ‘Technology and crime: increased capital investment in information technology and changes in victimisation patterns’, International Yearbook of Law, Computers and Technology, vol. 9, pp. 97–109.

    Article  Google Scholar 

  • Wall, D. S. (1996) ‘Reconstructing the soul of Elvis: the social development and legal maintenance of Elvis Presley as intellectual property’, International Journal of the Sociology of Law, vol. 24, pp. 117–43.

    Article  Google Scholar 

  • Wall, D. S. and Johnstone, J. (1997) ‘The industrialization of law: the impact of information technology upon the legal practice’, International Journal of the Sociology of Law, vol. 27.

    Google Scholar 

  • Wasik, M. (1991) Crime and the Computer (Oxford: Clarendon Press).

    Google Scholar 

  • Young, J. (1974) ‘Deviance amplification’, in S. Cohen (ed.), Images of Deviance (Harmonsdworth: Penguin).

    Google Scholar 

  • Young, L. F. (1995) ‘United States computer crime laws, criminals and deterrence’, International Yearbook of Law, Computers and Technology, vol. 9, pp. 1–16.

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 1997 Palgrave Macmillan, a division of Macmillan Publishers Limited

About this chapter

Cite this chapter

Wall, D. (1997). Policing the Virtual Community: The Internet, Cyberspace and Cyber-Crime. In: Francis, P., Davies, P., Jupp, V. (eds) Policing Futures. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-25980-9_9

Download citation

Publish with us

Policies and ethics