Publication Cover
Policing and Society
An International Journal of Research and Policy
Volume 32, 2022 - Issue 1
6,979
Views
3
CrossRef citations to date
0
Altmetric
Articles

Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services

ORCID Icon, , , ORCID Icon &
Pages 103-124 | Received 19 Jul 2020, Accepted 25 Jan 2021, Published online: 10 Feb 2021

References

  • Abrahamsen, R., and Williams, M.C., 2010. Security beyond the state: private security in international politics. Cambridge: Cambridge University Press.
  • Anderson, R., et al. (2013). Measuring the cost of cybercrime. In: R. Böhme, ed. The Economics of information security and privacy. Berlin: Springer, 265–300.
  • Beck, U., Lash, S., and Wynne, B., 1992. Risk society: towards a new modernity (Vol. 17). New York: Sage.
  • Behr, H., 2008. Deterritorialisation and the transformation of statehood: the paradox of globalisation. Geopolitics, 13 (2), 359–382.
  • Bojarski, K., 2015. Dealer, hacker, lawyer, spy: modern techniques and legal boundaries of counter-cybercrime operations. The European review of organised crime, 2 (2), 25–50.
  • Bouchard, M., 2007. On the resilience of illegal drug markets. Global crime, 8 (4), 325–344.
  • Brewer, R., et al., 2019. Cybercrime prevention: theory and applications. Cham: Palgrave Macmillan.
  • British Society of Criminology. 2015. Statement of ethics. Available from: http://www.britsoccrim.org/ethics/.
  • Brodeur, J.-P., 1983. High policing and low policing: remarks about the policing of political activities. Social problems, 30 (5), 507–520.
  • Brunt, R., Pandey, P., and McCoy, D. (2017). Booted: an analysis of a payment intervention on a DDoS-for-hire service. Workshop on the economics of information security, San Diego, 6–26.
  • Castells, M., 2002. The internet galaxy: reflections on the internet, business, and society. New York: Oxford University Press.
  • Clayton, R., Moore, T., and Christin, N. (2015). Concentrating correctly on cybercrime concentration. In Workshop on the economics of information security.
  • Cohen, L.E. and Felson, M., 1979. Social change and crime rate trends: a routine activity approach. American sociological review, 44, 588–608.
  • Cohen, J., Gorr, W., and Singh, P., 2003. Estimating intervention effects in varying risk settings: do police raids reduce illegal drug dealing at nuisance bars? Criminology, 41 (2), 257–292.
  • Coleman, G., 2014. Hacker, hoaxer, whistleblower, spy: the many faces of anonymous. New York: Verso books.
  • Collier, B., et al., 2019. Booting the booters: evaluating the effects of police interventions in the market for denial-of-service attacks. Proceedings of the internet measurement conference, 50–64.
  • Collier, B., et al., 2020. Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies. Proceedings of the workshop on the economics of information security.
  • Collier, B., Thomas, D. R., Clayton, R., and Hutchings, A. 2019, October. Booting the booters: Evaluating the effects of police interventions in the market for denial-of-service attacks. Proceedings of the Internet Measurement Conference, 50–64. https://doi.org/https://doi.org/10.1145/3355369.3355592.
  • Davis, R.A., and Wu, R., 2009. A negative binomial model for time series of counts. Biometrika, 96 (3), 735–749.
  • Dupont, B., 2016. The polycentric governance of cybercrime: the fragmented networks of international cooperation. Cultures & conflicts, 102 (2), 95–120.
  • Dupont, B., 2017. Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, law and social change, 67 (1), 97–116.
  • Florez, C.P., and Boyce, B., 1990. Laundering drug money. FBI law enforcement Bulletin, 59 (4), 22–26.
  • Garland, D., 2012. The culture of control: crime and social order in contemporary society. Chicago: University of Chicago Press.
  • Gould, A., 2020. Sovereign control and ocean governance in the regulation of maritime private policing. Policing and society, 1–17. doi:https://doi.org/10.1080/10439463.2020.1732975.
  • Henry, A., and Smith, D.J., 2017. Transformations of policing. Oxon: Routledge.
  • Hilbe, J.M., 2011. Negative binomial regression. Cambridge: Cambridge University Press.
  • Holt, T.J., 2013. Examining the forces shaping cybercrime markets online. Social Science computer review, 31 (2), 165–177.
  • Holt, T.J., and Bossler, A.M., 2014. An assessment of the current state of cybercrime scholarship. Deviant behavior, 35 (1), 20–40.
  • Hutchings, A., and Clayton, R., 2016. Exploring the provision of online booter services. Deviant behavior, 37 (10), 1163–1178.
  • Hutchings, A., and Holt, T.J., 2017. The online stolen data market: disruption and intervention approaches. Global crime, 18 (1), 11–30.
  • Hutchings, A., and Holt, T.J., 2018. Interviewing cybercrime offenders. Journal of qualitative criminal justice & criminology, 7 (1), 75–94.
  • Karami, M., and McCoy, D. 2013. Understanding the emerging threat of ddos-asa-service. In 6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 13).
  • Koper, C.S., and Reuter, P., 1996. Suppressing illegal gun markets: Lessons from drug enforcement. Law and contemporary problems, 59 (1), 119–146.
  • Kozinets, R.V., 2015. Netnography. London: Sage Publications.
  • Kubrin, C.E., et al., 2010. Proactive policing and robbery rates across us cities. Criminology, 48 (1), 57–97.
  • Ladegaard, I., 2019. “I pray that we will find a way to carry on this dream”: how a law enforcement crackdown united an online community. Critical sociology, 45 (4-5), 631–646.
  • Leukfeldt, E.R., Kleemans, E.R., and Stol, W.P., 2017. Cybercriminal networks, social ties and online forums: social ties versus digital ties within phishing and malware networks. The British journal of criminology, 57 (3), 704–722.
  • Levi, M., and Maguire, M., 2004. Reducing and preventing organised crime: an evidencebased critique. Crime, law and social change, 41 (5), 397–469.
  • Levi, M., and Williams, M.L., 2013. Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. Information management & computer security, 21 (5), 420–443. doi:https://doi.org/10.1108/IMCS-04-2013-0027.
  • Liang, B.A., and Mackey, T., 2009. Searching for safety: addressing search engine, website, and provider accountability for illicit online drug sales. American journal of law & medicine, 35 (1), 125–184.
  • Manky, D., 2013. Cybercrime as a service: a very modern business. Computer fraud & security, 2013 (6), 9–13.
  • Martin, J., and Christin, N., 2016. Ethics in cryptomarket research. International journal of drug policy, 35, 84–91.
  • Mazerolle, L., Soole, D., and Rombouts, S., 2007. Drug law enforcement: a review of the evaluation literature. Police quarterly, 10 (2), 115–153.
  • McCoy, D., et al., 2012. Priceless: The role of payments in abuse-advertised goods. In Proceedings of the 2012 ACM conference on computer and communications security, 845–856.
  • NCA. 2020. Cyber choices: helping you choose the right and legal path. Available from: https://nationalcrimeagency.gov.uk/what-we-do/crime-threats/ cyber-crime/cyberchoices [Accessed May 7 2020].
  • Nhan, J., and Huey, L. (2013). Policing through nodes, clusters and bandwidth: The role of network relations in the prevention of and response to cyber-crimes. In: S. Leman-Langlois, ed. Technocrime: Technology, Crime and Social Control. Portland, OR: Willan Publishing, 66–87.
  • Nicaso, A., and Lamothe, L. (1995). Global mafia: the new world order of organized crime. Toronto: Macmillan.
  • Noland, R.B., Quddus, M.A., and Ochieng, W.Y., 2008. The effect of the London congestion charge on road casualties: an intervention analysis. Transportation, 35 (1), 73–91.
  • Paoli, L., 2007. Mafia and organised crime in Italy: the unacknowledged successes of law enforcement. West European politics, 30 (4), 854–880.
  • Paquet-Clouston, M., Décary-Hétu, D., and Bilodeau, O., 2018. Cybercrime is whose responsibility? A case study of an online behaviour system in crime. Global crime, 19 (1), 1–21.
  • Qurashi, F., 2018. The prevent strategy and the UK ‘war on terror’: embedding infrastructures of surveillance in Muslim communities. Palgrave communications, 4 (1), 1–13.
  • Ratcliffe, J.H., 2016. Intelligence-led policing. Canberra: Routledge.
  • Ratcliffe, J., and Makkai, T., 2004. Diffusion of benefits: evaluating a policing operation. Canberra: Australian Institute of Criminology.
  • Ritter, A., and McDonald, D., 2008. Illicit drug policy: scoping the interventions and taxonomies. Drugs: education, prevention and policy, 15 (1), 15–35.
  • Santanna, J. J., Schmidt, R. D. O., Tuncer, D., De Vries, J., Granville, L. Z., & a. (2016). Booter blacklist: unveiling ddos-for-hire websites. In 2016 12th International Conference on Network and Service Management (CNSM), 144–152.
  • Sauter, M., 2013. “LOIC will Tear Us Apart” The impact of tool design and media portrayals in the success of activist DDoS attacks. American behavioral scientist, 57 (7), 983–1007.
  • Schuilenburg, M., 2017. The securitization of society: crime, risk, and social order (Vol. 12). New York: NYU Press.
  • Shearing, C., and Wood, J., 2003. Nodal governance, democracy, and the new ‘denizens’. Journal of law and society, 30 (3), 400–419.
  • Smit, E.G. Van Noort, G., and Voorveld, H.A., 2014. Understanding online behavioural advertising: user knowledge, privacy concerns and online coping behaviour in Europe. Computers in human behavior, 32, 15–22.
  • Thomas, D.R., Clayton, R., and Beresford, A.R., 2017. 1000 days of UDP amplification DDoS attacks. In 2017 APWG Symposium on electronic crime research (eCrime), 79–84.
  • Wall, D.S., 2007. Policing cybercrimes: situating the public police in networks of security within cyberspace. Police practice and research, 8 (2), 183–205.
  • Williams, M., 2006. Virtually criminal: crime, deviance and regulation online. Oxon: Routledge.
  • Williams, M., and Levi, M., 2015. Perceptions of the ecrime controllers: modelling the influence of cooperation and data source factors. Security journal, 28 (3), 252–271.
  • Yar, M., 2005. The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European journal of criminology, 2 (4), 407–427.
  • Yip, M., et al., 2012. The digital underground economy: a social network approach to understanding cybercrime. In digital Futures 2012: the third annual digital economy all hands Conference.