1,418
Views
0
CrossRef citations to date
0
Altmetric
Articles

Exploring the relationship between IT development, poverty and cybercrime: an Armenia case study

&
Pages 353-374 | Received 29 Apr 2022, Accepted 26 Jan 2023, Published online: 22 Mar 2023

ABSTRACT

This paper explores the relationship between IT development, regional poverty, and cybercrime, through the case of Armenia. Armenia was selected as it is a former Soviet state that has sought to promote the development of its IT sector in recent years, which has occurred within a context of widespread regional poverty. The paper acknowledges the potentially cyber-criminogenic interactions between developed socio-technological and impoverished legitimate economic conditions, that the literature has noted in several high cybercrime nations. It then examines the case of Armenia by exploring potentially cyber-criminogenic conditions there and by constructing an overview of economic cybercrime trends in Armenia since 2010. The paper finds that, despite the promotion of IT development within the context of regional poverty, cybercrime in Armenia remains low. It explores, through a series of expert interviews, characteristics of the IT sector in Armenia that have mitigated against the cyber-criminogenic interactions between these two conditions. Finally, it identifies potentially transferable policy lessons, wider theoretical implications, and avenues of future research that emerge from this case.

Introduction

It is axiomatic that cyberthreats of various kinds, including cyberwarfare, cyberterrorism, the spread of misinformation online, and economically motivated cybercrimes, have become issues of growing international concern. Despite their potentially ‘placeless’ qualities, these threats, which can, in theory, originate from anywhere in the world with a connection to the internet, display distinctive geographies that are rooted within specific regions (Hall et al. Citation2021). The literature of economically motivated cybercrime, for example, despite the challenges of collecting robust data on its origins, associates it with nations such as those of Eastern Europe and the former Soviet Union, Brazil and Nigeria (Ibrahim Citation2016; Lusthaus, Bruce, and Phair Citation2020; Lusthaus and Varese Citation2021; Whitty Citation2018, 109).

This paper explores the relationship between IT development, regional poverty and cybercrime, through the case of Armenia. Armenia was selected as it is a former Soviet state that has sought to promote the development of its IT sector in recent years (Avetisyan Citation2022). This has occurred within a context of widespread regional poverty (Mkrtichyan, Vermishyan, and Balasanyan Citation2016; Sargsyan and Cairns Citation2019; World Bank Citation2015, Citation2020). As subsequent discussions show, this is a combination that is potentially cyber-criminogenic. Armenia has also been identified within one statistical study (Kigerl Citation2016a, 167) as a phishing specialist nation alongside other widely acknowledged high cybercrime countries such as Brazil, Romania and Turkey. Furthermore, no substantive analysis of cybercrime in Armenia has been undertaken to date.

The paper has four primary aims. First, it establishes the extent to which Armenia can be said to possess a cyber-criminogenic environment. Second, it reviews cases of and recent trends in cybercrime in Armenia in an attempt to establish the nature, types and extent of cybercrime originating there. Third, it explores the interaction between IT development and regional poverty in Armenia, and its relationship to levels of cybercrime. Finally, it identifies potentially transferable policy lessons, wider theoretical implications, and avenues of future research that emerge from this case.

This case study focuses specifically on economic cybercrime and draws on systematic reviews of salient academic, media and grey literatures, statistical sources, and expert perceptions obtained from interviews with researchers based in both Armenia and beyond with regionally-specific specialisms in socio-economic conditions affecting young people, political science and international relations and online harms, and practitioners from Armenia and beyond from the Anti-Cybercrime Unit of the Armenian police, the CyberEast Project of the Council of Europe, the Internet Society of Armenia, the Atlantic Council’s Digital Forensics Research Lab, and from within the Armenian IT sector.

Literature review: the uneven geographies of cybercrime

Various explanations for the uneven geography of cybercrime have been advanced across multidisciplinary literatures, comprising statistics (Kigerl Citation2012, Citation2016a, Citation2016b; Mezzour, Carley, and Carley Citation2014), international relations and political economy (Kshetri Citation2010, Citation2013a, Citation2013b), criminology and ethnography (Burrell Citation2008; Ibrahim Citation2016; Leukfeldt Citation2014; Leukfeldt, Kleemans, and Stol Citation2017; Lusthaus and Varese Citation2021; Okeshola and Adeta Citation2013) and investigative journalism (Glenny Citation2008, Citation2011). Despite their diversity, these explanations share a fundamental belief that the geographies of cybercrime are the product of the spatial co-presence of combinations of potentially cyber-criminogenic conditions, which occur only in certain regions. Within this explanation particular significance is attached to the co-presence of developed socio-technological and impoverished legitimate economic conditions in high cybercrime nations.

A variety of potentially cyber-criminogenic conditions have been highlighted across the various cybercrime literatures identified above. Technological, economic, and institutional variables have been the most widely deployed within statistical studies of cybercrime, reflecting the difficulties of operationalising alternative social and cultural variables statistically. Variables deployed here include measures of unemployment, internet use, cybercrime legislation and policy, IT infrastructure and corruption (Kigerl Citation2012; Mezzour, Carley, and Carley Citation2014). These statistical literatures have, generally, embraced a more restricted set of potentially cyber-criminogenic variables than those of other salient literatures. Further, a perennial challenge facing this research is obtaining robust data for the locations of cybercriminals, given the measures they undertake to disguise this (Kigerl Citation2016b, 67).

The international relations and political economy literature offers broad surveys of cybercrime, typically for nations widely perceived as major cybercrime threat nations such as China and Russia (Kshetri Citation2013a, Citation2013b) or for large groups of nations, such as the developing world (Kshetri Citation2010). They draw largely upon secondary sources and explore the causes and nature of cybercrime from different regions, the ways in which cybercrime and cybersecurity shapes the relationships between nations, and national and regional responses to cybercrime. They also include comparative discussions of cybercrime from different regions. A major contribution of this literature to cybercrime scholarship is that it recognises a wider range of potentially cyber-criminogenic factors than those highlighted in the statistical literature. Specifically, it also talks about the social legitimacy that cybercrime apparently enjoys in some regions and the potential influence of strongly nationalist political contexts on cybercrime activity (Kshetri Citation2010, Citation2013a, Citation2013b).

Criminological and ethnographic studies of cybercrime explore the grounded interactions between cybercriminals within their regional contexts (Lusthaus and Varese Citation2021). These studies are typically conducted at the micro-scale and employ ethnographic, interview, survey and archival methods. A major contribution of this literature is that it, again, recognises an expanded range of potentially cyber-criminogenic conditions. For example, it discusses poor, limited or compromised law enforcement capacity, the presence of organised criminal groups within cybercrime economies, the influence of materialistic cultures and cybercriminals’ deployment of various historical narratives, such as histories of colonial and corporate exploitation, to justify their own targeting of external victims (Adeniran Citation2011; Armstrong Citation2011; Burrell Citation2008; Ibrahim Citation2016; Okeshola and Adeta Citation2013; Olayemi Citation2014; Tade Citation2013; Tade and Ibrahim Citation2011; Warner Citation2011).

Within the potentially cyber-criminogenic conditions identified above, the interactions between developed socio-technological conditions and impoverished legitimate economic conditions have emerged as of particular significance to understanding cybercrime development. For example, the statistical literature suggests that the most significant predictors of cybercrime activity within nations are GDP and internet users per capita, where high cybercrime nations tend to be characterised by IT literate populations, as suggested by higher rates of internet users per capita, in regional contexts where they are faced with limited opportunities to deploy their skills within the legitimate economy, as suggested by lower levels of GDP or high rates of unemployment (Kigerl Citation2012). Cybercrime’s criminological and ethnographic literature also attributes causality to the co-presence of Soviet technological legacies and regional poverty. For example, Lusthaus and Varese (Citation2021, 1), argue that the high levels of cybercrime observed in Romania result from the scientific legacies of the Soviet era, high levels of poverty within the region and extensive corruption. Further, from the international relations and political economy literature Kshetri argues:

The combination of over-educated and under-employed computer experts has made Russia and other Eastern European countries fertile ground for hackers. In these economies the growth rate of IT industries is far from enough to absorb the IT workforce. (Citation2010, 1071)

It is not difficult to imagine Armenia’s policy of IT development, enacted in the context of ongoing regional poverty, potentially, unwittingly replicating the situation observed by Kshetri in Russia.

Drawing upon this literature, then, we might recognise three potential scenarios stemming from the presence of widespread IT access and usage within the context of regional poverty, whether this be the product of a historical legacy, as in the case of Romania (Lusthaus and Varese Citation2021, 1) or contemporary cultural and educational preferences, as in the case of Nigeria (Adeniran Citation2011) or policy initiatives, as in the case of Armenia, with regard to levels of cybercrime. First, IT skills and infrastructure development are not accompanied by sufficient IT jobs growth, in the context of a cyber-criminogenic environment. This results in a rise in cybercrime as young people with IT skills fail to access appropriate employment in the legitimate IT sector and therefore seek alternative opportunities in cybercrime. Second, IT skills and infrastructure development are accompanied by sufficient IT jobs growth. This sees IT related economic development with no resultant rise in cybercrime, as young people with IT skills successfully access appropriate employment in the legitimate IT sector. Third, IT skills and infrastructure development are accompanied by sufficient IT jobs growth. This sees IT related economic development with an accompanying fall in cybercrime, or slowing of cybercrime growth, as young people with IT skills successfully access appropriate employment in the legitimate IT sector and those involved in cybercrime recognise opportunities to deploy their skills in the legitimate IT sector and some abandon cybercrime in favour of legitimate alternatives.

The first of the three scenarios above, reflects situations that have been observed in some confirmed high cybercrime nations in Eastern Europe and the former Soviet Union and Nigeria (Kigerl Citation2012, 482; Kshetri Citation2010, 1071; Lusthaus and Varese Citation2021, 1). We are yet, though, to see a literature that connects IT development, poverty and cybercrime that explicitly recognises instances of IT development in the context of regional poverty, with no rise in cybercrime, or that speaks of the potentials of IT development in such contexts to reduce cybercrime or slow its growth. It is lacuna such as these that this paper recognises and aims to begin to address.

Over the past two decades, the Armenian government has considered the IT sector as a strategic path for the development of the country’s economy (Avetisyan Citation2022). Prioritising the development of the IT sector is linked to existing geopolitical challenges, such as closed borders and unresolved territorial conflicts, as well as some well-established technological traditions originating from Soviet times. During the Soviet era, Armenia was considered a centre for technological research and production, most of which was conducted at the Yerevan Computer Research and Development Institute (Mergelyan Institute). Between 1958 and 1965, the Yerevan Computer Research and Development Institute, created the Razdan family of general purpose digital computers. In addition, the Institute also produced automatic control systems for civil and defence purposes (Tosunyan Citation2021). Between 1960 and 1980, other Soviet Armenian factories Armelectro Factory, Electron and HrazdanMash began to make early computers, automated control systems, radio electronics, space communication devices, rocket launchers, and various parts used in military submarines and ships. The technology sector generally experienced a rather difficult transition period in 1991-1997, when regional conflicts, a declining economy and the emigration of high-level professionals significantly hampered the overall recovery of the economy. In 1998, there were about 35 to 40 programming companies and internet providers in Armenia, employing approximately 1000 specialists (Parsyan Citation2021).

In December 2000, the Government of the Republic of Armenia officially recognised the IT sector as one of the priority sectors for Armenia’s economic development (Parsyan Citation2021). In 2001, the Information Technologies Development Support Council (ITDSC) was established, acting as a liaison hub for the promotion and development of the IT sector between the Government and IT businesses, educational institutions, NGOs, donors and international organisations. In 2019, the new Ministry of High-Tech Industry was established replacing the Ministry of Transport, Communication and Information Technology. The aims of this new Ministry are to create and strengthen conditions for the balanced and sustainable development of high technologies, digitalisation, cybersecurity, innovative technologies, communication, mail, internet, the spheres of air and space, as well as to create and strengthen conditions for ensuring the state’s economic growth (Parsyan Citation2021). Noteworthy here is that most IT companies, almost 95 percent, were founded between 2000 and 2018 (Parsyan Citation2021).

While the IT sector is an economically thriving sector, Armenia generally struggles from low levels of cultivation of arable land, limited resources and low growth potential due to political instability and significant geopolitical challenges. Most recently, the 44-day armed conflict with Azerbaijan over the Nagorno-Karabakh enclave in 2020 and the COVID-19 pandemic reduced growth to a negative rate of 7.6 GDP in 2020, reflecting the reliance on remittances (mainly from Russia and the US) (LloydsBankTrade Citation2022). Accordingly, in 2020, the GDP of the IT sector also declined to 5.1 percent (Parsyan Citation2021). In view of these geopolitical challenges, IT development has always been perceived as a way forward in dealing with such economic and geopolitical challenges as it is an industry not dependent on borders (Richard Giragosian, June 2019).

In the space of just over 15 years, the IT sector grew more than 15-fold in the number of firms, 10-fold in the number of employees, and the total industry revenue now represents 5 percent of GDP and 11 percent of exports for Armenia (Kassarjian Citation2017). The Enterprise Incubator Foundation, a technology business incubator and IT development agency based in Yerevan, reports that the industry’s total revenue, which consists of the software and services sector and the internet service provider sector, reached $922.3 million in 2018, a 20.5 percent increase from 2017 (Mkrtumyan Citation2019). The revenue generated in this sector represents 7.4 percent of Armenia’s GDP ($12.4 billion) in 2018 (Mkrtumyan Citation2019). In comparison, agriculture represents 11.2 percent of GDP and employs 24 percent of the total workforce (LloydsBankTrade Citation2022; ).

Figure 1. The share of the IT sector in the GDP of the Republic of Armenia in 2010–2020 (adapted from Parsyan Citation2021).

Figure 1. The share of the IT sector in the GDP of the Republic of Armenia in 2010–2020 (adapted from Parsyan Citation2021).

Research methodology

The method underpinning this research had two phases. The first gathered empirical information about potentially cyber-criminogenic conditions in Armenia and about cybercrime there since 2010. The issues of availability and validity of empirical information about cybercrime origins is well documented (Kigerl Citation2016b, 67). There is, for example, currently no official or comprehensive ‘off the shelf’ data about the nature and extent of cybercrime from and in Armenia that we could draw upon. This necessitated producing our own overview based on multiple, publicly available sources. This involved a systematic review of relevant academic and grey literatures and statistical and media sources. This was conducted between October 2020 and February 2021 and yielded over 200 items. These were scrutinised and salient empirical information extracted and recorded.

The sources drawn upon through this process included local, national and international media outlets, and independent, international investigative media platforms such as the following: the Institute for War and Peace Reporting and the Organised Crime and Corruption Reporting Project; reports from think tanks and independent non-profit organisations including Carnegie Europe, Chatham House, and Transparency International; internal official sources including items from the Government of Armenia and the Investigative Committee of the Republic of Armenia; items from international organisations and institutions such as the Council of Europe, the European Bank for Reconstruction and Development, the International Monetary Fund, the United Nations and the World Bank; a research organisation, the Caucasus Research Resources Centre; a European Union funded project, EU4Digital and cybersecurity companies. The sources identified included items produced in Armenian, English and Russian.

Many of the items identified contained or drew upon sources of data widely regarded as robust and which are commonly included within academic literatures. These included official reports and statistics and academic research surveys. However, we are aware of potential issues of unreliability, bias, and a lack of robustness in some of the source types identified in this phase of the research. We sought to ensure validity in several ways. Drawing upon the national and international knowledge of the researchers and a research assistant, we excluded sources that we felt lacked national or international reputations for reliability. For example, in the case of media sources we drew only upon those sources we knew to be politically non-aligned and that had a multi-year track record of publication. Further, we tried to restrict the information that we extracted to that which could be verified through public records, such as reports of cases of cybercrime that had been prosecuted through the Armenian legal system, or, where they reported the views of those with local expertise, to those cases where that local expertise was publicly verifiable. Evaluation of the empirical information extracted from these sources suggested a high degree of internal correspondence, giving us confidence in the validity of the trends we report in the two subsequent sections. Where possible we tried to evidence the observations we made through multiple sources. Finally, the information obtained during the first phase of research was tested in the second phase, which consisted of a series of semi-structured expert interviews.

The experts for inclusion in phase two were selected through a purposive, non-probability search. This was problem- and expertise-oriented (von Soest Citation2022, 3) and experts were selected on the basis of their publicly verifiable regional expertise in either cybercrime and illicit internet use or conditions affecting young people in Armenia. Fourteen people with appropriate expertise were identified through this search and were contacted. Of these, eight agreed to be interviewed. Although the number of interviewees was relatively low, the pool of appropriate expertise from which these were drawn was also small and those who took part were reflective of the breadth of expertise identified in the wider pool. The high degree of correspondence in the information provided by the interviewees gives us confidence in the material collected in this phase. Details of the interviewees are given in the appendix.

The interviews were conducted between November 2021 and April 2022 using a variety of standard video calling software platforms. The interviews were recorded with consent. The interviews were semi-structured and qualitative in nature and, although the specific interview schedules were tailored to an extent to the specific expertise of the interviewee, they collectively covered the following: relevant biographical, professional and organisational information; policing, legislation and regulation of cybercrime and illicit internet use in Armenia; cybercrime in Armenia including trends, nature, extent and examples of cases; relevant socio-economic and political conditions affecting young people in Armenia; and the IT sector in Armenia.

The interviews all lasted between 33 min and one hour 17 min, with an average length of 44 min. All of the recorded interviews were listened to several times by both researchers. Transcripts were produced using speech to text software which were read several times and errors generated by the software corrected. This provided a thorough emersion in the interview material. The interviews were analysed through the application of thematic analysis.

Findings

Cyber-criminogenic conditions in Armenia

This section considers the extent to which conditions identified within the cybercrime literature, with the potential to be cyber-criminogenic, are present in Armenia. Internet penetration in Armenia is almost universal; a 2020 estimate suggested that 96 percent of Armenians had access to the internet (Raja and Malumyan Citation2020), while the internet is an important part of the lives of young people (Mkrtichyan, Vermishyan, and Balasanyan Citation2016), and social media use is high (Baghdasaryan Citation2013; Data Reportal Citation2020). This suggests the presence of developed socio-technological conditions in Armenia.

The legitimate economy in Armenia has experienced a number of negative trends in recent years, including economic downturn, stagnation, uncertainty and high levels of unemployment. The country was hit hard by the 2008 global financial crash (Tiwari et al. Citation2018; World Bank Citation2015) and the subsequent decade was largely one of economic stagnation (Iskandaryan Citation2018). The stronger economic growth witnessed towards the end of the last decade has since stalled due to the impacts of COVID-19 (World Bank Citation2020). Young people appear to have been particularly badly impacted by these trends. Youth unemployment remains high in Armenia. A 2016 survey found that 55 percent of young people over 23 who responded were unemployed (Mkrtichyan, Vermishyan, and Balasanyan Citation2016). Those affected by youth unemployment in Armenia include those with advanced education. The number of the labour force with advanced education who were unemployed in Armenia was 17.24 percent in 2020 (World Bank Citation2022). For those young Armenians who are employed, it has been reported that their recent experiences of employment in Armenia have often been of low pay and job insecurity (Sargsyan and Cairns Citation2019). Armenia, then, does appear to possess an impoverished legitimate economic context, which especially affects the lives of young people.

Some high cybercrime countries have been said to be characterised by widespread social tolerance and acceptance of illicit practices and actors, reflective of both a developed illicit economic context and a materialist social/cultural context. In Armenia, these are evident in the cultural and political accommodation of organised crime groups (Babayan Citation2018; Mejlumyan Citation2020), and the apparent acceptance of illicit practices as legitimate routes to prosperity (Medina and Schneider Citation2018; Mkrtichyan, Vermishyan, and Balasanyan Citation2016, 72). It has been noted, for example, that ‘the role and significance of work – as the primary means to achieve prosperity ­­ – have considerably decreased in Armenian society. Professional work presents itself as an “unprofitable” occupation’ (Mkrtichyan, Vermishyan, and Balasanyan Citation2016, 43). These authors go on to observe that in Armenia ‘When financial success is considered to be the major aim for everyone, but there are no legal ways of achieving this aim within society, deviant behaviour increases and value disorientation comes into play’ (72).

High levels of corruption have also been noted in Armenia (Feldman and Alibašić Citation2019; Iskandaryan Citation2020; Kavkazkii Citation2019). This appears to have infected sectors of the Armenian economy. Studies have recognised significant barriers facing young people accessing professional employment (Sargsyan and Cairns Citation2019), associated with a widespread perception among young Armenians that corruption and nepotism are more important than qualifications in finding a job (Mkrtichyan, Vermishyan, and Balasanyan Citation2016; Sargsyan and Cairns Citation2019).

Nationalist political contexts that are tolerant of, or indifferent towards, external cyber economic or political victimisation, or within which it is actively promoted, have been drawn upon by cybercriminals in some high cybercrime countries, such as China and Nigeria (Kshetri Citation2010, Citation2013b), to justify their activities by attaching discourses of patriotism to them. Such political motivations have been attached to recent online activities originating in Armenia including campaigns of economic cybercrime, hacking and fake news directed towards Azerbaijani and Turkish targets (ArmInfo Citation2020; HackRead Citation2015a, Citation2015b; Kavkazkii Citation2015; Martirosyan Citation2017; Mkrtchyan Citation2020; News Armenia Citation2017). It has been argued that these activities are reflective of the negative views of these groups in Armenian political and public discourse (Terzyan Citation2018; Vetsko Citation2020; Yerevan Press Club Citation2019) suggesting some elements of strong nationalism within Armenia’s political context.

Finally, a series of shortcomings in national anti-cybercrime measures have been recognised in Armenia including, the lack of a whole government approach to cyber security (Nerzetyan Citation2018) and the relatively low number of convictions for cybercrime offences that have been secured (Israelyan Citation2015). The Council of Europe’s CyberEast Project (Citation2019, 5), for example, noted the lack of a government Computer Emergency Response Team (CERT) ‘which poses great challenges for coordination and response’. Inadequacies within the legal/regulatory and policing context in Armenia, was also a theme raised within our interviews. Several challenges were identified by our interviewees, in addition to those noted above. Giorgi Jokhadze (23 November 2021), from the CyberEast Project, who manages the Council of Europe’s cybercrime projects with Eastern Partnership countries, of which Armenia is a member, identified problematic legacies of the Soviet era, limitations in Armenia’s cybercrime policing and law enforcement capacity, and issues of compliance with the Budapest Convention on Cybercrime. He noted, for example, that cybercrime policing is an unpopular area of police work due to low clearance rates which may hinder career progression. Jokhadze did, however, note some improvements since the Velvet Revolution in 2018. Concerns about police capacity were also raised by Grigori Saghyan, secretary of the Internet Governance Council of Armenia who cited low police salaries compared to those available in the private sector, diverting IT expertise away from cybercrime investigation (7 February 2022). A lack of policing capacity was confirmed in an interview with Vvahagn Harutyunyan (13 April 2022), ex-Head of the Anti-Cybercrime Unit of the Armenian Police, who said, ‘I worked in cybercrime for 11 years, from 2009 to 2019. When I became Deputy Head of the Cybercrime division, at that time, the cybercrime unit was very poorly equipped, as in not enough computers. But it was also poorly staffed in terms of mind. They only really caught pornography.’ He also noted the impacts of low police salaries on policing capacity in Armenia: ‘For now, we don’t have enough people (police) but you know the police income is also very low, lower than in other businesses. That’s why maybe people leave the police as they are in demand. They can even go abroad to the US or Europe and use their skills.’ Nerses Kopalyan (15 December 2021), a Political Scientist from the University of Nevada, Las Vegas, noted, with reference to the problematic legacies of the Soviet era, a reluctance of the state to engage with the private sector over cyber issues, a tendency for cybersecurity capacity in Armenia to be prioritised towards cyberwarfare rather than cybercrime investigation, reflecting Armenia’s regional geopolitical relations, and a lack of expert cybercrime prosecutors in Armenia.

In sum, this analysis suggests that a number of potentially cyber-criminogenic conditions are, to significant degrees, co-present within Armenia, which is suggestive of a national context that is potentially cyber criminogenic. The Armenian government, then, has pursued a policy of IT-focused development in recent years. This has taken place within the context of regional poverty, unemployment among young people, and the presence of other conditions that may contribute to the regional growth of cybercrime.

Economic cybercrime trends in Armenia

Armenia does appear to be on an upward trajectory in terms of levels of economic cybercrime originating from and practised there. It has seen recent spikes in fraud perpetrated over social media (Armenia Sputnik Citation2020a; Council of Europe Citation2019, Citation2020) and the theft of personal data for blackmail (Armenia Sputnik Citation2020b). Rather than being new phenomena, resulting from the second Karabakh war and/or the COVID-19 pandemic, these are the continuation of trends that have been observable for some time. While a lack of reliable data makes mapping cybercrime trends difficult, it has been widely recognised that Armenia has been experiencing growth in cybercrime for almost 10 years.

Wired magazine was able to claim in 2012 that ‘Armenia is not a leading haven for cybercriminals’ (Zetter Citation2012). In 2014 it was reported that, while cybercrime in Armenia was still not extensive, it was growing (JNews Citation2014). This upward trend was confirmed in 2016 by Dmitry Beresnev, Head of Management and Control of Microsoft in CIS countries (News Armenia Citation2016). More recent reports, citing police sources, suggest 20–25 percent annual growth rates in cybercrime cases in Armenia between 2016 and 2018 (Armenpress Citation2018), albeit from a low base, and by 2019, F-Secure, a Finnish cybersecurity company, identified Armenia as a new entrant in the world’s top 10 cybercrime source countries (F-Secure Citation2019).

Empirically substantiating the broad trends noted above is a challenging endeavour, given the lack of robust data. There are relatively few publicly available discussions of specific cybercrime cases in Armenia. Those that are reported tend to contain only sparse details of the cases and those involved. The majority of reported cases involve individuals or pairs of conspirators involved in different scams, including setting up fake social media accounts or advertisements with the intention of fraudulently obtaining loans, other forms of identity theft, blackmail and stealing money from bank ATMs (Investigative Committee Citation2019a, Citation2019b, Citation2019c, Citation2020; Novosti Armeniia Citation2019). There is also discussion of Armenia’s first conviction for a computer-related crime, the case of Georgy Avanesov, a 27-year-old, who received a four-year prison sentence in 2012 for creating the Bredolab botnet (Zetter Citation2012).

Other cases, however, involve the arrest of larger groups of between four and eight people engaged in more organised scams including thefts from money transfer systems, embezzlement by a group posing as loan mediators between banks and customers, theft using point of sale terminals obtained by registering fake hospitality companies, the Piconet Technology LLC case, a fake virus scam, and a scam targeting researchers by imitating the websites of two European scientific journals (ArmBanks Citation2020a, Citation2020b; Armenpress Citation2017; Butler Citation2013; Papachristou Citation2019). Some of these examples suggest degrees of sophistication and organisation reminiscent of cybercrime cases from other Eastern European and former Soviet states (Glenny Citation2011, 173–174). These cases, for example, involved extensive victimisation – a preliminary police investigation of the Piconet Technology case identified 60 US victims (Papachristou Citation2019); the theft of significant sums of money – the case involving the point of sale terminals theft is reported to have netted 85 million Armenian dram (worth roughly $172,000) from several Australian citizens (Armenpress Citation2017); and evidence of advanced technical expertise – the fake academic journal website case is reported to have duped hundreds of researchers into paying author fees and initially fooled Thomson Reuters, a metrics company who compile journal impact factors (Butler Citation2013). Noting the upward trajectory in this economic cybercrime activity and instances of its success and sophistication, suggests a more systematic review of Armenian cybercrime cases would extend our empirical understanding to a nation for which the academic literature presently offers no substantive discussions.

Despite the apparent upward trend noted above, there was universal consensus within our interviews that cybercrime in Armenia remains low and has not risen to match the levels observed in other nations in Eastern Europe and the former Soviet Union such as Russia, Romania and Ukraine (Glenny Citation2011; Kshetri Citation2013a; Lusthaus and Varese Citation2021). Respondents were explicit in their view that economic cybercrime was not extensively practised within Armenia.

We still view Armenia as a low crime country in terms of cyber, if you compare it to the data coming from Ukraine, which is of course quite telling, but also Belarus, for example, which is a sort of safer destination, or used to be. (Jokhadze, 23 November 2021)

I think we still have a long way to go to become like Romania [in terms of levels of cybercrime from there]. (Harutyunyan, 13 April 2022)

While Giorgi Jokhadze noted there was a possible issue of under reporting of economic cybercrime in Armenia, stemming from the lack of a Government CERT, he did not feel this was a major or systemic omission and would not change the overall picture significantly.

The lack of any extensive cybercrime economy in Armenia was confirmed by other respondents. The economic cybercrime that was noted was generally characterised as minor.

These were mostly cases involving stealing via Facebook, card fraud and also from bank accounts. These were mainly Armenian bank accounts … It’s mostly related to personal websites and social media sites. With small amounts of money. We had this case of a fraudster, where the fraudster got more than 33,000 Dram, this is 60 (US) dollars. (Harutyunyan, 13 April 2022)

Cybercrime coming out of Armenia is very, very minimal … From the domestic lens I am familiar with some cases of groups within Armenia who engage in cybercrime for economic reasons. They target, you know, external audiences, whether it is in the EU or United States, this is petty stuff. (Kopalyan, 15 December 2021)

We may say that there are special internet oriented crimes or internet oriented misbehaviour or something, but I cannot say there is something like phishing emails trying to get peoples’ bank accounts or something like this, so there is no crime, I mean on a mass scale. (Ruben Muradyan, Chief Information Security Officer, in the Armenian IT sector, 20 December 2021)

It was noted by one respondent that the low levels of economic cybercrime observed in Armenia were reflective of its immediate regional context, where the Caucasus region is seen as somewhat behind wider cybercrime trends.

In our experience … the Caucasus region, I mean maybe with a bit of an exception with Georgia as Georgia is on the forefront when it comes to cybercrime, we don’t see a lot of, you know, response to the global trends. So, for example, when we see that there is an advance somewhere that is a big problem, especially with virtual currencies, the units in Armenia do not report it as much. I mean they still report more traditional forms of fraud as being the main problem, and social engineering, especially by social networks, especially the Russian language ones, but they seem to be a bit lagging behind in terms of following the latest trends. (Jokhadze, 23 November 2021)

There was a feeling, expressed by some respondents, that Armenia offers insufficient domestic opportunities for cybercrime, to sustain any extensive, internal cybercrime economy, and that domestic Armenian cybercriminals generally lacked the technical expertise or knowledge of potential target nations to launch actions directed externally, on any significant scale.

The vast majority of cybercrime is done at the domestic level, so cybercriminals in the US or in the UK or in France target people in the UK, the US or France. They usually operate domestically. Armenia’s domestic market is so small that cybercriminals cannot operate, there is no market of crime in Armenia, so if you are a cybercriminal you have to operate externally, and this is a very complicated process … Because to engage in cybercrime you need to have a degree of healthy understanding of the country that you are targeting, their banking system, their credit card system, the behaviour of individuals you are trying to target, the type of fraud you are going to engage in. There are a lot of cultural components involved in that. (Kopalyan, 15 December 2021)

I don’t think, like, the market for cybercrime in Armenia is near the level that it is in Ukraine … in Ukraine we’ve seen a lot of financially motivated scams, clickbait, online, and in Armenia I haven’t seen as much of that. (Zarine Kharazian, Associate Editor, Atlantic Council, Digital Forensics Research Lab, 20 December 2021)

The individual cybercrime cases discussed in the Armenian media and reviewed above, do include some examples of sophisticated, externally directed scams, reaping victims from across Europe, the US and Australia (Armenpress Citation2017; Butler Citation2013; Papachristou Citation2019). However, if the interpretations offered by our respondents are an accurate reflection of the nature of Armenian economic cybercrime, these would appear to be exceptions, rather than the norm.

There was some discussion within the interviews, of cybercrime activity, albeit still on a minor scale, being imported into Armenia from abroad, especially through diaspora networks from the United States.

As far as the cybercrime stuff that we are talking about, it’s not indigenous, it’s coming from the outside … So whatever behaviour we are seeing is being transported in, it’s not something that is being organically developed from the inside … post Velvet [Revolution], like I said, it’s basically, if I would say I have seen anything, or observed any patterns, its these small activities that are being transported from the outside, mainly from the United States into Armenia. So, if you are a criminal operative in the US and you engage in some wire fraud as they call it here, which is credit card or banking fraud, you know, simply doing it in Armenia and then changing your whatever, the IP … you would think you have some insulation post Velvet it’s these sort of individualized, non-systemic activities that you are seeing being transported from outside of the country. (Kopalyan, 15 December 2021)

IT development and regional poverty interactions in Armenia

The previous section, while only able to offer a brief overview of recent trends in economic cybercrime in Armenia, recognised that, despite evidence of a rising trajectory since 2010, levels remain low and do not compare to those observed in other high cybercrime nations in Eastern Europe and the former Soviet Union. Armenia, then, differs from these nations. It has experienced the widely theorised and observed, apparently cyber-criminogenic, combination of IT development and ongoing regional poverty affecting young people. It is the co-presence of these factors within other nations that has produced a pool of appropriately skilled and motivated cybercrime labour. Despite this, Armenia has not developed into another post-Soviet high cybercrime nation.

This section, then, asks why extensive cybercrime growth has not occurred within Armenia, by exploring the specific interactions between IT development and regional poverty there. We recognie three characteristics of IT sector development in Armenia that mitigate against the growth of cybercrime. These are yet to be substantively discussed within the context of IT development there and offer potential policy lessons that might be transferable to other regional contexts.

First, Armenia’s IT sector growth has been rapid, and has been sufficient to absorb the pools of appropriately skilled young people available in Armenia. In our interviews, Ruben Muradyan, who works at a senior level within the growing IT sector, described the effect of this growth as akin to that of a ‘vacuum cleaner’.

For the last two decades the IT sector is blooming, and it acts like a vacuum cleaner that is sucking up all of the engineers from nearby areas of specialization. If a person has gone through higher mathematics during his university studies, he is ready to become a software developer, or a system administrator, or a network engineer, or you name it. (20 December 2021)

The receipt of IT investments and relocations from overseas companies, especially from the US through diaspora connections, and more recently Russia, following the imposition of international sanctions, were identified in interviews as important in fuelling the growth of Armenia’s IT sector (see also Avetisyan Citation2022).

The IT sector in Armenia went from basically being seven percent of the economy to 14 percent, and now it’s at 18 percent. About three, four very large companies out of the US such as ServiceTitan, for example, you know, they’re friends from high school, they’re moving a chunk of their one-billion-dollar company into Armenia. (Kopalyan, 15 December 2021)

You know what, because of the sanctions against Russia, lots of people from Russia, Armenians from Russia but also just Russians, they come to Armenia, open up their own business, 90 percent of them are programmers, let’s say or work in this sphere. I’d say that IT takes the first place and is our expertise. Pashinyan did say it right that there is a lack of skilled people because the potential of this area is huge. (Harutyunyan, 13 April 2022)

We do not see in Armenia, then, the situation observed elsewhere, of large numbers of young people with IT skills, unable to find legitimate employment opportunities commensurate with their skills and aspirations, who turn to cybercrime. Indeed, in Armenia, there is evidence of an under-supply of appropriately skilled IT labour (EU4Digital Citation2019), something confirmed in our interviews.

Right now, you do have severe shortages in the workforce. Most IT companies that operate in Armenia actually have a work[force] shortage, they have a shortage of IT experts … So, it’s not as if you have a large number of qualified IT experts who can’t find jobs. It’s actually the very reverse. There is a very very very strong need for programmers, for engineers in the IT sector. The market has a huge demand, but Armenia’s IT sector, at least the workforce, isn’t able to supply that demand at this point … It’s not at a point where you have unemployed experts that might engage in illicit behaviour, it’s actually the complete opposite, you don’t have enough experts to meet the demands of the market. (Kopalyan, 15 December 2021)

Training young people with IT skills in Armenia, and their gaining employment has not been a straightforward process, however. Although, in Armenia the Soviet technological legacy ‘is still alive today in how the country embraces education and hard sciences’ (Shepard Citation2020, no page), this has not resulted in high quality education and training that is responsive to the needs of business. Armenia, for example, performs poorly in maths and science education compared to other former Soviet states (Caro and He Citation2018). Further, the World Bank reported that only 45 percent of Armenian IT graduates were considered sufficiently skilled to enter the workforce (World Bank Citation2014). The connections between scientific talent and business, in Armenia, therefore, do not appear to be seamless, something articulated by the team behind the tech start-up Krisp, for example (Mkrtumyan Citation2019) and may have only exacerbated the shortages of skilled IT labour noted above. Thus, our respondents were all able to confirm the recent rapid growth of the Armenian IT sector in absolute terms and its capacity to absorb the pools of skilled young people available.

Second, salaries within Armenia’s growing IT sector are high, within the context of Armenia’s economy (Avetisyan Citation2022), and are sufficient to deter migration towards alternative illegal economic opportunities. The experiences of young people working within Armenia’s growing IT sector differ significantly to those encountered in other sectors (Parsyan Citation2021). The issues of low pay and job insecurity that have been identified as affecting young people in Armenia (Sargsyan and Cairns Citation2019) do not apply to the IT sector. This was an issue unanimously identified across the interviews that we conducted.

maybe you’re working for an American company that is based in Armenia, that has a, you know, sort of, presence in Armenia and generally, yeah, you are paid a better salary than you would if you did not work in the tech sector. (Kharazian, 20 December 2021)

When we talk about corruption and poverty, that is not applicable to the IT sector because, actually those in the IT sector are the upper middle class in Armenia. So, if the average income in Armenia is about 400 dollars a month, those in the IT sector are making 17, 18 [hundred], 2000 dollars a month … because the average IT worker makes 15, 16 hundred dollars a month which is extremely well paid in Armenia, there’s really no relationship between poverty and this sector. It’s actually the reverse. This is why I don’t see someone who’s, you know, making the equivalent of what would be 100, 150 thousand dollars US or 100 thousand pounds [1]20 thousand pounds in the UK, engaging in cybercrime when they have an extremely well-paying job and a very comfortable lifestyle. (Kopalyan, 15 December 2021)

So, when you say that someone [with IT skills or working in the Armenian IT sector] would, or should, or can, or perhaps could be involved in illicit internet use or cybercrime, or something, those people do not have reasons to do it. They are earning ten times more than other salaries if they are on a senior level. So just imagine the social gap between all the regular average people and people working in ICT. (Murdyan, 20 December 2021)

Third, as Nerses Kopalyan indicated above, and other respondents confirmed, the IT sector is largely free of the corruption and nepotism characteristic of other sectors in the Armenian economy (Mkrtichyan, Vermishyan, and Balasanyan Citation2016; Sargsyan and Cairns Citation2019). In terms of young people’s experiences, this means that this sector is more oriented towards the qualifications and skills of employees than their social connections and young people with appropriate qualifications and skills do not face the barriers to entry that they might encounter in other sectors. Our interviewees attributed the lack of corruption in this sector to the high salaries of the IT sector, the high degrees of involvement by overseas companies and the lack of connections to government.

So, in the IT sector, both poverty isn’t an issue and corruption is simply not applicable to that industry because it really has no relationship with the government or with government contracts or processes that are conducive to corruption. (Kopalyan, 15 December 2021)

This is [working in the Armenian IT sector] the area where the most possible meritocracy within a transitional society like ours is implemented. I mean it will not be implemented, it is already implemented. (Muradyan, 20 December 2021)

In Armenia, most IT companies work as part of other companies based abroad. I have a friend programmer for example who works for an educational company based in Malaysia. Another friend of mine is writing an IT project for a company based in Singapore. Others design websites for European companies. (Harutyunyan, 13 April 2022)

Kopalyan also indicated that structurally the Armenian IT sector is geared towards start-up companies (see also Avetisyan Citation2022), and suggested that career frustration within the sector could be more easily resolved by leaving a job and creating a start-up, rather than by engaging in cybercrime. He also cited the post-revolutionary values, high ethical standards and professional identities of young people involved in the Armenian IT as further mitigation against their involvement in cybercrime.

I would see that the culture and the ethics within the IT sector, are very very high. The etiquette is very very high because those in the IT sector view themselves as being highly professional. They do view themselves as being the very opposite of what the previous system was. So, within the bubble that is the IT sector, in that culture actually these kinds of behaviour [cybercrime] is looked down upon. It’s frowned upon and they are the ones who are displaying some anger and frustration at the, sort of, diaspora elements trying to trickle down cybercriminal behaviour because, the point is, we have such a positive reputation internationally that we don’t want anything harming this reputation. So, in that context I would argue that you would see very very serious pushback from the industry if any of this illicit behaviour grows or becomes an issue. (Kopalyan, 15 December 2021)

While this might suggest there are structural and cultural components that have also distanced the Armenian IT sector from illegality, these are not issues that arose in other interviews, however, so might be considered, for the moment, areas that would merit further investigation.

In sum, therefore, this discussion indicates that, despite being spatially co-present, there is very little, or no, interaction between the IT sector in Armenia, and those engaged within it, and the high levels of regional poverty and corruption observed within the nation. The ready availability of jobs, the high salaries paid, and the lack of barriers to entry for those with appropriate qualifications and skills, mean that young people involved in this sector are able to avoid the challenges that affect their peers in other sectors. The exceptional nature of the IT sector within the context of the wider Armenian economy was captured by two, possibly throwaway, comments from our interviews. It was described as like a ‘vacuum cleaner’ (Muradyan) and a ‘bubble’ (Kopalyan).

The final section of this paper now goes on to draw out some wider implications of this case.

Conclusions

Earlier we outlined three scenarios that might potentially result from IT development occurring in the context of regional poverty. Of these, Armenia seems most likely to have experienced the second: IT development accompanied by sufficient IT jobs growth, sees no resultant rise in cybercrime. Although we noted some discussions of rises in economic cybercrime in Armenia, we found no evidence to connect this to IT development there, and Armenia continues to be perceived as a low cybercrime nation. Further, we can dismiss the first scenario: IT development not accompanied by sufficient IT jobs growth, sees a resultant rise in cybercrime. Our interviews clearly indicate that IT jobs growth in Armenia has at least matched the supply of skilled labour in recent years. Indeed, it is likely to have exceeded this supply during this time.

We can confidently conclude, therefore, that IT development in Armenia has not produced a resultant rise in cybercrime. Our first policy lesson from this case should be that IT development can, under certain circumstances, occur within the context of regional poverty, and other potentially cyber-criminogenic conditions, without a resultant rise in cybercrime. The characteristics of the Armenian case, outlined in the previous section, might inform the principles of any future policy model. Namely, IT development in the context of regional poverty and other potentially cyber-criminogenic conditions should meet the following criteria: be able to absorb the supply of IT-specialist labour; generate salaries that are sufficient to deter illegality; and ensure that entry is based only on qualifications and skills.

However, we should remain wary of assuming the universal transferability of the Armenian model. Defining specific policy objectives, the ways in which the principles above are to be achieved, that do not generate unintended cyber-criminogenic outcomes, present significant challenges. Our interviews identified particularities of the Armenian case that mitigated against cybercrime illegality. These were, the roles of overseas investment and involvement, especially through diaspora connections to the United States, as significant drivers and shapers of Armenia’s IT development and, perhaps, the post-revolutionary cultural orientations of young people involved in IT. The challenge for policy transfer from this case is likely to involve designing policy objectives that replicate the effects of these particularities across very different demographic, economic and social contexts.

At this point we are unable to say anything definitive about the third scenario outlined earlier: IT development accompanied by sufficient jobs growth sees a resultant drop in cybercrime, or slowing of growth. The potential of IT development being deployed as a form of explicit anti-cybercrime policy, then, remains an open question and an avenue of further research.

This paper has also advanced a series of theoretical contributions. It acknowledges the range and diversity of potentially cyber-criminogenic factors identified across salient literatures (Hall et al. Citation2021). We also recognise the particular importance attached to developed socio-technological and impoverished legitimate economic conditions, in explaining the presence of extensive cybercrime economies within certain regions. However, the analysis presented here suggests such combinations of conditions will also be present in regions without extensive cybercrime economies. We cannot, therefore, interpret the geographies of cybercrime solely through the spatial co-presence of certain conditions, or through statistical correlation alone. Our analysis emphasises the importance of also demonstrating causality by exploring specific interactions between potentially cyber-criminogenic conditions within regions. This points to the value of more ethnographic approaches. We would recommend that future analysis also considers ranging beyond the familiar terrains of Eastern Europe and West Africa that have monopolised the literatures of cybercrime to date. It should consider pursuing new, or little recognised, cybercrime threats, or cases like Armenia that might challenge the prescriptions of universal models of cybercrime.

Finally, this analysis suggests several Armenia specific avenues of further research. First, a systematic analysis of Armenian cybercrime cases would add further empirical validity to the arguments within this paper and would reveal much about the nature, levels and types of economic cybercrime practised within Armenia, and its organisation, sophistication and patterns of victimisation. Second, an economic analysis of the IT sector in Armenia covering its structure, the roles of overseas investment and involvement, especially through Armenia’s diaspora connections, and profiles of those involved, would help us understand more, how it has evaded the problems of low growth, low salaries and corruption that have blighted other sectors of the Armenian economy. Third, the equitable distribution of the costs and benefits of Armenia’s IT development, across other sectors of the economy and society, also remains an open question, worthy of further investigation. Fourth, future research should speak more directly to young peoples’ experiences of living through the transitions discussed here. Surveys that engage directly with young Armenian’s employment experiences, self-identities and cultural orientations would add considerable nuance to our understandings of the multiple ways in which they are negotiating a potentially cyber-criminogenic environment. Finally, the Armenia case might be used to ask broader, regional questions about cybercrime threats and the factors that underpin them. There is a tendency, in both the popular imagination and in some cybercrime literature, to see the former Soviet Union as an undifferentiated cyberthreat landscape. The Armenia case suggests there is greater nuance to this regional context than has generally been acknowledged. Situated analysis across this region would help excavate differences in the specific geographies of the post-Soviet cyberthreat landscape.

Acknowledgements

We would like to thank Eva Rosenthal for her invaluable research assistance on this project.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This research has been supported by a British Academy small research grant (award number: SRG1920\100892).

Notes on contributors

Tim Hall

Tim Hall is a Professor in the Department of Policing, Criminology and Forensics at the University of Winchester. He is a criminologist and human geographer with interests in the geographies of crime, organised crime and cybercrime. His ongoing research is unified by an interest in the spatial aspects of illicit and illegal practices. He has published extensively in these fields and is the author and editor of a number of books including The Economic Geographies of Organized Crime (Guilford, 2018), The Illicit and Illegal in Regional and Urban Governance and Development: Corrupt Places (Routledge, 2017, with Francesco Chiodelli and Ray Hudson) and A Research Agenda for Global Crime (Edward Elgar, 2019 with Vincenzo Scalia). He is a Principal Fellow of the Higher Education Academy.

Ulrike Ziemer

Ulrike Ziemer is a Senior Lecturer in Sociology at the University of Winchester. Her publications include numerous journal articles and book chapters on the Armenian diaspora in Russia, as well as on gender issues in the South Caucasus. She has published a monograph Ethnic Belonging, Gender and Cultural Practices: Youth Identities in Contemporary Russia (Ibidem Verlag, 2011) and two edited volume East European Diasporas, Migration and Cosmopolitanism (Routledge, 2012) and Women’s Everyday Lives in War and Peace in the South Caucasus (Springer, 2020).

References

Appendix: professional titles of expert interviewees

Anthropologist, University of Tennessee, Knoxville.

Assistant Editor Atlantic Council Digital Forensics Research Lab, Washington DC.

Chief International Security Officer, Armenian IT company.

Ex-Head of the Anti-Cybercrime Unit, Armenian Police/Head of Hi-Tech Crime Division, Main Department of Combating Organised Crime, Police of Republic of Armenia.

Political Scientist, University of Nevada, Las Vegas, Caucasus and Eurasia specialism.

Project Manager, Cybercrime Project Office, Council of Europe.

Sociologist Yerevan State University, co-author Independence Generation report, Armenia.

Vice President of the Internet Society of Armenia/Secretary of the Internet Governance Council of Armenia.