595
Views
0
CrossRef citations to date
0
Altmetric
Comment

‘Hacking the hackers’: reflections on state-implemented disruption as a ‘new model’ for cyber policing

ORCID Icon & ORCID Icon
Received 11 May 2023, Accepted 02 Nov 2023, Published online: 15 Nov 2023

References

  • ABC News (2022). Medibank cyber attack: What personal data has been accessed and what can you do? ABC News, 7 November 2022. https://www.abc.net.au/news/2022-11-07/medibank-cyber-attack-what-personal-data-has-been-accessed/101623540 [last accessed 8 May 2023]
  • ABC News (2023). Latitude Financial will not pay ransom to cyber hackers as millions of customer records compromised. ABC News, 11 April 2023. https://www.abc.net.au/news/2023-04-11/latitude-financial-will-not-pay-ransom-to-cyber-hackers/102207430 [last accessed 8 May 2023]
  • Alazab, M. (2022). A new cyber taskforce will supposedly ‘hack the hackers’ behind the Medibank breach. It could put a target on Australia’s back. The Conversation. https://theconversation.com/a-new-cyber-taskforce-will-supposedly-hack-the-hackers-behind-the-medibank-breach-it-could-put-a-target-on-australias-back-194532 [last accessed 8 May 2023]
  • AustCyber. (2022). Australia’s cyber security sector competitiveness plan 2022, https://www.austcyber.com/resources/sector-competitiveness-plan [last accessed 8 May 2023]
  • Australian Federal Police. (2022). Statement by AFP Commissioner Reece Kershaw on Medibank Private data breach. Australian Federal Police. https://www.afp.gov.au/news-media/media-releases/statement-afp-commissioner-reece-kershaw-medibank-private-data-breach [last accessed 8 May 2023]
  • Australian Signals Directorate. (2021). REDSPICE: A blueprint for growing ASD’s capabilities. file:///Users/whelan/Downloads/ASD-REDSPICE-Blueprint%20(1).pdf [last accessed 8 May 2023]
  • Balko, R. (2013). Rise of the warrior cop: The militarization of America’s police forces. New York: Public Affairs.
  • Bátrla, M., & Harašta, J. (2022). ‘Releasing the hounds?’ Disruption of the Ransomware ecosystem through offensive cyber operations. In 2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon) (Vol. 700, pp. 93–115). IEEE.
  • Boes, S., & Leukfeldt, R. (2017). Fighting cybercrime: A joint effort. In R. M. Clark & S. Hakim (Eds.), Cyber-physical security: Protecting critical infrastructure at the state and local level (pp. 185–203). Springer.
  • Bossler, A., Holt, T. J., Cross, C., & Burruss, G. W. (2020). Policing fraud in England and Wales: Examining constables’ and sergeants’ online fraud preparedness. Security Journal, 33(2), 311–328. https://doi.org/10.1057/s41284-019-00187-5
  • Bright, D., & Whelan, C. (2021). Organised crime and law enforcement: A network perspective. Routledge.
  • Caldwell, A., & Curran, K. (2020). A critique of active defense or ‘hack back’. International Journal for Information Security Research, 10(1), 957–961. https://doi.org/10.20533/ijisr.2042.4639.2020.0109
  • CBC News (2023) Intelligence watchdog questions cyber agency’s approach to international law, CSE insists it was above board. CBC News, 28 April 2023. https://www.cbc.ca/news/politics/cse-cyber-legal-obligations-1.6826521 [last accessed 8 May 2023]
  • ChainAlysis (2022). Crypto crime report 2022. https://go.chainalysis.com/2022-Crypto-Crime-Report.html [last accessed 8 May 2023]
  • Collier, B., Thomas, D. R., Clayton, R., Hutchings, A., & Chua, Y. T. (2022). Influence, infrastructure, and recentering cybercrime policing: Evaluating emerging approaches to online law enforcement through a market for cybercrime services. Policing and Society, 32(1), 103–124. https://doi.org/10.1080/10439463.2021.1883608
  • Connolly, L., Wall, D. S., Lang, M., & Oddson, B. (2020). An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. Journal of Cybersecurity, 6(1), tyaa023.
  • Cornish, D. B., & Clarke, R. V. (2017). Understanding crime displacement: An application of rational choice theory. In M. Natarajan (Ed.), Crime opportunity theories (pp. 197–211). Routledge.
  • Coyne, C. & Hall, A. (2017). Four decades and counting: The continued failure of the War on Drugs, Policy Analysis 811, Cato Institute, Washington, D.C.
  • Cross, C. (2019). Reflections on the reporting of fraud in Australia. Policing: An International Journal, 43(1), 49–61. https://doi.org/10.1108/PIJPSM-08-2019-0134
  • Cross, C. (2020). Oh we can’t actually do anything about that’: The problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice, 20(3), 358–375. https://doi.org/10.1177/1748895819835910
  • Décary-Hétu, D., & Giommoni, L. (2017). Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous. Crime, Law and Social Change, 67(1), 55–75. https://doi.org/10.1007/s10611-016-9644-4
  • Den Heyer, G. (2014). Mayberry revisited: a review of the influence of police paramilitary units on policing. Policing and Society, 24(3), 346–361.
  • Denning, D. (2014). Framework and principles for active cyber defense. Computers & Security, 40, 108–113. https://doi.org/10.1016/j.cose.2013.11.004
  • Department of Home Affairs (DHA). (2022). Media conference Melbourne. Department of Home Affairs, Australian Federal Government, Canberra. https://minister.homeaffairs.gov.au/ClareONeil/Pages/media-conference-melbourne-12112022.aspx [last accessed 23 Feb 2023]
  • DiMaggio, J. (2023). Ransomware diaries: Unlocking LockBit. Analyst 1. https://analyst1.com/ransomware-diaries-volume-1/ [last accessed 23 Feb 2023]
  • Dodge, C., & Burruss, G. (2019). Policing cybercrime: responding to the growing problem and considering future solutions. In R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (pp. 339–358). Oxfordshire: Routledge.
  • Dupont, B. (2017). Bots, cops, and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, law and Social Change, 67(1), 97–116. https://doi.org/10.1007/s10611-016-9649-z
  • Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of Criminology, 54(1), 76–92. https://doi.org/10.1177/00048658211003925
  • Faubert, C., Décary-Hétu, D., Malm, A., Ratcliffe, J., & Dupont, B. (2021). Law enforcement and disruption of offline and online activities: A review of contemporary challenges. In M. Kranenbarg & R. Leukfeldt (Eds.), Cybercrime in context: The human factor in victimization, offending, and policing (pp. 351–370). Springer.
  • Federal Bureau of Investigation (FBI). (2021). FBI Statement on JBS cyberattack. FBI National Press Office. https://www.fbi.gov/news/press-releases/press-releases/fbi-statement-on-jbs-cyberattack [last accessed 8 May 2023]
  • Federal Bureau of Investigation (FBI). (2023). U.S. Department of Justice disrupts Hive ransomware variant. https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant [[last accessed 8 May 2023]
  • Harkin, D., & Whelan, C. (2019). Exploring the implications of ‘low visibility’ specialist cyber-crime units. Australian & New Zealand Journal of Criminology, 52(4), 578–594. https://doi.org/10.1177/0004865819853321
  • Harkin, D., & Whelan, C. (2022). Perceptions of police training needs in cyber-crime. International Journal of Police Science and Management, 24(1), 66–76.
  • Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist cyber-crime units: An empirical analysis. Police Practice and Research, 19(6), 519–536. https://doi.org/10.1080/15614263.2018.1507889
  • Hendry, J. (2019). AFP copping cyber skills shortage hard warns chief. IT News. https://www.itnews.com.au/news/afp-copping-cyber-skills-shortage-hard-warns-chief-519687 [last accessed 22/9/23]
  • Holt, T., & Bossler, A. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
  • Holzer, C. T., & Lerums, J. E. (2016). The ethics of hacking back. In 2016 IEEE Symposium on Technologies for Homeland Security (HST) (pp. 1–6). IEEE.
  • Innes, M., & Sheptycki, J. W. (2004). From detection to disruption. International Criminal Justice Review, 14(1), 1–24. https://doi.org/10.1177/105756770401400101
  • Johnson, S., Guerette, R., & Bowers, K. (2014). Crime displacement: What we know, what we don’t know, and what it means for crime reduction. Journal of Experimental Criminology, 10(4), 549–571. https://doi.org/10.1007/s11292-014-9209-4
  • Kiker III, C. R. (2015). From Mayberry to Ferguson: The militarization of American policing equipment, culture, and mission. Washington & Lee Law Review Online, 71, 282.
  • Kirby, S., & Penna, S. (2010). Policing mobile criminality: Towards a situational crime prevention approach to organised crime. In K. Bullock, R. V. Clarke, & N. Tilley (Eds.), Situational prevention of organised crime (pp. 193–212). Willan Publishing.
  • Kirby, S., & Snow, N. (2016). Praxis and the disruption of organised crime groups. Trends in Organized Crime, 19(2), 111–124. https://doi.org/10.1007/s12117-016-9269-0
  • Martin, J., & Whelan, C. (2023). Ransomware through the lens of state crime: Conceptualizing ransomware groups as cyber proxies, pirates, and privateers. State Crime Journal, 12(1), 4–28. https://doi.org/10.13169/statecrime.12.1.0004
  • Meyerson, D. (2015). Why should justice be seen to be done? Criminal Justice Ethics, 34(1), 64–86. https://doi.org/10.1080/0731129X.2015.1019780
  • Monahan, T., & Palmer, N. A. (2009). The emerging politics of DHS fusion centers. Security Dialogue, 40(6), 617–636.
  • Munk, T. (2022). The rise of politically motivated cyber attacks: Actors, attacks and cybersecurity. Routledge.
  • Noble, N. (2020), Director-General ASD speech to the National Security College, Australian Signals Directorate. https://www.asd.gov.au/publications/director-general-asd-speech-national-security-college [last accessed 8 May 2023]
  • Roziere, B., & Walby, K. (2019). Special weapons and tactics teams in Canadian policing: legal, institutional, and economic dimensions. Policing and Society, 30(6), 704–719.
  • Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1-2), 4–37. https://doi.org/10.1080/01402390.2014.977382
  • Schjolberg, S., & Ghernaouti-Helie, S. (2011). A global treaty on cybersecurity and cybercrime. Cybercrime Law, 97. https://www.cybercrimelaw.net/documents/A_Global_Treaty_on_Cybersecurity_and_Cybercrime,_Second_edition_2011.pdf
  • Scott, B. (2022). Australian cyber: What’s “Redspice” for? The Interpreter. https://www.lowyinstitute.org/the-interpreter/australian-cyber-what-s-redspice [last accessed 8 May 2023]
  • Sentas, V. (2016). Policing the diaspora: Kurdish Londoners, MI5 and the proscription of terrorist organizations in the United Kingdom. British Journal of Criminology, 56(5), 898–918.
  • Skopik, F., & Pahi, T. (2020). Under false flag: Using technical artifacts for cyber attack attribution. Cybersecurity, 3(1), 1–20. https://doi.org/10.1186/s42400-020-00048-4
  • Van Buskirk, J., Bruno, R., Dobbins, T., Breen, C., Burns, L., Naicker, S., & Roxburgh, A. (2017). The recovery of online drug markets following law enforcement and other disruptions. Drug and Alcohol Dependence, 173, 159–162.
  • Wall, D. S. (2021). Cybercrime as a transnational organized criminal activity. In F. Allum & S. Gilmour (Eds.), Routledge handbook of transnational organized crime (pp. 318–336). Routledge.
  • Whelan, C., & Harkin, D. (2021). Civilianising specialist units: Reflections on the policing of cyber-crime. Criminology & Criminal Justice, 21(4), 529–546. https://doi.org/10.1177/1748895819874866
  • Wilson, M., Cross, C., Holt, T. J., & Powell, A. (2022). Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. Journal of Criminology, 55(4), 468–494. https://doi.org/10.1177/26338076221123080

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.