References
- Anderson, R., et al. 2012. Measuring the cost of cybercrime. Paper to the 11th annual workshop on the economics of information security, Berlin, 25–26 June. Available from: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf [Accessed 1 February 2013].
- Andrade, J. 2012. Teen blackmail via Facebook. Philippine Daily Inquirer. Available from: http://newsinfo.inquirer.net/205505/teen-blackmail-via-facebook [Accessed 1 February 2013].
- Banerji, R. 2012. David Hemler: 28 years on the run. BBC News Online, 3 September. Available from: http://www.bbc.co.uk/news/magazine-19331209 [Accessed 1 February 2013].
- BBC, 2009. T-Mobile staff sold personal data. BBC News Online, 17 November. Available from: http://news.bbc.co.uk/1/hi/uk/8364421.stm [Accessed 1 February 2013].
- BBC, 2010. Laptop with personal data of 24,000 people is stolen. BBC News Online, 29 June. Available from: http://www.bbc.co.uk/news/10453067 [Accessed 1 February 2013].
- BBC, 2012a. Watchdog finds undeleted data on second-hand disk drives. BBC News Online, 25 April. Available from: http://www.bbc.co.uk/news/technology-17827562 [Accessed 1 February 2013].
- BBC, 2012b. Credit card ‘info for sale’ websites closed in global raids. BBC News Online, 26 April. Available from: http://www.bbc.co.uk/news/uk-17851257 [Accessed 1 February 2013].
- BBC, 2012c. Facebook has more than 83 million illegitimate accounts. BBC News Online, 2 August. Available from: http://www.bbc.co.uk/news/technology-19093078 [Accessed 1 February 2013].
- BBC, 2012d. US jails hacker who sold access to hijacked PCs. BBC News Online, 7 September. Available from: http://www.bbc.co.uk/news/technology-19517316 [Accessed 1 February 2013].
- Blocher, J., 2009. Reputation as property in virtual economies. Yale Law Journal Pocket Part, 118, 120–125.
- Blumberg, A., and Eckersley, P. 2009. On locational privacy, and how to avoid losing it forever. Electronic Frontier Foundation report, August. Available from: https://www.eff.org/files/eff-locational-privacy.pdf [Accessed 1 February 2013].
- Branton, J. 2010. Your identity for sale online: thieves sell credit numbers, more on members-only sites. The Columbian, 25 November. Available from: http://www.columbian.com/news/2010/nov/25/your-identity-for-sale-online/ [Accessed 1 February 2013].
- Casciani, D. 2008. UK identities sold for £80 online. BBC News Online, 17 November. Available from: http://news.bbc.co.uk/1/hi/uk/7732569.stm [Accessed 1 February 2013].
- Charrett, S., 1997. The modern identity changer: how to create a new identity for privacy and personal freedom. Boulder, CO: Paladin Press.
- Cowley, J. 2000. Where are they now? The Observer, 18 June. Available from: http://www.guardian.co.uk/theobserver/2000/jun/18/features.review17 [Accessed 1 February 2013].
- CPS, 2012. Interim guidelines on prosecuting cases involving communications sent via social media, Crown Prosecution Service, 19 December. Available from: http://www.cps.gov.uk/consultations/social_media_consultation.pdf [Accessed 1 February 2013].
- Critchley, T.A., 1978. A history of the police in England and Wales. London: Constable.
- Donath, J., 1999. Identity and deception in the virtual community. In: A. Smith, A. Marc, and P. Kollock eds. Communities in cyberspace. London: Routledge, 29–59.
- Edwards, L. 2012. Section 127 Communications Act 2003 – Threat or menace? Pangloss Blog, 21 September. Available from: http://blogscript.blogspot.co.uk/2012/09/section-127-communications-act-2003.html [Accessed 1 February 2013].
- Finch, E., 2002. What a tangled web we weave: identify theft and the internet. In: Y. Jewkes ed. dot.cons: crime, deviance and identity on the internet. Cullompton: Willan, 86–104.
- FireEye, 2012. Top words used in spear phishing attacks to successfully compromise enterprise networks and steal data. FireEye report, September. Available from: http://www.fireeye.com/resources/pdfs/fireeye-top-spear-phishing-words.pdf [Accessed 1 February 2013].
- Fiveash, K. 2012. Top prosecutor warns troll-hunting cops not to choke courts. The Register, 13 November. Available from: http://www.theregister.co.uk/2012/11/13/keir_starmer_warns_against_millions_of_trolling_offences/ [Accessed 1 February 2013].
- Glenny, M., 2012. DarkMarket: how hackers became the new Mafia. New York: Vintage.
- Goodman, M., 1997. Why the police don't care about computer crime. Harvard Journal of Law and Technology, 10, 645–694.
- Haggerty, K., and Ericson, R., 2000. The surveillant assemblage. British Journal of Sociology, 51 (4), 605–622. 10.1080/00071310020015280
- Hansard, 2012. How many convictions there were in each region under section 127 of the Digital Communications Act 2003 in each of the last five years, Answer by Jeremy Wright to a question by Andrew Gwynne. Hansard, HC Deb, 9 November, c824W.
- Hawkes, N. 2011. How not to measure identity fraud. Straight statistics blog. Available from: http://www.straightstatistics.org/article/how-not-measure-identity-fraud [Accessed 1 February 2013].
- Home Office, 2012. False ID guidance. Available from: http://www.homeoffice.gov.uk/publications/alcohol-drugs/alcohol/alcohol-supporting-guidance/false-id-guidance?view=Binary [Accessed 1 February 2013].
- Horn, L. 2012. Trend watch: employers asking candidates for Facebook passwords. PCMAG.COM, 22 March. Available from: http://www.pcmag.com/article2/0,2817,2401999,00.asp [Accessed 1 February 2013].
- Innes, M., 2004. Reinventing tradition? Reassurance, neighbourhood security and policing. Criminal Justice, 4 (2), 151–171.
- Inquirer News, 2012. Man in Facebook blackmail case pleads not guilty. Inquirer News, 28 March. Available from: http://newsinfo.inquirer.net/168409/man-in-facebook-blackmail-case-pleads-%E2%80%98not-guilty%E2%80%99 [Accessed 1 February 2013].
- Insley, J. 2010. Need a false identity? It'll cost a couple of quid. The Observer, 16 March. Available from: http://www.guardian.co.uk/money/2010/may/16/false-identity-cost [Accessed 1 February 2013].
- Javelin, 2009. 2009 Identity fraud survey report: consumer version. Pleasanton, CA: Javelin Strategy and Research.
- Javelin, 2010. 2010 Identity fraud survey report: consumer version. Pleasanton, CA: Javelin Strategy and Research.
- Javelin, 2011. 2011 Identity fraud survey report: consumer version. Pleasanton, CA: Javelin Strategy and Research.
- Javelin, 2012. 2012 Identity fraud survey report: consumer version. Pleasanton, CA: Javelin Strategy and Research.
- Jeffries, A. 2012. Facebook's fake-name fight grows as users skirt the rules. The Verge, 17 September. Available from: http://www.theverge.com/2012/9/17/3322436/facebook-fake-name-pseudonym-middle-name [Accessed 1 February 2013].
- Keane, B. 2012. Cybercrime: rarer and less costly than we're told. Crikey, 31 October. Available from: http://www.crikey.com.au/2012/10/31/cybercrime-rarer-and-less-costly-than-were-told/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+CrikeyDaily+%28Crikey+Daily%29 [Accessed 1 February 2013].
- Kirk, J. 2012. Project monitors price of stolen credit card data in real time. PCWorld, 1 August. Available from: http://www.pcworld.com/article/260245/project_monitors_price_of_stolen_credit_card_data_in_real_time.html [Accessed 1 February 2013].
- Kirlappos, I., Sasse, A., and Harvey, N. 2012. Why trust seals don't work: a study of user perceptions and behavior. Lecture Notes in Computer Science, 7344, 308–324. Available from: http://www.springerlink.com/content/wj3v741872461gl7 [Accessed 1 February 2013].
- Levi, M., and Williams, M., 2012. eCrime reduction partnership mapping study. Cardiff: NOMINET/Cardiff University.
- Lewis, P., and Evans, R. 2013. Police spies stole identities of dead children. The Guardian, 3 February. Available from: http://www.guardian.co.uk/uk/2013/feb/03/police-spies-identities-dead-children [Accessed 3 February 2013].
- Leyden, J. 2012a. If you see ‘URGENT tax rebate download’ in an inbox, kill it with fire. The Register, 26 September. Available from: http://www.theregister.co.uk/2012/09/26/spear_phishing_hooks/ [Accessed 1 February 2013].
- Leyden, J. 2012b. Pushdo botnet's smokescreen traffic hits legitimate websites. The Register, 19 September. Available from: http://www.theregister.co.uk/2012/09/19/pushdo_spews_fake_traffic/ [Accessed 1 February 2013].
- Leyden, J. 2012c. UK data-blurt cockups soared 1,000 per cent over last five years. The Register, 30 August. Available from: http://www.theregister.co.uk/2012/08/30/data_breach_increase/ [Accessed 1 February 2013].
- Lister, S., and Wall, D., 2006. In: A. Wahidin, and M. Cain eds. Ageing, crime and society. Cullompton: Willan Publishing, 107–123.. Deconstructing distraction burglary: an ageist offence?
- Manning, P.K., 1998. The police: mandate, strategies, and appearances. In: P. Manning, and J. Van Maanen eds. Policing: a view from the street. New York: Random House, 7–32.
- McBarnet, D., 1979. Arrest: the legal context of policing. In: S. Holdaway ed. The British police. London: Arnold.
- Messieh, N. 2012. Survey: 37% of your prospective employers are looking you up on Facebook. The Next Web, 18 April. Available from: http://www.thenational.ae/news/world/europe/jailed-italian-mafia-bosses-find-friends-on-facebook [Accessed 1 February 2013].
- Musil, S. 2010. Report: Teen gets 15 years for Facebook blackmail. cnet News, . Available from: http://news.cnet.com/8301-1023_3-10459536-93.html [Accessed 1 February 2013].
- Nasheri, H., 2005. Economic espionage and industrial spying. New York: Cambridge University Press.
- National Statistics, 2012. 2010/11 Scottish crime and justice survey: main findings. National Statistics/Scottish Government. Available from: http://www.scotland.gov.uk/Resource/Doc/361684/0122316.pdf [Accessed 1 February 2013].
- NFA, 2012. Annual fraud indicator. National Fraud Authority, March. Available from: http://www.homeoffice.gov.uk/publications/agencies-public-bodies/nfa/annual-fraud-indicator/annual-fraud-indicator-2012?view=Binary [Accessed 1 February 2013].
- NFSA, 2009. The national fraud strategy: a new approach to combating fraud. The National Fraud Strategic Authority. Available from: http://www.homeoffice.gov.uk/publications/agencies-public-bodies/nfa/national-fraud-strategy?view=Binary [Accessed 1 February 2013].
- One India, 2012. You may get call from Facebook if profile identity is fake: beware fake Facebook profile holders. OneIndia, 9 September. Available from: http://news.oneindia.in/2012/09/09/youmay-get-call-from-facebook-if-profile-identity-issuspec-1067709.html [Accessed 1 February 2013].
- Phillips, W., 2012. What an academic who wrote her dissertation on trolls thinks of Violentacrez. The Atlantic, 15 October. Available from: http://www.theatlantic.com/technology/archive/2012/10/what-an-academic-who-wrote-her-dissertation-on-trolls-thinks-of-violentacrez/263631/ [Accessed 1 February 2013].
- Pilkington, E., 2010. Tyler Clementi, student outed as gay on internet, jumps to his death. The Guardian, 30 September. Available from: http://www.guardian.co.uk/world/2010/sep/30/tyler-clementi-gay-student-suicide [Accessed 1 February 2013].
- Pisa, N., 2012. Fake pilot who joined cabin crew in cockpit is arrested in plot mirroring Spielberg's hit film Catch Me If You Can. Daily Mail, 23 September. Available from: http://www.dailymail.co.uk/news/article-2207422/Italian-police-arrest-man-posed-pilot-joined-cabin-crew-budget-airline-cockpit.html?ITO=1490 [Accessed 1 February 2013].
- Poulter, S., 2011. Thinking of checking out a bargain? Beware the company websites that are selling on your personal details. Daily Mail, 8 April. Available from: http://www.dailymail.co.uk/news/article-1375066/Beware-company-websites-selling-personal-details.html#ixzz260WNCodO [Accessed 1 February 2013].
- Protalinski, E., 2012. Facebook tests prompt asking you to snitch on your friends who aren't using their real name. Next Web, 21 September. Available from: http://thenextweb.com/facebook/2012/09/21/facebook-now-wants-snitch-friends-arent-using-real-name/ [Accessed 1 February 2013].
- Reiner, R., 2000. (3rd ed.). The politics of the police. Oxford: Oxford University Press.
- RSA, 2011. The psychology of social engineering. RSA, July. Available from: http://www.rsa.com/solutions/consumer_authentication/intelreport/11477_Online_Fraud_report_0711.pdf [Accessed 1 February 2013].
- Schneier, B., 2008. How to create the perfect fake identity. WIRED, 4 September. Available from: http://www.wired.com/politics/security/commentary/securitymatters/2008/09/securitymatters_0904 [Accessed 1 February 2013].
- Shaikh, T., 2003. £1,400 buys a new identity, a new passport and entry to the UK. The Telegraph, 12 January. Available from: http://www.telegraph.co.uk/news/uknews/1418636/1400-buys-a-new-identity-a-new-passport-and-entry-to-the-UK.html [Accessed 1 February 2013].
- Shearing, C., and Ericson, R., 1991. Culture as figurative action. British Journal of Sociology, 42 (4), 481–506. 10.2307/591444
- Smith, R., 2010. Identity theft and fraud. In: Y. Jewkes, and M. Yar eds. Handbook of internet crime. Cullompton: Willan, 273–301.
- Stajano, F., and Wilson, P., 2011. Understanding scam victims: seven principles for systems security. Communications of the ACM, 543, 70–75 (early version available at http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-754.pdf) [Accessed 1 February 2013].10.1145/1897852.1897872
- Straits Times, 2012. Real passports with fake identities issued in Indonesia. The Straits Times, 17 July. Available from: http://www.asianewsnet.net/home/news.php?id=33554&sec=1 [Accessed 1 February 2013].
- Sussman, V., 1995. Policing cyberspace. U.S. news & world report, 23 January, 54–61.
- Swash, R., 2012. A new internet age? Web users turn on trolls. The Guardian, 19 October. Available from: http://www.guardian.co.uk/technology/2012/oct/19/new-internet-age-trolls [Accessed 1 February 2013].
- Trueman, B., 2011. Is the UK's anti-fraud strategy achieving its aims? Accountancy Age, 14 November. Available from: http://www.accountancyage.com/aa/opinion/2124714/uks-anti-fraud-strategy-scratch [Accessed 1 February 2013].
- Wall, D.S., 1997. Policing the virtual community: the internet, cyber-crimes and the policing of cyberspace. In: P. Francis, P. Davies, and V. Jupp eds. Policing futures. London: Macmillan, 208–236.
- Wall, D.S., 1998. The chief constables of England and Wales: the socio-legal history of a criminal justice elite. Aldershot: Dartmouth.
- Wall, D.S., 2007. Cybercrime: the transformation of crime in the information age. Cambridge: Polity.
- Wall, D.S., 2007/11. Policing cybercrimes: situating the public police in networks of security within cyberspace. Police Practice and Research: An International Journal, 8 (2), 183–205. Available from: http://ssrn.com/abstract=853225 [Accessed 1 February 2013].
- Wall, D.S., 2008/11. Cybercrime and the culture of fear: social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society, 116, 861–884 (Revised Feb. 2011). SSRN: Available from: http://ssrn.com/abstract=1155155 [Accessed 1 February 2013].10.1080/13691180802007788
- Wall, D.S., 2010a. Micro-frauds: virtual robberies, stings and scams in the information age. In: T. Holt, and B. Schell eds. Corporate Hacking and Technology-Driven Crime: Social Dynamics and implications. Hershey, PA: IGI Global, 68–85.
- Wall, D.S., 2010b. The organization of cybercrime and organized cybercrime. In: M. Bellini, P. Brunst, and J. Jaenke eds. Current issues in IT security. Freiburg: Max-Planck-Instituts für ausländisches und internationales Strafrecht, 53–68.
- Wall, D.S., 2010c. The UK tackles crimes against the machine. Jane's Intelligence Weekly, 2 (15), 13.
- Wall, D.S., 2013a. DR19: identity crime in the UK, Future of identity series. London: BIS Foresight.
- Wall, D.S., 2013b. DR20: the future challenge of identity crime in the UK, Future of identity series. London: Government Office for Science Foresight Initiative Project.
- Wall, D.S., 2013c. Enemies within: redefining the insider threat in organizational security policy. Security Journal, 26 (2), 107–124.
- Whitson, J., and Haggerty, K., 2008. Identity theft and the care of the virtual self. Economy and Society, 37 (4), 572–594. 10.1080/03085140802357950
- Wolf, N., 2012. Amanda Todd's suicide and social media's sexualisation of youth culture. The Guardian, 26 October. Available from: http://www.guardian.co.uk/commentisfree/2012/oct/26/amanda-todd-suicide-social-media-sexualisation [Accessed 1 February 2013].
- Yip, M., Webber, C., and Shadbolt, N., 2013. Trust among Cybercriminals? Carding forums, uncertainty and implications for policing. Policing and Society, xx, xx.