Cyber Crime and Information Warfare
Essay by review • March 5, 2011 • Research Paper • 7,825 Words (32 Pages) • 1,994 Views
CYBER CRIME AND INFORMATION WARFARE
Dr Peter Grabosky
Australian Institute of Criminology, ACT
Paper presented at the Transnational Crime Conference
convened by the Australian Institute of Criminology
in association with the Australian Federal Police and
Australian Customs Service
and held in Canberra, 9-10 March 2000
2
Introduction
Willie Sutton, a notorious American bank robber of a half century ago, was once asked why he
persisted in robbing banks. “Because that’s where the money is,” he is said to have replied.1 The
theory that crime follows opportunity has become established wisdom in criminology;
opportunity reduction has become one of the fundamental principles of crime prevention.
But there is more to crime than opportunity. Crime requires a pool of motivated offenders,
and a lack of what criminologists would refer to as “capable guardianship”; someone to mind
the store, so to speak.
These basic principles of criminology apply to computer related crime no less than they do to
bank robbery or to shop lifting. They will appear from time to time throughout the following
discussion. Not all of these factors are amenable to control by governments alone. It follows,
therefore, that a variety of institutions will be required to control computer related crime.
This paper discusses current and emerging forms of computer-related illegality. It reviews nine
generic forms of illegality involving information systems as instruments or as targets of crime.
It will also discuss issues arising from the global reach of information systems. It is trite to
describe the ways in which computers have, figuratively speaking, made the world a smaller
place. The corresponding potential for trans-jurisdictional offending will pose formidable
challenges to law enforcement. For some crimes, this will necessitate a search for alternative
solutions.
The following pages will suggest that much computer-related illegality lies beyond the
capacity of contemporary law enforcement and regulatory agencies alone to control, and that
security in cyberspace will depend on the efforts of a wide range of institutions, as well as on
a degree of self-help by potential victims of cyber-crime.
The ideal configuration may be expected to differ, depending upon the activity in question,
but is likely to entail a mix of law enforcement, technological and market solutions. The paper
will conclude with a discussion of the most suitable institutional configuration to address
those forms of computer-related crime which have been identified.
Before we begin to review the various forms of criminality involving information systems as
instruments and/or as targets, and the most appropriate means of controlling them, let us first
look at the questions of motivation and of opportunity.
Motivations of Computer Criminals
The motivations of those who would commit computer related crime are diverse, but hardly
new. Computer criminals are driven by time-honoured motivations, the most obvious of which
are greed, lust, power, revenge, adventure, and the desire to taste “forbidden fruit”. The ability
to make an impact on large systems may, as an act of power, be gratifying in and of itself. The
desire to inflict loss or damage on another may also spring from revenge, as when a disgruntled
employee shuts down an employer’s computer system, or to ideology, as when one defaces the
1 There remains considerable doubt whether the words were Sutton’s, or rather those of an imaginative
journalist. See Ralph Keyes, Nice Guys Finish Seventh:False Phrases, Spurious Sayings and Familiar
Misquotations. Harper Collins New York:1993, p 16.
3
web page of an institution that one regards as abhorrent. Much activity on the electronic
frontier entails an element of adventure, the exploration of the unknown. The very fact that
some activities in cyberspace are likely to elicit official condemnation is sufficient to attract the
defiant, the rebellious, or the irresistibly curious. Given the degree of technical competence
required to commit many computer-related crimes, there is one other motivational dimension
worth noting here. This, of course, is the intellectual challenge of mastering complex systems.
None of the above motivations is new. The element of novelty resides in the unprecedented
capacity of technology to facilitate acting on these motivations.
Increasing Opportunities for Computer-Related Crime
Recent and anticipated changes in technology arising from the convergence of communications
and computing are truly breathtaking, and have already had a significant impact on many
aspects of life.
...
...