Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet8/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   4   5   6   7   8   9   10   11   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

2
CHAPTER 1
Cyberspace: The new frontier for policing?
According to the UK’s 2011 Cyber Security Strategy, at the time of its publication 
2 billion people were online and there were over 5 billion Internet-connected devices 
in existence. During that same year, the number of people being proceeded against 
for offences under the Computer Misuse Act 1991 in England and Wales, accord-
ing to a document from the Ministry of Justice, was nine (
Canham, 2012
) with no 
people being proceeded against for the two offences under s.1(1) and s.1(3). Perhaps 
as surprisingly, the records from the Police National Legal Database (PNLD) used 
by all police forces in England and Wales for offence wordings, charging codes, and 
legal research show that during two weeks (chosen at random) in 2013 the Computer 
Misuse Act 1990 and its constituent parts were accessed as follows:
Between 4th and 10th March—907 times
Between 10th and 16th November—750 times
Reconciling these two data sets is difficult. While it is clear from the PNLD access 
data that law enforcement officials in England and Wales are still interrogating the 
1990 legislation frequently (on average, around 825 times per week or 118 times 
per day or annually 42,900 times), the number of prosecutions for the correlative of-
fences is vanishingly small. One of the many challenges with cybercrime and cyber-
enabled criminality is establishing its size and shape.
THE SHAPE OF THE CHALLENGE
Just as the shape of our technology has changed beyond all recognition since 1990, 
so too has the shape of the challenge. The almost unconstrained development of 
Internet-based connectivity can be seen, on one hand, as a phenomenological eman-
cipation of the masses, an extension of the Civil Data Movement and the citizens’ 
entitlement to publicly held data (see (
Sampson and Kinnear, 2010
). On the other 
hand, the empowerment it has given others (particularly sovereign states) to abuse 
cyberspace has been cast as representing the “end of privacy” prompting a petition to 
the United Nations for a “bill of digital rights.”
Steering a predictably middle course, the UK strategy sets out the key—and, it is 
submitted, most elusive—concept within the document: that of a “vibrant, resilient, 
and secure cyberspace.” The aspiration must surely be right but how can resilience 
and security be achieved within a vibrant space run by computers? In terms of both 
computers and our reliance upon them, we have moved so far from the original no-
tion of boxes, functions, commands and programs, along with the consequences that 
can be brought about by their use, that a fundamental re-think is needed.
So what—and where—is cyberspace? Much has been written recently on the 
threat, risk and harm posed by “cybercrime,” “e-crime,” “cyber-enabled” criminality 
but the legislation has been left a long way behind. The EU has a substantial num-
ber of workstreams around its “Cybersecurity Strategy” and its own working defini-
tion of “cyberspace” though its own proposed Directive has no legal definition but 
rather one for Network and Information Security to match the agency established in 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish