Policing Cybercrime
- LAST REVIEWED: 24 May 2018
- LAST MODIFIED: 24 May 2018
- DOI: 10.1093/obo/9780195396607-0244
- LAST REVIEWED: 24 May 2018
- LAST MODIFIED: 24 May 2018
- DOI: 10.1093/obo/9780195396607-0244
Introduction
As technology continues to become intertwined with each aspect of our lives, law enforcement at all levels will need to continue in better understanding how technology influences human behavior, including the commission of crime. Scholars and police administrators have argued over the last several decades that local law enforcement will need to assume a larger role in the investigation and prevention of cybercrime. Since official statistics on cybercrime in the United States are poor or nonexistent, and similar conclusions can be made about other countries as well for a wide variety of reasons, it is challenging to assess how the nature of cybercrime has changed over time as well as whether specific police strategies are effective. When examining the literature on the law enforcement response to cybercrime, scholars have spent much of their efforts providing broad overviews of cybercrime and how its characteristics create unique challenges for their investigation and prevention. However, more literature is moving toward the prediction or evaluation of effective policing strategies to deal with specific cybercrime types, such as the use of Internet Crimes Against Children Task Forces to more effectively deter child pornography production. In fact, the literature has grown regarding examinations of the strengths and weaknesses of how law enforcement handles specific forms of cybercrime, such as cyberbullying and cyberstalking, online economic crimes, cyberterrorism and cyberwarfare, and child pornography. Scholars have also surveyed police administrators, officers, and digital forensic examiners to get a better understanding of their perceptions of cybercrimes, the law enforcement response to it, and the impact that these types of investigations, particularly child pornography, have on investigators. In addition to examining traditional strategies to deal with cybercrime, scholars have examined other methods as well, such as online community policing and working more effectively with other entities that police cyberspace. Although much of the literature comes from the United States and European nations, cybercrime is a global problem and scholars have examined how these nations’ law enforcement agencies have responded to cybercrime as well. Finally, not all of the literature in this field is sociological in nature; there is rich information in the forms of textbooks, books, and articles discussing digital forensics from a legal and practitioner perspective.
Overall Summaries of Issues Regarding the Policing of Cybercrime
A wide range of literature exists which provides overviews of the law enforcement response to cybercrime. These include introductory cybercrime textbooks, such as Holt, et al. 2018 and Hill and Marion 2016, which focus on specific types of cybercrime but also have specific chapters dedicated to law enforcement and governmental responses. Holt, et al. 2015 and Wall and Williams 2014 are full monographs on the policing of cybercrime, which allow for a more thorough examination of the issues. Articles and book chapters on the topic include Goodman 1997, Wall 1998, and Jewkes and Yar 2008, as well as more recent examinations such as Lanier and Cooper 2016. The Police Executive Research Forum 2014 report provides a comprehensive overall view of the issues of policing cybercrime from practitioners’ perspectives, while Steinmetz and Gerber 2014 provides insights from hackers.
Goodman, M. D. 1997. Why the police don’t care about computer crime. Harvard Journal of Law and Technology 10:465–494.
An early commentary on why the police should care about computer crime and why they don’t care or have been slow to respond, such as: incongruence with why they became police officers, the challenges of policing computer crime, resources, prosecutors needing to take it more seriously, and the lack of public outcry. Commentary ends with possible steps to move forward (e.g., training). Suitable for all audiences.
Hill, J. B., and N. E. Marion. 2016. Introduction to cybercrime: Computer crimes, laws, and policing in the 21st century. Santa Barbara, CA: Praeger Security International.
Textbook that has separate chapters dedicated to the domestic and international responses to cybercrime. Suitable for all audiences.
Holt, T. J., A. M. Bossler, and K. Seigfried-Spellar. 2018. Cybercrime and digital forensics: An introduction. 2d ed. London: Routledge.
Textbook that covers different forms of cybercrime (separate chapters on each form of cybercrime), cyber legislation, and the challenges that domestic and international law enforcement have in responding to cybercrime. Contains separate chapter that focuses specifically on law enforcement challenges. Suitable for all audiences.
Holt, T. J., G. W. Burruss, and A. M. Bossler. 2015. Policing cybercrime and cyberterror. Durham, NC: Carolina Academic Press.
Provides broad overview of issues pertaining to law enforcement and cybercrime, including the roles of law enforcement, problems with cybercrime statistics, police officer perceptions of cybercrime, attitudes toward training, attitudes toward the law enforcement response to cybercrime, stress and satisfaction among cybercrime investigators, and suggested next steps for law enforcement. Includes both summary of the literature and original analyses. Suitable for all audiences.
Jewkes, Y., and M. Yar. 2008. Policing cyber crime: Emerging trends and future challenges. In Handbook of policing. Edited by T. Newburn, 580–607. Cullumpton, UK: Willan.
A chapter within an edited book that provides an overall review of some of the unique challenges and factors that cybercrime poses for law enforcement with a particular focus on child pornography. Examines trends, priorities, and challenges for the future of policing cybercrime. Suitable for all audiences.
Lanier, M. M., and A. T. Cooper. 2016. From papyrus to cyber: How technology has directed law enforcement policy and practice. Criminal Justice Studies: A Critical Journal of Crime, Law and Society 29:92–104.
Discussion of the positive and negative impacts of both traditional (non-cyber) and cyber technology on law enforcement. Appropriate for all audiences.
Police Executive Research Forum. 2014. The role of local law enforcement agencies in preventing and investigating cybercrime. Washington, DC: Police Executive Research Forum.
A report from an independent research organization which provides an overall summary of issues regarding the policing of cybercrime at the local level, including its impact, the measurement and reporting of cybercrime, perceptions of cybercrime, legislative and jurisdictional concerns, promising practices such as task forces and computer forensics labs, personnel development, network security, community education, and the use of social media for prevention and investigation. Appropriate for all audiences.
Steinmetz, K. F., and J. Gerber. 2014. “The greatest crime syndicate since the Gambinos”: A hacker critique of government, law, and law enforcement. Deviant Behavior 35:243–261.
DOI: 10.1080/01639625.2013.823344
Provides analysis of content from a hacker zine regarding the governmental and law enforcement response to hacking, providing insight on how hackers view the competency of law enforcement. Appropriate for all audiences.
Wall, D. S. 1998. Catching cybercriminals: Policing the Internet. International Review of Law, Computers & Technology 12:201–218.
An earlier examination of the significance of cybercrime, law enforcement strategies to police the Internet, and the appropriateness of terrestrial forms of policing to virtual crimes. Appropriate for all audiences.
Wall, D. S., and M. L. Williams, eds. 2014. Policing cybercrime: Networked and social media technologies and the challenge for policing. London: Routledge.
An edited book that contains chapters which examine how both the specialization of cybercrime offending, where individuals commit complex forms of cybercrime, as well as nonspecialists create unique challenges for law enforcement to address. Appropriate for all audiences.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Active Offender Research
- Actus Reus
- Adler, Freda
- Adversarial System of Justice
- Adverse Childhood Experiences
- Aging Prison Population, The
- Airport and Airline Security
- Alcohol and Drug Prohibition
- Alcohol Use, Policy and Crime
- Alt-Right Gangs and White Power Youth Groups
- Animals, Crimes Against
- Anomie
- Arson
- Art Crime
- Back-End Sentencing and Parole Revocation
- Bail and Pretrial Detention
- Batterer Intervention Programs
- Bentham, Jeremy
- Big Data and Communities and Crime
- Biosocial Criminology
- Blackmail
- Black's Theory of Law and Social Control
- Blumstein, Alfred
- Boot Camps and Shock Incarceration Programs
- Burglary, Residential
- Bystander Intervention
- Capital Punishment
- Chambliss, William
- Chicago School of Criminology, The
- Child Maltreatment
- Chinese Triad Society
- Civil Protection Orders
- Collateral Consequences of Felony Conviction and Imprisonm...
- Collective Efficacy
- Commercial and Bank Robbery
- Commercial Sexual Exploitation of Children
- Communicating Scientific Findings in the Courtroom
- Community Change and Crime
- Community Corrections
- Community Disadvantage and Crime
- Community-Based Justice Systems
- Community-Based Substance Use Prevention
- Comparative Criminal Justice Systems
- CompStat Models of Police Performance Management
- Confessions, False and Coerced
- Conservation Criminology
- Consumer Fraud
- Contextual Analysis of Crime
- Control Balance Theory
- Convict Criminology
- Co-Offending and the Role of Accomplices
- Corporate Crime
- Costs of Crime and Justice
- Courts, Drug
- Courts, Juvenile
- Courts, Mental Health
- Courts, Problem-Solving
- Crime and Justice in Latin America
- Crime, Campus
- Crime Control Policy
- Crime Control, Politics of
- Crime, (In)Security, and Islam
- Crime Prevention, Delinquency and
- Crime Prevention, Situational
- Crime Prevention, Voluntary Organizations and
- Crime Trends
- Crime Victims' Rights Movement
- Criminal Career Research
- Criminal Decision Making, Emotions in
- Criminal Justice Data Sources
- Criminal Justice Ethics
- Criminal Justice Fines and Fees
- Criminal Justice Reform, Politics of
- Criminal Justice System, Discretion in the
- Criminal Records
- Criminal Retaliation
- Criminal Talk
- Criminology and Political Science
- Criminology of Genocide, The
- Critical Criminology
- Cross-National Crime
- Cross-Sectional Research Designs in Criminology and Crimin...
- Cultural Criminology
- Cultural Theories
- Cybercrime
- Cybercrime Investigations and Prosecutions
- Cycle of Violence
- Day Fines
- Deadly Force
- Defense Counsel
- Defining "Success" in Corrections and Reentry
- Desistance
- Deterrence
- Developmental and Life-Course Criminology
- Digital Piracy
- Driving and Traffic Offenses
- Drug Control
- Drug Trafficking, International
- Drugs and Crime
- Elder Abuse
- Electronically Monitored Home Confinement
- Employee Theft
- Environmental Crime and Justice
- Experimental Criminology
- Extortion
- Family Violence
- Fear of Crime and Perceived Risk
- Felon Disenfranchisement
- Femicide
- Feminist Theories
- Feminist Victimization Theories
- Fencing and Stolen Goods Markets
- Firearms and Violence
- Forensic Science
- For-Profit Private Prisons and the Criminal Justice–Indust...
- Fraud
- Gambling
- Gangs, Peers, and Co-offending
- Gender and Crime
- Gendered Crime Pathways
- General Opportunity Victimization Theories
- Genetics, Environment, and Crime
- Green Criminology
- Halfway Houses
- Harm Reduction and Risky Behaviors
- Hate Crime
- Hate Crime Legislation
- Healthcare Fraud
- Hirschi, Travis
- History of Crime in the United Kingdom
- History of Criminology
- Homelessness and Crime
- Homicide
- Homicide Victimization
- Honor Cultures and Violence
- Hot Spots Policing
- Human Rights
- Human Trafficking
- Identity Theft
- Immigration, Crime, and Justice
- Incarceration, Mass
- Incarceration, Public Health Effects of
- Income Tax Evasion
- Indigenous Criminology
- Institutional Anomie Theory
- Integrated Theory
- Intermediate Sanctions
- Interpersonal Violence, Historical Patterns of
- Interrogation
- Intimate Partner Violence, Criminological Perspectives on
- Intimate Partner Violence, Police Responses to
- Investigation, Criminal
- Juvenile Delinquency
- Juvenile Justice System, The
- Juvenile Waivers
- Kidnapping
- Kornhauser, Ruth Rosner
- Labeling Theory
- Labor Markets and Crime
- Land Use and Crime
- Lead and Crime
- Legitimacy
- LGBTQ Intimate Partner Violence
- LGBTQ People in Prison
- Life Without Parole Sentencing
- Local Institutions and Neighborhood Crime
- Lombroso, Cesare
- Longitudinal Research in Criminology
- Mandatory Minimum Sentencing
- Mapping and Spatial Analysis of Crime, The
- Mass Media, Crime, and Justice
- Measuring Crime
- Mediation and Dispute Resolution Programs
- Mental Health and Crime
- Merton, Robert K.
- Meta-analysis in Criminology
- Middle-Class Crime and Criminality
- Migrant Detention and Incarceration
- Mixed Methods Research in Criminology
- Money Laundering
- Motor Vehicle Theft
- Multi-Level Marketing Scams
- Murder, Serial
- Narrative Criminology
- National Deviancy Symposia, The
- Nature Versus Nurture
- Neighborhood Disorder
- Neutralization Theory
- New Penology, The
- Offender Decision-Making and Motivation
- Offense Specialization/Expertise
- Organized Crime
- Outlaw Motorcycle Clubs
- Panel Methods in Criminology
- Peacemaking Criminology
- Peer Networks and Delinquency
- Perceptions of Youth, Juvenile Justice Professionals'
- Performance Measurement and Accountability Systems
- Personality and Trait Theories of Crime
- Persons with a Mental Illness, Police Encounters with
- Phenomenological Theories of Crime
- Plea Bargaining
- Poaching
- Police Administration
- Police Cooperation, International
- Police Discretion
- Police Effectiveness
- Police History
- Police Militarization
- Police Misconduct
- Police, Race and the
- Police Use of Force
- Police, Violence against the
- Policing and Law Enforcement
- Policing, Body-Worn Cameras and
- Policing, Broken Windows
- Policing, Community and Problem-Oriented
- Policing Cybercrime
- Policing, Evidence-Based
- Policing, Intelligence-Led
- Policing, Privatization of
- Policing, Proactive
- Policing, School
- Policing, Stop-and-Frisk
- Policing, Third Party
- Polyvictimization
- Positivist Criminology
- Pretrial Detention, Alternatives to
- Pretrial Diversion
- Prison Administration
- Prison Classification
- Prison, Disciplinary Segregation in
- Prison Education Exchange Programs
- Prison Gangs and Subculture
- Prison History
- Prison Labor
- Prison Visitation
- Prisoner Reentry
- Prisons and Jails
- Prisons, HIV in
- Private Security
- Probation Revocation
- Procedural Justice
- Property Crime
- Prosecution and Courts
- Prostitution
- Psychiatry, Psychology, and Crime: Historical and Current ...
- Psychology and Crime
- Public Criminology
- Public Opinion, Crime and Justice
- Public Order Crimes
- Public Social Control and Neighborhood Crime
- Punishment Justification and Goals
- Qualitative Methods in Criminology
- Queer Criminology
- Race and Sentencing Research Advancements
- Race, Ethnicity, Crime, and Justice
- Racial Threat Hypothesis
- Racial Profiling
- Rape and Sexual Assault
- Rape, Fear of
- Rational Choice Theories
- Rehabilitation
- Religion and Crime
- Restorative Justice
- Risk Assessment
- Routine Activity Theories
- School Bullying
- School Crime and Violence
- School Safety, Security, and Discipline
- Search Warrants
- Seasonality and Crime
- Self-Control, The General Theory:
- Self-Report Crime Surveys
- Sentencing Enhancements
- Sentencing, Evidence-Based
- Sentencing Guidelines
- Sentencing Policy
- Sex Crimes
- Sex Offender Policies and Legislation
- Sex Trafficking
- Sexual Revictimization
- Situational Action Theory
- Snitching and Use of Criminal Informants
- Social and Intellectual Context of Criminology, The
- Social Construction of Crime, The
- Social Control of Tobacco Use
- Social Control Theory
- Social Disorganization
- Social Ecology of Crime
- Social Learning Theory
- Social Networks
- Social Threat and Social Control
- Solitary Confinement
- South Africa, Crime and Justice in
- Sport Mega-Events Security
- Stalking and Harassment
- State Crime
- State Dependence and Population Heterogeneity in Theories ...
- Strain Theories
- Street Code
- Street Robbery
- Substance Use and Abuse
- Surveillance, Public and Private
- Sutherland, Edwin H.
- Technology and the Criminal Justice System
- Technology, Criminal Use of
- Terrorism
- Terrorism and Hate Crime
- Terrorism, Criminological Explanations for
- Testimony, Eyewitness
- Therapeutic Jurisprudence
- Trajectory Methods in Criminology
- Transnational Crime
- Truth-In-Sentencing
- Urban Politics and Crime
- US War on Terrorism, Legal Perspectives on the
- Victim Impact Statements
- Victimization, Adolescent
- Victimization, Biosocial Theories of
- Victimization Patterns and Trends
- Victimization, Repeat
- Victimization, Vicarious and Related Forms of Secondary Tr...
- Victimless Crime
- Victim-Offender Overlap, The
- Violence Against Women
- Violence, Youth
- Violent Crime
- White-Collar Crime
- White-Collar Crime, The Global Financial Crisis and
- White-Collar Crime, Women and
- Wilson, James Q.
- Wolfgang, Marvin
- Women, Girls, and Reentry
- Wrongful Conviction