Abstract
The 1980s and 1990s has witnessed the development of an exciting new domain which, warts and all, is potentially free of conventional politics, social order and social regulation. Never before has there been so much ready access to such a broad range of human knowledge and experience. However this ‘cyberspace’, which has been created by the Internet,2 is not without its contradictions. The optimism arising from its potential to democratize access to hitherto restricted knowledge and thus level out some of the social boundaries that have developed both within and across societies is tempered by the nature of this revolutionary new resource. In addition to the considerable benefits that the Internet creates, there are also many opportunities for new types of offending and new forms of anti-social behaviour. Moreover, cyberspace undermines economic, social and political boundaries, posing a considerable threat to traditional forms of governance and creating a challenge to traditional understandings of order.
The following discussion focuses primarily upon policing in the United Kingdom, but draws upon the experiences of the United States and other jurisdictions where appropriate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akdeniz, Y. (1996a) ‘Computer pornography: a comparative study of US and UK obscenity laws and child pornography laws in relation to the internet’, International Review of Law, Computers and Technology, vol. 10, no. 2, pp. 235–61.
Akdeniz, Y. (1996b) ‘Section 3 of the Computer Misuse Act 1990: An antidote for computer viruses’, Web Journal of Contemporary Legal Issues, vol. 3,
Arthur, C. (1996) ‘New crackdown on child porn on the internet’, The Independent, 23 September.
Barlow, J. P. (1990) ‘Crime and puzzlement: in advance of the law on the electronic frontier’, Whole Earth Review, Fall, p. 44.
Barlow, J. P. (1994) ‘The economy of ideas: a framework for rethinking patents and copyrights in the digital age (Everything you know about intellectual property is wrong)’, Wired, vol. 2, no. 3, p. 84.
Battcock, R. (1995) ‘Computer Misuse Act 5 years on’ [http://www.strath.ac.uk/Departments/Law/student/PERSONAL/R_BATTCOCK/].
Bauman, Z. (1992) Intimations of Post-Modernity (London: Routledge).
Benedikt, M. (ed.) (1991) Cyberspace: The First Steps (Cambridge, Mass.: MIT Press).
Blakey, D. (1996) ‘Policing cyberspace’, Policing Today, vol. 2, no. 1, pp. 19–21.
Braithwaite, J. (1992) Crime, Shame and Reintegration (Cambridge, Cambridge University Press).
Braverman. H. (1976) Labour and Monopoly Capital (New York: Monthly Review Press).
Burrell, I. (1996) ‘Leak reveals contempt for British FBI’, The Independent, 11 October, p. 1.
Byassee, W. S. (1995) ‘Jurisdiction of Cyberspace: applying real world precedent to the virtual community’, Wake Forest Law Review, vol. 30, pp. 197–220.
Caden, M. L. and Lucas, S. E. (1996) ‘Accidents on the Information Superhighway: on-line liability and regulation’, Richmond Journal of Law & Technology, vol. 2, no. 1.
Chandler, A. (1996) ‘The changing definition and image of hackers in popular discourse’, International Journal of the Sociology of Law, vol. 24, pp. 229–51.
Charlesworth, A. (1995) ‘Between flesh and sand: rethinking the Computer Misuse Act 1990’, International Year book of Law, Computers and Technology (Oxford: Carfax Publishing) vol. 9, pp. 31–46.
Cohen, S. (1980) Folk Devils and Moral Panics (Oxford: Basil Blackwell).
Critchley, T. A. (1967) A History of the Police in England and Wales 1900–1966 (London: Constable).
DTI (1992) Dealing with Computer Misuse (London: HMSO).
Duff, L. and Gardiner, S. (1996) ‘Computer crime in the global village: strategies for control and regulation — in defence of the hacker’, International Journal of the Sociology of Law, vol. 24, pp. 211–28.
Elmer-Dewitt, P. (1994) ‘Battle for the soul of the Internet’, Time, 25 July, pp. 50, 52.
Escobar, A. (1996) ‘Welcome to Cyberia: Notes on the anthropology of cyberculture’, in Z. Saradar and J. R. Ravetz (eds), Cyberfutures: Culture and Politics on the Information Superhighway (London: Pluto Press).
European Commission Select Committee (1996) Green Paper on the Protection of Minors and Human Dignity in Audio-Visual and Information Services (Brussels—Luxembourg).
Evans, J. (1994) ‘Cruising the Internet: what’s in it for lawyers?’, Cal. Lawyer, July, p. 67.
Fraser, B. T. (1996) ‘Computer Crime Research Resources’, School of Library and Information Studies, Florida State University [http://mailer.fsu.edu/~btf1553/ccrr/search1.htm].
Gash, N. (1961) Mr Secretary Peel (London: Longman).
Gibson, W. (1984) Neuromancer (London: HarperCollins).
Giddens, A. (1990) The Consequences of Modernity (London: Polity Press).
Gottfredson, G. and Hischi, T. (1990) A General Theory of Crime (Stanford California: Stanford University Press).
Grossman, W. (1996) ‘A grip on the new’, Electronic Telegraph, 1 October, no. 496.
Hafner, K. and Markoff, J. (1995) Cyberpunk: Outlaws and Hackers on the Computer Frontier (New York: Simon & Schuster).
The Herald (1996) ‘Inquiry into pornography on Tory students’ Internet page’, The (Glasgow) Herald, 19 August, p. 6.
Hermer, J. and Hunt, A. (1996) ‘Official graffiti of the everyday’, Law and Society Review, vol. 30, no. 3, pp. 455–80.
Itzen, C. (ed.) (1993) Pornography: Women, Violence and Civil Liberties (Oxford: Oxford University Press).
Johnson, D. and Post, D. G. (1996) ‘Law and borders: the rise of law in cyberspace’ [http://www.law.syr.edu/Course.Materials/Chon/borders.html].
Kumar, K. (1978) Prophecy and Progress: The Sociology of Post-Industrial Society (Harmondsworth: Penguin).
Lloyd, I. (1994) ‘Shopping in Cyberspace’, International Journal of Law and Information Technology, vol. 1, no. 3, pp. 335–48.
Mandel, T. F. (1993) Surfing the Wild Internet, SCAN; Business Intelligence Program, SRI International, Menlo Park, No. 2109, March.
Manning, P. K. (1977) Police Work (Cambridge, Mass.: MIT Press).
McBarnet, D. (1979) ‘Arrest: the legal context of policing’, in S. Holdaway (ed.), The British Police (London: Arnold).
McCormack, N. (1996b) ‘Criminals slip through the net’, Electronic Telegraph, 5 November, p. 3.
National Computing Centre. (1996) The Information Security Breaches Survey 1996 (The National Computing Centre Limited).
National Heritage Committee (1996) The Structure and Remit of the Department of National Heritage (London: HMSO).
Post, D. (1995) ‘Encryption vs. the alligator clip: the feds worry that encoded messages are immune to wiretaps’, New Jersey Law Journal, 23 January, p. 8.
Pretzlik, C. (1996) ‘Firm accused of fraud on the Internet’, Daily Telegraph, 9 November.
Reiner, R. (1992) The Politics of the Police (Sussex: Wheatsheaf).
Reno, J. Hon (1996) ‘Law enforcement in cyberspace’, address to the Commonwealth Club of California, San Francisco Hilton Hotel, 14 June [http://pwp.usa.pipeline.com/~jya/addres.txt].
Rheingold, H. (1993) The Virtual Community: Homesteading the Electronic Frontier (London: Secker & Warburg).
Rimm, M. (1995) ‘Marketing pornography on the information superhighway: a survey of 917,410 images, descriptions, short stories, and animations downloaded 8.5 million times by consumers in over 2000 cities in forty countries, provinces, and territories’, Georgetown Law Journal, vol. 83, no. 5, pp. 1849–1934.
Rose, P. (1995) ‘Internet police crack child porn network’, Daily Mail, 27 July, p. 16.
Ross, A. (1990) ‘Hacking away at the counterculture’, Postmodern Culture, vol. 1, no. 1: [http://jefferson.village.virginia.edu/pmc/issue.990%ontents.990.htmI].
Sacks, H. (1972) ‘Notes on police assessment of moral character’, in D. Sudnow (ed.), Studies in Social Interaction (New York: Free Press).
Saradar, Z. and Ravetz, J. R. (1996) ‘Reaping the technological whirlwind’, in Z. Saradar and J. R. Ravetz (eds), Cyberfutures: Culture and Politics on the Information Superhighway (London: Pluto Press).
Savage, S. P., Charman, S. and Cope, S. (1996) ‘Police governance: the Association of Chief Police Officers and constitutional change’, Public Policy and Administration, vol. 11, no. 2, pp. 92–106.
Schlozberg, S. (1983) Computers and Penal Legislation (Oslo: Norwegian Research Centre for Computers and Law).
Select Committee on Science and Technology (1996) Information Society: Agenda for Action in the UK, Fifth Report, Select Committee on Science and Technology, H. L. 1995–1996.
Shearing, C. (1995) ‘Transforming the culture of policing: thoughts from South Africa’, in D. Dixon (ed.), Crime, Criminology and Public Policy, Special Supplementary Issue of the Australian and New Zealand Journal of Criminology (Sydney: Butterworths).
Shearing, C. and Ericson, R. (1991) ‘Culture as figurative action’, British Journal of Sociology, vol. 42, no. 4, pp. 481–506.
Standage, T. (1996) ‘Web access in a tangle as censors have their say’, Electronic Telegraph, 10 September, no. 475.
Steele, J. (1996) ‘Howard denies the national police squad will be like FBI’, Electronic Telegraph, 3 July, no. 419.
Sterling, B. (1994) The Hacker Crackdown (London: Penguin Books).
Sterling, B. (1995) ‘Good cop, bad hacker’, speech to the High Technology Crime Investigation Association, Wired, vol. 3, no. 5, p. 122.
Sussman, V. (1995) ‘Policing Cyberspace’, U.S. News 38; World Rep., Jan. 23, 1995, at 54, Lexis, News library, Usenews file, 1995 WL 3113171.
Szafranski, Col. R. (1995) ‘A theory of Information Warfare: preparing for 2020,’ Air Chronicles, vol. 1, pp. 56–65 [http://www.cdsar.af.mil/apj/szfran.html].
Tendler, S. (1996a) ‘Hi-tech cheats use supermarket cards to fake credit sales’, The Times, 26 June, p. 6.
Tendler, S. (1996b) ‘Public to help police curb internet porn’, The Times, 2 December.
Tribe, L. H. (1991) ‘The constitution in cyberspace: law and liberty beyond the electronic frontier’, The Humanist, 26 March, p. 15.
Uhlig, R. (1996a) ‘Hunt is on for Internet dealer in child porn’, Electronic Telegraph, 23 October, no. 518.
Uhlig, R. (1996b) ‘Minister’s warning over Internet porn’, Electronic Telegraph, 16 August.
Uhlig, R. (1996c) ‘“Safety Net” on Internet will catch child porn’, Electronic Telegraph, 23 September, no. 488.
Uhlig, R. (1996d) ‘Hackers sabotage Blair internet page’, Electronic Telegraph, 10 December, no. 566.
United Nations (1995), International Review of Criminal Policy No. 43 and 44 — United Nations Manual on the Prevention and Control of Computer-Related Crime [http://www.ifs.univie.ac.at/~pr2gql/rev4344.htm1#crime].
Wall, D. S. (1995) ‘Technology and crime: increased capital investment in information technology and changes in victimisation patterns’, International Yearbook of Law, Computers and Technology, vol. 9, pp. 97–109.
Wall, D. S. (1996) ‘Reconstructing the soul of Elvis: the social development and legal maintenance of Elvis Presley as intellectual property’, International Journal of the Sociology of Law, vol. 24, pp. 117–43.
Wall, D. S. and Johnstone, J. (1997) ‘The industrialization of law: the impact of information technology upon the legal practice’, International Journal of the Sociology of Law, vol. 27.
Wasik, M. (1991) Crime and the Computer (Oxford: Clarendon Press).
Young, J. (1974) ‘Deviance amplification’, in S. Cohen (ed.), Images of Deviance (Harmonsdworth: Penguin).
Young, L. F. (1995) ‘United States computer crime laws, criminals and deterrence’, International Yearbook of Law, Computers and Technology, vol. 9, pp. 1–16.
Editor information
Editors and Affiliations
Copyright information
© 1997 Palgrave Macmillan, a division of Macmillan Publishers Limited
About this chapter
Cite this chapter
Wall, D. (1997). Policing the Virtual Community: The Internet, Cyberspace and Cyber-Crime. In: Francis, P., Davies, P., Jupp, V. (eds) Policing Futures. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-25980-9_9
Download citation
DOI: https://doi.org/10.1007/978-1-349-25980-9_9
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-0-333-68966-0
Online ISBN: 978-1-349-25980-9
eBook Packages: Palgrave Social & Cultural Studies CollectionSocial Sciences (R0)