International Journal on Criminology Volume 3, Number 2, Fall 2015 | Page 90
Confronting Cybercrime through Criminology
• Treatment 1: What the cyberworld needs is a highway code—just as the society
of the automobile, in its time, gave rise to its own. This code must be developed
and enforced by a coalition of powerful nations, in the reasonable hope that it will
be enforced worldwide. Another possible image for this indispensable normative
superstructure would be that of the control tower.
• Treatment 2: The Highway Code applies to every vehicle, be it a luxury model or a
more modest car. Similarly, only a code of the cyberworld would effectively penalize
the predators, financial raiders, giants of the net, and others who plunder it with
impunity and exploit its users.
An Agile Worldwide Digital Infrastructure? No, a Fragile One.
Today, the global system of automated data-processing constitutes a worldwide
superstructure. Cyberspace represents a new continent, a new world. And
these new information and communication technologies (ICT) alter the way
in which populations think, believe, behave, and learn.
This applies to the whole population: honest folk, but also wrongdoers. Now, as always,
when humans conquer a new area, it is not long before we see theft, fraud, crime,
propagandist activities, fakery, and lies, among other forms of deviance from social
norms. Cybercrime does indeed exist, and therefore cybercriminals also: in 2013,
Interpol found that, on a global scale, more than 80 percent of online criminality can
be attributed to transnational criminal groups. Today, this cybercrime is the Holy
Grail for every felon. Consider the following:
• A total dissociation of time and distance, offering the ability to
commit a crime at a distance of 10,000 kilometers (cyber-theft).
•Youth that are hypnotized, easy to dupe and infiltrate, in so far as
they see “the world as a set of applications, and their own world as
a series of applications—sometimes even as one single application,
extending from cradle to grave.”
• Cybercriminal masterminds, gang chiefs, or network bosses with
almost guaranteed impunity—today only peripheral stooges are
arrested.
• Limited costs for considerable gains.
•A simple methodology, exploiting two fundamental factors: human
weakness (such as naivety) and technical vulnerabilities (such as flaws
open to exploits)
85