International Journal on Criminology Volume 3, Number 2, Fall 2015 | Page 91

International Journal on Criminology Ultimately, in the ambient Internet world, we hear nothing regarding crime. Sometimes we speak of the effects of crime (attacks, intrusions. . .), but never, or almost never, of flesh-and-blood criminals—who they are and where they really come from. This is a dramatic omission. For if one thing is obvious, it is the need to start out by naming that which one wishes to understand, and subsequently deal with. Thus the discreet power of nomination is a formidable one: “Naming enables us to know. . . Naming unveils. . . By virtue of exhibiting, names attest to their magisterial sovereignty over things,” 2 as Martin Heidegger said. In medicine, for example, failing to name a serious illness condemns the patient: in strategy, likewise, failing to give a precise name to a threat most often condemns the victim. Cybercrime, Cyberterrorism: The Three Big Questions Is cybercrime more dangerous than terrorism? Quite recently James Comey, director of the FBI, declared: “The threat is so dire that cyber security . . . for the second consecutive year, surpass[es] both terrorism and espionage—even the threat posed by weapons of mass destruction.” 3 Seriously? Let us understand the FBI director: he lives in a society formatted by, and intoxicated by, media hype. When speaking to the cream of Silicon Valley, any announcement that falls short of the first (digital) world war would inevitably trigger yawns of boredom. Nevertheless, the threat of cybercrime is real. Today, the digital world is like the Bank of France minus the safety deposit boxes: generally, in most cases hackers of all stripes need only help themselves. In the past year, hackers were able to gain access to the systems of an American retail giant and steal almost all the confidential personal data of seventy million payment cards (those of its entire, massive customer base)—that is, a third of all cards currently in use in the US. Recently in France we saw the hijacking of TV5Monde: for a period of hours, the wholesale capture of a huge television network, its servers and diffusion channels, its accounts on social networks, and other places—something that was, for France, as huge a “strategic shock” in the virtual world as last January’s killings (at Charlie Hebdo and Hyper-Cacher) were in the physical world. After the TV5 hijack: Is France well-protected? France lacks any mechanism for the early detection of dangers and threats. All too often, our official services react to a drama that is already underway, a crime already 3 Translator’s note: James Comey, “The FBI and the Private Sector: Closing the Gap in Cyber-Security,” address to the RSA Cyber Security Conference, February 26, 2014, accessed October 8, 2015, https:// www.fbi.gov/news/speeches/the-fbi-and-the-private-sector-closing-the-gap-in-cyber-security. 4 Translator’s note : Xavier Raufer, Cyber-criminologie (Paris: CNRS, 2015). 86