Abstract
Societies today are well-entrenched in the digital age and dependent upon its features such as the rapid real-time flow of unstructured data, the streams of visual images generated by users of social networks, the information produced by commuters on their way to work and the flood of data from hundreds of sensors in our transportation hubs. However, there is a significant downside of this revolution: the willingness and aptitude of those who share our cyberspace to engage in criminality. There is a real chance that those who are charged with the responsibility of policing cybercrime will get left behind. This gives rise to a number of questions. How best can the new cybercrime landscape be monitored, especially post-pandemic? How best can it be policed? What role can and should the private sector play? This chapter addresses these and other questions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Australian Competition and Consumer Commission (ACCC). 2022. ‘Scams robbed Australians of more than $2 billion last year’, Canberra: Australian Competition and Consumer Commission, https://www.accc.gov.au/media-release/scams-robbed-australians-of-more-than-2-billion-last-year. Accessed 4 July 2022.
Australian Communications and Media Authority (ACMA). 2022. ‘New Rules to Fight SMS Scams’, Australian Communications and Media Authority, https://www.acma.gov.au. Accessed 12 July 2022.
Australian Cyber Security Magazine (ACSM). 2022. Australian Government to Increase Data Breach Penalties, Australian Cyber Security Magazine, 24 October. https://australiancybersecuritymagazine.com.au/australian-government-to-increase-data-breach-penalties/ Accessed 17 January 2023.
Australian Crime Commission (ACC). 2015. Organized crime in Australia report. Canberra: Commonwealth of Australia.
Australian Cyber Security Centre. 2017. Australian Cyber Security Centre 2017 Threat Report. https://www.acsc.gov.au/publications/ACSC_Threat_Report_2017.pdf Accessed 20 February 2019.
Australian Government. 2018. New Australian Government Data Sharing and Release Legislation, Issues Paper for Consultation. Canberra: Department of Prime Minister and Cabinet.
Australian Government. 2016. Australia’s Cyber Security Strategy. https://www.pmc.gov.au/sites/default/files/publications/australias-cyber-security-strategy.pdf. Accessed: 20 February 2019.
Australian Parliament. 2017. Review of the implementation period of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2014, 13 April. Canberra: Joint Parliamentary Committee on Intelligence and Security.
Branch, Phillip. 2014. ‘Surveillance by metadata’. Issues 109 (December): 10–13.
Broadhurst, Roderic and Chang, Lennon Yao-Chung. 2013. ‘Cybercrime in Asia: Trends and challenges’ in Handbook of Asian Criminology Liu, Jianhong, Hebenton, Bill and Jou, Susyan (eds.), 49–63. New York: Springer.
Chang, Lennon Yao-Chung. 2012. Cybercrime in the Greater China Region: Regulatory Responses, and Crime Prevention Across the Taiwan Strait Cheltenham: Edward Elgar Publishing.
Cross, Cassandra. 2020. ‘“Oh we can't actually do anything about that”: The problematic nature of jurisdiction for online fraud victims’ Criminology and Criminal Justice, 20(3), 358-375.
Cross, Cassandra, Holt, Karen and O’Malley, Roberta Liggett. 2022. ‘“If U Don’t Pay they will Share the Pics”: Exploring Sextortion in the Context of Romance Fraud’, Victims & Offenders: An International Journal of Evidence-based Research, Policy, and Practice. https://doi.org/10.1080/15564886.2022.2075064 Accessed 23 September 2022.
Davis, Nicholas and Subic, Aleksandar. 2018. ‘Hope and fear surround emerging technologies, but all of us must contribute to stronger governance’, The Conversation, 18 May. https://theconversation.com/hope-and-fear-surround-emerging-technologies-but-all-of-us-must-contribute-to-stronger-governance-96122. Accessed 1 February 2019.
Economist. 2017. ‘Data is the new oil’ The Economist, 6 May. https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data Accessed 17 January 2023.
Falk, Rachael and Brown, Anne-Louise. 2022. ‘Exfiltrate, encrypt, extort: The global rise of ransomware and Australian’s policy options’, Journal of the Australasian Institute of Policing 14(2) 29-37.
Fernandes, Clinton and Sivaraman, Vijay. 2015. It’s only the beginning: Metadata retention laws and the internet of things Australian Journal of Telecommunications and the Digital Economy, 3(3). http://telsoc.org/ajtde/index.php/ajtde/article/view/21. Accessed 1 February 2019.
Flannery, Angela. 2019. Public Sector Data: The Proposed Data Sharing and Release Act and implications for governments. http://www.mondaq.com/article.asp?article_id=772966&signup=true. Accessed 1 February 2019.
Gal, Un. 2017. ‘The new data retention law seriously invades our privacy—and it’s time we took action’, The Conversation 16 June. https://theconversation.com/the-new-data-retention-law-seriously-invades-our-privacy-and-its-time-we-took-action-78991?sa=pg2&sq=metadata&sr=1 Accessed 1 February 2019.
Gordon, Sarah and Ford, Richard. 2006. ‘On the definition and classification of cybercrime’, Journal of Computer Virology, 2, 13–20.
Grabosky, Peter. 2007. Electronic Crime. New Jersey: Prentice Hall.
Grattan, Michelle. 2015. ‘$131 million for companies’ metadata retention in budget boost to counter terrorism’, The Conversation 12 May, https://theconversation.com/131-million-for-companies-metadata-retention-in-budget-boost-to-counter-terrorism-41637. Accessed 1 February 2019.
Holt, Thomas J. 2018. ‘Regulating cybercrime through law enforcement and industry mechanisms’, The Annals of the American Academy of Political and Social Science 679 (1), 140-157.
Joseph, Sarah. 2018. ‘Why the business model of social media giants like Facebook is incompatible with human rights’ The Conversation. 3 April. https://theconversation.com/why-the-business-model-of-social-media-giants-like-facebook-is-incompatible-with-human-rights-94016. Accessed 1 February 2019.
Kantor, Susan and Kallenbach, Paul. 2021. ‘How might the new Identify and Disrupt laws impact you?’ https://www.minterellison.com/articles/how-might-the-new-identify-and-disrupt-laws-impact-you. Accessed 1 July 2022.
Karp, Paul. 2021. ‘Australian powers to spy on cybercrime suspects given green light’ The Guardian, 25 August 2021.
Kowalick, Phil, Connery, David and Sarre, Rick. 2018. ‘Intelligence-sharing in the context of policing transnational serious and organized crime: a note on policy and practice in an Australian setting’ Police Practice and Research: An International Journal 19(6), 596-608.
Ludlam, Scott. 2015. ‘Data retention: We need this opposition to oppose’ ABC The Drum, 27 February http://www.abc.net.au/news/2015-02-27/ludlam-we-need-this-opposition-to-oppose/6269504 Accessed 1 February 2019.
Manokha, Ivan. 2018. ‘Cambridge Analytica’s closure is a pyrrhic victory for data privacy’ The Conversation, 3 May. https://theconversation.com/cambridge-analyticas-closure-is-a-pyrrhic-victory-for-data-privacy-96034 Accessed 1 February 2019.
McGuire, Mike and Dowling, Samantha. 2013. Cybercrime: A review of the evidence: Summary of key findings and implications. Home Office Research Report 75. London: Home Office, October.
MinterEllison. 2022. Perspectives on Cyber Risk, https://www.minterellison.com/articles/perspectives-on-cyber-risk-new-threats-and-challenges-in-2022 Accessed 1 July 2022.
O’Malley, Pat. 2009. ‘Responsibilisation,’ in Wakefield, Alison and Fleming, Jenny (eds), Sage Dictionary of Policing, 277–279, London: Sage Publications.
Perkins, Roberta C. and Howell, C. Jordan. 2021. ‘Honeypots for Cybercrime Research’ in Lavorgna, Anita and Holt, Thomas J. (eds.), Researching Cybercrimes, 233–261, Geneva: Springer Nature.
Perlroth, Nicole. 2021. This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, London: Bloomsbury.
Prenzler, Tim and Sarre, Rick. 2022. ‘Facilitating Best Practice in Security: The Role of Regulation’ in Gill, M (ed.), Handbook of Security, 777–799, Houndmills: Palgrave-Macmillan.
Prenzler, Tim and Sarre, Rick. 2017. ‘The Security Industry and Crime Prevention’, in Prenzler, T. (ed) Understanding Crime Prevention: The Case Study Approach, 165–181, Samford Valley, Queensland: Australian Academic Press.
Prenzler, Tim and Sarre, Rick. 2012. ‘Public-Private Crime Prevention Partnerships’ in Prenzler, T. (ed). Policing and Security in Practice: Challenges and Achievements, 149–167, Basingstoke, Hampshire: Palgrave Macmillan.
Rodrick, Sharon. 2009. ‘Accessing telecommunications data for national security and law enforcement purposes’ Federal Law Review 37(3): 375-415.
Sarre, Rick. 2022. ‘Policing Cybercrime: Is There a Role for the Private Sector?’ in Eterno, John A., Stickle, Ben, Peterson, Diana S. and Das, Dilip K. (eds.) Police Behavior, Hiring and Crime Fighting, 217–227, New York, NY: Routledge.
Sarre, Rick. 2020. ‘Facial recognition technology is expanding rapidly across Australia. Are our laws kee** pace?’ The Conversation, 10 July 2020. https://theconversation.com/facial-recognition-technology-is-expanding-rapidly-across-australia-are-our-laws-kee**-pace-141357. Accessed 1 March 2020.
Sarre, Rick. 2018. ‘Revisiting metadata retention in light of the government’s push for new powers’ The Conversation, 8 June 2018. https://theconversation.com/revisiting-metadata-retention-in-light-of-the-governments-push-for-new-powers-97931 Accessed 1 March 2020.
Sarre, Rick. 2017a. ‘Metadata retention as a means of combatting terrorism and organized crime: a perspective from Australia’ Asian Journal of Criminology 12: 167-79.
Sarre, Rick. 2017b. ‘The Surveillance Society: A Criminological Perspective’ in Viano, Emilio C. (ed.) Cybercrime, Organized Crime, and Societal Responses: International Approaches, 291–300, New York City: Springer.
Sarre, Rick. 2015. ‘Eyes in the Sky’, Drone Magazine, Issue 1, 48-51.
Sarre, Rick. 2014a. ‘The Use of Surveillance Technologies by Law Enforcement Agencies: What are the Trends, Opportunities and Threats?’ in Pływaczewski, Emil W. (ed.), Current Problems of the Penal Law and Criminology, 755–767, Białystok, Poland: Temida Publishing House.
Sarre, Rick. 2014b. ‘National security gags on media force us to trust state will do no wrong’, The Conversation, 26 September 2014b. https://theconversation.com/national-security-gags-on-media-force-us-to-trust-state-will-do-no-wrong-32103 Accessed 20 July 2022.
Sarre, Rick and Prenzler, Tim. 2023 forthcoming. ‘Cyber Space Crime Prevention Partnerships in Blackstone, Erwin A., Hakim, Simon and Meehan, Brian. (eds), Handbook on Public & Private Security, New York: Springer.
Sarre, Rick and Prenzler, Tim. 2021. ‘Policing and security: Critiquing the privatisation story in Australia’ in Birch, Philip, Kennedy, Michael and Kruger, Erin (eds.) Australian Policing: Critical issues in 21st century police practice, 221–233, New York, NY: Routledge.
Sarre, Rick, Brooks, David Jonathan, Smith, Clifton L. and Draper, Rick. 2014. ‘Current and Emerging Technologies Employed to Abate Crime and to Promote Security’, in Arrigo, Bruce A. and Bersot, Heather Y. (eds.) The Routledge Handbook of International Crime and Justice Studies, 327-349, New York: Routledge.
Sarre, Rick, Lau, Laurie and Chang, Lennon. 2018. ‘Responding to cybercrime: current trends’ Police Practice and Research: An International Journal, 19(6), 515–518.
Turnbull, Malcolm. 2015. ‘Magna Carta and the rule of law in the digital age’ Speech to the Sydney Institute, Sydney, 7 July. https://www.malcolmturnbull.com.au/media/speech-to-the-sydney-institute-magna-carta-and-the-rule-of-law-in-the-digit. Accessed 18 January 2021.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sarre, R. (2023). Perspectives on Policing Post-pandemic Cybercrime. In: Smith, R.G., Sarre, R., Chang, L.YC., Lau, L.YC. (eds) Cybercrime in the Pandemic Digital Age and Beyond. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-29107-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-29107-4_9
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-031-29106-7
Online ISBN: 978-3-031-29107-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)