Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-swr86 Total loading time: 0 Render date: 2024-07-16T12:19:16.276Z Has data issue: false hasContentIssue false

7 - Online Undercover Investigations and the Role of Private Third Parties

Published online by Cambridge University Press:  18 November 2023

Anne Brunon-Ernst
Affiliation:
Université Paris-Panthéon-Assas
Jelena Gligorijevic
Affiliation:
Australian National University, Canberra
Desmond Manderson
Affiliation:
Australian National University, Canberra
Claire Wrobel
Affiliation:
Université Paris-Panthéon-Assas
Get access

Summary

I. Introduction

Over the past quarter century, a great deal of crime has migrated from physical space to cyberspace. What was formerly achieved with a can of spray paint can now be engineered with SQL injections and file transfer protocols. Extortion demands, once made face to face, by letter or through a telephone call, can now be made online. Extortion payments, previously delivered in a paper bag or briefcase, can now be accomplished by electronic funds transfer. Sexually explicit images of children, once circulated by hand or purchased in disreputable bookstores, are now reproduced and disseminated instantaneously, in real time. Adults no longer need to lurk near schoolyards to arrange illicit assignations, preferring less obtrusive encounters in chatrooms frequented by young people.

Predictably, a great proportion of criminal investigation has also migrated to cyberspace. Cyber forensics, once an esoteric specialty, is becoming increasingly central to crime control. Law enforcement agencies are scrambling to keep abreast of their criminal adversaries. Accompanying the activities of state agencies are those of private citizens. Just as police in recent years have invited a degree of citizen ‘co-production’ in conventional crime control through initiatives such as Neighbourhood Watch and Crimestoppers, contemporary law enforcement agencies have established online reporting protocols and hotlines. The FBI's Internet Crime Complaints Center (IC3) and the Australian ReportCyber are two examples.

Throughout history, state police have used covert or undercover methods to complement more visible, transparent investigative techniques. The reasons are pragmatic: certain types of activity, such as serious organised crime and complex criminal conspiracies, are less amenable to interdiction by means of overt, conventional police practices.

Undercover policing has been described as a ‘necessary evil’ because of its potential for misuse. By their very nature, covert methods are open to abuse and to the avoidance of accountability. One need look no further than totalitarian states of the twentieth century for grim illustrations. But even in democratic states that present themselves as paragons of governmental accountability and champions of human rights, abuses can and do occur.

Covert policing is by no means the monopoly of state policing and security services. Nor, as the editors of this volume note, is it a uniquely modern phenomenon. Private individuals, members of non-governmental organisations and commercial entities have all engaged in investigation for a variety of motives, including a sense of civic responsibility, moral indignation or commercial gain.

Type
Chapter
Information
Publisher: Edinburgh University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×