U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Fox and the Hunters: How IC Technologies Change the Crime Race

NCJ Number
207466
Journal
European Journal on Criminal Policy and Research Volume: 10 Issue: 1 Dated: 2004 Pages: 3-26
Author(s)
Ernesto U. Savona; Maria Mignone
Date Published
2004
Length
24 pages
Annotation
This article examines how new information and communication technologies (ICT's) are changing criminal methods, dynamics, and trends, as well as the challenges faced by legislators, law enforcement agencies, and scientists in preventing and combating crime that uses new ICT's.
Abstract
The Internet provides instant global communication between and among individuals and institutions. Used criminally, this can facilitate stalking, money laundering, fraud, larceny, and various types of theft. Relatively new ICT's permit criminals anonymity, a broadening of the pool of potential victims, and an inexpensive and accessible tool for committing many types of crimes. This article discusses how new ICT's maybe the subject of a crime, the object of a crime, as tools for committing or planning crime, and as a "symbol" of crime (intimidation or deception). One section of this article discusses how particular types of criminals, i.e., organized crime groups and white-collar offenders, are using ICT to commit their crimes. In discussing the challenges faced by legislators in countering ICT-related crime, this article presents a table that displays legal provisions designed to target computer-related crime in the 15 European Union Member States. Regarding law enforcement efforts against ICT-related crime, the discussion notes ways in which law enforcement is itself using new ICT's to detect, identify, and investigate criminal activities. The scientific community is also involved in the fight against ICT-related crime, as it discovers and develops ways to increase ICT security and tailor technologies for law enforcement tasks. 1 table and 29 references