
Crime in the Digital Age
Controlling Telecommunications and Cyberspace Illegalities
- 256 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Willie Sutton, a notorious American bank robber of fifty years ago, was once asked why he persisted in robbing banks. "Because that's where the money is," he is said to have replied. The theory that crime follows opportunity has become established wisdom in criminology; opportunity reduction has become one of the fundamental principles of crime prevention.
"The enormous benefits of telecommunications are not without cost." It could be argued that this quotation from Crime in the Digital Age, is a dramatic understatement. Grabosky and Smith advise us that the criminal opportunities which accompany these newest technological changes include: illegal interception of telecommunications; electronic vandalism and terrorism; theft of telecommunications services; telecommunications piracy; transmission of pornographic and other offensive material; telemarketing fraud; electronic funds transfer crime; electronic money laundering; and finally, telecommunications in furtherance of other criminal conspiracies.
However, although digitization has facilitated a great deal of criminal activity, the authors suggest that technology also provides the means to prevent and detect such crimes. Moreover, the varied nature of these crimes defies a single policy solution. Grabosky and Smith take us through this electronic minefield and discuss the issues facing Australia as well as the international community and law enforcement agencies.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title
- Copyright
- Contents
- Acknowledgments
- Acronyms
- Table of Cases
- Table of Legislation
- 1 Introduction
- 2 Illegal Interception of Telecommunications
- 3 Electronic Vandalism and Terrorism
- 4 Stealing Telecommunications Services
- 5 Telecommunications Piracy
- 6 Pornography and Other Offensive Content
- 7 Telemarketing Fraud
- 8 Electronic Funds Transfer Crime
- 9 Electronic Money Laundering
- 10 Telecommunications in Furtherance of Criminal Conspiracies
- 11 Towards Security and Prosperity in Cyberspace
- References
- Index