Skip to main content

Complicity in Cyberspace: Applying Doctrines of Accessorial Liability to Online Groups

  • Chapter
Cybercrime Risks and Responses

Abstract

Telecommunications technologies have changed not only the ways in which crimes are committed but also the ways in which offenders interact in committing them. The truism of “action at a distance” exemplified by online crime, whereby offenders and victims need not be located in the same place or even the same country, also holds for relationships between co-offenders. Online criminal groups can operate effectively without their members ever meeting in person, being able to recognize each other by sight, or knowing each other’s real names.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Anton, D. and Urbas, G. (2011) “Why Julian Assange May Have a Case to Answer in Australia,” Legal Theory Blog, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1733666## (accessed 11 February 2015).

    Google Scholar 

  • Bronitt, S. and McSherry, B. (2010) Principles of Criminal Law 3rd edn, Sydney: Thomson Reuters.

    Google Scholar 

  • Choo, K-K. R., Smith, R. G. and McCusker, R. (2007) “Future Directions in Technology-Enabled Crime 2007–09,” Research in Public Policy Series 78, Canberra, Australia: Australian Institute of Criminology.

    Google Scholar 

  • Gilad, M. (2012) “Virtual or Reality: Prosecutorial Practices in Cyber Child Pornography Ring Cases,” Richmond Journal of Law and Technology 18: 1–66.

    Google Scholar 

  • Hardy, K. (2010) “Operation Titstorm: Hacktivism or Cyber-Terrorism?,” University of New South Wales Law Journal 33 (2): 474–502.

    Google Scholar 

  • Krone, T. (2004) “A Typology of Online Child Pornography Offending,” Trends & Issues in Crime and Criminal Justice no. 279, Canberra, Australia: Australian Institute of Criminology.

    Google Scholar 

  • McCusker, R. (2006) “Transnational Organised Cyber Crime: Distinguishing Threat From Reality,” Crime, Law and Social Change 46: 257–73.

    Article  Google Scholar 

  • Odgers, S. (2010) Principles of Federal Criminal Law 2nd edn, Sydney: Thomson Reuters.

    Google Scholar 

  • Terre des Hommes (2013) “Webcam Child Sex Tourism,” http://www.terredeshommes.org/webcam-child-sex-tourism-2/ (accessed 11 February 2015).

  • Urbas, G. (2007) “Cross-National Investigation and Prosecution of Intellectual Property Crimes: The Example of ‘Operation Buccaneer’,” Crime, Law and Social Change 46: 207–21.

    Article  Google Scholar 

  • Urbas, G. (2008) “Look Who’s Stalking: Cyberstalking, Online Vilification and Child Grooming Offences in Australian Legislation,” Internet Law Bulletin 10 (6): 62–9.

    Google Scholar 

  • Urbas, G. (2012) “Copyright, Crime and Computers: New Legislative Frameworks for Intellectual Property Rights Enforcement,” Journal of International Commercial Law and Technology 7: 11–26.

    Google Scholar 

  • Urbas, G. (2012) “Cybercrime, Jurisdiction and Extradition: The Extended Reach of Cross-Border Law Enforcement,” Journal of Internet Law 16 (1): 7–17.

    Google Scholar 

  • Urbas, G. (2013) “Australia’s Accession to the Convention on Cybercrime,” Inter-net Law Bulletin 16: 2–3.

    Google Scholar 

  • Urbas, G. and Choo, R. (2008) “Resource Materials on Technology-Enabled Crime,” Technical and Background Paper no. 28, Canberra, Australia: Australian Institute of Criminology.

    Google Scholar 

  • Urbas, G. and Grabosky, P. (2006) “Cybercrime and Jurisdiction: An Australian Perspective,” in Cybercrime and Jurisdiction: A Global Survey, B. -J. Koops and S. Brenner (eds.), IT and Law Series no. 11, The Hague, the Netherlands: TMC Asser Press.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Gregor Urbas

About this chapter

Cite this chapter

Urbas, G. (2015). Complicity in Cyberspace: Applying Doctrines of Accessorial Liability to Online Groups. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_13

Download citation

Publish with us

Policies and ethics