Abstract
This chapter examines the numerous connections between cybercrime and surveillance. The use of surveillance to detect and disrupt cybercrime, the theft and other illegal use of the artifacts of surveillance as a variety of cybercrime, as well as criminal types of surveillance are among many ways in which the two relate. This chapter offers a holistic look at surveillance and cybercrime by looking at both theoretical insights from literatures, like critical surveillance studies and behavioral surveillance of consumers for marketing, as well as emerging practical issues in surveillance-related cybercrime, like “sextortion” and the use of remote access trojans or RATs.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Albrecht, K. (2001). Supremarket cards: The tip of the retail surveillance iceberg. Denver University Law Review, 79, 534.
Albrechtslund, A. (2008). Online social networking as participatory surveillance. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949
Alexander, G., Brooks, M., Crete-Nisihata, M., Maynier, E., Scott-Railton, T., Delbert, R. (2018) Familiar feeling: A malware campaign targeting the Tibetan diaspora resurfaces. Citizen Lab Research Report No.111, University of Toronto, August 2018.
Alhawari, S. (2015). An empirical study on customer retention and customer loyalty. International Journal of Information Systems and Change Management, 7(3), 183–202.
Al-Heeti, A. (2018, June 28). Exactis said to have exposed 340 million records, more than Equifax breach. CNET. https://www.cnet.com/news/exactis-340-million-people-may-have-been-exposed-in-bigger-breach-than-equifax/
Allmer, T. (2011). Critical surveillance studies in the information society. Cognition, Communication and Co-operation, 9(2), 566–592.
Andreas, P., & Price, R. (2001). From war fighting to crime fighting: Transforming the American national security state. International Studies Review, 3(3), 31–52.
Andrejevic, M. (2002) The work of being watched: Interactive media and the exploitation of self-disclosure. Critical Studies in Media Communication, 19(2), 230–248.
Andrejevic, M. (2007a) Surveillance in the digital enclosure. The Communication Review, 10(4), 295–317.
Andrejevic, M. (2007b), iSpy: Surveillance and power in the interactive era. Lawrence: University Press of Kansas.
Andrews, L., Holloway, M., & Massoglia, D. (2015). Digital peepholes: Remote activation of webcams: Technology, law and policy. The Institute for Science, law and technology. http://ckprivacy.org/files/2016/04/digital_peepholes_2015.pdf
Armitage, R. (2002). To CCTV or not to CCTV? A review of current research into the effectiveness of CCTV systems in reducing crime (community safety practice briefing). Nacro, 1–8. Available https://epic.org/privacy/surveillance/spotlight/0505/nacro02.pdf
Associated Press. (2018, December 1). Espionage, ID theft? Risks from stolen Marriott data myriad. https://www.voanews.com/a/espionage-id-theft-risks-from-stolen-marriott-data-myriad/4683203.html
Avery, M. (2007). The constitutionality of warrantless electronic surveillance of suspected foreign threats to the National Security of the United States. University of Miami Law Review, 62, 541.
Baker, J. E. (2007). In the common defense: National Security law for perilous times (pp. 105–110). Cambridge: Cambridge University Press.
Bakir, V. (2015). “Veillant panoptic assemblage”: Mutual watching and resistance to mass surveillance after Snowden. Media and Communication, 3(3), 12–25.
Balkin, J. M. (2008). The constitution in the national surveillance state. Minnesota Law Review, 93, 1.
Ball, K., & Snider, L. (Eds.). (2013). The surveillance-industrial complex: A political economy of surveillance. Abingdon/New York: Routledge.
Bamford, J. (1982). The puzzle palace: America’s National Security Agency and its special relationship with Britain’s GCHQ: James Bamford. London: Sidgwick & Jackson.
Bamford, J. (2009) The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. Anchor Books. 2009. ISBN: 0307279391, 9780307279392.
Banks, W., & Dycus, S. (2016). Soldiers on the home front: The domestic role of the American military. Cambridge: Harvard University Press.
Barrabi, T. (2018, April 2). Panera bread data breach exposes customer records. Fox Business. https://www.foxbusiness.com/markets/panera-bread-data-breach-exposes-customer-records
Baumer, T. L., & Rosenbaum, D. P. (1984). Combating retail theft: Programs and strategies. Boston: Butterworth.
Bejtlich, R. (2004). The Tao of network security monitoring: Beyond intrusion detection. Boston, Massachusetts: Pearson Education.
Bell, C. (2006). Surveillance strategies and populations at risk: Biopolitical governance in Canada’s national security policy. Security Dialogue, 37(2), 147–165.
Bencsáth, B., Pék, G., Buttyán, L., & Felegyhazi, M. (2012). The cousins of stuxnet: Duqu, flame, and gauss. Future Internet, 4(4), 971–1003.
Berghel, H. (2017). Equifax and the latest round of identity theft roulette. Computer, 50(12), 72–76.
Bloss, W. (2007). Escalating US police surveillance after 9/11: An examination of causes and effects. Surveillance & Society, 4(3), 208–228.
Brandom, R. (2013, December 18). FBI agents tracked Harvard bomb threats despite Tor. The Verge. https://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor
Brodsky, T., Cohen, R., Cohen-Solal, E., Gutta, S., Lyons, D., Philomin, V., Trajkovic, M. (2002). Visual surveillance in retail stores and in the home. In Video-based surveillance systems computer vision and distributed processing (pp. 51–61).
Brown, S., Gommers, J., Serrano, O. (2015). From cyber security information sharing to threat management. In Proceedings of the 2nd ACM Workshop on information sharing and collaborative security (WISCS ’15 Denver, Colorado, USA – October 12 – 12, 2015) (pp. 43–49)
Brumfield, B. (2012, February 17). Computer spyware is newest weapon in Syrian conflict. CNN, Friday. https://www.cnn.com/2012/02/17/tech/web/computer-virus-syria/index.html
Campbell, J. E., Carlson, M. (2002). Panopticon.com: Online Surveillance and the Commodification of Privacy. Journal of Broadcasting & Electronic Media, 46(4), 586–606.
Canali, D., Balzarotti, D., & Francillon, A. (2013, May). The role of web hosting providers in detecting compromised websites. In Proceedings of the 22nd international conference on World Wide Web (pp. 177–188). Rio de Janeiro: ACM.
Cascio, J. (2006). The rise of the participatory panopticon. WorldChanging. At http://www.worldchanging.com/archives/002651.html. Accessed 30 Jan 2008.
Castells, M. (2001). The internet galaxy: Reflections on the internet, business, and society. Oxford: Oxford University Press.
CBS. (2018, December 11). Equifax data breach was “entirely preventable,” congressional report finds. CBS News. https://www.cbsnews.com/news/equifax-data-breach-was-entirely-preventable-congressional-report-finds/
Cheng, B. W., Chang, C. L., & Liu, I. S. (2005). Establishing customer relationship management framework in nursing homes. Total Quality Management & Business Excellence, 16(5), 607–629.
Cimpanu, C. (2019, March 8). Marriott CEO shares post-mortem on last year’s hack. ZDNet. https://www.zdnet.com/article/marriott-ceo-shares-post-mortem-on-last-years-hack/
Clark, J. (2016, May). Growing threat: Sextortion. Cyber Misbehavior, United States Attorneys’ Bulletin, 64(3), 1–64. https://www.justice.gov/usao/file/851856/download
Coakley, R. W. (1996) The role of federal military forces in domestic disorders, 1789–1878. Army Historical Series. Center of Military History, United States Army, Washington, D.C., 2011. Available: https://history.army.mil/html/books/030/30-13-1/CMH_Pub_30-13-1.pdf
Coats, D. (2017). “Worldwide Threat Assessment of the US Intelligence Community”, Senate Select Committee on Intelligence Statement for the Record, May 11, 2017, Washington DC: Office of the Director of National Intelligence. Available: https://www.hsdl.org/?view&did=801029
Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention crime prevention studies (Vol. 16, pp. 41–96). Monsey: Criminal Justice Press.
Cowan, P., Egleson, N., & Hentoff, N. (1974). State secrets; police surveillance in America. New York: Holt, Rinehart and Winston.
Cox, J. (2019, February 6). Hundreds of bounty hunters had access to AT&T, T-Mobile, and Sprint customer location data for years. Motherboard. https://motherboard.vice.com/en_us/article/43z3dn/hundreds-bounty-hunters-att-tmobile-sprint-customer-location-data-years
Danziger, S., Van Der Gaag, J., Smolensky, E., & Taussig, M. K. (1982). The life-cycle hypothesis and the consumption behavior of the elderly. Journal of Post Keynesian Economics, 5(2), 208–227.
Dawson, S. (1993). Consumer responses to electronic article surveillance alarms. Journal of Retailing, 69(3), 353.
DCA. (2015). Selling “slaving” outing the principal enablers that profit from pushing malware and put your privacy at risk. https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/selling-slavery.pdf
DCA. (2017). The gateway Trojan, digital citizens Alliance (Vol. 1, Version 1, pp. 1–45). https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/2017_7The_Gateway_Trojan.pdf
De la Cerna, M. (2012). Sextortion. Cebu Daily News. Retrieved October 05, 2012.
Deibert, R. (2017, December 6). Evidence that Ethiopia is Spying on journalists shows commercial spyware is out of control. Wired. https://www.wired.com/story/evidence-that-ethiopia-is-spying-on-journalists-shows-commercial-spyware-is-out-of-control/
Deibert R., Crete-Nishihata, M., Dalek, J., Hardy, S., Kleemola, K., McKune, S., Poetranto, I., Scott-Railton, J., Senft, A., Sonne, B., & Wiseman, G. (2014, November 11). Communities @risk: Targeted digital threats against civil society. Citizen Lab. https://tspace.library.utoronto.ca/bitstream/1807/80130/1/Deibert%20et%20al_2014_Communities%20%40%20Risk.pdf
Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 222–232.
Denning, D. E., Baugh, W. E. (1999). Hiding crimes in cyberspace. Information, Communication & Society, 2(3), 251–276.
Denning, D., & Neumann, P. G. (1985). Requirements and model for IDES-a real-time intrusion-detection expert system. Menlo Park: SRI International.
Dowley, M. F. (2002). Government surveillance powers under the USA Patriot act: Is it possible to protect national security and privacy at the same time-a constitutional tug-of-war. Suffolk University Law Review, 36, 165.
Elgin, B., & Riley, M. (2014). Now at the sands casino: An Iranian hacker in every server, Bloomberg. Online at https://www.bloomberg.com/news/articles/2014-12-11/iranian-hackers-hit-sheldon-adelsons-sands-casino-in-las-vegas
Elmer, G. (1997). Spaces of surveillance: Indexicality and solicitation on the internet. Critical Studies in Mass Communication, 14(2), 182–191.
Fan, Q., Yanagawa, A., Bobbitt, R., Zhai, Y., Pankanti, S., Hampapur, A. (2009). Fast detection of retail fraud by using polar touch buttons. In ICME, 2009.
Farinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Le Blond, S., McCoy, D., & Levchenko, K. (2017). To catch a ratter: Monitoring the behavior of amateur DarkComet RAT operators in the wild. IEEE Symposium on Security and Privacy (SP), 1, 770–787.
Fazzini, K. (2019, February 13). The great Equifax mystery: 17 months later, the stolen data has never been found, and experts are starting to suspect a spy scheme. CNBC. https://www.cnbc.com/2019/02/13/equifax-mystery-where-is-the-data.html
Federal Trade Commission (FTC). (2014). Data brokers: A call for transparency and accountability. Washington, DC. https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf
Federal Trade Commission (FTC). (Undated). The Equifax data breach. https://www.ftc.gov/equifax-data-breach
Feldman, B. (2019, January 9). It’s very easy to get your hands on cell phone location data. New York Magazine. http://nymag.com/intelligencer/2019/01/report-demonstrates-how-easy-it-is-to-buy-location-data.html
Ferguson, A. G. (2017). The rise of big data policing: Surveillance, race, and the future of law enforcement. New York: New York University.
Fijnaut, C. J., & Marx, G. T. (Eds.). (1995). Undercover: Police surveillance in comparative perspective. The Hague: Martinus Nijhoff Publishers.
Fleishman, G. (2018). Equifax data breach, one year later: Obvious errors and no real changes, new report says. Fortune, September 7. http://fortune.com/2018/09/07/equifax-data-breach-one-year-anniversary/
Foucault, M. (1975). Surveiller et punir: Naissance de la prison. Paris: Editions Gallimard.
Foucault, M. (1977). Discipline and punish: The birth of the prison (trans: Sheridan, A.). London: Allen Lane.
Foucault, M. (1995). Discipline and punish: The birth of the prison. New York: Vintage.
Fuchs, C. (2009). Social networking sites and the surveillance society: A critical case study of the usage of studiVZ, Facebook, and MySpace by students in Salzburg in the context of electronic surveillance. Salzburg: Research Group Unified Theory of Information.
Fuchs, C. (2010). Social networking sites and complex technology assessment. International Journal of E-Politics, 1(3), 19–38.
Fuchs, C. (2011). New media, web 2.0 and surveillance. Sociology Compass, 5(2), 134–147.
Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (Eds.). (2011). Internet and surveillance: The challenges of web 2.0 and social media. (pp. 147–169). New York: Routledge.
Gallagher, S. (2014, December 11). Iranian hackers used Visual Basic malware to wipe Vegas casino’s network. Ars Technica. https://arstechnica.com/information-technology/2014/12/iranian-hackers-used-visual-basic-malware-to-wipe-vegas-casinos-network/
Galperin, E. (2016). When governments attack: Malware targeting activists, lawyers, and journalists. USENIX. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/galperin
Galperin, E., Marquis-Boire M. (2012). The internet is back in Syria and so is malware targeting Syrian activists. Electronic Frontier Foundation December 3, 2012, available: https://www.eff.org/deeplinks/2012/12/iinternet-back-in-syria-so-is-malware
Gandhi, U., Malarvizhi Kumar, P., Varatharajan, R., Manogaran, G., Sundarasekar, R., Kadu, S. (2018). HIoTPOT: Surveillance on IoT Devices against Recent Threats. Wireless Personal Communications 2/2018. https://doi.org/10.1007/s11277-018-5307-3
Gandy, O. (1993). The panoptic sort: A political economy of personal information. Boulder: Westview.
Gerstner, L. (2018, May 10). Hackers target loyalty programs. Kiplinger. https://www.kiplinger.com/article/spending/T059-C000-S002-hackers-target-loyalty-programs.html
Glassberg, J. (2018, September 25). A new kind of ‘sextortion’ scam is on the rise. Yahoo Finance. https://finance.yahoo.com/news/new-kind-sextortion-scam-rise-191229944.html
Granick, J. S. (2017). American spies: Modern surveillance, why you should care, and what to do about it. Cambridge: Cambridge University Press.
Gressin, S. (2018). The Marriott data breach. Federal Trade Commission. https://www.consumer.ftc.gov/blog/2018/12/marriott-data-breach
Gutting, G. (1998). Foucault, Michel (1926–84). In E. Craig & L. Floridi (Eds.), Routledge encyclopedia of philosophy (Vol. 4, pp. 708–713). London: Routledge.
Hackley, C. (2002). The panoptic role of advertising agencies in the production of consumer culture. Consumption, Markets and Culture, 5(3), 211–229.
Harris, S. (2010). The watchers: The rise of America’s surveillance state. New York: Penguin.
Hern, J. (2018, January 28). Fitness tracking app Strava gives away location of secret US army bases. The Guardian. https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases
Hier, S. P., & Walby, K. (2011). Privacy pragmatism and streetscape video surveillance in Canada. International Sociology, 26(6), 844–861.
Hollister, S. (2019, January 8). Carriers can sell your location to bounty hunters because ISP privacy is broken. The Verge. https://www.theverge.com/2019/1/8/18174024/att-sprint-t-mobile-scandal-phone-location-tracking-black-market-bounty-hunters-privacy-securus
Huey, L., Rosenberg, R. (2004). Watching the web: Thoughts on expanding police surveillance opportunities under the cyber-crime convention. Canadian Journal of Criminology and Criminal Justice, 46(5), 597–606.
ICMEC. (2018, October). Studies in child protection: Sexual extortion and nonconsensual pornography. The Koons Family Institute on International Law & Policy, 1–39. https://www.icmec.org/wp-content/uploads/2018/10/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf
Jaeger, P. T., Bertot, J. C., & McClure, C. R. (2003). The impact of the USA Patriot act on collection and analysis of personal information under the foreign intelligence surveillance act. Government Information Quarterly, 20(3), 295–314.
Kang, R. (2018). Lessons from Hollywood cybercrimes: Combating online predators. Berkeley Journal of Entertainment and Sports Law, 7(1) Article 5, 1–12. https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1071&context=bjesl
Karas, S. (2002). Enhancing the privacy discourse: Consumer information gathering as surveillance. The Journal of Technology Law & Policy, 7, 29.
Katyal, N. K. (2001a). Architecture as crime control. Yale Law Journal, 111, 1039.
Katyal, N. K. (2001b). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.
Katyal, N. K. (2003). Digital architecture as crime control. Yale Law Journal, 112, 2261.
Kealey, G. S. (2017). Spying on Canadians: The Royal Canadian Mounted Police Security Service and the origins of the long cold war. Toronto: University of Toronto Press.
Kerr, O. S. (2002). Internet surveillance law after the USA Patriot act: The big brother that isn’t. Northwestern University Law Review, 97, 607.
Kerr, O. S. (2014). A rule of lenity for national security surveillance law. Virginia Law Review, 100, 1513–1543.
Kerr, O. S. (2018) Implementing Carpenter (December 14, 2018). The Digital Fourth Amendment (Oxford University Press), Forthcoming; USC Law Legal Studies Paper No. 18-29. Available at SSRN: https://ssrn.com/abstract=3301257
Kinsman, G. W., Buse, D. K., & Steedman, M. (Eds.). (2000). Whose National Security?: Canadian state surveillance and the creation of enemies. Toronto: Between the Lines.
Kirkup, M., & Carrigan, M. (2000). Video surveillance research in retailing: Ethical issues. International Journal of Retail & Distribution Management, 28(11), 470–480.
Koskela, H. (2004). Webcams, TV shows and mobile phones: Empowering exhibitionism. Surveillance & Society, 2(2/3), 199–215.
Koskela, H. (2006). The other side of surveillance: webcams, power and agency. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and beyond (pp. 161–181). Devon: Willan Publishing
Krebs, B. (2014). Spam nation: The inside story of organized cybercrime-from global epidemic to your front door. Naperville: Sourcebooks, Inc.
La Vigne, N. G., Lowry, S. S., Dwyer, A. M., & Markman, J. A. (2011a). Using public surveillance systems for crime control and prevention: A practical guide for law enforcement and their municipal partners (Final technical report). Urban Institute Justice Policy Center. https://www.urban.org/sites/default/files/publication/27551/412402-Using-Public-Surveillance-Systems-for-Crime-Control-and-Prevention-A-Practical-Guide-for-Law-Enforcement-and-Their-Municipal-Partners.PDF
La Vigne, N. G., Lowry, S. S., Markman, J. A., & Dwyer, A. M. (2011b). Evaluating the use of public surveillance cameras for crime control and prevention (final technical report). Washington, DC: Urban Institute Justice Policy Center.
Lace, S. (Ed.). (2005). The glass consumer: Life in a surveillance society. Bristol: Policy Press.
Landau, S. (2013). Making sense from Snowden: What’s significant in the NSA surveillance revelations. IEEE Security & Privacy, 11(4), 54–63.
Last, J. M., Abramson, J. H., & Freidman, G. D. (Eds.). (2001). A dictionary of epidemiology (Vol. 4). New York: Oxford University Press.
Lauer, J. (2008). Alienation in the information economy: Toward a Marxist critique of consumer surveillance. In B. De Cleen & N. Carpentier (Eds.), Participation and media production: Critical reflections on content creation (pp. 41–53). Cambridge: Cambridge Scholars Publishing.
Laurie, C. D., & Cole, R. H. (1997). The role of federal military forces in domestic disorders, 1877–1945. Washington, DC: Government Printing Office.
Lessig, L. (2009). Code: And other laws of cyberspace. www.ReadHowYouWant.com
Lipp, K. (2015). License to connive: Boston still tracks vehicles, lies about it, and leaves sensitive resident data exposed online. Dig Boston. https://digboston.com/license-to-connive-boston-still-tracks-vehicles-lies-about-it-and-leaves-sensitive-resident-data-exposed-online/
Lyon, D. (1994). The electronic eye: The rise of surveillance society. Minneapolis: University of Minnesota Press.
Lyon, D. (1998). The World Wide Web of surveillance: The internet and off-world power-flows. Information, Communication & Society, 1(1), 91–105.
Lyon, D. (2001). Surveillance society: Monitoring everyday life (Issues in society). Maidenhead: Open University Press.
Lyon, D. (2003a). Cyberspace, surveillance, and social control: The hidden face of the internet in Asia. In K. C. Ho, R. Kluver, & K. C. Yang (Eds.), Asia.Com: Asia encounters the internet (pp. 67–82). London: Routledge.
Lyon, D. (2003b). Surveillance technology and surveillance society. In T. J. Misa, P. Brey, & A. Feenberg (Eds.), Modernity and technology (pp. 161–184). Cambridge, MA: MIT Press.
Lyon, D. (2003c). Airports as data filters: Converging surveillance systems after September 11th. Journal of Information, Communication and Ethics in Society, 1(1), 13–20.
Lyon, D. (2003d). Technology vs ‘terrorism’: Circuits of city surveillance since September 11th. International Journal of Urban and Regional Research, 27(3), 666–678.
Lyon, D. (2006). Airport screening, surveillance, and social sorting: Canadian responses to 9/11 in context. Canadian Journal of Criminology and Criminal Justice, 48(3), 397–411.
Lyon, D. (2007a). Surveillance studies: An overview. Cambridge: Polity Press.
Lyon, D. (2007b). Resisting surveillance. In S. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 368–377). Maidenhead: Open University Press.
Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 2053951714541861.
Madani, A., Rezayi, S., & Gharaee, H. (2011, October). Log management comprehensive architecture in Security Operation Center (SOC). In International conference on computational aspects of social networks (CASoN) (pp. 284–289). Salamanca: IEEE.
Mansfield-Devine, S. (2017). Fileless attacks: Compromising targets without malware. Network Security, 2017(4), 7–11.
Marczak, B., Scott-Railton J., McKune S., Abdul Razzak B., Deibert R. (2018a) Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries. The CitizenLab September 18, 2018. Available: https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-tooperations-in-45-countries/
Marczak, B., Scott-Railton J., Deibert R. (2018b) NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident. The CitizenLab July 31, 2018. Available: https://citizenlab.ca/2018/07/nso-spyware-targeting-amnesty-international/
Margulies, P. (2014). Dynamic surveillance: Evolving procedures in metadata and foreign content collection after Snowden. Hastings Law Journal, 66, 1.
Marquis-Boire, M. (2012, June). From Bahrain with love: Spy kit exposed? The citizen lab research brief. https://citizenlab.ca/wp-content/uploads/2015/03/From-Bahrain-With-Love-FinFishers-Spy-Kit-Exposed.pdf
Marquis-Boire, M., & Hardy, S. (2012, June). Syrian activists targeted with BlackShades spy software. The Citizen Lab Research Brief. https://citizenlab.ca/wp-content/uploads/2015/03/Syrian-Activists-Targeted-with-BlackShades-Spy-Software.pdf
Martin, C. R., Jr. (1976). A transgenerational comparison – The elderly fashion consumer. Advances in Consumer Research, 3, 1.
Marx, G. T. (1989). Undercover: Police surveillance in America. Berkeley: University of California Press.
Mason, J. B., & Bearden, W. O. (1978). Profiling the shopping behavior of elderly consumers. The Gerontologist, 18(5_Part_1), 454–461.
Microsoft. (2014). Microsoft helps FBI in GameOver Zeus botnet cleanup. https://blogs.microsoft.com/blog/2014/06/02/microsoft-helps-fbi-in-gameover-zeus-botnet-cleanup/
Miller, S., & Weckert, J. (2000). Privacy, the workplace and the internet. Journal of Business Ethics, 28(3), 255–265.
Miloslavskaya, N. (2016). Security operations centers for information security incident management. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), Vienna, Austria, 2–24 Aug. 2016. https://doi.org/10.1109/FiCloud.2016.26
Monahan, T. (2010). The future of security? Surveillance operations at homeland security fusion centers. Social Justice, 37(2/3 (120–121)), 84–98.
Moore, A. D. (2011). Privacy, security, and government surveillance: Wikileaks and the new accountability. Public Affairs Quarterly, 25(2), 141–156.
Mortenson, W. B., Sixsmith, A., & Woolrych, R. (2015). The power (s) of observation: Theoretical perspectives on surveillance technologies and older people. Ageing & Society, 35(3), 512–530.
Mulin, G. (2018, May 24). Online sex crime – what is sextortion, how common is webcam blackmail and how to keep yourself safe online? The Sun. https://www.thesun.co.uk/news/2293628/sextortion-how-common-is-webcam-blackmail-and-how-to-keep-yourself-safe-online-latest/
Murakami Wood, D. (2009). Situating surveillance studies. Surveillance & Society, 6(1), 52–61.
Murdock, J. (2018, July 24). Scammers are pretending to have webcam footage of victims watching porn to make them pay up. Newsweek. https://www.newsweek.com/sextortion-scammers-claim-have-webcam-footage-victims-watching-porn-pay-1039463
Musgrave, S. (2013, December 14). Boston police halt license scanning program. Boston Globe. https://www.bostonglobe.com/metro/2013/12/14/boston-police-suspend-use-high-tech-licence-plate-readers-amid-privacy-concerns/B2hy9UIzC7KzebnGyQ0JNM/story.html
Newman, K. (2018, January 29). Fitness app reveals remote military bases. US News and World Report. https://www.usnews.com/news/world/articles/2018-01-29/fitness-app-strava-reveals-military-security-oversight
Nieto, M. (1997). Public video surveillance: Is it an effective crime prevention tool? California Research Bureau. http://www.ncjrs.gov/App/publications/abstract.aspx?ID=179953
Norton. (2019). Do loyalty cards compromise your security? https://us.norton.com/internetsecurity-privacy-do-loyalty-cards-compromise-your-security.html
O’Flaherty, K. (2019, March 11). Marriott CEO reveals new details about Mega Breach. Forbes. https://www.forbes.com/sites/kateoflahertyuk/2019/03/11/marriott-ceo-reveals-new-details-about-mega-breach/#27c1f788155c
Onwubiko, C. (2015) Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy. In Proceedings of the IEEE international conference on cyber situational awareness, data analytics and assessment (Cyber SA 2015), joint and co-located with Cyber Science 2015 conferences, London, UK, June 8–9, 2015.
Ogura, T. (2006). Electronic government and surveillance-oriented society. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and behind (pp. 270–295). Portland: Willan Publishing.
Parenti, C. (2003). The soft cage: Surveillance in America from slavery to the war on terror. New York: Basic Books.
Pell, S. K., & Soghoian, C. (2014). Your secret stingray’s no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy. The Harvard Journal of Law & Technology, 28, 1.
Perlroth, N. (2017, February 11). Spyware’s odd targets: Backers of Mexico’s soda tax. New York Times. https://www.nytimes.com/2017/02/11/technology/hack-mexico-soda-tax-advocates.html
Pieterse, J. N. (2012). Leaking superpower: WikiLeaks and the contradictions of democracy. Third World Quarterly, 33(10), 1909–1924.
Pix, A., & Schneier, B. (2017, July 18). Surveillance is the business model of the internet. Open Democracy. https://www.opendemocracy.net/en/digitaliberties/surveillance-is-business-model-of-internet/
Piza, E. L. (2018). The crime prevention effect of CCTV in public places: A propensity score analysis. Journal of Crime and Justice, 41(1), 14–30.
Pridmore, J. (2010). Reflexive marketing: The cultural circuit of loyalty programs. Identity in the Information Society, 3(3), 565–581.
Pridmore, J., & Lyon, D. (2011). Marketing as surveillance: Assembling consumers as brands. In D. Zwick & J. Cayla (Eds.), Inside marketing: Practices, ideologies, devices (pp. 115–136). Oxford: Oxford University Press.
Pridmore, J., & Zwick, D. (2011). Marketing and the rise of commercial consumer surveillance. Surveillance & Society, 8(3), 269–277.
Pryor, B. (2006). Foucault, Michel (1926–1984). In D. M. Borchert (Ed.), Encyclopedia of philosophy (Vol. 3, pp. 698–702). Detroit: Thomson Gale.
Ranjbarfard, M. (2016). Customer knowledge management maturity model for insurance sector. International Research Journal of Applied and Basic Sciences, 10, 938–951.
Ratcliffe, J. (2006). Video surveillance of public places. Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services.
Rezaeirad, M., Farinholt, B., Dharmdasani, H., Pearce, P., Levchenko, K., & McCoy, D. (2018, August 15–17). Schrödinger’s RAT: Profiling the stakeholders in the remote access Trojan ecosystem. In Proceedings of the 27th USENIX security symposium. Baltimore.
Roberts, A. (2012). WikiLeaks: The illusion of transparency. International Review of Administrative Sciences, 78(1), 116–133.
Rowley, J. (2005). Customer knowledge management or consumer surveillance. Global Business and Economics Review, 7(1), 100–110.
Samatas, M. (2007). Security and surveillance in the Athens 2004 Olympics: Some lessons from a troubled story. International Criminal Justice Review, 17(3), 220–238.
Sandoval, M. (2013). A critical empirical case study of consumer surveillance on Web 2.0. In: Internet and surveillance (pp. 167–189). Routledge.
Schneier, B. (Undated). Ubiquitous Surveillance and Security. Norbert Weiner Learning Center. http://norbertwiener.org/ubiquitous-surveillance-and-security-bruce-schneier/
Schwartz, M. (2018, November 2). Radisson suffers global loyalty program data breach. Bank Info Security. https://www.bankinfosecurity.com/blogs/radisson-suffers-global-loyalty-program-data-breach-p-2677
Scott-Railton, J., Hardy, S., & Daily, P. (2014, December, 18). Malware attack targeting Syrian ISIS critics. The Citizen Lab.
Shackleford, D. (2015). Who’s using cyberthreat intelligence and how? SANS Institute. https://www.sans.org/reading-room/whitepapers/analyst/cyberthreat-intelligence-how-35767
Smith, A. D. (2008). Modernizing retail grocery business via knowledge management-based systems. Journal of Knowledge Management, 12(3), 114–126.
Springer, S., Chi, H., Crampton, J., McConnell, F., Cupples, J., Glynn, K., et al. (2012). Leaky geopolitics: The ruptures and transgressions of WikiLeaks. Geopolitics, 17(3), 681–711.
St. John, A. (2019). Facebook breach exposed personal data of millions of users. Consumer Reports. https://www.consumerreports.org/digital-security/facebook-data-breach-exposed-personal-data-of-millions-of-users/
Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–498.
Stoll, C. (2005). The cuckoo’s egg: Tracking a spy through the maze of computer espionage. New York: Simon and Schuster.
Stoycheff, E. (2016). Under surveillance: Examining Facebook’s spiral of silence effects in the wake of NSA internet monitoring. Journalism & Mass Communication Quarterly, 93(2), 296–311.
Sundaramurthy, S. C., Case, J., Truong, T., Zomlot, L., Hoffmann, M. (2014). A tale of three security operation centers. In Proceedings of the 2014 ACM workshop on security information workers (November 2014 SIW ’14) (pp. 43–50)
Taylor, R. (2018, November). Dunkin’ suffers data breach of customer loyalty program. QSR Magazine. https://www.qsrmagazine.com/security/dunkin-suffers-data-breach-customer-loyalty-program
Theoharis, A. G. (1978). Spying on Americans: Political surveillance from hoover to the Huston plan. Philadelphia: Temple University Press.
Theoharis, A. G. (2004). The FBI & American democracy: A brief critical history (p. 46). Lawrence: University Press of Kansas.
Turow, J. (2005). Audience Construction and Culture Production: Marketing Surveillance in the Digital Age. Annals of the American Academy of Political and Social Science, 597(1), 103–121. https://doi.org/10.1177/0002716204270469
Turow, J. (2006). Cracking the consumer code: Advertisers, anxiety, and surveillance in the digital age. In K. Haggerty & R. Ericson (Eds.), The new politics of surveillance and visibility (p. 279). Toronto: University of Toronto Press.
Van Hoboken, J. V. (2013). Privacy and security in the cloud: Some realism about technical solutions to transnational surveillance in the post-Snowden era. Maine Law Review, 66, 487.
Verble, J. (2014). The NSA and Edward Snowden: Surveillance in the 21st century. ACM SIGCAS Computers and Society, 44(3), 14–20.
Villa, M. (2016, July). “Executive summary” to a call to action: Ending “sextortion” in the digital age (p. 4). https://www.trust.org/contentAsset/raw-data/f3b8d35c-27bf-4ba7-9251-abc07d588347/file
Walby, K. (2005). Open-street camera surveillance and governance in Canada. Canadian Journal of Criminology and Criminal Justice, 47(4), 655–684.
Walby, K., & Monaghan, J. (2011). Private eyes and public order: Policing and surveillance in the suppression of animal rights activists in Canada. Social Movement Studies, 10(01), 21–37.
Wall, D. (2003). Mapping out cybercrimes in a cyberspatial surveillant assemblage. In K. Ball & F. Webster (Eds.), The intensification of surveillance: Crime terrorism and warfare in the information age (pp. 112–136). London: Pluto.
Wall, D. (2006). Surveillant internet technologies and the growth in information capitalism: Spams and public trust in the information society. In K. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 340–362). Toronto: University of Toronto Press.
Wall, D. S. (2004) Digital realism and the governance of spam as cybercrime. European Journal on Criminal Policy and Research, 10(4), 309–335.
Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice & Research: An International Journal, 8(2), 183–205.
Wall, D. S. (2013). Enemies within: Redefining the insider threat in organizational security policy. Security Journal 26(2), 107–124. Palgrave Macmillan UK.
Welsh, B. C., & Farrington, D. P. (2003). Effects of closed-circuit television on crime. The Annals of the American Academy of Political and Social Science, 587(1), 110–135.
Welsh, B. C., & Farrington, D. P. (2009a). Making public places safer: Surveillance and crime prevention. Oxford: Oxford University Press.
Welsh, B. C., & Farrington, D. P. (2009b). Making public places safer: Surveillance and crime prevention. https://doi.org/10.1093/acprof:oso/9780195326215.001.0001. Chapter: Welsh, Brandon C., & David P. Farrington how might surveillance measures reduce crime? https://doi.org/10.1093/acprof:oso/9780195326215.003.0003.
Whitaker, R., Kealey, G. S., & Parnaby, A. (2012). Secret service: Political policing in Canada: From the Fenians to fortress America. Toronto: University of Toronto Press.
Winter, J. S. (2014). Surveillance in ubiquitous network societies: Normative conflicts related to the consumer in-store supermarket experience in the context of the internet of things. Ethics and Information Technology, 16(1), 27–41.
Wittes, B. (2016). Sextortion. The Government Studies Program at Brookings. Available: https://www.brookings.edu/wpcontent/uploads/2016/05/20160511-sextortion-presentation-wittes.pdf
Wittes, B. (2018, May). Cyber Sextortion and International Justice transcript (p. 941). https://www.law.georgetown.edu/international-law-journal/wp-content/uploads/sites/21/2018/05/48-3-Cyber-Sextortion-and-International-Justice.pdf
Wittes, B., Poplin, C., Jurecic, Q., & Spera, C. (2016a). Sextortion: Cybersecurity, teenagers, and remote sexual assault. https://www.brookings.edu/wp-content/uploads/2016/05/sextortion1-1.pdf
Wittes, B., Poplin, C., Jurecic, Q., & Spera, C. (2016b). Closing the sextortion sentencing gap: A legislative proposal. https://www.brookings.edu/wp-content/uploads/2016/05/sextortion2.pdf
Wong, K. (2006). The NSA terrorist surveillance program. Harvard Journal on Legislation, 43, 517.
Yoo, J. (2014). The legality of the National Security Agency’s bulk data surveillance programs. Harvard Journal of Law & Public Policy, 37, 901.
You, I., & Yim, K. (2010, November). Malware obfuscation techniques: A brief survey. In 2010 international conference on broadband, wireless computing, communication and applications (pp. 297–300). Fukuoka: IEEE. https://dl.acm.org/citation.cfm?id=1908903
Zeitlin, S. (2015). Botnet takedowns and the fourth amendment. New York University Law Review, 90, 746.
Zhang, Z. (2011). Customer knowledge management and the strategies of social software. Business Process Management Journal, 17(1), 82–106.
Zippel, C., & Bohnet-Joschko, S. (2017). Post market surveillance in the german medical device sector–current state and future perspectives. Health Policy, 121(8), 880–886.
Zurawski, N. (2011). Local practice and global data: Loyalty cards, social practices, and consumer surveillance. The Sociological Quarterly, 52(4), 509–527.
Zureik, E., & Salter, M. (Eds.). (2013). Global surveillance and policing. Portland, Oregon: Routledge.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Nussbaum, B., Sebastian Udoh, E. (2020). Surveillance, Surveillance Studies, and Cyber Criminality. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_16
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences