- Research Handbooks in Financial Law series
Edited by Barry Rider
Chapter 52: Disruption of crime and the use of intelligence
Far-reaching changes need to be made in the way law enforcement agencies access intelligence and disrupt crime because cyberspace means that the traditional approach that has served so well for more than 40 years is no longer fit for purpose. Since the early 1970s, ‘intelligence led policing’ and Problem Oriented Policing (POP) have provided the model for tackling criminality in most western countries. The problem is that these models rely on the localized nature of the relationship between the victim, the location and the offender. The development of the internet and the ability of criminals to commit crime from great distances, often beyond the jurisdiction of the victim and local law enforcement agencies, are testing the traditional model of combating crime. This development has major implications for the way law enforcement agencies address all types of environmental and situational crime including economic crime. The growing reliance by society on the ‘internet of things’ world is arguably having a greater impact on less tangible concepts like economic crime than on ‘real world’ property or location crimes such as robbery or burglary. Moreover, the increased societal use of the internet has much wider implications that significantly challenge sovereign nations and governments as their laws prove to be inadequate for making timely interventions against criminals or for allowing disruption to their activities online.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.