Abstract
‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly,
Introduction
Cybercrime and cybersecurity are increasingly being presented among the major social, political and economic challenges of our time. Cybercrime is an umbrella concept used to refer to cyber-enabled crimes (i.e. traditional crimes that are enhanced via the use of networked technologies) and cyber-dependent crimes (i.e. crimes that would not exist without networks technologies; see McGuire & Dowling, 2013; Wall, 2001). For the most part, criminological research has focused more on cyber-enabled crime and, to a lesser extent, on policing responses to those crimes. Research in this domain is loosely referred to as ‘cyber-criminology’ (Grabosky, 2016). Cybersecurity is a very broad concept and diverse field of practice. For computer scientists, the term is typically used to refer to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access (Carley, 2020; Fichtner, 2018). It does not matter, from a definitional point of view, whose systems are being considered, with cybersecurity being used in the context of personal devices, the home, workplace and institutions. Rather, the different types and purposes of data, networks and systems are more questions for the precise makeup of cybersecurity. Much like the idea of ‘security’, cybersecurity is a slippery concept meaning very different things to different people.
The ‘securitisation’ of cybersecurity cannot be ignored (Kremer, 2014). Indeed, some argue that the term ‘cybersecurity’ can be understood ‘as “computer security” plus “securitisation”’ (Hansen & Nissenbaum, 2009, p. 1160), reflecting the view that shifting from
As cyber-criminology and cybersecurity are both concerned with the study of online harms and responses to such harms, it would be logical to assume that these fields share many theoretical and empirical approaches. Upon a closer examination, however, it becomes clear that they are more accurately understood as two discrete academic fields, each mobilising differentiated conceptual frameworks, research questions, datasets, publication outlets and career paths. This paper argues that the concept and field of cybersecurity is in much need of greater conceptualisation. In doing so, we recognise that ‘all that we can know about security is what people do in its name’ (Valverde, 2011, p. 5), suggesting that efforts should not be caught up in only theorising security but also addressing the practices of security governance. These practices, it is argued, need to be considered in the context of the logics, scale and scope of specific security projects. Our focus in this paper is to consider these questions within the diverse and, at times, contradictory set of actors and practices that make up the field of cybersecurity.
The paper therefore proceeds as follows. First, we consider in more depth the origins of the cyber-criminology and cybersecurity fields. This allows us to not only further explain the divergence between these cyber fields but also provide insights into how these differences can be better navigated. We therefore hope to promote further integration between these disciplines in future research on cybercrime and cybersecurity. Second, we focus the rest of the paper on the relational dynamics connecting the cyber
Cyber-criminology and cybersecurity
The autonomy maintained by cyber-criminology and cybersecurity as discrete academic fields has resulted in limited engagement between researchers and publications, a situation probably amplified by the technical lineage of cybersecurity within the computer science and engineering disciplines, while cyber-criminology has remained firmly grounded in the social sciences. Hence, one would argue that the logics, spatial and temporal scales, and jurisdictions of concern to cyber-criminology and cybersecurity differ significantly. To understand this surprising disjuncture, it is useful to sketch their scientific genealogies. We will first start with the field of cyber-criminology.
Cybercrime and criminology
The first recorded instances of computers and digital networks being used illegally closely followed their adoption by modern organisations in the 1960s (Parker, 1976). Because computers were bulky mainframes that had not yet been connected to each other, the first generation of cybercrime was mainly the result of insiders abusing their privileged access (Brenner, 2007). The democratisation of personal computers in the 1980s and of the internet in the early 1990s afforded new criminal opportunities to curious and bored adolescents who disrupted digital systems through the development and dissemination of computer viruses and worms, while profit-driven thieves and scammers began to exploit poorly-secured financial transaction systems and to manipulate the trust of internet users (Brenner, 2007; Grabosky, 2016; Lusthaus, 2018). Since then, computer networks, devices, applications and online platforms have shaped every aspect of human activity and have provided a constant stream of new criminal opportunities to innovative offenders.
One of the first issues that criminologists interested in researching cybercrime had to address was to determine where to situate these unfamiliar offenses in the pantheon of traditional crimes usually covered by the discipline. In other words, should cybercrime be treated as a brand-new form of offending, thereby requiring a renewed criminological toolset, or should the hyperbole surrounding its novelty be downplayed to focus on the natural evolution of crime—the ‘old wine in new bottles’ hypothesis (Grabosky, 2001), which could be studied adequately by using conventional theories and methods? One strategy adopted by cyber-criminologists to overcome this dilemma has been to develop inclusive cybercrime typologies that are able to accommodate both well-established crimes supercharged by digital technologies and new crimes that do not have any historical precedents (‘true’ cybercrimes). Quite a few variations have been designed over time, but most differentiate between cyber-enabled and cyber-dependent crimes, the former leveraging digital technologies to amplify existing forms of offending (e.g. online fraud or the distribution of child sexual exploitation material), the latter covering malicious activities that would not exist outside of the digital realm (e.g. hacking or denial of service attacks) (McGuire & Dowling, 2013). Others also include cyber-assisted crimes, where digital technologies are incidental to the offense, for example when drug traffickers exchange messages over the internet using encryption tools (Grabosky, 2016; Levi et al., 2015; Wall, 2017). As useful as they are, these typologies accurately reflect patterns of association between humans and machines at a particular point in time but are challenged by the constant changes and new configurations that new technologies introduce and the accelerating pace of this evolution. Just like the term cybercrime overtook the more popular terminology of ‘computer crime’ in the 2000s to account for the increasingly connected nature of computer systems, one can only wonder how long the concept of cybercrime will maintain its usefulness in a world so saturated by digital technologies that they eventually become invisible to their users (McGuire, 2020; Powell et al., 2018).
The challenge of defining cybercrime has had direct implications on its measurement and the theories that have been mobilised to link it with broader social processes. The ambiguous nature of various cybercrime definitions used over time has impaired the design of statistical tools that could accurately capture its prevalence and measure its impact on society. Existing official crime statistics, on which criminologists traditionally depend, do not adequately reflect cybercrime-specific data. This is because a majority of cybercrimes—and in particular cyber-assisted and cyber-enabled cybercrimes—are prosecuted through statutes that pay more heed to the substance of the offence than to the technological means used to commit the crime. A growing share of crimes also incorporate online and offline components, making cybercrime harder to disentangle from local street crime (Levi, 2017; Roks et al., 2020). As a result, the recording of such offences in most countries still remains problematic or fragmented (Lavorgna, 2020, p. 20), and only raw estimates of the global costs of cybercrime can be made (McGuire, 2018). This leaves criminologists at the mercy of cybersecurity firms and think-tanks that produce dubious surveys and statistics as marketing material, often grossly exaggerating the prevalence of cybercrime and the financial harm it causes (Florêncio et al., 2014).
Empirically, criminologists have greatly benefited from the behavioural visibility of cyber-offenders (Leonardi & Treem, 2020), whose activities can be followed with relative ease on online convergence settings such as hacking forums and illicit marketplaces (Pastrana et al., 2018; Rossy & Décary-Hétu, 2018). This has allowed them to explore market forces at work, including the role played by trust, reputation, social ties, expert knowledge, business practices and operational security measures—to name a few—in the criminal performance of these underground markets, and of their participants (Holt, 2017). A smaller number of studies have also relied on youth surveys to understand the onset of pathways to cybercrime (Brewer et al., 2018; Fox & Holt, 2020), as well as to compare cyber-offenders with traditional offenders (Weulen Kranenbarg et al., 2019). A few researchers have also managed to interview malicious hackers and to gain access to police investigative files (Leukfeldt et al., 2017; Lusthaus, 2018), opening a window into the offending patterns, thinking models and rationalisation processes of cyber-offenders. In parallel, the experience of cybercrime victims has attracted significantly less attention, with studies trying to understand susceptibility to cybercrime victimhood and to better document the unmet needs of cybercrime victims (Button & Cross, 2017; Leukfeldt et al., 2020). Finally, more attention is being paid to the attitudes, capacities and effectiveness of law enforcement organisations (Harkin et al., 2018; Holt & Bossler, 2012) and the civilians supporting them (Whelan & Harkin, 2019).
Most cybercrime publications rely on existing criminological theoretical frameworks, trying to assess their compatibility with a fast-digitising society. Classical theories such as deterrence theory, routine activity theory, general strain theory, social learning theory, differential association theory, the general theory of crime or drift theory remain dominant as explanatory factors in the cybercrime literature (Bossler, 2020). By contrast, publications that leverage science and technology studies’ frameworks such as actor-network theory (van der Wagen & Pieters, 2020) or that examine more thoroughly the co-evolution of specific technologies and criminal innovations (Dupont, 2020; McGuire, 2008; Wall, 2017) are still comparatively rare. Because of the technical skills required, empirical evaluations of interventions seeking to disrupt or prevent cybercrime activities are extremely scarce (Collier et al., 2019; Maimon & Louderback, 2019), and when they exist, they are not always able to capture the contribution of public-private linkages and partnerships enabling such interventions (Dupont, 2017). This difficulty to account for the dispersed nature of cybercrime control and prevention capacities and responsibilities is mirrored by cybersecurity’s limited engagement with criminological insights.
Cybersecurity: From national security to behavioural perspectives
While it may not have reached the status of a full-fledged discipline yet, cybersecurity as a research field is quickly developing at the intersection of computer science, political science and 41 other disciplines (Carley, 2020). Like their cyber-criminologist colleagues, cybersecurity researchers have also seen shifts in the terminology used to frame their research agenda, from computer security in the 1960s to information security in the 2000s, the cyber- prefix gaining widespread acceptance in the 2010s (Landwehr, 2010). The Google Books Ngram graph below displays the occurrence frequency of the three terms in the 40 million books scanned by Google and published in English between 1960 and 2019 (Figure 1). This evolution does not merely reflect new trends launched by scientists eager to differentiate their work from their predecessors’. It also denotes the broadening focus of cybersecurity, which expanded beyond its initial narrow interest in the security of machines to gradually incorporate considerations about the information stored and processed by these machines, and ultimately the humans and social institutions interacting with both.
The fields of computer science and engineering account for 70–80% of cybersecurity publications, while social science research comes a distant second with 18–30% of publications, depending on which bibliographic database is queried (Dhawan et al., 2020; Dunn Cavelty, 2018). The computer science and engineering strands of cybersecurity research are primarily focused on hardware and software vulnerabilities, with limited concerns for the ‘manufactured’ nature of those risks, which are enabled by IT companies favouring innovation and speed of growth over security and are exploited by human adversaries who never stop to innovate. Aware of this shortcoming, a growing number of computer scientists rely on human–computer interaction theories and leverage behavioural economics to provide more accurate explanations of the cyber-risk landscape and to design more effective interventions (Briggs et al., 2017; Moore, 2010).
Ever since its precursor technologies were developed in the late 1960s with seed funding from the United States Defence Department’s Advanced Research Project Agency, the internet has been closely associated with military interests (Castells, 2002). The internet’s military heritage partly explains why cybersecurity is predominantly framed as a national security issue by political scientists (Dunn Cavelty, 2018). This mindset implies that online risks are construed as existential threats to the survival of the polity, requiring exceptional responses from intelligence and defence institutions to address the most unimaginable (and often ‘hyped’) catastrophic scenarios (Kremer, 2014). Securitising online harms is problematic, because such emergency responses may be used to justify the violation of legal and social norms (Hansen & Nissenbaum, 2009), while failing to properly acknowledge the negative financial and emotional consequences suffered by millions of cybercrime victims.
Empirically, and by contrast with cyber-criminologists, cybersecurity researchers have used their technical clout to develop a broader range of measurement strategies to assess the contours of the cyber-threat landscape, the risk exposure of various organisational actors, the harm suffered and the effectiveness of the security measures put in place. Using diverse data sources such as criminal forum posts, insurance prices, stock market activity, bitcoin transactions, legal cases, data breach incident reports and surveys collected and processed automatically using customised computer programs and algorithms, they have debunked some myths, such as the out-of-control nature of cybercrime (Woods & Böhme, 2020). However, because of the disciplinary background of the researchers driving these methodological efforts, the technical breakthroughs that enable the collection, processing and visualisation of vast quantities of hard-to-access data often receive more attention than the social and policy insights these data can generate. Very few of these datasets are available to criminologists, with some notable exceptions, such as the data sharing framework implemented by Cambridge’s Cybercrime Centre (Pastrana et al., 2018).
Thus, despite the growing attractiveness of cybersecurity to many established disciplines, it is still dominated by computer scientists and engineers and to a lesser extent by political scientists. This lack of transdisciplinary engagement seems counterproductive, both for cybersecurity (which misses out on insights on crime prevention, deterrence, social network analysis of criminal enterprises, third party policing or victimisation, to name a few) and for cyber-criminology (which remains partially blind to the contributions automated analytical tools such as machine learning and deep learning algorithms can make to the detection and categorisation of crime patterns, or to the crime control and prevention capacities deployed by private and non-governmental actors). In that context, we believe it is time to end this separation of technical, political and criminological knowledge (Dunn Cavelty, 2018, p. 26), which only fragments our capacity to make sense of online harms in a world where law enforcement and national security institutions, on the contrary, seem to converge in a reconfiguration of the security field.
Appreciating the relational dynamics of the cyber field
Intersecting cyber-harms
The varied cyber-related harms are the focus of many institutional actors comprising this broad security field. Our objective is not to describe such actors, which would constitute a monolithic mapping exercise, but rather to highlight the relational attributes among them. Various attempts to categorise cybercrime and cybersecurity threats and harms have been put forward (e.g. Agrafiotis et al., 2018; de Bruijne et al., 2017). However, any such attempt is a starting point rather than an end in itself, as it helps to frame the distribution of responsibilities and capacities within the cyber field.
Australia’s most recent
Finally, new threat configurations erasing the convenient boundaries that characterise existing typologies emerge on a regular basis. For example, the leaks of offensive hacking tools developed by the National Security Agency and the Central Intelligence Agency (probably orchestrated by intelligence adversaries) have been exploited by for-profit hackers to fuel their cybercrime spree, effectively using American intelligence agencies as their Research and Development laboratories (Trend Micro, 2019). Cyber-attackers working on behalf of nation states have also been observed selling access to the networks they infiltrated for espionage purposes to cybercriminals and running ransomware campaigns to increase their profits (Group IB, 2020), while in a symmetrical hybridisation process, state-sponsored groups are buying access to targets of interest from cybercrime groups (Global Research & Analysis Team, 2020). Where cyber-related harms and their associated security actors sit along the ‘low’ and ‘high’ policing (Brodeur, 2010) continuum is therefore difficult to tease apart.
New cybersecurity actors
It is therefore not surprising that this security field includes a diverse array of actors that cross long-established organisational boundaries, including policing, intelligence and defence agencies along with policy departments from multiple levels of government. Some of these actors have much more experience and expertise to respond to cyber harms than others. Police, for example, are widely known to struggle to deal with cybercrime, while signals intelligence agencies have developed deep expertise in cybersecurity and have received very generous funding as a result of their central role in national cybersecurity strategies.
Over the last five years in particular, most governments have established new organisational forms in an effort to bring many diverse capabilities together. The Australian Cyber Security Centre (ACSC), established as a standalone agency within the Australian Signals Directorate (ASD), includes staff from five government agencies in law enforcement, criminal intelligence, security intelligence, signals intelligence and defence sectors. Computer Emergency Response Teams, among others, located in policy areas of government were also relocated into the ACSC at the time. The ACSC’s purpose is to provide a hub for information-sharing and public and private sector collaboration on cyber security, including preventing and responding to cyber threats and harms. It is similar to the National Cyber Security Centre (NCSC) in the United Kingdom (UK), established in October 2016, and the Canadian Centre for Cyber Security, established shortly after Australia’s in 2018, each also part of their respective signals’ intelligence agencies. In all cases, such centres report to cooperate with private stakeholders though there is no formal membership status extended outside of state actors. Alongside these centres, many governments have directed significant resources to funding centres specialising in cybersecurity research and commercialisation. 1
There are some notable differences between countries that we would like to reflect on a little here. For example, the activities of the ACSC are potentially broader than their equivalents in the UK and Canada. As mentioned above, it has a core function in relation to the reporting of cybercrimes, previously the responsibility of the Australian Criminal Intelligence Commission (ACIC).
2
When making a report, complainants are asked to identify as a person or individual, business or organisation, or government department. If reporting as an individual, the overwhelming majority of such reports are likely to be cybercrimes. Those making reports are informed that their matter will be passed onto the relevant police service and may or may not be investigated. In these cases, reports to the ACSC are likely for information gathering purposes only. There are no state police, who are responsible for most cybercrimes against individuals, in the ACSC and each state jurisdiction manages cybercrime reports in different ways. The UK, in contrast, has multi-agency Regional Organised Crime Units (ROCUs) that are hosted by the National Crime Agency (NCA), have responsibility for cybercrime and are connected to the NCSC. The commitment to similar units in Australia has been affirmed (Australian Government, 2020); however, the focus of the Joint Cyber Security Centres in Australia is more about engagement with cybersecurity stakeholders (amongst other things), including in the private sector, and less about responding to cybercrime. The NCSC is not responsible for the UK public online reporting tool,
Since the formation of the ACSC, the two most recent Director-Generals of the ASD have given become much more public as the activities of such agencies become increasingly promoted. The same general principle is true across the Five Eyes community as cyber-related harms have brought about greater visibility to this domain of high policing. As such, signals intelligence agencies, not long ago largely hidden from public view, are now taking a much more prominent position in the cybersecurity field. This role extends to advising business on cybersecurity resilience and practical steps for individuals to improve their cyber safety at home. The ACSC has engaged in continual campaigns and other strategies in a deliberate effort to raise its profile, largely with a goal of enhancing cybersecurity awareness and thus preventing online harms. Indeed, the Australian Security Intelligence Organisation (ASIO) has similarly just launched its first public campaign called ‘think before you link’, equally focused on raising awareness around cyber security (ASIO, 2020). The activities of such actors, however, are legally defined and differentiated. While the ACSC is within ASD, it is quite distinct from other ASD roles, which are exclusively focused offshore, including offensive cyber capabilities. While ASIO, as a security agency, is largely domestically focused, its national security and counterintelligence mandate is different from conventional crime. ASD has recently publicly revealed its role in offensive cyber operations in disrupting terrorist groups and in the last year has reportedly directed its capabilities against foreign cyber criminals behind COVID-19 themed phishing campaigns targeting Australian residents (Australian Government, 2020).
Blurring boundaries across the crime-security continuum
These boundaries are further blurring, however. For example, recent debate has occurred in relation to the potential for ASD to play a role in offensive cyber capabilities against transnational crime networks such as those involved in child sex offences and people smuggling (Australian Broadcasting Corporation, 2020). Many of these activities have long been the responsibility of the Australian Federal Police, the key federal agency investigating and prosecuting such offences. Although it is a legal requirement of most signals intelligence agencies across the Five Eyes that they cannot collect intelligence within their national borders, many have provisions to allow them to assist other actors such as national police or security intelligence agencies where that is requested. These examples serve to highlight our underlying argument that there are multiple points of convergence where cybercrimes and threats to cybersecurity meet. These developments are not unique to Australia. In 2015, the UK established a co-located Joint Operations Cell involving a collaboration between the Government Communications Headquarters (GCHQ) and the NCA (GCHQ, 2015). While this cell was initially focused exclusively on disrupting online child sexual exploitation, the relationship has since extended to many types of serious and organised crime, including fraud, money laundering, people trafficking and various forms of illicit smuggling activity. We therefore see high policing agencies becoming increasingly involved in low (or lower) policing activities.
The idea of a crime-security continuum is one way to begin to address the complexity of the cyber field. We situate crime at the ‘low’ policing end with security at the ‘high’ policing end. What becomes clear from doing so, if it was not clear from the paper already, is the many points of convergence we see in the middle (see Figure 2). For example, in one detailed review of cyber threat actor typologies, the authors identify 11 threat actor ideal types: extortionists, information brokers, crime facilitators, digital robbers, scammers and fraudsters, crackers, insiders, terrorists, hacktivists, state actors and state-sponsored networks (de Bruijne et al., 2017). These actors are then differentiated by their expertise, resources, organisational form and motivation. Although some of these actors could be viewed as being exclusively cybersecurity threats (e.g. state actors and state-sponsored networks), it is not quite as simple to do the same in relation to cybercrime. As mentioned above, financially motivated criminals might engage in activities that can clearly be viewed as crime, but the same actors could also direct their activities against higher risk targets (such as critical infrastructures) or be enrolled by state actors to conduct espionage campaigns or cyberattacks. In other cases, as in the examples of child sex exploitation, it is not the activity itself that elevates something from a crime problem to a security problem but rather the level of difficulty that capacity-limited police services experience in responding to such activities. An increasing amount of such harms therefore gets pushed into the middle of the crime-security continuum, if not much closer to security. The security actors comprising the cyber field are thus inextricably connected (see Figure 3 for a high-level overview that simply aims to demonstrate some potential ties between cyber actors, with black dots representing state actors and white dots private actors).

Crime-security continuum.

The cybersecurity field. LE: law enforcement.

Occurrences of the terms ‘cybersecurity’, ‘information security’ and ‘computer security’ in books published in English between 1960 and 2019.
In addition to mapping out the cyber field, the crime-security continuum has normative implications. There are cyber harms that we argue belong firmly in the low and high domains specifically. This is not to say anything about their seriousness insofar as victim impacts. In contrast, we argue that some harms are better recognised as crime problems rather than security problems and that their corresponding security actors should focus on different harms based on where they sit along this continuum. In particular, we would argue there is a much greater need for police–especially local police–to become involved in the cyber field. Some activities, most notably fraud and scams against individuals or organisations, are indeed criminal activities and, we argue, should be the focus of police (the difficulty in obtaining successful prosecutions notwithstanding). Even illicit activities undertaken by child sex syndicates and transnational crime groups would normally be considered
Conclusion
This paper is a starting point in seeking to promote much greater collaboration between and among disciplines in approaching the field of cybercrime and cybersecurity. It has highlighted how these fields emerged as discrete research problems and argued that much greater integration is needed to further advance these research fields. We have argued that both cybercrime and cybersecurity have been constrained by this bifurcation, meaning each would benefit from input from the other. Our primary goal has been to examine the relationships between cybercrime and cybersecurity and to reflect on what this relationship means for conceptualising this particular security field. Ultimately, it may be that all we have been able to successfully do is highlight what a challenging endeavour this will prove. Much like the term ‘security’ (e.g. Zedner, 2009), we need to recognise that cybersecurity means different things to different people. Different conceptions of security have emerged as an effort to denote specific security threats and referent objects. For example, distinctions are made between ideas such as ‘human security’, ‘national security’ and ‘international security’. If cybersecurity is viewed as a specialist domain of national security (which it clearly is, for some), we should not be surprised that political scientists focus on its securitisation. But it is clear that cybersecurity is about more than national security. Indeed, in the case of cybersecurity, there is an enormous potential of referent objects, ranging from individuals, organisations and corporations of all sizes, through to nation states and even international networks of state and non-state actors. It may be time to think deeply about whether additional prefixes to the term ‘cybersecurity’ would indeed add clarity to this field. The longstanding distinction between ‘low’ and ‘high’ policing (Brodeur, 2010) may have some utility at the extremes, with ‘low cybersecurity’ relating to such things as routine internet security and protecting personal accounts and devices, while ‘high cybersecurity’ includes protecting government systems against computer intrusions from state actors. Between these two extremes, there are many harms that can be classified in varying ways.
The difficulties in neatly defining cyber-related harms are also evidenced in the responses of governments and security actors. The introduction of new network-based cybersecurity centres undoubtedly has a number of positives in relation to both promoting cybersecurity awareness as well as harnessing resources to respond to cyber threats across organisational boundaries and professional disciplines. Yet, when we look at the growing number of harms that are captured under the banner of ‘cybersecurity’, and the increasingly diverse focus of such centres, it is clear that one cannot evoke the term cybersecurity and expect the audience to appreciate its intended meaning. The same term has dramatically different implications if it is being evoked in the context of local or personal devices and systems compared with those of financial institutions or the apparatus of government. Even within government, furthermore, the term has very different implications if we are focusing on protected to highly classified information such as in defence contexts.
Definitions aside, the cybersecurity field is converging along new configurations that blur the lines between law enforcement and national security, low and high policing, public and private security. We should question whether it is in fact desirable or not for traditional high policing agents (signals intelligence agencies) to have such a public role in cybersecurity, particularly in relation to cybercrime problems that are definitely more
Footnotes
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the Social Sciences and Humanities Research Council of Canada (950-231178).
