Abstract
Victims are often conceptualized as single, human and static entities with certain risk factors that make them more vulnerable and attractive for offenders. This framework is challenged by emerging forms of high-tech cybercrime, such as ransomware, botnets and virtual theft, in which the offender targets a composite of human, technical and virtual entities. This study critically assesses the current theorization of the cyber victim and offers an alternative approach. Drawing on actor-network theory and three empirical case studies, it analyses the cyber victim as a hybrid actor-network consisting of different entities that, together with the offender, make the victimization possible. The proposed concepts of victim composition, delegation and translation enable a more profound understanding of the hybrid and complex process of becoming a high-tech cyber victim. Keywords: cybercrime, cyber victimization, actor-network theory, botnet, ransomware, virtual theft
Introduction
Although computer viruses have existed already for quite some time, today’s ‘digital demons’ seem to take it even further. Nowadays our computers and devices can get infected with all kinds of advanced malicious software (malware 1 ), enabling an offender to take over computers and use them as ‘bots’ or ‘slaves’ in a cyber attack, or remotely take them ‘hostage’ by means of ‘ransomware’. In the latter case, the computers or computer files are locked or encrypted, denying the victims access until the ransom has been paid (Gazet, 2010). Malware can also be used to steal personal credentials or to make fraudulent bank transactions (Bossler and Holt, 2009). In other words, our offline, digitalized and virtual lives can be targeted and harmed in multiple new, different and sophisticated ways.
These more technical forms of criminal victimization differ from traditional victimization in various aspects. For instance, the interaction between the offender and victim is much more indirect (Reyns, 2013), and the offensive actions are often directed not only towards humans, but also towards vulnerable technical devices, which play a crucial role in the victimization process. This poses the question whether victimologists and criminologists are confronted with a different type of victimization than they are familiar with, and whether existing theories and concepts provide sufficient analytical power in this context.
This article critically assesses the current criminological theorization of the ‘cyber victim’ in light of newly emerging forms of high-tech cyber victimization, and provides an alternative conceptualization. In this context we adopt a problem-driven approach. Based on the analysis of three empirical cases of cyber victimization, involving respectively ransomware, botnets and virtual theft, we demonstrate that existing approaches commonly used in cyber criminology (the lifestyle routine activity approach in particular) are too anthropocentric, reductionist and dualistic in nature for a type of victimization in which there are no clear boundaries between the human and the technical, the actual and the virtual, and the offending and the victimized (see also Brown, 2006; Franko Aas, 2007).
We suggest an alternative conceptualization of the cyber victim through exploring the theoretical potential of actor-network theory (ANT; Latour, 2005). In this context we build on the ANT approach to cybercrime proposed by Van der Wagen and Pieters (2015), but extend the framework to victims and victimization. ANT is a critical and constructivist approach that provides a conceptual framework in which entities, actors and actions are understood in a networked, heterogeneous and complex fashion (Latour, 2005; Verbeek, 2006). ANT does not differentiate a priori between entities in terms of their
The first section of this article takes a look at how the high-tech cyber victim is currently theorized in existing criminological research. We then present the three empirical cases and point out different conceptual limitations of existing approaches in capturing the features of these forms of cyber victimization. The article then discusses ANT’s conceptual framework and assesses its potential in relation to the cases, resulting in an alternative conceptualization of the high-tech cyber victim. In the final discussion we will touch upon the wider implications of the proposed hybrid victim approach and provide suggestions for further research.
The current theorization of the high-tech cyber victim
In recent years, cybercrime victimization has become an important and rapidly evolving field for criminology (see Holt and Bossler, 2014). Although it is a rather specific subfield, it deals with a wide variety of criminal victimization. Cybercrimes can be targeted against specific individuals (for example, online harassment, stalking), groups of individuals (for example, hate crimes), computer systems or networks (for example, hacking), (large) populations of computer users (for example, virus infections), virtual entities (for example, virtual rape), critical infrastructures (for example, cyber attacks against power plants), and so on. The current study concentrates on the theorization of forms of cybercrime that have a significant technical or ‘high-tech’ dimension, also referred to as ‘computer-focused crime’ (Maimon et al., 2015) or ‘true cybercrime’ (Wall, 2007). These crimes differ from the more ‘low-tech’ cybercrimes (for example, cyber stalking) in the sense that digital technology is not only a means to commit crime but a necessary condition for the type of crime committed (Koops, 2010). These crimes have gained relatively little attention in criminology (see, for example, Bossler and Holt, 2009, 2011; Leukfeldt, 2015), and their technical nature may challenge existing theoretical frameworks more or differently than so-called computer-enabled crimes such as cyber stalking.
Criminological studies that have been conducted on high-tech cyber victimization are predominantly empirical tests of the lifestyle approach (Hindelang, Gottfredson and Garofalo, 1978) and/or the routine activity theory (Cohen and Felson, 1979), theories that are also most influential in traditional victim studies. The lifestyle model supposes that certain behaviours (for example, related to work, school and leisure) expose certain individuals with certain demographic features to certain risky (crime-prone) situations (McNeeley, 2015). The Routine Activity Theory (RAT) on the other hand, focuses more on crime and victimization as an event (Pratt and Turanovic, 2016). It considers victimization to be the result of the convergence in time and space of a motivated offender, a vulnerable or suitable target/victim and the absence of capable guardianship. It assumes that motivated offenders seek to find places where suitable targets are concentrated, but also places where they can find an absence of capable guardianship, guardians being humans or objects that can prevent crime from occurring (for example, a fence, a surveillance camera or a police officer) (Yar, 2005). Although these theories are distinct approaches, they lead to similar hypotheses and are often combined in one framework, also denoted as general opportunity theory or lifestyle routine activity theory (see McNeeley, 2015, for an overview).
Following this approach, studies on high-tech cyber victimization seek to unravel which individual and situational factors put certain people at risk of cyber victimization. Yet, instead of offline activities, these studies concentrate primarily on people’s
In short, criminological studies on high-tech cyber victimization generally apply an opportunity-based approach, thereby seeking to map the individual and structural features of the cyber victim population. Although online and technical risk factors are also examined, these studies tend to conceptualize victims in a similar vein as victims of traditional crime: as vulnerable (human) entities with certain risky characteristics that make them more visible, suitable and/or attractive for offenders. We question whether such a framework provides an adequate and sufficient basis for the analysis of high-tech crime victimization, because of the key role played by technological and virtual entities in the victimization process.
Setting the empirical context: The victim of ransomware, botnets and virtual theft
In order to critically assess the dominant theories that are currently applied in criminology, we now take a closer look at three empirical cases of high-tech crime victimization, involving ransomware, botnets and virtual theft. By drawing on these cases and the features that can be abstracted from them, we seek to examine the applicability of current frameworks more concretely and expose how and why their analytical power is limited. At the same time, the cases are used as the empirical basis for assessing ANT’s analytical potential in relation to high-tech cyber victimization later in the article.
The reason for selecting these particular three cases is twofold. Firstly, the cases represent recent and underexplored types of high-tech cybercrime victimization and its characteristic general features, and each case also has distinguishing victimization elements, as discussed below. Secondly, we had the unique opportunity to gain access to these cases through police investigations and offender interviews. The first two cases concern police investigations that were placed at our disposal by the Dutch High-Tech Crime Police Unit. Both investigations included information on the victimization process. 2 The third case study is based on a face-to-face interview with an offender who was engaged in virtual theft by hacking the computer system of his fellow players. 3 He explained in great detail how he deceived and targeted his victims, thereby providing insights into how this particular type of victimization takes shape.
In the following, we will first introduce the cases and then assess the analytical power of existing theories in analysing the associated victims and victimization processes.
Case 1: Ransomware victimization
Ransomware can be defined as ‘a kind of malware which demands a payment in exchange for a stolen functionality’ (Gazet, 2010: 77). Although ransomware had emerged as early as 1989 under the name ‘PC Cyborg’ (Overill, 1998), the concept of taking a computer system hostage has become extremely popular, threatening and sophisticated in recent years (Gazet, 2010). The current case concerns one of the earlier manifestations of ransomware, also denoted as ‘scareware’, which is relatively easy to remove from the computer 4 and strongly depends on techniques of deception to make the computer user pay. At least 65,000 computer users in the Netherlands were infected with it.
The ransomware was mainly spread by means of infecting advertisements on pornographic and illegal downloading websites, but also through more regular ones such as newspaper and library sites. The targeted websites made use of an automated advertisement system involving banners and popups, based on a contract with an advertisement company. The offender(s) 5 purchased advertisement space and programmed the advertisements in such a manner that the ransomware could be downloaded when the computer users clicked on them. In this process computer users were actually silently re-directed to a server where a so-called ‘exploit kit’ was running, an advanced tool that automatically scans the vulnerability of the computer system and enables the installation of the ransomware. After its installation the computer displayed the following message: ‘You are a suspect in a crime [for example, distributing child pornography or illegally downloading content] and should pay a 100 euro fine [within 48 hours] in order to avoid criminal charges as well as to regain access to your computer.’ The pop-up message also included logos of the police and of the stores where a payment card could be bought. The users had to insert the code on the card in the field that was displayed on the blocked computer screen.
As we can read in the victim statements, those who paid the ransom sincerely believed that the displayed message was authentic. Most of the victims mentioned that the genuine-looking law enforcement imagery, logos and text tricked them, along with the fact that the computer really appeared to be blocked. Only when the computer remained blocked after paying the ransom did most users realize that they had been deceived, then reported the incident to the police and visited a computer store for removal of the malware.
Case 2: Botnet victimization
A botnet can be defined as a network of ‘victimized machines’, ‘zombie computers’ or ‘slaves’ under the remote control of an offender (denoted as a ‘botherder’), facilitating a broad range of crimes, including banking malware, credit card theft and distributed denial-of-service (DDoS) attacks (Wagenaar, 2012). 6 Whereas banking malware and credit card theft target the infected machines themselves, in DDoS attacks the infected machines are used to attack machines or systems outside of the network (Schless and Vranken, 2013). The current case, which involved a botnet of at least 3 million computers, included both types of attacks.
In order to set up and control the botnet, the botherder first had to infect the computers with bot malware, in this case ‘Bredolab’. He was aware of a specific vulnerability in advertising software and purchased a list of websites that used this particular software. He gained access to the advertisement space of at least 148 websites, through which he was able to target a large number of computer users. As soon as Bredolab was successfully installed on the computers, it basically functioned as a so-called ‘downloader’ – a program that enables the installation of additional malware, mostly on behalf of third parties who could place an order in the ‘botnet shop’ of the botherder (see also De Graaf et al., 2013). This additional malware was, for instance, a Trojan that steals banking credentials from the compromised machines (Van der Wagen and Pieters, 2015). 7
The malware spread at unprecedented speed. Within a relatively short time, multiple bots joined the network, even requiring the botherder to expand his infrastructure. However, the vulnerability the botherder was able to exploit was at some point (ready to be) patched or fixed by a security company. In order to prevent the patching of the software, he launched a DDoS attack on the company. Soon thereafter, law enforcement agencies traced the botherder and dismantled the entire botnet (for a full description, see Van der Wagen and Pieters, 2015; De Graaf et al., 2013).
Case 3: High-tech virtual theft victimization
Virtual theft refers to theft that takes place in the context of a virtual world or online game. Because the stolen virtual goods can have actual material value, virtual theft is considered an illegal activity, an issue widely discussed by legal scholars (see, for example, Strikwerda, 2012). The interviewed offender was active in a multiplayer game in which certain missions had to be accomplished for which he could earn valuable gear and outfits. The offender stated that he was able to steal thousands of euros from his fellow players, for which he employed two distinct methods.
In the first method he installed a remote access tool (RAT) on the computer of the fellow player, a tool or Trojan that enables the remote take-over of someone’s computer and webcam. He was able to install the RAT by luring the fellow players to a self-created (malicious) genuine-looking website that was related to the game. He started a chat conversation with the fellow players and then sent them the link of the fake website, for example by saying: ‘Here you can find the newest items of the game’. Once the person clicked on the link, the RAT was silently installed. The offender also sent the link of the fake website to the friends of the victim in order to infect them with the malware as well. The next step was to observe the fellow players through the webcam and to wait until they left the computer, which gave him the opportunity to steal the most precious virtual goods from their account. After he succeeded, he removed the malware from the computer and deleted all traces of his presence. The second method is rather different. The offender, here in the capacity of a virtual player (he had about 14 accounts), attacked his fellow players during the game itself, while simultaneously launching a DDoS attack on their computer (IP address). 8 During this attack, the fellow player was not able to defend him or herself because the system temporarily crashed. After killing the player, he could take (‘win’) their virtual belongings.
Limitations of existing frameworks in analysing high-tech crime cases
As mentioned earlier, one of the core assumptions within traditional frameworks is that certain individual and situational risk factors increase the likelihood of becoming a (cyber) victim. On the basis of the three cases, it seems that analysing such factors can contribute to more knowledge about cyber victims. For instance, not updating software, visiting certain websites and/or clicking on (malicious) advertisements most likely increase the likelihood of becoming infected with malware. However, when we look more closely at the process in which the victim is targeted and becomes a victim, existing criminological frameworks also seem to encounter certain conceptual problems and have some critical blind spots.
Firstly, in the lifestyle routine activity theory, risk and vulnerability are generally attributed or assigned to single entities. In the above cases, however, it is not one single homogeneous entity but rather a chain or
Secondly, it can be argued that existing frameworks are too anthropocentric when it comes to grasping who/what is ‘the victim’ in high-tech cyber victimization, an issue that has also been raised with regard to victims of environmental crime, such as animals, plants and ecosystems (see, for example, Hall, 2011; Halsey and White, 1998). Green criminologists plead for a broadening or extension of the victim concept in order to qualify non-humans for the status of victim, and take a critical stance towards the individual and human conception of victimhood in traditional frameworks. The emphasis on humans as victims has also been debated in the context of virtual criminality, which involves not merely entities that are non-human but also virtual and fictional ones. In the case of virtual rape, for example, it is not the human body that is physically harmed, but rather the ‘virtual self’ that is emotionally suffering, which in turn poses the question whether victimhood requires a conceptualization beyond the human body (Brown, 2006; Strikwerda, 2015).
In the context of high-tech cyber victimization, we do not argue for a broadening of the victim concept in the sense that technical or virtual entities should also have the status of victim. Instead, we stipulate the
This brings us also to the rather dualistic nature of criminological frameworks. Opportunity theories and also criminology in general maintain strict divisions between what is human and what is technological (see also Brown, 2006; Franko Aas, 2007), but also between who is the victim and who is the offender (Van der Wagen and Pieters, 2015). Although much work has been done in victimology to study why offenders are more likely to become victims as well – also denoted as the ‘offender–victim’ overlap (see Jennings et al., 2012) – ontologically criminologists still consider the victim and the offender as two separate entities. As we can see in the cases, such a distinction might vanish when digital technology is involved. In the case of botnets, for example, the victimized machines become part of a larger network of machines and are then used to attack others. So a botnet can simultaneously be a victim or victimized network and an infrastructure or tool for other crimes, and thus operate in the capacity of an offender. We also see this dynamic in the case of infected websites and in the use of already hacked accounts to spread the malware further. This contagious nature of the victimization process also makes it more difficult to determine when a victimization begins and ends, just as in the case of a biological virus. Lifestyle routine activity theory tends to analyse and conceptualize victimization in terms of a concrete event, whereas victimization in the digital age can have a long-lasting and unpredictable nature (see, again, Whitson and Haggerty, 2008).
Thirdly, lifestyle routine activity theory is more engaged in assessing the suitability of the victim than with the targeting process itself when it comes to explaining victimization. As we have pointed out already, victimization is conceptualized in terms of
When considering the conceptualization of the role of the victim in the victimization process, we can argue that opportunity theory, aside from ‘being vulnerable’ or ‘putting themselves in risky situations’, under-theorizes the role of the victim or takes it for granted. The role of the victim is however overemphasized in the traditional literature through the controversial concept of ‘victim precipitation’, which refers to the notion that victims actively contribute to their victimization (Von Hentig, 1940, 1948). This concept has always been associated with ‘victim blaming’ rather than merely being a neutral concept for analysing the interaction between offenders and victims (see Rock, 2007). Based on what we have seen in the cases, it can be argued that elements of victim precipitation also need further theoretical consideration if we fully want to grasp how high-tech cyber victimization takes shape as an interactive process. As Demant and Dilkes-Frayne (2015) point out in their discussion of the limitations of situational crime prevention, criminologists cannot understand how crime events unfold when they merely look at the (rational) choice making of offenders. In the footsteps of ANT, the authors conceptualize a crime event as a process that is co-shaped by multiple entities in the network, and not merely by the offender. This angle is also one of the cornerstones of our approach to victimization (see further in this article).
The lens of actor-network theory
The limitations outlined above – the rather anthropocentric, dualistic and reductionist nature of existing approaches used to study (high-tech) cyber victimization – led us to the constructivist framework of actor-network theory. ANT can be situated in science and technology studies and is commonly connected with the work of Callon (1986), Law (1992, 2004), Mol (2010) and Latour (1992; 2005). In recent years, various studies have emerged that apply ANT in the context of crime (see Luppicini, 2014, for an overview; Robert and Dufresne, 2015). Also the value of ANT is increasingly recognized in the scope of cybercrime (Brown, 2006; Smith et al., 2017; Wood, 2017). Yet empirical criminological studies applying ANT in the cyber domain are still quite rare (see, for example, Hinduja, 2012; Van der Wagen and Pieters, 2015; Van der Wagen, 2018a).
ANT is not a theory in the traditional sense of the word, but rather a critical framework or lens that provides a list of sensitizing terms (Mol, 2010). ANT criticizes traditional social scientists (for example, Giddens, Durkheim, Habermas, etc.) – to whom Latour refers as ‘the sociologists of the social’ – for treating ‘the social’ as a distinct substance (next to technical, biological and economic ones) and for presenting the social as some kind of stable force or cause (see Latour, 2005). Alternatively, Latour proposes to treat the ‘social’ or any ‘thing’ as a network or collective of various non-social (human and non-human) elements. This approach of the social he terms the ‘sociology of associations’.
ANT is also supportive of a ‘material turn’ or a ‘turn to things’ (see also Preda, 1999), arguing that non-human entities should be viewed and studied as
This is also reflected in the metaphor of
ANT also points out that we should look at
A related concept is ANT’s notion of delegation. In order to complete a certain programme of action, actions can be also
Conceptualizing high-tech cyber victimization through ANT
From the above description, it follows that ANT is a lens that requires actors and actions to be viewed in a more networked, hybrid and complex manner, a principle that is reflected in each single ANT concept. Drawing on this perspective, we propose to conceptualize the high-tech cyber victim as a heterogeneous network of various interacting elements that have to be targeted, deceived and/or controlled by the offender, which is also an actor-network (Van der Wagen and Pieters, 2015). This analytical framework includes three main interrelated concepts:
Victim composition
As pointed out before, there is often no single victim or target involved in high-tech cybercrime, but rather a chain or network of (multiple) targets/victims (human, technical and virtual) whose vulnerability has to be targeted, either chronologically or simultaneously. Traditional opportunistic frameworks, which have a tendency to attribute risk or vulnerability to a single point actor, therefore seem to have limited explanatory power in this context. ANT’s concept of
As we have seen in the cases, technical vulnerability is always essential to target a computer user, yet is often still not exploitable without a human vulnerability and/or a human action such as one ‘wrong’ click (see also the concept of delegation). At the same time, the victim is targeted as a hybrid entity, being neither entirely human nor exclusively technical or virtual. In the case of ransomware, for example, the victim is targeted as a human and a machine, one enabling the targeting of the other, and also in the hybrid sense that computers are not merely tools but devices that people are attached to and depend on. In the case of virtual theft, on the other hand, the victim is a virtual player who is attacked in the setting of a fictional game, but also as a ‘real’ person behind the avatar and webcam, possessing virtual goods with ‘real value’. Even the offender himself operated in the capacity of both virtual and real agent, blurring the distinction between the fictional and the actual. The concept of victim composition can thus unravel the hybrid nature of the victim as an entity and target.
Victim delegation
As we could observe in the cases, various human and technical entities are mobilized, designed, rented and/or purchased by the offender(s) to initiate, carry out and realize the victimization. Traditional approaches used in victim studies do not draw much attention to the offending process itself in the analysis of the victim. The concept of
Victim translation
As mentioned before, traditional approaches tend to treat the suitable target as a pre-existing and rather static entity exposed to a motivated (strategic) offender. It can be argued that such a view blackboxes the interactive nature and dynamics of the victimization process. From the ANT angle, victimization is considered as an interactive and generative process in which the victim as a network has to be created, programmed, controlled and exploited by the offender. ANT’s concept of translation – which stipulates the transformative nature of events, actors and situations – could be useful to look at victimization in a more interactive and fluid way. Target suitability is then considered not as something pre-existing but as being partly determined and generated
Conclusion and discussion: Towards a hybrid victim theory
In this article we have aimed at outlining limitations of the current theorization of the cyber victim – the lifestyle routine activity framework in particular – and suggested an alternative conceptualization based on actor-network theory. By assessing the ANT lens in the context of three high-tech crime cases, we formulated three ANT-based victim concepts, a framework we would like to denote as ‘hybrid victim theory’.
The concept of
For the study of high-tech victimization, such an approach suggests that we should not only examine the actors that we usually consider to be ‘the victim’ (the eventual human computer users). In order to expose the (composition of) actors that generate or ‘cause’ victimization, we have to examine the offender and all the entities that he or she is targeting, including the computer of the user. More research on the role of entities such as website owners, whose website is used to distribute malware, also becomes more crucial (victim delegation). Furthermore, in light of the transformative and interactive nature of victimization (translation), the hybrid victim approach also opts for other research methods. For instance, experimental research in which computer users are exposed to certain conditions could gain insights into victims’ programmes of action (for example, whether they will click on certain links)
The hybrid victim approach could also provide a basis for novel ways of thinking about crime prevention, or at least add a dimension to current approaches within situational crime prevention (see also Demant and Dilkes-Frayne, 2015). For example, since it looks at how vulnerabilities are distributed among various human and non-human nodes in the victim network, it will also propose the setting-up of a distributed network of (interconnected) anti-programmes to defeat or prevent cyber victimization. Fixing vulnerabilities and becoming more resilient is then perceived as a collaborative duty
From the perspective of hybrid victim theory, measures could also be directed at (preventing) particular (inter)actions that play a role in enabling high-tech cyber victimization. Traditionally, one would stimulate potential victims (computer users) to change their password frequently, to not click on every link or attachment they encounter or to update their software, for example by means of awareness campaigns. From the perspective of hybrid victim theory, with the computer as part of the victim actor-network, an additional emphasis on technical encouragement or enforcement becomes more natural. Different forms of (in-built) ‘technical assistance’ could make the composite victims better equipped (‘resilient’) to combat and defend themselves against various cyber risks, including malware-based infections. Technical assistance could be also provided to victims that have
This study marks only the beginning of criminology’s engagement and theorization of high-tech crime victimization, based on a study of ransomware, botnets and virtual theft. Valuable research could still be done in terms of additional case studies, extensions of the new conceptual framework, and assessing the implications for quantitative research in the cyber domain. At the same time, our study provokes the question about criminology’s future engagement and role in the analysis of high-tech crime and victimization. Since vulnerabilities are to a large extent technical in nature, criminologists should become more technically proficient and/or seek closer cooperation with computer scientists.
Footnotes
Acknowledgements
We would like to thank René van Swaaningen, Martina Althoff, and the two anonymous reviewers for their constructive and valuable comments on the earlier draft of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship and/or publication of this article: Wytske van der Wagen’s research was conducted in the scope of a PhD project financed by the University of Groningen (Faculty of Law). Wolter Pieters’ research has received funding from the European Union’s Horizon 2020 Research and Innovation Programme, under grant agreement no 740920 (CYBECO). This publication reflects only the authors’ views and the EU is not liable for any use that may be made of the information contained herein.
