Policing the Cyberspace – Is the Peel Theory of Community Policing Applicable ?

WADA, Friday Josiah

Abstract


The current model for policing and law enforcement as proposed by Peel in 1829 is based on four characteristics that shapedhow conventional offline crimes are committed. The theory is founded on the fact that criminals and victims are proximate;there are limitations in the scale and extent of crime that can be committed per time; physical constraints such as planningthe crime and visiting the crime scene prior to the crime poses a challenge to criminals; and the ability of law enforcement toprofile or study the crime pattern can aid detection and apprehension. Although Cyber crimes share a few of the attributes ofconventional crimes, it deviates completely in terms of its operation. For instance, cyber crime is automated, thus it has in itsintrinsic nature, the potential to attack multiples of victims per time at different location. Spatial confinement is thereforenegated as a means for detection and apprehension. Another interesting but disturbing phenomenon on the webscape is thatcyber criminals can subtly turn their victims to criminals by hijacking (using anonymous proxies) their systems. Suchsystems are used to propagate the crime in order to reach more victims and escape detection. Crimes of this nature arecommitted across international boundaries, hence sovereignty of states are violated making prosecution extremely difficult.Building on a previous work by Longe et al (2010), this paper takes a critical look at the Peel theory of policing in thecontext of cyber crime. We identified the Achilles heel in the model and make recommendations that will assist in scaling upthe theory to be able to respond appropriately to the challenges of fighting crime in the information age.Keywords: Cyber crime, Law Enforcement, Policing, Proxies, Peel Model.

Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.