How does cyber technology impact interactions between offenders and victims?
One way that cyber technology has impacted these interactions is that these interactions have become much more anonymous. Before the internet became much more interconnected, when someone wanted to commit a crime, it had to be done in person. In a bank robbery, whoever is committing the crime, needed to show up to the bank, where people could see what the person looks like, even if their face may be obstructed. However, with cyber technology, people can now hack into banks and steal the same amount of money, if not more, as someone who walked in there. Then, nobody has any idea who this person is because nobody has seen them and all they may be is an IP address. In addition, with cyber technology there is likely more offenders for one victim. Anything can be shared very easily and quickly over the internet to many people. Especially with anonymity, more than one person may be interacting with a single victim. One example of this is cyber bullying. With anonymity, people are more comfortable with bullying someone online because they believe that they are safe from any consequence. Another difference in interactions is that the number of people that can do something at once is much higher due to cyber technology. One example of this is that whole teams can work on hacking a single business, or network, or country.
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
Firstly, the reason that the “short arm” of predictive knowledge is better than a “long arm” of predictive knowledge is that with a “short arm,” the knowledge is more present rather than reaching far out to something that may not happen. Especially when it comes to cybersecurity, systems need to be updated in the present rather than try to be ready for something that may never happen in the future. If the predictive knowledge looks too far ahead, it may miss what needs to be done at that moment. In order to find use of that predictive knowledge, systems need to be constantly kept up to date to prevent vulnerabilities and to keep a secure system.