1. How does cyber technology impact interactions between offenders and victims?

The online cyberspace creates a free-for-all marketplace for predators and criminals to hunt their victims. The opportunities are essentially endless for these types of criminals, and they chances that their identities will be uncovered are slim. These offenders have a nearly untouchable status that allows them to remain anonymous and keep offending until they majorly slip up. Finding personal information legally is incredibly easy to do online, so someone with hacking ability and willingness to dip into illegal means of access, can find out anything they want about someone and use that to commit an array of crimes, from fraud to murder. Cyber technology has given offenders the power and the victims have little means to defend themselves

2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Technology evolves rapidly, and our policy can simply not keep up. Predicting attacks and changes to technological. Advances is nearly impossible. In order for us to develop cyber policy and infrastructure, we need to be reactive yet prepared. We are at a disadvantage because it is extremely hard to predict when attacks are eminent. What we can do is hire the brightest minds, and invest in the best technology to combat cyber warfare. By creating living policies that can ebb and flow with the inconsistent state of technology, we can best preside on cyber related issues. By building on existing policy we are able to add and change in accordance with newly emerging issues, advancements and attacks. By pursuing international relations, we can help ourselves learn about the technologies the other countries have created as well as what adversaries are utilizing. We can combine forces with allied nations to combat these new developments made by other countries.

Sources https://www.cfr.org/blog/how-should-us-cybersecurity-policy-develop

https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf