Abstract
Three categories of organised groups that exploit advances in information and communications technologies (ICT) to infringe legal and regulatory controls: (1) traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; (2) organised cybercriminal groups which operate exclusively online; and (3) organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct are described in this article. The need for law enforcement to have in-depth knowledge of computer forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques will become more pronounced with the increased likelihood of digital content being a source of disputes or forming part of underlying evidence to support or refute a dispute in judicial proceedings. There is also a need for new strategies of response and further research on analysing organised criminal activities in cyberspace.
Similar content being viewed by others
Notes
Interested reader is referred to a recent article of Galeotti (2008) for an excellent overview of the history of organised crime.
The definition of “organised criminal group” from Article 2 of the UN Convention on Transnational Organized Crime is adopted in this article: a group having at least three members, taking some action in concert (i.e., together or in some co-ordinated manner) for the purpose of committing a ‘serious crime’ and for the purpose of obtaining a financial or other benefit. The group must have some internal organization or structure, and exist for some period of time before or after the actual commission of the offence(s) involved.
In this article, traditional organised crime groups refer to crime groups known to be involved in traditional criminal activities that took place in the physical world (e.g. murder, extortion, money laundering and drug trafficking).
Organised cyber crime groups refer to online crime groups that may exist only in cyberspace such as hackers groups.
Although many organised crime groups now aim at making money, several traditional ones (e.g. Italian and Italian American mafia), as pointed out by one of the reviewers, may still aim at exercising political power as well.
Interested reader is referred to a recent article of Sein (2008) for an excellent overview of one major human smuggling case in the USA—the case involving “Sister Ping”.
It is not the intention of this article to discuss whether the use of technology by traditional organised criminal groups (e.g. the triads in Hong Kong, the secret societies in Singapore and the Japanese Yakuza) is a generalised phenomenon although recent incidents suggest that traditional organised criminal groups are increasingly involved in technology-enabled crimes such as intellectual property offences.
Refer to the United States Securities and Exchange Commission on “Pump and Dump Schemes” for more information—http://www.sec.gov/answers/pumpdump.htm
Malware, also known as malicious software, is designed to install itself on a computer without the computer owner’s informed consent, particularly if it does so in a way that may compromise the security of the computer. Malware includes Trojans, viruses and worms.
In such scams, the perpetrators often pretend to sell something that they do not have while requesting for the payment in advance. Recent cases include the arrest of a group of 419 scammers by Dutch police in February 2007 (Libbenga 2007) and the February 2008 arrest of a Nigerian citizen in Perth, Australia who was alleged to be a an international A$1 million internet scam syndicate (AAP 2008).
Recent statistics (NW3C/FBI 2007) indicate that online auction fraud is the most prevalent offence type reported to the Internet Crime Complaint Center. Out of 207,492 complaints between 1 January and 31 December 2006, online auction fraud accounted for 45% of the 86,279 cases referred to US law enforcement agencies and 33% of the total reported dollar loss. It is important to recognise, however, that in comparison with the total volume of online transactions the number of complaints remains relatively small.
In a recent case, a defendant who is one of 17 individuals indicted on charges including Conspiracy to Commit Offenses Against the United States, Fraud in Connection with Access Devices; Fraud in Connection with Identification Documents, Authentication Features, and Information; Aggravated Identity Theft; Conspiracy to Commit Money Laundering, and aiding and abetting these offenses, allegedly obtained stolen credit and debit card account information by visiting Internet Relay Chat rooms and forums run by cybercriminals. The defendant then allegedly encoded these fraudulently obtained credit card information onto plastic cards with magnetic strips and used the plastic cards to withdraw money from automated teller machines and automated cashier machines. Several other individuals were reportedly recruited by the defendant to repatriate the proceeds of crime overseas—money mules. On 10 August 2007, the defendant was sentenced to 84 months in prison and was ordered to make restitution to the victim banks, forfeit property which represented both the means used to commit these offenses as well as the proceeds of the offenses, and serve a 3 year term of supervised release (US DoJ 2007g).
A botnet is a network of individual computers infected with bot malware. These compromised computers are also known as zombies or zombie computers. The zombies, part of a botnet under the control of the botnet controller, can then be used as remote attack tools to facilitate the sending of spam, hosting of phishing websites, distribution of malware, and mounting denial of service attacks. Among the three botnet communication typologies identified by Cooke et al. (2005)—centralised, distributed P2P and random—the most commonly used are the centralised and distributed P2P. Building botnets requires minimal levels of expertise (Ianelli and Hackworth 2005). A brief two-step overview on how to build a botnet is outlined by Choo (2007).
Money mules are individuals hired by organised criminals to perform international wire fraud (AIC 2007) or to purchase prepaid cards, and the mailing or shipping of prepaid cards out of the country without regulators being aware (Choo 2008). A recent example of individuals being recruited by organised crime groups to repatriate criminal proceeds includes the example case reported in the 2005–2006 Asia/Pacific Group on money laundering yearly typologies report (APG 2006:9).
In the Federal Trade Commission complaint, it was alleged that ‘TJX, with over 2,500 stores worldwide, failed to use reasonable and appropriate security measures to prevent unauthorized access to personal information on its computer networks. An intruder exploited these failures and obtained tens of millions of credit and debit payment cards that consumers used at TJX’s stores, as well as the personal information of approximately 455,000 consumers who returned merchandise to the stores. Banks have claimed that tens of millions of dollars in fraudulent charges have been made on the cards and millions of cards have been cancelled and reissued’ (US FTC 2008:unpaginated). Several media articles further suggested that between 45 and 90 million payment card accounts were, in fact, compromised as a result of the data breach incident involving The TJX Companies Inc.’s (Abelson 2007; Goodin 2007; Vijayan 2007). On 27 March 2008, the US Federal Trade Commission announced that ‘discount retailer TJX and data brokers Reed Elsevier and Seisint have agreed to settle charges that each engaged in practices that, taken together, failed to provide reasonable and appropriate security for sensitive consumer information. The settlements will require that the companies implement comprehensive information security programs and obtain audits by independent third-party security professionals every other year for 20 years’ (US FTC 2008:unpaginated).
Bot malware, a malicious program, allows attackers to remotely control vulnerable computers and form virtual networks of zombies—botnets. Botnets can be leveraged to orchestrate concerted attacks against other computing resources, for example, distributed denial of service (DDoS) attacks against targeted networks (Choo 2007).
Distributed denial-of-service (DDoS) attacks are targeted attacks against specific website(s) by flooding the web server(s) with repeated messages, tying up the system and denying access to legitimate users.
Keyloggers (also known as keylogging programs) are designed to monitor user activity including keystrokes. They can be used by cybercriminals to steal passwords or credit card details, which can then be used for malicious purposes such as identity/online fraud.
According to a recent media release by the FBI, ‘[t]he ring, in fact, was run very much like a business, with various players handling different roles, direction coming from the top down, and the sadistic images serving as currency. Again, a sophisticated operation’ (FBI 2008a:unpaginated).
Known politically motivated hacker groups include ‘Hacker Union for China’ and ‘ChinaHonker.com.’
Computer forensics can be defined as the science of identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data (NIST 2006).
References
Abelson J (2007) Breach of data at TJX is called the biggest ever. The Boston Globe, 29 March. Avialable at: http://www.boston.com/business/globe/articles/2007/03/29/breach_of_data_at_tjx_is_called_the_biggest_ever/
Adam A (2002) Cyberstalking and Internet pornography: gender and the gaze. Ethics Inf Technol 4(2):133–42
Ahmad R (2007) Slashing through the Web of terror. Todayonline, 3 March
Ames B (2007) Online spending tops US$100 billion. Computerworld.com.au, 05 January
APACS (2008). Quarterly statistical release (15.05.08). Available at: http://www.apacs.org.uk/media_centre/documents/080515APACSquarterlystatisticalreleaseMar08final.pdf
Armagh DS, Battaglia NL (2006) Use of computers in the sexual exploitation of children, 2nd edn. US Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, Washington, DC
Asia-Pacific Group on Money Laundering (APG) (2006) The Asia/Pacific Group on Money Laundering (APG) yearly typologies report 2005–2006. Available at: http://www.apgml.org/documents/docs/6/APG%20Yearly%20Typologies%20Report%2005-06_PUBLIC.pdf
AusCERT (2006) Computer crime and security survey. Available at: http://www.auscert.org.au/images/ACCSS2006.pdf
Australia Associated Press (AAP) (2007) Selim cleared over destruction of data. 19 April. Available at: http://www.smh.com.au/news/national/selim-cleared-over-destruction-of-data/2007/04/18/1176696916796.html
Australia Associated Press (AAP) (2008) Police unveil $1 million internet scam. 23 February. Available at: http://www.smh.com.au/news/security/police-unveil-1-million-internet-scam/2008/02/23/1203467457719.html
Australian Crime Commission (ACC) (2007) Illicit drug data report 2005–06. Available at: http://www.crimecommission.gov.au/content/publications/iddr_2005_06/IDDR_2005-06.pdf
Australian Crime Commission (ACC) (2008) Organised crime in Australia. Available at: http://www.crimecommission.gov.au/content/publications/Other_Publications/080117_Organised_Crime_In_Australia.pdf
Australian Federal Police (AFP) (2008) National child porn operation nets 90 people. Media release 5 June. Available at: http://www.afp.gov.au/media_releases/national/2008/national_child_porn_operation_nets_90_people
Australian Institute of Criminology (AIC) (2006) Acquiring high tech crime tools. High tech crime brief no 13. Available at: http://www.aic.gov.au/publications/htcb/htcb013.html
Australian Institute of Criminology (AIC) (2007) Money mules. High tech crime brief no. 16. Available at: http://www.aic.gov.au/publications/htcb/htcb016.html
Australian Payments Clearing Association (APCA) (2005) Annual report 2005. Available at: http://www.apca.com.au/Public/apca01_live.nsf/WebPageDisplay/PUB_AnnualReport
Bakier AH (2008) Jihadi website advises recruits on how to join al-Qaeda. Terrorism Focus V(18):3–4
BBC News (2001) Russia arrests ‘grandfather of cybercrime’. BBC News, 26 May. Available at: http://news.bbc.co.uk/1/hi/world/europe/1353092.stm
Bequai A (2001) Organized crime goes cyber. Comput Secur 20(6):475–478
Brenner SW (2002) Organized cybercrime? How cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology 4(1):1–50
Canadian Security Intelligence Service (2000) Transnational criminal activity: a global context. Available at: http://www.csis-scrs.gc.ca/en/publications/perspectives/200007.asp?print_view=1
Casey E (2002) Error, uncertainty, and loss in digital evidence. Int J Digit Evidence 1(2)
Charlton J (2005) Al Qaeda buys cyber criminal expertise. Comput Fraud Secur 2005(3):9
Choo KKR (2007) Zombies and botnets. Trends & Issue, 333. Australian Institute of Criminology. Available at: http://www.aic.gov.au/publications/tandi2/tandi333.html
Choo KKR (2008) Money laundering and terrorism financing risks of prepaid cards instruments? Asian J Criminol (in press). doi:10.1007/s11417-008-9051-6
Choo KKR, Smith RG (2008) Criminal exploitation of online systems by organised crime groups. Asian J Criminol 3(1):37–59
Choo KKR, Smith RG, McCusker R (2007) Future directions in technology-enabled crime. Research and public policy series no 78. Australian Institute of Criminology. Available at: http://www.aic.gov.au/publications/rpp/78/
CipherTrust (2005) Phishing: organized crime for the 21st century. Available at: http://www.securecomputing.com/webform.cfm?id=102
Cohen CL (2007) Growing challenge of computer forensics. Police Chief 74(3). Available at: http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1136&issue_id=32007
Cooke E, Jahanian F, McPherson D (2005) The zombie roundup: understanding, detecting, and disrupting botnets. In: SRUTI’05 Workshop Proceedings. USENIX Association, Berkeley CA, pp 35–44
Curry A, McGrane S (2006) China’s cyberwarriors. Foreign Policy, September/October issue no. 93
Enforcement Bulletin (2007) Raid of a major pirate packaging facility in Guangzhou. Enforcement Bulletin Issue 33, p 5
Evron G (2008) Battling botnets and online mobs. Georget J Int Affairs Winter/Spring 2008:121–126
FBI (2008a) Major child porn ring busted and 20 children rescued worldwide. Press release, 6 March. Available at: http://www.fbi.gov/page2/march08/innocentimages_030608.html
FBI (2008b) Department of Justice launches new law enforcement strategy to combat increasing threat of international organized crime. Press release, 23 April. Available at: http://www.fbi.gov/pressrel/pressrel08/ioc042308.htm
Franklin J, Paxson V, Perrig A, Savage S (2007) An inquiry into the nature and causes of the wealth of internet miscreants. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 14th ACM conference on Computer and communications security, ACM CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007. ACM, New York, pp 375–388
Galeotti M (2008) Criminal histories: an introduction. Global Crime 9(1–2):1–7
Garretson C (2007) Whaling: Latest e-mail scam targets executives. Computerworld, 16 November. Available at: http://www.computerworld.com.au/index.php?id=1342062697&eid=-255
Gerstenfeld PB, Grant DR, Chiang C (2003) Hate online: a content analysis of extremist internet sites. Analyses of Social Issues and Public Policy 3(1):29–44
Goodin D (2007) TJX agrees to pay banks $41m to cover Visa losses. Channel register, 3 December. Available at: http://www.channelregister.co.uk/2007/12/03/tjx_settlement_agreement/
Goodin D (2008) Rent-a-bot gang rises from the DDoS ashes. Channel register, 13 March. Available at: http://www.channelregister.co.uk/2008/03/13/loadscc_rises_again/
Grabosky P (2007) Requirements of prosecution services to deal with cyber crime. Crime Law Soc Chang 47(4–5):201–223
Great Britain Crown Prosecution Service (GB CPS) (2006). Convictions for internet rape plan. Media release, 1 December
Harding T (2007) Terrorists ‘use Google maps to hit UK troops’. Telegraph.co.uk, 13 January
Harrison C (2006) Cyberspace and child abuse images: a feminist perspective. Affilia 21(4):365–379
Ianelli N, Hackworth A (2005) Botnets as a vehicle for online crime. CERT Coordination Center, Pittsburgh PA
Infosecurity (2007) Interview: Eugene Kaspersky 2007. Infosecurity, May/June issue
Institute of Defence and Strategic Studies (IDSS) (2006) Proceedings of the International conference on Terrorism in Southeast Asia: the threat and response. Available at: http://www.rsis.edu.sg/
Jaques R (2006) European police nab zombie hackers. Vnunet.com, 27 Jun
Jen WY, Chang W, Chou S (2006) Cybercrime in Taiwan: an analysis of suspect records. Paper to Workshop on Intelligence and Security
Keizer G (2007) Porn sites serve up Mpack attacks. Computerworld, 25 June. Available at: http://www.computerworld.com.au/index.php?id=610295694&eid=-255
Keizer G (2008) Researcher: Russian hosting network runs a protection racket. Computerworld, 20 February. Available at: http://www.computerworld.com.au/index.php?id=1496227928&eid=-6787
Kirk J (2007a) Hackers build private IM to keep out the law. Computerworld.com, 28 March
Kirk J (2007b) Symantec: Chinese hackers grow in number, skills. Infoworld.com, 18 May
Kirk J (2007c) Estonia recovers from massive denial-of-service attack. InfoWorld, 17 May
Kshetri N (2005) Pattern of global cyber war and crime: a conceptual framework. J Internat Manag 11(4):541–562
Kshetri N (2006) The simple economics of cybercrimes. IEEE Security Privacy 4(1):33–39
Lal R (2005) South Asian organized crime and terrorist networks. Orbis 49(2):293–304
Lesk M (2007) The new front line: Estonia under cyberassault. IEEE Security Privacy 5(4):76–79
Leyden J (2007) MI5 warns over China hacking menace. The register, 3 December. Available at: http://www.theregister.co.uk/2007/12/03/mi5_warns_over_chinese_hack_attacks/
Libbenga J (2007) Another 419 scam ring nicked. The register, 25 April. Available at: http://www.theregister.co.uk/2007/04/25/another_419_scamring_nicked/
Libbenga J, Leyden J (2007) Dutch botnet duo sentenced. The register, 1 February. Available at: http://www.theregister.co.uk/2007/02/01/dutch_botnet_gang_sentenced/
Marks P (2007) How to leak a secret and not get caught. New Sci 2586:13
McAfee (2006) Virtual criminology report: organised crime and the internet. McAfee, Santa Clara, CA
McCombie S (2007) Organised cybercrime & phishing: the godfathers of the internet. Presentation at the Technology Trends 2007 seminars, CSIRO ICT centre, Australia, 12 February. Available at: http://www.ict.csiro.au/MU/Trends/
McCusker R (2006) Transnational organised cyber crime—distinguishing threat from reality. Crime Law Soc Chang 46:257–273
McGraw G (2006) Interview: silver bullet speaks to Avi Rubin. IEEE Security Privacy 4(3):11–13
McMillan R (2008) Criminals hack ceos with fake subpoenas. PC world, 14 April. Available at: http://www.pcworld.com/businesscenter/article/144548/criminals_hack_ceos_with_fake_subpoenas.html
Miller N (2007) From Russia with malice: criminals trawl the world. The age, 24 July
MSN—Mainichi Daily News (2006) Inside the Yamaguchi-gumi: Ex-gangster’s life a history of Japan’s postwar underworld. MSN—Mainichi Daily News, 24 May
NACHA (2008) NACHA reports more than 18 billion ach payments in 2007. Media release, 19 May. Available at: http://www.nacha.org/News/news/pressreleases/2008/Volume_Final.pdf
National Institute of Standards and Technology (NIST) (2006) Guide to integrating forensic techniques into incident response. NIST computer security special publications SP800-86. NIST, Rockville, MD Available at: http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf
National Science and Technology Council (NSTC) (2006) Federal plan for cyber security and information assurance research and development. NIST, Arlington, VA
National White Collar Crime Center and Federal Bureau of Investigation (NW3C/FBI) (2007) 2006 IC3 annual internet fraud report. Available at: http://www.ic3.gov/media/annualreport/2005_IC3Report.pdf
Office of the United States Trade Representative (2007) 2007 Special 301 report. Available at: http://www.ustr.gov/assets/Document_Library/Reports_Publications/2007/2007_Special_301_Review/asset_upload_file980_11122.pdf
Organized Crime and Triad Bureau (2007) Triad activities in Hong Kong. Hong Kong Police, 30 May
PandaLabs (2007) Cybercrime.. for sale (II). Available at: http://blogs.pandasoftware.com/blogs/pandalabs/archive/2007/05/03/Cybercrime_2E002E002E00_-for-sale-_2800_II_2900_.aspx
Parliamentary Joint Committee on the Australian Crime Commission (2007) Inquiry into the future impact of serious and organised crime on Australian society. Parliament House, Canberra September
Pereira J (2007) How credit-card data went out wireless door. The Wall Street Journal, 4 May
PricewaterhouseCoopers (PwC) (2006) DTI information security breaches survey 2006. Available at: http://www.pwc.com/extweb/pwcpublications.nsf/docid/7FA80D2B30A116D7802570B9005C3D16
Rodriguez A (2007) Attacks on Estonia move to new front. Chicago Tribune, 29 May
Rogers M, Scarborough K, Frakes K, San Martin C (2007) Survey of law enforcement perceptions regarding digital evidence. IFIP Int Fed Inform Process 242:41–52
Schrank P (2007) Newly nasty. The Economist, 24 May
Sein AJ (2008) The prosecution of Chinese organized crime groups: the Sister Ping case and its lessons. Trends Organ Crim 11(2):157–182
Serious Organised Crime Agency (SOCA) (2006) The United Kingdom threat assessment of serious organised crime. Available at: http://www.soca.gov.uk/assessPublications/downloads/threat_assess_unclass_250706.pdf
Serious Organised Crime Agency (SOCA) (2008) The United Kingdom threat assessment of serious organised crime. Available at: http://www.soca.gov.uk/assessPublications/downloads/UKTA2008-9NPM.pdf
Simon Wiesenthal Center (2008) iReport: online terror + hate the first decade. Available at: http://www.wiesenthal.com/atf/cf/%7BDFD2AAC1-2ADE-428A-9263-35234229D8D8%7D/IREPORT.PDF
Singapore Commercial Affairs Department (CAD) (2006) Money mules. Available at: http://www.cad.gov.sg/crimeprev/cpa_moneymules.htm
Singapore Commercial Affairs Department (CAD) (2007) Case of 6-members credit card skimming syndicate. Media release, 21 May
Singapore Ministry of Home Affairs (MHA) (2004) Second reading speech for the Criminal Law (Temporary Provisions) (Amendment) Bill, Ministry Of Home Affairs—Speech by Associate Professor Ho Peng Kee, Senior Minister of State for Law and Home Affairs on 1 September 2004. Available at: http://app3.mha.gov.sg/news_details.aspx?nid=743
Singapore Police Force (SPF) (2007) Unlicensed moneylending syndicate busted—$130,000 seized. Media release, 13 April
Singh S (2007) The risks to business presented by organised and economically motivated criminal enterprises. J Financ Crime 14(1):79–83
Sophos (2007) Businesses warned by MI5 of Chinese espionage threat, Sophos offers advice. News release, 1 December. Available at: http://www.sophos.com/pressoffice/news/articles/2007/12/mi5-china-internet-spy.html
Swenson P, Shenoi S (2007) File system journal forensics. IFIP Int Fed Inform Process 242:231–244
Symantec (2007) Symantec internet security threat report vol. XI. Available at: www.symantec.com/threatreport
Todayonline (2007) Tigers have joined jihadi drug trade, says official. Todayonline, 11 June
United Kingdom Child Exploitation and Online Protection (UK CEOP) (2007) Global online child abuse network smashed—CEOP lead international operation into UK based paedophile ring. Media release, 18 June
United Kingdom Organised Crime Task Force (UK OCTF) (2007) Annual report and threat assessment 2007: organised crime in Northern Ireland. Available at: http://www.octf.gov.uk/index.cfm/section/publications/page/publicationList/viewArchives/true/category/5
United States Department of Justice (US DoJ) (2006) ‘Botherder’ dealt record prison sentence for selling and spreading malicious computer code. Media release, 8 May
United States Department of Justice (US DoJ) (2007a) Owners/operators of Asian massage parlors charged with transporting persons for prostitution. Media release, 11 May
United States Department of Justice (US DoJ) (2007b) Extradited software piracy ringleader sentenced to 51 months in prison. Media release, 22 June. Available at: http://washingtondc.fbi.gov/dojpressrel/pressrel07/wfo062207.htm
United States Department of Justice (US DoJ) (2007c) Former member of the US navy indicted on terrorism and espionage charges. Media release, 31 March. Available at: http://newhaven.fbi.gov/dojpressrel/2007/nh032107.htm
United States Department of Justice (US DoJ) (2007d) Heroin kingpin—first defendant ever extradited from Afghanistan—sentenced in Manhattan federal court to over 15 years in prison. Media release, 08 October
United States Department of Justice (US DoJ) (2007e) Extradited software piracy ringleader pleads guilty. Media release, 20 April. Available at: http://washingtondc.fbi.gov/dojpressrel/pressrel07/wfo042007b.htm
United States Department of Justice (US DoJ) (2007f) Fairfield man pleads guilty to attempted receipt and possession of child pornography. Media release 20 February. Available at: http://sacramento.fbi.gov/dojpressrel/pressrel08/sc022008.pdf
United States Department of Justice (US DoJ) (2007g) Tucson man sentenced to seven years for identity theft and fraudulent use of thousands of credit and debit card numbers. Media release, 10 August. http://www.usdoj.gov/usao/az/press_releases/2007/2007-182(Green-Bressler).pdf
United States Department of Justice (US DoJ) (2007h) Six defendants indicted for stealing money from bank customers accounts through the internet. Media release, 7 May. Available at: http://sacramento.fbi.gov/dojpressrel/pressrel07/sc050707.htm
United States Department of Justice (US DoJ) (2008a) Third defendant pleads guilty in pensacola in global child exploitation enterprise case. Media release, 6 May. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childexploitation_050608.htm
United States Department of Justice (US DoJ) (2008b) Second defendant pleads guilty in Pensacola in international child exploitation enterprise case. Media release, 28 April. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childexploitation042808.htm
United States Department of Justice (US DoJ) (2008c) Idaho man pleads guilty in international child exploitation enterprise case. Media release, 17 April. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childporn041708.htm
United States Department of Justice (US DoJ) (2008d) 33 individuals in U.S. and Romania indicted in federal RICO case that alleges widespread computer fraud. Media release, 19 May. Available at: http://losangeles.fbi.gov/dojpressrel/pressrel08/la051908ausa.htm
United States Federal Trade Commission (US FTC) (2008) Agency announces settlement of separate actions against retailer TJX, and data brokers Reed Elsevier and Seisint for failing to provide adequate security for consumers’ data. Media release, 27 March. Available at: http://www.ftc.gov/opa/2008/03/datasec.shtm
United States Secret Service (USSS) (2004) U.S. secret service’s operation firewall nets 28 arrests. Press release, 28 October
van Rassel J (2007) ATM skimmers seized in raid. Calgary Herald, 31 May
Vidino L (2007) The hofstad group: the new face of terrorist networks in Europe. Stud Confl Terror 30:579–592
Vijayan J (2007) Mass. credit union bills TJX $590k for breach-related costs. Computerworld, 6 June. Available at: http://computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9023778&taxonomyId=17&intsrc=kc_top
Ward M (2006) Anti-cartoon protests go online. BBC.co.uk, 8 February. Available at: http://news.bbc.co.uk/1/hi/technology/4692518.stm
Warner B (2006) Muslim hackers blast Denmark in net assault. PC Pro, 7 February. Available at: http://www.pcpro.co.uk/news/83314/muslim-hackers-blast-denmark-in-net-assault.html
Weimann G (2006) Virtual disputes: the use of the internet for terrorist debates. Stud Confl Terror 29(7):623–639
Zhuge J, Holz T, Song C, Guo J, Han X, Zou W (2008) Studying malicious websites and the underground economy on the Chinese web. In: Proceedings of the 7th Workshop on the Economics of Information Security, WEIS 2008, Hanover, New Hampshire, June 25–28, 2008
Acknowledgments
The author is most grateful to the two anonymous referees and the editor-in-chief for their constructive feedback. Despite their invaluable assistance, any errors remaining are solely attributed to the author.
Author information
Authors and Affiliations
Corresponding author
Additional information
The views expressed in this article are those of the author alone and not the Australian Government or the Australian Institute of Criminology.
Rights and permissions
About this article
Cite this article
Choo, KK.R. Organised crime groups in cyberspace: a typology. Trends Organ Crim 11, 270–295 (2008). https://doi.org/10.1007/s12117-008-9038-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12117-008-9038-9