Organised crime groups in cyberspace: a typology
Tóm tắt
Từ khóa
Tài liệu tham khảo
Abelson J (2007) Breach of data at TJX is called the biggest ever. The Boston Globe, 29 March. Avialable at: http://www.boston.com/business/globe/articles/2007/03/29/breach_of_data_at_tjx_is_called_the_biggest_ever/
Adam A (2002) Cyberstalking and Internet pornography: gender and the gaze. Ethics Inf Technol 4(2):133–42
Ahmad R (2007) Slashing through the Web of terror. Todayonline, 3 March
Ames B (2007) Online spending tops US$100 billion. Computerworld.com.au, 05 January
APACS (2008). Quarterly statistical release (15.05.08). Available at: http://www.apacs.org.uk/media_centre/documents/080515APACSquarterlystatisticalreleaseMar08final.pdf
Armagh DS, Battaglia NL (2006) Use of computers in the sexual exploitation of children, 2nd edn. US Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, Washington, DC
Asia-Pacific Group on Money Laundering (APG) (2006) The Asia/Pacific Group on Money Laundering (APG) yearly typologies report 2005–2006. Available at: http://www.apgml.org/documents/docs/6/APG%20Yearly%20Typologies%20Report%2005-06_PUBLIC.pdf
AusCERT (2006) Computer crime and security survey. Available at: http://www.auscert.org.au/images/ACCSS2006.pdf
Australia Associated Press (AAP) (2007) Selim cleared over destruction of data. 19 April. Available at: http://www.smh.com.au/news/national/selim-cleared-over-destruction-of-data/2007/04/18/1176696916796.html
Australia Associated Press (AAP) (2008) Police unveil $1 million internet scam. 23 February. Available at: http://www.smh.com.au/news/security/police-unveil-1-million-internet-scam/2008/02/23/1203467457719.html
Australian Crime Commission (ACC) (2007) Illicit drug data report 2005–06. Available at: http://www.crimecommission.gov.au/content/publications/iddr_2005_06/IDDR_2005-06.pdf
Australian Crime Commission (ACC) (2008) Organised crime in Australia. Available at: http://www.crimecommission.gov.au/content/publications/Other_Publications/080117_Organised_Crime_In_Australia.pdf
Australian Federal Police (AFP) (2008) National child porn operation nets 90 people. Media release 5 June. Available at: http://www.afp.gov.au/media_releases/national/2008/national_child_porn_operation_nets_90_people
Australian Institute of Criminology (AIC) (2006) Acquiring high tech crime tools. High tech crime brief no 13. Available at: http://www.aic.gov.au/publications/htcb/htcb013.html
Australian Institute of Criminology (AIC) (2007) Money mules. High tech crime brief no. 16. Available at: http://www.aic.gov.au/publications/htcb/htcb016.html
Australian Payments Clearing Association (APCA) (2005) Annual report 2005. Available at: http://www.apca.com.au/Public/apca01_live.nsf/WebPageDisplay/PUB_AnnualReport
Bakier AH (2008) Jihadi website advises recruits on how to join al-Qaeda. Terrorism Focus V(18):3–4
BBC News (2001) Russia arrests ‘grandfather of cybercrime’. BBC News, 26 May. Available at: http://news.bbc.co.uk/1/hi/world/europe/1353092.stm
Brenner SW (2002) Organized cybercrime? How cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology 4(1):1–50
Canadian Security Intelligence Service (2000) Transnational criminal activity: a global context. Available at: http://www.csis-scrs.gc.ca/en/publications/perspectives/200007.asp?print_view=1
Casey E (2002) Error, uncertainty, and loss in digital evidence. Int J Digit Evidence 1(2)
Choo KKR (2007) Zombies and botnets. Trends & Issue, 333. Australian Institute of Criminology. Available at: http://www.aic.gov.au/publications/tandi2/tandi333.html
Choo KKR (2008) Money laundering and terrorism financing risks of prepaid cards instruments? Asian J Criminol (in press). doi: 10.1007/s11417-008-9051-6
Choo KKR, Smith RG (2008) Criminal exploitation of online systems by organised crime groups. Asian J Criminol 3(1):37–59
Choo KKR, Smith RG, McCusker R (2007) Future directions in technology-enabled crime. Research and public policy series no 78. Australian Institute of Criminology. Available at: http://www.aic.gov.au/publications/rpp/78/
CipherTrust (2005) Phishing: organized crime for the 21st century. Available at: http://www.securecomputing.com/webform.cfm?id=102
Cohen CL (2007) Growing challenge of computer forensics. Police Chief 74(3). Available at: http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1136&issue_id=32007
Cooke E, Jahanian F, McPherson D (2005) The zombie roundup: understanding, detecting, and disrupting botnets. In: SRUTI’05 Workshop Proceedings. USENIX Association, Berkeley CA, pp 35–44
Curry A, McGrane S (2006) China’s cyberwarriors. Foreign Policy, September/October issue no. 93
Enforcement Bulletin (2007) Raid of a major pirate packaging facility in Guangzhou. Enforcement Bulletin Issue 33, p 5
Evron G (2008) Battling botnets and online mobs. Georget J Int Affairs Winter/Spring 2008:121–126
FBI (2008a) Major child porn ring busted and 20 children rescued worldwide. Press release, 6 March. Available at: http://www.fbi.gov/page2/march08/innocentimages_030608.html
FBI (2008b) Department of Justice launches new law enforcement strategy to combat increasing threat of international organized crime. Press release, 23 April. Available at: http://www.fbi.gov/pressrel/pressrel08/ioc042308.htm
Franklin J, Paxson V, Perrig A, Savage S (2007) An inquiry into the nature and causes of the wealth of internet miscreants. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 14th ACM conference on Computer and communications security, ACM CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007. ACM, New York, pp 375–388
Garretson C (2007) Whaling: Latest e-mail scam targets executives. Computerworld, 16 November. Available at: http://www.computerworld.com.au/index.php?id=1342062697&eid=-255
Gerstenfeld PB, Grant DR, Chiang C (2003) Hate online: a content analysis of extremist internet sites. Analyses of Social Issues and Public Policy 3(1):29–44
Goodin D (2007) TJX agrees to pay banks $41m to cover Visa losses. Channel register, 3 December. Available at: http://www.channelregister.co.uk/2007/12/03/tjx_settlement_agreement/
Goodin D (2008) Rent-a-bot gang rises from the DDoS ashes. Channel register, 13 March. Available at: http://www.channelregister.co.uk/2008/03/13/loadscc_rises_again/
Grabosky P (2007) Requirements of prosecution services to deal with cyber crime. Crime Law Soc Chang 47(4–5):201–223
Great Britain Crown Prosecution Service (GB CPS) (2006). Convictions for internet rape plan. Media release, 1 December
Harding T (2007) Terrorists ‘use Google maps to hit UK troops’. Telegraph.co.uk, 13 January
Ianelli N, Hackworth A (2005) Botnets as a vehicle for online crime. CERT Coordination Center, Pittsburgh PA
Infosecurity (2007) Interview: Eugene Kaspersky 2007. Infosecurity, May/June issue
Institute of Defence and Strategic Studies (IDSS) (2006) Proceedings of the International conference on Terrorism in Southeast Asia: the threat and response. Available at: http://www.rsis.edu.sg/
Jaques R (2006) European police nab zombie hackers. Vnunet.com, 27 Jun
Jen WY, Chang W, Chou S (2006) Cybercrime in Taiwan: an analysis of suspect records. Paper to Workshop on Intelligence and Security
Keizer G (2007) Porn sites serve up Mpack attacks. Computerworld, 25 June. Available at: http://www.computerworld.com.au/index.php?id=610295694&eid=-255
Keizer G (2008) Researcher: Russian hosting network runs a protection racket. Computerworld, 20 February. Available at: http://www.computerworld.com.au/index.php?id=1496227928&eid=-6787
Kirk J (2007a) Hackers build private IM to keep out the law. Computerworld.com, 28 March
Kirk J (2007b) Symantec: Chinese hackers grow in number, skills. Infoworld.com, 18 May
Kirk J (2007c) Estonia recovers from massive denial-of-service attack. InfoWorld, 17 May
Kshetri N (2005) Pattern of global cyber war and crime: a conceptual framework. J Internat Manag 11(4):541–562
Leyden J (2007) MI5 warns over China hacking menace. The register, 3 December. Available at: http://www.theregister.co.uk/2007/12/03/mi5_warns_over_chinese_hack_attacks/
Libbenga J (2007) Another 419 scam ring nicked. The register, 25 April. Available at: http://www.theregister.co.uk/2007/04/25/another_419_scamring_nicked/
Libbenga J, Leyden J (2007) Dutch botnet duo sentenced. The register, 1 February. Available at: http://www.theregister.co.uk/2007/02/01/dutch_botnet_gang_sentenced/
Marks P (2007) How to leak a secret and not get caught. New Sci 2586:13
McAfee (2006) Virtual criminology report: organised crime and the internet. McAfee, Santa Clara, CA
McCombie S (2007) Organised cybercrime & phishing: the godfathers of the internet. Presentation at the Technology Trends 2007 seminars, CSIRO ICT centre, Australia, 12 February. Available at: http://www.ict.csiro.au/MU/Trends/
McCusker R (2006) Transnational organised cyber crime—distinguishing threat from reality. Crime Law Soc Chang 46:257–273
McMillan R (2008) Criminals hack ceos with fake subpoenas. PC world, 14 April. Available at: http://www.pcworld.com/businesscenter/article/144548/criminals_hack_ceos_with_fake_subpoenas.html
Miller N (2007) From Russia with malice: criminals trawl the world. The age, 24 July
MSN—Mainichi Daily News (2006) Inside the Yamaguchi-gumi: Ex-gangster’s life a history of Japan’s postwar underworld. MSN—Mainichi Daily News, 24 May
NACHA (2008) NACHA reports more than 18 billion ach payments in 2007. Media release, 19 May. Available at: http://www.nacha.org/News/news/pressreleases/2008/Volume_Final.pdf
National Institute of Standards and Technology (NIST) (2006) Guide to integrating forensic techniques into incident response. NIST computer security special publications SP800-86. NIST, Rockville, MD Available at: http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf
National Science and Technology Council (NSTC) (2006) Federal plan for cyber security and information assurance research and development. NIST, Arlington, VA
National White Collar Crime Center and Federal Bureau of Investigation (NW3C/FBI) (2007) 2006 IC3 annual internet fraud report. Available at: http://www.ic3.gov/media/annualreport/2005_IC3Report.pdf
Office of the United States Trade Representative (2007) 2007 Special 301 report. Available at: http://www.ustr.gov/assets/Document_Library/Reports_Publications/2007/2007_Special_301_Review/asset_upload_file980_11122.pdf
Organized Crime and Triad Bureau (2007) Triad activities in Hong Kong. Hong Kong Police, 30 May
PandaLabs (2007) Cybercrime.. for sale (II). Available at: http://blogs.pandasoftware.com/blogs/pandalabs/archive/2007/05/03/Cybercrime_2E002E002E00_-for-sale-_2800_II_2900_.aspx
Parliamentary Joint Committee on the Australian Crime Commission (2007) Inquiry into the future impact of serious and organised crime on Australian society. Parliament House, Canberra September
Pereira J (2007) How credit-card data went out wireless door. The Wall Street Journal, 4 May
PricewaterhouseCoopers (PwC) (2006) DTI information security breaches survey 2006. Available at: http://www.pwc.com/extweb/pwcpublications.nsf/docid/7FA80D2B30A116D7802570B9005C3D16
Rodriguez A (2007) Attacks on Estonia move to new front. Chicago Tribune, 29 May
Rogers M, Scarborough K, Frakes K, San Martin C (2007) Survey of law enforcement perceptions regarding digital evidence. IFIP Int Fed Inform Process 242:41–52
Schrank P (2007) Newly nasty. The Economist, 24 May
Sein AJ (2008) The prosecution of Chinese organized crime groups: the Sister Ping case and its lessons. Trends Organ Crim 11(2):157–182
Serious Organised Crime Agency (SOCA) (2006) The United Kingdom threat assessment of serious organised crime. Available at: http://www.soca.gov.uk/assessPublications/downloads/threat_assess_unclass_250706.pdf
Serious Organised Crime Agency (SOCA) (2008) The United Kingdom threat assessment of serious organised crime. Available at: http://www.soca.gov.uk/assessPublications/downloads/UKTA2008-9NPM.pdf
Simon Wiesenthal Center (2008) iReport: online terror + hate the first decade. Available at: http://www.wiesenthal.com/atf/cf/%7BDFD2AAC1-2ADE-428A-9263-35234229D8D8%7D/IREPORT.PDF
Singapore Commercial Affairs Department (CAD) (2006) Money mules. Available at: http://www.cad.gov.sg/crimeprev/cpa_moneymules.htm
Singapore Commercial Affairs Department (CAD) (2007) Case of 6-members credit card skimming syndicate. Media release, 21 May
Singapore Ministry of Home Affairs (MHA) (2004) Second reading speech for the Criminal Law (Temporary Provisions) (Amendment) Bill, Ministry Of Home Affairs—Speech by Associate Professor Ho Peng Kee, Senior Minister of State for Law and Home Affairs on 1 September 2004. Available at: http://app3.mha.gov.sg/news_details.aspx?nid=743
Singapore Police Force (SPF) (2007) Unlicensed moneylending syndicate busted—$130,000 seized. Media release, 13 April
Singh S (2007) The risks to business presented by organised and economically motivated criminal enterprises. J Financ Crime 14(1):79–83
Sophos (2007) Businesses warned by MI5 of Chinese espionage threat, Sophos offers advice. News release, 1 December. Available at: http://www.sophos.com/pressoffice/news/articles/2007/12/mi5-china-internet-spy.html
Swenson P, Shenoi S (2007) File system journal forensics. IFIP Int Fed Inform Process 242:231–244
Symantec (2007) Symantec internet security threat report vol. XI. Available at: www.symantec.com/threatreport
Todayonline (2007) Tigers have joined jihadi drug trade, says official. Todayonline, 11 June
United Kingdom Child Exploitation and Online Protection (UK CEOP) (2007) Global online child abuse network smashed—CEOP lead international operation into UK based paedophile ring. Media release, 18 June
United Kingdom Organised Crime Task Force (UK OCTF) (2007) Annual report and threat assessment 2007: organised crime in Northern Ireland. Available at: http://www.octf.gov.uk/index.cfm/section/publications/page/publicationList/viewArchives/true/category/5
United States Department of Justice (US DoJ) (2006) ‘Botherder’ dealt record prison sentence for selling and spreading malicious computer code. Media release, 8 May
United States Department of Justice (US DoJ) (2007a) Owners/operators of Asian massage parlors charged with transporting persons for prostitution. Media release, 11 May
United States Department of Justice (US DoJ) (2007b) Extradited software piracy ringleader sentenced to 51 months in prison. Media release, 22 June. Available at: http://washingtondc.fbi.gov/dojpressrel/pressrel07/wfo062207.htm
United States Department of Justice (US DoJ) (2007c) Former member of the US navy indicted on terrorism and espionage charges. Media release, 31 March. Available at: http://newhaven.fbi.gov/dojpressrel/2007/nh032107.htm
United States Department of Justice (US DoJ) (2007d) Heroin kingpin—first defendant ever extradited from Afghanistan—sentenced in Manhattan federal court to over 15 years in prison. Media release, 08 October
United States Department of Justice (US DoJ) (2007e) Extradited software piracy ringleader pleads guilty. Media release, 20 April. Available at: http://washingtondc.fbi.gov/dojpressrel/pressrel07/wfo042007b.htm
United States Department of Justice (US DoJ) (2007f) Fairfield man pleads guilty to attempted receipt and possession of child pornography. Media release 20 February. Available at: http://sacramento.fbi.gov/dojpressrel/pressrel08/sc022008.pdf
United States Department of Justice (US DoJ) (2007g) Tucson man sentenced to seven years for identity theft and fraudulent use of thousands of credit and debit card numbers. Media release, 10 August. http://www.usdoj.gov/usao/az/press_releases/2007/2007-182(Green-Bressler).pdf
United States Department of Justice (US DoJ) (2007h) Six defendants indicted for stealing money from bank customers accounts through the internet. Media release, 7 May. Available at: http://sacramento.fbi.gov/dojpressrel/pressrel07/sc050707.htm
United States Department of Justice (US DoJ) (2008a) Third defendant pleads guilty in pensacola in global child exploitation enterprise case. Media release, 6 May. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childexploitation_050608.htm
United States Department of Justice (US DoJ) (2008b) Second defendant pleads guilty in Pensacola in international child exploitation enterprise case. Media release, 28 April. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childexploitation042808.htm
United States Department of Justice (US DoJ) (2008c) Idaho man pleads guilty in international child exploitation enterprise case. Media release, 17 April. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childporn041708.htm
United States Department of Justice (US DoJ) (2008d) 33 individuals in U.S. and Romania indicted in federal RICO case that alleges widespread computer fraud. Media release, 19 May. Available at: http://losangeles.fbi.gov/dojpressrel/pressrel08/la051908ausa.htm
United States Federal Trade Commission (US FTC) (2008) Agency announces settlement of separate actions against retailer TJX, and data brokers Reed Elsevier and Seisint for failing to provide adequate security for consumers’ data. Media release, 27 March. Available at: http://www.ftc.gov/opa/2008/03/datasec.shtm
United States Secret Service (USSS) (2004) U.S. secret service’s operation firewall nets 28 arrests. Press release, 28 October
van Rassel J (2007) ATM skimmers seized in raid. Calgary Herald, 31 May
Vidino L (2007) The hofstad group: the new face of terrorist networks in Europe. Stud Confl Terror 30:579–592
Vijayan J (2007) Mass. credit union bills TJX $590k for breach-related costs. Computerworld, 6 June. Available at: http://computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9023778&taxonomyId=17&intsrc=kc_top
Ward M (2006) Anti-cartoon protests go online. BBC.co.uk, 8 February. Available at: http://news.bbc.co.uk/1/hi/technology/4692518.stm
Warner B (2006) Muslim hackers blast Denmark in net assault. PC Pro, 7 February. Available at: http://www.pcpro.co.uk/news/83314/muslim-hackers-blast-denmark-in-net-assault.html
Weimann G (2006) Virtual disputes: the use of the internet for terrorist debates. Stud Confl Terror 29(7):623–639
Zhuge J, Holz T, Song C, Guo J, Han X, Zou W (2008) Studying malicious websites and the underground economy on the Chinese web. In: Proceedings of the 7th Workshop on the Economics of Information Security, WEIS 2008, Hanover, New Hampshire, June 25–28, 2008