Organised crime groups in cyberspace: a typology

Kim‐Kwang Raymond Choo1
1Australian Institute of Criminology

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abelson J (2007) Breach of data at TJX is called the biggest ever. The Boston Globe, 29 March. Avialable at: http://www.boston.com/business/globe/articles/2007/03/29/breach_of_data_at_tjx_is_called_the_biggest_ever/

Adam A (2002) Cyberstalking and Internet pornography: gender and the gaze. Ethics Inf Technol 4(2):133–42

Ahmad R (2007) Slashing through the Web of terror. Todayonline, 3 March

Ames B (2007) Online spending tops US$100 billion. Computerworld.com.au, 05 January

APACS (2008). Quarterly statistical release (15.05.08). Available at: http://www.apacs.org.uk/media_centre/documents/080515APACSquarterlystatisticalreleaseMar08final.pdf

Armagh DS, Battaglia NL (2006) Use of computers in the sexual exploitation of children, 2nd edn. US Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, Washington, DC

Asia-Pacific Group on Money Laundering (APG) (2006) The Asia/Pacific Group on Money Laundering (APG) yearly typologies report 2005–2006. Available at: http://www.apgml.org/documents/docs/6/APG%20Yearly%20Typologies%20Report%2005-06_PUBLIC.pdf

AusCERT (2006) Computer crime and security survey. Available at: http://www.auscert.org.au/images/ACCSS2006.pdf

Australia Associated Press (AAP) (2007) Selim cleared over destruction of data. 19 April. Available at: http://www.smh.com.au/news/national/selim-cleared-over-destruction-of-data/2007/04/18/1176696916796.html

Australia Associated Press (AAP) (2008) Police unveil $1 million internet scam. 23 February. Available at: http://www.smh.com.au/news/security/police-unveil-1-million-internet-scam/2008/02/23/1203467457719.html

Australian Crime Commission (ACC) (2007) Illicit drug data report 2005–06. Available at: http://www.crimecommission.gov.au/content/publications/iddr_2005_06/IDDR_2005-06.pdf

Australian Crime Commission (ACC) (2008) Organised crime in Australia. Available at: http://www.crimecommission.gov.au/content/publications/Other_Publications/080117_Organised_Crime_In_Australia.pdf

Australian Federal Police (AFP) (2008) National child porn operation nets 90 people. Media release 5 June. Available at: http://www.afp.gov.au/media_releases/national/2008/national_child_porn_operation_nets_90_people

Australian Institute of Criminology (AIC) (2006) Acquiring high tech crime tools. High tech crime brief no 13. Available at: http://www.aic.gov.au/publications/htcb/htcb013.html

Australian Institute of Criminology (AIC) (2007) Money mules. High tech crime brief no. 16. Available at: http://www.aic.gov.au/publications/htcb/htcb016.html

Australian Payments Clearing Association (APCA) (2005) Annual report 2005. Available at: http://www.apca.com.au/Public/apca01_live.nsf/WebPageDisplay/PUB_AnnualReport

Bakier AH (2008) Jihadi website advises recruits on how to join al-Qaeda. Terrorism Focus V(18):3–4

BBC News (2001) Russia arrests ‘grandfather of cybercrime’. BBC News, 26 May. Available at: http://news.bbc.co.uk/1/hi/world/europe/1353092.stm

Bequai A (2001) Organized crime goes cyber. Comput Secur 20(6):475–478

Brenner SW (2002) Organized cybercrime? How cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology 4(1):1–50

Canadian Security Intelligence Service (2000) Transnational criminal activity: a global context. Available at: http://www.csis-scrs.gc.ca/en/publications/perspectives/200007.asp?print_view=1

Casey E (2002) Error, uncertainty, and loss in digital evidence. Int J Digit Evidence 1(2)

Charlton J (2005) Al Qaeda buys cyber criminal expertise. Comput Fraud Secur 2005(3):9

Choo KKR (2007) Zombies and botnets. Trends & Issue, 333. Australian Institute of Criminology. Available at: http://www.aic.gov.au/publications/tandi2/tandi333.html

Choo KKR (2008) Money laundering and terrorism financing risks of prepaid cards instruments? Asian J Criminol (in press). doi: 10.1007/s11417-008-9051-6

Choo KKR, Smith RG (2008) Criminal exploitation of online systems by organised crime groups. Asian J Criminol 3(1):37–59

Choo KKR, Smith RG, McCusker R (2007) Future directions in technology-enabled crime. Research and public policy series no 78. Australian Institute of Criminology. Available at: http://www.aic.gov.au/publications/rpp/78/

CipherTrust (2005) Phishing: organized crime for the 21st century. Available at: http://www.securecomputing.com/webform.cfm?id=102

Cohen CL (2007) Growing challenge of computer forensics. Police Chief 74(3). Available at: http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1136&issue_id=32007

Cooke E, Jahanian F, McPherson D (2005) The zombie roundup: understanding, detecting, and disrupting botnets. In: SRUTI’05 Workshop Proceedings. USENIX Association, Berkeley CA, pp 35–44

Curry A, McGrane S (2006) China’s cyberwarriors. Foreign Policy, September/October issue no. 93

Enforcement Bulletin (2007) Raid of a major pirate packaging facility in Guangzhou. Enforcement Bulletin Issue 33, p 5

Evron G (2008) Battling botnets and online mobs. Georget J Int Affairs Winter/Spring 2008:121–126

FBI (2008a) Major child porn ring busted and 20 children rescued worldwide. Press release, 6 March. Available at: http://www.fbi.gov/page2/march08/innocentimages_030608.html

FBI (2008b) Department of Justice launches new law enforcement strategy to combat increasing threat of international organized crime. Press release, 23 April. Available at: http://www.fbi.gov/pressrel/pressrel08/ioc042308.htm

Franklin J, Paxson V, Perrig A, Savage S (2007) An inquiry into the nature and causes of the wealth of internet miscreants. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 14th ACM conference on Computer and communications security, ACM CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007. ACM, New York, pp 375–388

Galeotti M (2008) Criminal histories: an introduction. Global Crime 9(1–2):1–7

Garretson C (2007) Whaling: Latest e-mail scam targets executives. Computerworld, 16 November. Available at: http://www.computerworld.com.au/index.php?id=1342062697&eid=-255

Gerstenfeld PB, Grant DR, Chiang C (2003) Hate online: a content analysis of extremist internet sites. Analyses of Social Issues and Public Policy 3(1):29–44

Goodin D (2007) TJX agrees to pay banks $41m to cover Visa losses. Channel register, 3 December. Available at: http://www.channelregister.co.uk/2007/12/03/tjx_settlement_agreement/

Goodin D (2008) Rent-a-bot gang rises from the DDoS ashes. Channel register, 13 March. Available at: http://www.channelregister.co.uk/2008/03/13/loadscc_rises_again/

Grabosky P (2007) Requirements of prosecution services to deal with cyber crime. Crime Law Soc Chang 47(4–5):201–223

Great Britain Crown Prosecution Service (GB CPS) (2006). Convictions for internet rape plan. Media release, 1 December

Harding T (2007) Terrorists ‘use Google maps to hit UK troops’. Telegraph.co.uk, 13 January

Harrison C (2006) Cyberspace and child abuse images: a feminist perspective. Affilia 21(4):365–379

Ianelli N, Hackworth A (2005) Botnets as a vehicle for online crime. CERT Coordination Center, Pittsburgh PA

Infosecurity (2007) Interview: Eugene Kaspersky 2007. Infosecurity, May/June issue

Institute of Defence and Strategic Studies (IDSS) (2006) Proceedings of the International conference on Terrorism in Southeast Asia: the threat and response. Available at: http://www.rsis.edu.sg/

Jaques R (2006) European police nab zombie hackers. Vnunet.com, 27 Jun

Jen WY, Chang W, Chou S (2006) Cybercrime in Taiwan: an analysis of suspect records. Paper to Workshop on Intelligence and Security

Keizer G (2007) Porn sites serve up Mpack attacks. Computerworld, 25 June. Available at: http://www.computerworld.com.au/index.php?id=610295694&eid=-255

Keizer G (2008) Researcher: Russian hosting network runs a protection racket. Computerworld, 20 February. Available at: http://www.computerworld.com.au/index.php?id=1496227928&eid=-6787

Kirk J (2007a) Hackers build private IM to keep out the law. Computerworld.com, 28 March

Kirk J (2007b) Symantec: Chinese hackers grow in number, skills. Infoworld.com, 18 May

Kirk J (2007c) Estonia recovers from massive denial-of-service attack. InfoWorld, 17 May

Kshetri N (2005) Pattern of global cyber war and crime: a conceptual framework. J Internat Manag 11(4):541–562

Kshetri N (2006) The simple economics of cybercrimes. IEEE Security Privacy 4(1):33–39

Lal R (2005) South Asian organized crime and terrorist networks. Orbis 49(2):293–304

Lesk M (2007) The new front line: Estonia under cyberassault. IEEE Security Privacy 5(4):76–79

Leyden J (2007) MI5 warns over China hacking menace. The register, 3 December. Available at: http://www.theregister.co.uk/2007/12/03/mi5_warns_over_chinese_hack_attacks/

Libbenga J (2007) Another 419 scam ring nicked. The register, 25 April. Available at: http://www.theregister.co.uk/2007/04/25/another_419_scamring_nicked/

Libbenga J, Leyden J (2007) Dutch botnet duo sentenced. The register, 1 February. Available at: http://www.theregister.co.uk/2007/02/01/dutch_botnet_gang_sentenced/

Marks P (2007) How to leak a secret and not get caught. New Sci 2586:13

McAfee (2006) Virtual criminology report: organised crime and the internet. McAfee, Santa Clara, CA

McCombie S (2007) Organised cybercrime & phishing: the godfathers of the internet. Presentation at the Technology Trends 2007 seminars, CSIRO ICT centre, Australia, 12 February. Available at: http://www.ict.csiro.au/MU/Trends/

McCusker R (2006) Transnational organised cyber crime—distinguishing threat from reality. Crime Law Soc Chang 46:257–273

McGraw G (2006) Interview: silver bullet speaks to Avi Rubin. IEEE Security Privacy 4(3):11–13

McMillan R (2008) Criminals hack ceos with fake subpoenas. PC world, 14 April. Available at: http://www.pcworld.com/businesscenter/article/144548/criminals_hack_ceos_with_fake_subpoenas.html

Miller N (2007) From Russia with malice: criminals trawl the world. The age, 24 July

MSN—Mainichi Daily News (2006) Inside the Yamaguchi-gumi: Ex-gangster’s life a history of Japan’s postwar underworld. MSN—Mainichi Daily News, 24 May

NACHA (2008) NACHA reports more than 18 billion ach payments in 2007. Media release, 19 May. Available at: http://www.nacha.org/News/news/pressreleases/2008/Volume_Final.pdf

National Institute of Standards and Technology (NIST) (2006) Guide to integrating forensic techniques into incident response. NIST computer security special publications SP800-86. NIST, Rockville, MD Available at: http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf

National Science and Technology Council (NSTC) (2006) Federal plan for cyber security and information assurance research and development. NIST, Arlington, VA

National White Collar Crime Center and Federal Bureau of Investigation (NW3C/FBI) (2007) 2006 IC3 annual internet fraud report. Available at: http://www.ic3.gov/media/annualreport/2005_IC3Report.pdf

Office of the United States Trade Representative (2007) 2007 Special 301 report. Available at: http://www.ustr.gov/assets/Document_Library/Reports_Publications/2007/2007_Special_301_Review/asset_upload_file980_11122.pdf

Organized Crime and Triad Bureau (2007) Triad activities in Hong Kong. Hong Kong Police, 30 May

PandaLabs (2007) Cybercrime.. for sale (II). Available at: http://blogs.pandasoftware.com/blogs/pandalabs/archive/2007/05/03/Cybercrime_2E002E002E00_-for-sale-_2800_II_2900_.aspx

Parliamentary Joint Committee on the Australian Crime Commission (2007) Inquiry into the future impact of serious and organised crime on Australian society. Parliament House, Canberra September

Pereira J (2007) How credit-card data went out wireless door. The Wall Street Journal, 4 May

PricewaterhouseCoopers (PwC) (2006) DTI information security breaches survey 2006. Available at: http://www.pwc.com/extweb/pwcpublications.nsf/docid/7FA80D2B30A116D7802570B9005C3D16

Rodriguez A (2007) Attacks on Estonia move to new front. Chicago Tribune, 29 May

Rogers M, Scarborough K, Frakes K, San Martin C (2007) Survey of law enforcement perceptions regarding digital evidence. IFIP Int Fed Inform Process 242:41–52

Schrank P (2007) Newly nasty. The Economist, 24 May

Sein AJ (2008) The prosecution of Chinese organized crime groups: the Sister Ping case and its lessons. Trends Organ Crim 11(2):157–182

Serious Organised Crime Agency (SOCA) (2006) The United Kingdom threat assessment of serious organised crime. Available at: http://www.soca.gov.uk/assessPublications/downloads/threat_assess_unclass_250706.pdf

Serious Organised Crime Agency (SOCA) (2008) The United Kingdom threat assessment of serious organised crime. Available at: http://www.soca.gov.uk/assessPublications/downloads/UKTA2008-9NPM.pdf

Simon Wiesenthal Center (2008) iReport: online terror + hate the first decade. Available at: http://www.wiesenthal.com/atf/cf/%7BDFD2AAC1-2ADE-428A-9263-35234229D8D8%7D/IREPORT.PDF

Singapore Commercial Affairs Department (CAD) (2006) Money mules. Available at: http://www.cad.gov.sg/crimeprev/cpa_moneymules.htm

Singapore Commercial Affairs Department (CAD) (2007) Case of 6-members credit card skimming syndicate. Media release, 21 May

Singapore Ministry of Home Affairs (MHA) (2004) Second reading speech for the Criminal Law (Temporary Provisions) (Amendment) Bill, Ministry Of Home Affairs—Speech by Associate Professor Ho Peng Kee, Senior Minister of State for Law and Home Affairs on 1 September 2004. Available at: http://app3.mha.gov.sg/news_details.aspx?nid=743

Singapore Police Force (SPF) (2007) Unlicensed moneylending syndicate busted—$130,000 seized. Media release, 13 April

Singh S (2007) The risks to business presented by organised and economically motivated criminal enterprises. J Financ Crime 14(1):79–83

Sophos (2007) Businesses warned by MI5 of Chinese espionage threat, Sophos offers advice. News release, 1 December. Available at: http://www.sophos.com/pressoffice/news/articles/2007/12/mi5-china-internet-spy.html

Swenson P, Shenoi S (2007) File system journal forensics. IFIP Int Fed Inform Process 242:231–244

Symantec (2007) Symantec internet security threat report vol. XI. Available at: www.symantec.com/threatreport

Todayonline (2007) Tigers have joined jihadi drug trade, says official. Todayonline, 11 June

United Kingdom Child Exploitation and Online Protection (UK CEOP) (2007) Global online child abuse network smashed—CEOP lead international operation into UK based paedophile ring. Media release, 18 June

United Kingdom Organised Crime Task Force (UK OCTF) (2007) Annual report and threat assessment 2007: organised crime in Northern Ireland. Available at: http://www.octf.gov.uk/index.cfm/section/publications/page/publicationList/viewArchives/true/category/5

United States Department of Justice (US DoJ) (2006) ‘Botherder’ dealt record prison sentence for selling and spreading malicious computer code. Media release, 8 May

United States Department of Justice (US DoJ) (2007a) Owners/operators of Asian massage parlors charged with transporting persons for prostitution. Media release, 11 May

United States Department of Justice (US DoJ) (2007b) Extradited software piracy ringleader sentenced to 51 months in prison. Media release, 22 June. Available at: http://washingtondc.fbi.gov/dojpressrel/pressrel07/wfo062207.htm

United States Department of Justice (US DoJ) (2007c) Former member of the US navy indicted on terrorism and espionage charges. Media release, 31 March. Available at: http://newhaven.fbi.gov/dojpressrel/2007/nh032107.htm

United States Department of Justice (US DoJ) (2007d) Heroin kingpin—first defendant ever extradited from Afghanistan—sentenced in Manhattan federal court to over 15 years in prison. Media release, 08 October

United States Department of Justice (US DoJ) (2007e) Extradited software piracy ringleader pleads guilty. Media release, 20 April. Available at: http://washingtondc.fbi.gov/dojpressrel/pressrel07/wfo042007b.htm

United States Department of Justice (US DoJ) (2007f) Fairfield man pleads guilty to attempted receipt and possession of child pornography. Media release 20 February. Available at: http://sacramento.fbi.gov/dojpressrel/pressrel08/sc022008.pdf

United States Department of Justice (US DoJ) (2007g) Tucson man sentenced to seven years for identity theft and fraudulent use of thousands of credit and debit card numbers. Media release, 10 August. http://www.usdoj.gov/usao/az/press_releases/2007/2007-182(Green-Bressler).pdf

United States Department of Justice (US DoJ) (2007h) Six defendants indicted for stealing money from bank customers accounts through the internet. Media release, 7 May. Available at: http://sacramento.fbi.gov/dojpressrel/pressrel07/sc050707.htm

United States Department of Justice (US DoJ) (2008a) Third defendant pleads guilty in pensacola in global child exploitation enterprise case. Media release, 6 May. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childexploitation_050608.htm

United States Department of Justice (US DoJ) (2008b) Second defendant pleads guilty in Pensacola in international child exploitation enterprise case. Media release, 28 April. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childexploitation042808.htm

United States Department of Justice (US DoJ) (2008c) Idaho man pleads guilty in international child exploitation enterprise case. Media release, 17 April. Available at: http://jacksonville.fbi.gov/dojpressrel/pressrel08/childporn041708.htm

United States Department of Justice (US DoJ) (2008d) 33 individuals in U.S. and Romania indicted in federal RICO case that alleges widespread computer fraud. Media release, 19 May. Available at: http://losangeles.fbi.gov/dojpressrel/pressrel08/la051908ausa.htm

United States Federal Trade Commission (US FTC) (2008) Agency announces settlement of separate actions against retailer TJX, and data brokers Reed Elsevier and Seisint for failing to provide adequate security for consumers’ data. Media release, 27 March. Available at: http://www.ftc.gov/opa/2008/03/datasec.shtm

United States Secret Service (USSS) (2004) U.S. secret service’s operation firewall nets 28 arrests. Press release, 28 October

van Rassel J (2007) ATM skimmers seized in raid. Calgary Herald, 31 May

Vidino L (2007) The hofstad group: the new face of terrorist networks in Europe. Stud Confl Terror 30:579–592

Vijayan J (2007) Mass. credit union bills TJX $590k for breach-related costs. Computerworld, 6 June. Available at: http://computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9023778&taxonomyId=17&intsrc=kc_top

Ward M (2006) Anti-cartoon protests go online. BBC.co.uk, 8 February. Available at: http://news.bbc.co.uk/1/hi/technology/4692518.stm

Warner B (2006) Muslim hackers blast Denmark in net assault. PC Pro, 7 February. Available at: http://www.pcpro.co.uk/news/83314/muslim-hackers-blast-denmark-in-net-assault.html

Weimann G (2006) Virtual disputes: the use of the internet for terrorist debates. Stud Confl Terror 29(7):623–639

Zhuge J, Holz T, Song C, Guo J, Han X, Zou W (2008) Studying malicious websites and the underground economy on the Chinese web. In: Proceedings of the 7th Workshop on the Economics of Information Security, WEIS 2008, Hanover, New Hampshire, June 25–28, 2008