Asian Journal of Criminology

, Volume 2, Issue 2, pp 145–161 | Cite as

The Internet, Technology, and Organized Crime

  • Peter GraboskyEmail author


Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional” organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age.


Asia Cybercrime Digital technology Forgery Fraud 



The author would like to thank John McFarlane and an anonymous reviewer for their comments on an earlier draft.


  1. ASEAN Regional Forum (2006). Statement on cooperation in fighting cyber attack and terrorist misuse of cyber space of the thirteenth ASEAN Regional Forum 2006. (visited 18 September 2007).
  2. Ashcroft, J. (2004). Statement of Attorney General John Ashcroft on the Regpay Child Pornography Indictment (visited 18 September 2007).
  3. Associated Press (2006). State Department Suffers Computer Break-Ins. 11 July 2006 (visited 18 September 2007).
  4. BBC News (2001). Attack on Japan ministry website. (visited 18 September 2007).
  5. Broadhurst, R. G. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies and Management, 29(3), 408–433.CrossRefGoogle Scholar
  6. Buchanan, J., & Grant, A. (2001). Investigating and prosecuting Nigerian fraud. United States Attorneys’ Bulletin November, 2001, 39–47.Google Scholar
  7. Bullwinkel, J. (2005). International cooperation in combating cyber-crime in Asia: Existing mechanisms and new approaches. In R. Broadhurst & P. Grabosky (Eds.), Cyber-crime: The challenge in Asia (pp. 269–302). Hong Kong: Hong Kong University Press.Google Scholar
  8. Burrell, I. (1999). Asian trade in illegal immigration is uncovered. The independent, 27 December, (visited 18 September 2007).
  9. Carwile, K. P., & Hollis, V. (2004). The mob: From 42nd street to wall street. Journal of Financial Crime, 11(4), 325–341.CrossRefGoogle Scholar
  10. Chambliss, W. (1989). State organized crime. Criminology, 27(2), 183–208.CrossRefGoogle Scholar
  11. China .org (2007). Banking Authority Addresses Credit Card Fraud (visited 18 September 2007).
  12. Choo, K.-K. R., Smith, R. G., & McCusker, R. (2007). Future directions in technology-enabled crime: 2007–09. Research and Public Policy Series No.78. Australian Institute of Criminology, Canberra (visited 18 September 2007).
  13. Cilluffo, F. J. (2007). The internet: A portal to violent Islamist extremism. Testimony to the Homeland Security and Governmental Affairs Committee, United States Senate, May 3, 2007. (visited 18 September 2007).
  14. (2006). ‘Flashmob’ of 12 Proposed to One Girl in Beijing. 3 September (visited 18 September 2007).Google Scholar
  15. Curtis, G. E., Elan, S., Hudson, R., & Kollars, N. (2003). Transnational activities of Chinese crime organizations. Federal Research Division, Library of Congress, Washington. (visited 18 September 2007).
  16. Denning, D. (2000). Cyberterrorism. Testimony before the special oversight panel on terrorism, Committee on Armed Services, U.S. House of Representatives, May 23, 2000. (Visited 18 September 2007).
  17. Finnane, M. (2002) Sentencing judgment, Judge Michael John Finnane QC Regina v H. The District Court of New South Wales, Criminal JurisdictionFriday, 23 August 2002 01/11/0877. (visited 18 September 2007).
  18. Forman, R. F., Woody, G. E., McLellan, T., & Lynch, K. G. (2006). The availability of web sites offering to sell opioid medications without prescriptions. American Journal of Psychiatry, 163(7), 1233–1238.CrossRefGoogle Scholar
  19. Givner-Forbes, R., & Shwery, C. (2007). Mapping the electronic Jihad: An outline of the virtual Jihadi Community. RSIS Commentaries 33/2007 (visited 18 September 2007).
  20. Goldstone, D., & Shave, B. (1999). International dimensions of crimes in cyberspace. Fordham International Law Journal, 22, 1924–1971.Google Scholar
  21. Goodell, J. (2002). How to fake a passport New York Times Magazine February 10, 2002 (visited 18 September 2007).
  22. Grabosky, P. N., & Smith, R. G. (1998). Crime in the digital age. New Brunswick, NJ: Transaction Publishers, and Sydney: Federation Press.Google Scholar
  23. Grant, A., David, F., & Grabosky, P. (1997). Child pornography in the digital age. Transnational Organized Crime, 3(4), 171–188.Google Scholar
  24. Halstead, B. (1998). The use of models in the analysis of organized crime and development of policy. Transnational Organized Crime, 4(1), 1–24.CrossRefGoogle Scholar
  25. Hill, P. (2005). The changing face of the Yakuza. In M. Galeotti (Ed.), Global crime today (pp. 97–116). Abingdon: Routledge.Google Scholar
  26. Makarenko, T. (2004). The crime-terror continuum: Tracing the interplay between transnational organized crime and terrorism. Global Crime, 6(1), 129–145.CrossRefGoogle Scholar
  27. McDonell, R. (1998). Money laundering methodologies and international and regional countermeasures. Paper presented at a conference convened by the Australian Institute of Criminology, Sydney, 7–8 May. (visited 18 September 2007).
  28. McMullan, J., & Perrier, D. (2007). The security of gambling and gambling with security: Hacking, law enforcement and public policy. International Gambling Studies, 7(1), 43–58.CrossRefGoogle Scholar
  29. Mitnick, K., & Simon, W. (2005). The art of intrusion. Indianapolis: Wiley Publishing.Google Scholar
  30. Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge: Cambridge University Press.Google Scholar
  31. Nicholson, J. A. (2005). Flash! Mobs in the age of mobile connectivity. Fiberculture, 6 (visited 18 September 2007).
  32. Office of the National Counterintelligence Executive (2006). Annual Report to Congress on Foreign Economic Collection and Industrial Espionage 2005. Office of the Director of National Intelligence, Washington (visited 19 October 2007).
  33. Ortis, C., & Evans, P. (2003). The internet and Asia-Pacific security: Old conflicts and new behaviour. The Pacific Review, 16(4), 549–572.CrossRefGoogle Scholar
  34. Parsky, L. H. (2005). Statement before the subcommittee on oversight of government management, the federal workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs United States Senate, June 14, 2005 (visited 18 September 2007).
  35. Passas, N. (1996). The genesis of the BCCI scandal. Journal of Law and Society, 23(1), 57–72.CrossRefGoogle Scholar
  36. Perl, R. (2005). State crime: The north Korean drug trade. In M. Galeotti (Ed.), Global crime today (pp. 117–128). Abingdon: Routledge.Google Scholar
  37. Poynting, S. (2006). What caused the Cronulla riot? Race & Class, 48(1), 85–92.CrossRefGoogle Scholar
  38. Priest, E. (2006). The future of music and film piracy in China. Berkeley Technology Law Journal, 21, 795–871.Google Scholar
  39. Radio Australia (2007). Thai authorities uncover massive credit card fraud 8 January (visited 15 January 2007).
  40. Ramo, J. C. (1996). Crime Online. Time Digital, September 23, pp. 28–32.Google Scholar
  41. Reuters (2001) Internet sex offer puts Malaysian husband in jail. (visited 18 September 2007).
  42. Rheingold, H. (2002). Smart mobs: The next social revolution. New York: Perseus Publishing.Google Scholar
  43. Schneider, J. L. (2003). Hiding in plain sight: An exploration of the activities of a drugs newsgroup. Howard Journal of Criminal Justice, 42(4), 372–389.CrossRefGoogle Scholar
  44. Sheptycki, J. (2000). Introduction. In J. Sheptycki (Ed.), Issues in transnational policing (pp 1–20). London: Routledge.Google Scholar
  45. Sims, J. C. (2006). What NSA is doing......and why it’s illegal. Hastings Constitutional Law Quarterly, 33(2&3), 101–136.Google Scholar
  46. Sipress, A. (2004). An Indonesian’s prison memoir takes holy war into cyberspace: In sign of new threat, Militant Offers Tips on Credit Card Fraud, Washington Post 14 December, A19 (visited 18 September 2007).
  47. Slotter, K. (1997). Plastic payments: Trends in credit card fraud. FBI Law Enforcement Bulletin. (visited 18 September 2007).
  48. Smith, R. G., Holmes, M., & Kaufmann, P. (1999). Nigerian advance fee fraud. Trends and Issues in Crime and Criminal Justice, 121. Australian Institute of Criminology, Canberra. (visited 18 September 2007).
  49. Smith, R. G., & Urbas, G. (2001). Controlling fraud on the internet. Research and public policy series no. 39. Australian Institute of Criminology, Canberra (visited 18 September 2007).
  50. Stoll, C. (1989). The cuckoo’s egg. New York: Pocket Books.Google Scholar
  51. Sullivan, J. P. (2001). Gangs, hooligans, and anarchists: the vanguard of netwar in the streets. In D. F. Ronfeldt & J. Arquilla (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 99–126). Santa Monica: RAND Corporation.Google Scholar
  52. Sussmann, M. (1999). The critical challenges from international high-tech and computer related crime at the millennnium. Duke Journal of Comparative and International Law, 9, 451–489.Google Scholar
  53. Thomas, T. L. (2003). Al Qaeda and the Internet: The danger of “cyberplanning”. Parameters, 33(1), 112–123 (visited 18 September 2007).Google Scholar
  54. US Department of Justice (1997). The Office of Enforcement Operations- its role in the area of electronic surveillance. US Attorneys’ Bulletin, 45(5), 8–18 (visited 18 September 2007).Google Scholar
  55. US Department of Justice (2005) First U.S. Convictions in Largest Ever Multinational Investigation of Internet Piracy (March 8) (visited 18 September 2007).
  56. US Department of Justice (2007). Operation Buccaneer. (visited 18 September 2007).
  57. Vanderbilt, T. (2004). Follow the crowd: Tom Vanderbilt on new-model flash mobs. ArtForum (visited 18 September 2007).
  58. Vaughan, D. (1983). Controlling unlawful organizational behavior: Social structure and corporate misconduct. Chicago: University of Chicago Press.Google Scholar
  59. Wahlert, G. (1996). Implications of the move to a cashless society: Law enforcement. In A. Graycar & P. Grabosky (Eds.), Money laundering in the 21st century: Risks and countermeasures. Canberra: Australian Institute of Criminology. (visited 18 September 2007).Google Scholar
  60. Wasik, B. (2006). My crowd: Or, phase 5. Harper’s Magazine, March 2006, 56–66.Google Scholar
  61. White, R. (2006). Swarming and the social dynamics of group violence. Trends and Issues in Crime and Criminal Justice, 326. Australian Institute of Criminology, Canberra. (visited 18 September 2007).
  62. Williams, P. (2002). Organized crime and cyber-crime: Implications for business (visited 18 September 2007).
  63. Wong, A. (2006). ‘Flash mob rape’ case conviction. The Standard, 21 September. (visited 18 September 2007).

Copyright information

© Springer Science+Business Media B.V. 2007

Authors and Affiliations

  1. 1.The Australian National UniversityCanberraAustralia

Personalised recommendations