Abstract
Cybercrime has become an integral part of the transnational threat landscape and conjures up pressing images of nefarious and increasingly complex online activity. More recently, the concept of ‘organised crime’ has been attributed to cybercriminality. There has been subsequent disagreement and confusion concerning whether such crime is a derivation of traditional organised crime or an evolution of such crime within the online space. This opaque state of affairs has been exacerbated by the relative lack of clear evidence attesting to and supporting either scenario. Technological advances have always been used to the advantage of the criminal fraternity. The crucial question that remains is whether those advances have merely facilitated the commission of physical crime or whether in fact they have led to the creation of a new wave of traditional, but virtual, organised crime.
Similar content being viewed by others
Notes
Majid Y. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427:408.
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social and Legal Studies, 10(2), 243–249:243
Nisbett, C (2002). New directions in cyber-crime. White Paper, QineticQ, http://www.qinetiq.com/home/security/information_and_network_security/white_paper_index.Par.0012.File.pdf
Wall, D. S.(2004). The internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justices system (Chapter 4:77). Sage
IBM (2006). IBM B2B security survey: Australia/Global summary report (provided to author by IBM)
Article 2 (a) of the UN Convention Against Transnational Organized Crime defines an ‘organised criminal group’ as a ‘...structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences established in accordance with [the] Convention, in order to obtain, directly or indirectly, a financial or other material benefit.’
Council of Europe (2004). Organised crime situation report: Focus on the threat of cybercrime, http://www.coe.int/T/E/Legal_Affairs/Legal_co-operation/Combating_economic_crime/8_Organised_crime/Documents/Organised%20Crime%20Situation%20Report%202004.pdf
Cited in Naylor, R. T. (2000). Expert panel on emerging crimes:4, Research and Statistics Division, Department of Justice, http://www.justice.gc.ca/en/ps/rs/rep/2002/expertpanel.pdf
Cited in McMillan, R (2006). FBI: Cybercriminals taking clues from Mafia, http://www.pcworld.com/article/id, 126664-c,cybercrime/article.html
Ibid
Cited in Wired News (2006), Cybercrime is getting organized, http://www.wired.com/news/technology/internet/0,71793-0.html?tw=rss.index
Cited in Thomson, I (2003). NHTCU issues stark cyber-crime warning, http://www.managementconsultancy.co.uk/vnunet/news/2122171/nhtcu-issues-stark-c
Nisbett, op. cit
U.S. Congress (1951). Special Committee on Organized Crime in Interstate Commerce
U.S. Congress (1963). Senate Permanent Subcommittee on Investigations of the Committee on Government Operations
A meeting of crime Bosses at the home of Joseph Barbara in Appalachian, New York, in 1957
UN Commission on Crime Prevention and Criminal Justice (2001). Conclusions of the study on effective measures to prevent and control high-technology and computer-related crime, 10th Session, 8–17 May, http://www.unodc.org/pdf/crime/10_commission/4e.pdf
Davis, R and Pease, K (2001). Crime, technology and the future, Security Journal, 59–61, Perpetuity Press Ltd.
Naylor, op.cit
Ibid: 4
Zittrain, J. L. (2006). The generative internet, Harvard Law Review (119:7), http://www.harvardlawreview.org/issues/119/may06/may06.shtml
Sussman, M. A. (1999). The critical challenges from international high-tech and computer-related crime at the millennium. Duke Journal of Comparative and International Law, 9, 451–489):451
Miller, R, Michalski, W, & Stevens, B (1998). The promises and perils of 21st century technology: An overview of the issues in 21st century technologies. Promises and perils of a dynamic future, OECD.
Symantec (2006). Symantec internet security threat report: Trends for January 06–June 06, http://www.symantec.com/specprog/threatreport/ent-whitepaper_symantec_internet_security_threat_report_x_09_2006.en-us.pdf
Symantec (2006). Cybercrime: A disturbing trend http://www.symantec.com/home_homeoffice/library/article.jsp?aid=cybercrime_a_disturbing_trend
CipherTrust (2005). Phishing: Organized crime for the 21st century, http://www.ciphertust.com
UN Commission on Crime Prevention and Criminal Justice (2001), op. cit
Morris, S. (2004). The future of netcrime now: Part 1 - Threats and challenges, Home Office.
Millman, R. (2005). IT managers fail to protect mobile devices, SC Magazine, 11 November, http://www.scmagazine.com/asia/news/article/527520/it-managers-fail-protect-mobile-devices/
Brenner, op.cit, 24
Nisbett, op.cit
Brenner, op. cit, 24
Nisbett, op. cit
Ibid
Cressey, D. R. (1969). Theft of a nation: The structure and operations of organized crime in America. New York: Harper & Row.
Joseph V, A mafia member, testified before the McClellan Committee (n.17 supra). Details of his life may be found in Maas, P. (1968), The Valachi papers, New York: G.P. Putnam
United Nations Office on Drugs and Crime (2002). Results of a pilot study of forty selected organized crime groups in sixteen countries, http://www.unodc.org/pdf/crime/publications/Pilot_survey.pdf
Nisbett, op.cit
Olson, J. L. (2004). The threat of systematic and organized cybercrime and information warfare: 17 http://www.american.edu/traccc/resources/publications/students/olson01.pdf
Europol (2006). Organised Crime Threat Assessment 2006: 18 http://www.europol.europa.eu/publications/OCTA/OCTA2006.pdf
McAfee (2006). McAfee virtual criminology report: Organised crime and the internet, http://www.softmart.com/mcafee/docs/McAfee%20NA%20Virtual%20Criminology%20Report.pdf
Williams, P. (2001). Organized crime and cybercrime: Synergies, trends and responses. Global Issues 6(2), 25, US Department of State, http://usinfo.state.gov/journals/itgic/0801/ijge/ijge0801.pdf
Clarberg, B. (2003). Cyber crime, Paper presented at the conference on international cooperation on transnational crime, The Hague, 9–10 October (unpublished)
See, for example, McCusker, R. (2006) Organised crime and terrorism: Convergence or separation?, ECPR Standing group on organised crime newsletter (5:2) 2–5 http://www.essex.ac.uk/ecpr/standinggroups/crime/documents/SGOC_Vol5_2.pdf
Olson, op.cit: 15
Ibid:16
Nisbett, op.cit
Brenner, op.cit: 39
Council of Europe (2005). Organised crime situation report: Focus on the threat of economic crime, http://www.coe.int/t/e/legal_affairs/legal_co-operation/combating_economic_crime/8_Organised_crime/Documents/Report2005E.pdf
Brenner, op. cit: 45
Ibid
Ibid: 47
Clarberg: op.cit
Williams, op.cit: 23
Grabosky, op.cit
Williams, op.cit: 23
See ‘Introduction’ at p.1 supra
Williams, op.cit: 22
Ibid
Council of Europe (2004), op.cit: 169
Cited in Williams (2001), op.cit: 23
Morris, op.cit: 28
Parizo, E.B. (2005). Busted: The inside story of ‘Operation Firewall’, Security.com, http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1146949,00.html
Cited in Parizo, op.cit
Council of Europe, op.cit: 118
Ibid: 119
Ibid: 121
Europol, op.cit: 18
Criminal Intelligence Service of Canada (2005). http://www.cisc.gc.ca/annual_reports/annual_report2005/document/annual_report_2005_e.pdf :15
Drug Enforcement Administration, Federal Bureau of Investigation and Royal Canadian Mounted Police (2006). 2006 Canada/US organized crime threat assessment, http://www.psepc.gc.ca/prg/le/_fl/2006_Canada-US_OC-TA_en.pdf
Ibid: 13
Ibid: 5
Criminal Intelligence Service of Canada (2005). 2005 Annual report on organized crime in Canada: 13, http://www.cisc.gc.ca/annual_reports/annual_report2005/document/annual_report_2005_e.pdf
Criminal Intelligence Service of Canada (2006), op.cit: 9
Europol, op.cit: 18
Serious Organised Crime Agency (2006). The United Kingdom threat assessment of serious organised crime 2006/7: 23 http://www.soca.gov.uk/assessPublications/downloads/threat_assess_unclass_250706.pdf
Hynds, L (2005). Organized crime offers rent-a-zombie deals, http://www.spamdailynews.com/publish/Organized_crime_offers_rent-a-zombie_deals.asp
Financial Action Task Force (2006). Report on new payment methods, http://www.fatf-gafi.org/dataoecd/30/47/37627240.pdf
Kubic, T. T. (2001). The FBI’s perspective on the cyber crime problem. Testimony before the House Committee on the Judiciary, Subcommittee on Crime, http://www.fbi.gov/congress/congress01/kubic061201.htm
Griffiths, P (2006). Internet gangs hiring students for cybercrime, http://www.nzherald.co.nz/section/3/story.cfm?c_id=3&objectid=10414819
McAfee (2006) op.cit
Stone, G (2005). Microsoft partners with Australian law enforcement agencies to combat cyber crime, Microsoft press release, http://www.ahtcc.gov.au/__data/assets/pdf_file/13952/MR050330_ForensicWorkshop.pdf
CNN (2001). FBI warns companies about Russian hacker attacks, http://archives.cnn.com/2001/TECH/internet/03/08/hacker.attacks/index.html
McCafferty, D. (2004). Organized cyber crime, http://www.thewhir.com/features/organized-cybercrime.cfm
ibid
Fisher, D. (2006). Feds court infosec pros in fight against cybercrime, http://searchsecurity.techtarget.com.au/topics/article.asp?DocID=1207228
Cited in Ilett, D (2006). Mafia insiders infiltrating firms, U.K. cops warn, http://news.com.com/Mafia+insiders+infiltrating+firms%2C+U.K.+cops+warn/2100-7348_3-6064954.html?tag=mainstry
Horn, P. (2006). It’s time to arrest cyber crime
Cited in Thomson, I. (2002). Organised crime goes digital, http://www.crime-research.org/news/2002/12/Mess1201.htm
Ibid
Association for Payment Clearing Services (2006). A vulnerability and threat assessment of authentication mechanisms for internet based financial services: 2006 review, London
McCusker, R. (2007). The ultimate work at home scam. Money Laundering Intelligence (14)
McAfee (2005). McAfee virtual criminology report: North American study into organized crime and the internet, http://www.mcafee.com/us/local_content/misc/mcafee_na_virtual_criminology_report.pdf
Author information
Authors and Affiliations
Corresponding author
Additional information
Rob McCusker is a Research Analyst in Transnational Crime, Australian Institute of Criminology.
Rights and permissions
About this article
Cite this article
McCusker, R. Transnational organised cyber crime: distinguishing threat from reality. Crime Law Soc Change 46, 257–273 (2006). https://doi.org/10.1007/s10611-007-9059-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10611-007-9059-3