The Internet, Technology, and Organized Crime

Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional” organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age.

[1]  P. Meiksins,et al.  Controlling Unlawful Organizational Behavior: Social Structure and Corporate Misconduct. , 1985 .

[2]  William J. Chamblis STATE‐ORGANIZED CRIME—The American Society of Criminology, 1988 Presidential Address* , 1989 .

[3]  Clifford Stoll,et al.  The Cuckoo's Egg , 1989 .

[4]  Peter Grabosky,et al.  Money laundering in the 21st century : risks and countermeasures : seminar held on 7 February 1996, Canberra, Australia , 1995 .

[5]  N. Passas The Genesis of the BCCI Scandal , 1996 .

[6]  David Goldstone,et al.  International Dimensions of Crimes in Cyberspace , 1998 .

[7]  The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium , 1999 .

[8]  Russell G. Smith,et al.  Nigerian Advance Fee Fraud , 1999 .

[9]  John Arquilla,et al.  Networks and Netwars: The Future of Terror, Crime and Militancy , 2001 .

[10]  Nina A. Kollars,et al.  Transnational activities of Chinese crime organizations , 2002 .

[11]  Howard Rheingold,et al.  Smart Mobs: The Next Social Revolution , 2002 .

[12]  T. Thomas Al Qaeda and the Internet: The Danger of “Cyberplanning” , 2003, Parameters.

[13]  Jacqueline L. Schneider,et al.  Hiding in Plain Sight: An Exploration of the Illegal(?) Activities of a Drugs Newsgroup , 2003 .

[14]  P. Evans,et al.  The Internet and Asia-Pacific security: Old conflicts and new behaviour , 2003 .

[15]  Peter Grabosky,et al.  Crime in the Digital Age , 2003 .

[16]  Peter B. E. Hill The Changing Face of the Yakuza , 2004 .

[17]  Hedieh Nasheri Economic Espionage and Industrial Spying: Contents , 2004 .

[18]  The mob: from 42nd Street to Wall Street , 2004 .

[19]  R. Perl State Crime: The North Korean Drug Trade , 2004 .

[20]  Tamara Makarenko,et al.  The Crime-Terror Continuum: Tracing the Interplay between Transnational Organised Crime and Terrorism , 2004 .

[21]  Issues in Transnational Policing , 2005 .

[22]  William L. Simon,et al.  The Art of Intrusion , 2005 .

[23]  Eric Priest The Future of Music and Film Piracy in China , 2005 .

[24]  Peter Grabosky,et al.  Cyber-Crime: The Challenge in Asia , 2005 .

[25]  Judith A. Nicholson Flash! Mobs in the Age of Mobile Connectivity , 2005 .

[26]  Rob White Swarming and the social dynamics of group violence , 2006 .

[27]  What NSA is Doing . . . and Why it's Illegal , 2006 .

[28]  Kevin G Lynch,et al.  The availability of web sites offering to sell opioid medications without prescriptions. , 2006, The American journal of psychiatry.

[29]  Roderic Broadhurst,et al.  Developments in the global law enforcement of cyber‐crime , 2006 .

[30]  S. Poynting What caused the Cronulla riot? , 2006 .

[31]  David C. Perrier,et al.  The Security of Gambling and Gambling with Security: Hacking, Law Enforcement and Public Policy , 2007 .

[32]  Mapping the electronic jihad : an outline of the virtual jihadi community , 2007 .

[33]  Kim-Kwang Raymond Choo,et al.  Future directions in technology-enabled crime: 2007-09 , 2008 .