Organised crime groups in cyberspace: a typology

Three categories of organised groups that exploit advances in information and communications technologies (ICT) to infringe legal and regulatory controls: (1) traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; (2) organised cybercriminal groups which operate exclusively online; and (3) organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct are described in this article. The need for law enforcement to have in-depth knowledge of computer forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques will become more pronounced with the increased likelihood of digital content being a source of disputes or forming part of underlying evidence to support or refute a dispute in judicial proceedings. There is also a need for new strategies of response and further research on analysing organised criminal activities in cyberspace.

[1]  August Bequai,et al.  Organized Crime Goes Cyber , 2001, Comput. Secur..

[2]  Eoghan Casey Error, Uncertainty and Loss in Digital Evidence , 2002, Int. J. Digit. EVid..

[3]  Susan W. Brenner Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships , 2003 .

[4]  Phyllis B. Gerstenfeld,et al.  Hate Online: A Content Analysis of Extremist Internet Sites , 2003 .

[5]  A. Adam Cyberstalking and Internet pornography: Gender and the gaze , 2002, Ethics and Information Technology.

[6]  J. Minkel Her Majesty's Secret Service , 2004 .

[7]  Rollie Lal South Asian Organized Crime and Terrorist Networks , 2005 .

[8]  N. Kshetri Pattern of Global Cyber War and Crime: A Conceptual Framework , 2005 .

[9]  Matthew Pemble Whose computer is it anyway? (part II) , 2005 .

[10]  John Charlton Al Qaeda buys cyber criminal expertise , 2005 .

[11]  Farnam Jahanian,et al.  The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.

[12]  Nir Kshetri,et al.  The simple economics of cybercrimes , 2006, IEEE Security & Privacy Magazine.

[13]  Richard T. Crowder,et al.  Office of the United States Trade Representative , 2006 .

[14]  Shihchieh Chou,et al.  Cybercrime in Taiwan - An Analysis of Suspect Records , 2006, WISI.

[15]  G. Weimann Virtual Disputes: The Use of the Internet for Terrorist Debates , 2006 .

[16]  C. Harrison Cyberspace and Child Abuse Images , 2006 .

[17]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[18]  Aaron Hackworth,et al.  Botnets as a Vehicle for Online Crimes , 2006 .

[19]  Rob McCusker,et al.  Transnational organised cyber crime: distinguishing threat from reality , 2007 .

[20]  Gary McGraw Silver Bullet Speaks to Avi Rubin , 2006, IEEE Security & Privacy Magazine.

[21]  Kim-Kwang Raymond Choo Zombies and botnets , 2007 .

[22]  Sujeet Shenoi,et al.  File System Journal Forensics , 2007, IFIP Int. Conf. Digital Forensics.

[23]  How to leak a secret and not get caught , 2007 .

[24]  M. Rogers,et al.  Survey of Law Enforcement Perceptions Regarding Digital Evidence , 2007, IFIP Int. Conf. Digital Forensics.

[25]  The risks to business presented by organised and economically motivated criminal enterprises , 2007 .

[26]  Michael E. Lesk,et al.  The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.

[27]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.

[28]  Peter Grabosky,et al.  Requirements of prosecution services to deal with cyber crime , 2007 .

[29]  Lorenzo Vidino The Hofstad Group: The New Face of Terrorist Networks in Europe , 2007 .

[30]  Criminal histories: an introduction , 2008 .

[31]  Kim-Kwang Raymond Choo,et al.  Future directions in technology-enabled crime: 2007-09 , 2008 .

[32]  Chengyu Song,et al.  Studying Malicious Websites and the Underground Economy on the Chinese Web , 2008, WEIS.

[33]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[34]  The prosecution of Chinese organized crime groups: the Sister Ping case and its lessons , 2008 .

[35]  Money Laundering and Terrorism Financing Risks of Prepaid Cards Instruments? , 2009 .