Skip to main content

Organized Cybercrime and National Security

  • Chapter
Cybercrime Risks and Responses

Abstract

An earlier version of this chapter appeared in Korean Institute of Criminology Research Report Series 13-B-01 Information Society and Cybercrime: Challenges for Criminology and Criminal Justice. Korean Institute of Criminology and International Society of Criminology, Seoul, 2013.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Bibliography

  • Bamford, James (2004) A Pretext for War, New York: Doubleday.

    Google Scholar 

  • Bamford, James (2008) The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America, New York: Random House.

    Google Scholar 

  • Bradsher, Keith (2006) “North Korean Ploy Masks Ships Under Other Flags,” New York Times, 20 October, http://www.nytimes.com/2006/10/20/world/ asia/20shipping.html?pagewanted=print (accessed 25 July 2014).

  • Choo, Kim-Kwang Raymond and Grabosky, Peter (2014) “Cyber Crime,” in The Oxford Handbook of Organized Crime, L. Paoli (ed.), New York: Oxford University Press.

    Google Scholar 

  • Coleman, Gabriella (2011) “Anonymous: From the Lulz to Collective Action,” The New Everyday, 6 April, http://mediacommons.futureofthebook.org/tne/pieces/anonymous-lulz-collective-action (accessed 25 July 2014).

    Google Scholar 

  • Cowell, A. (1992) “Sicilians Jeer Italian Leaders at a Funeral Protest,” The New York Times, 22 July, http://www.nytimes.com/1992/07/22/world/sicilians-jeer-italian-leaders-at-a-funeral-protest.html (accessed 25 July 2014).

    Google Scholar 

  • Cressey, Donald R. (1972) Criminal Organization: Its Elementary Forms, London: Heinemann Educational Books.

    Google Scholar 

  • Denning, Dorothy (2001) “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in Networks and Netwars: The Future of Terror, Crime, and Militancy, J. Arquilla and D. F. Ronfeldt (eds.), Santa Monica, CA: Rand Corporation.

    Google Scholar 

  • Donohue, Laura (2013) “NSA Surveillance May be Legal–But It’s Unconstitutional,” The Washington Post, 21 June, http://articles.washingtonpost.com/2013-06-21/opinions/40110321_1_electronic-surveillance-fisa-nsa-surveillance (accessed 25 July 2014).

    Google Scholar 

  • Federal Bureau of Investigation (FBI) (2012) “Press Release: Another Cyber Fraud Defendant Charged in Operation Aching Mules Sentenced in Manhattan Federal Court,” 23 March, http://www.fbi.gov/press-releases/2012/another-cyber-fraud-defendant-charged-in-operation-aching-mules-sentenced -in-manhattan-federal-court (accessed 25 July 2014).

  • Gidda, Miren (2013) “Edward Snowden and the NSA Files-Timeline,” The Guardian, 26 July, http://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline?INTCMP=SRCH (accessed 25 July 2014).

    Google Scholar 

  • Glenny, Misha (2011) Dark Market, New York: Knopf.

    Google Scholar 

  • Grabosky, Peter (1995) “Using Non-governmental Resources to Foster Regulatory Compliance,” Governance: An International Journal of Policy and Administration 8 (4): 527–50.

    Article  Google Scholar 

  • Graham, William R, Jr (2000) “Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to ‘W0nderland’,” Law Review of Michigan State University-Detroit College of Law, 457–84.

    Google Scholar 

  • Greenwald, Glenn (2014) No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, New York: Metropolitan Books.

    Google Scholar 

  • Greitens, Sheena (2012) “A North Korean Corleone,” New York Times, 12 March, http://www.nytimes.com/2012/03/04/opinion/sunday/a-north-korean-corleone.html?pagewanted=all (accessed 25 July 2014).

  • Halstead, Boronia (1998) “The Use of Models in the Analysis of Organized Crime and Development of Policy,” Transnational Organized Crime 4 (1): 1–24.

    Article  Google Scholar 

  • Information Warfare Monitor (2010) “Shadows in the Cloud: Investigating Cyber Espionage 2.0,” http://www.nartv.org/mirror/shadows-in-the-cloud.pdf (accessed 25 July 2014).

  • Lee, Jennifer (2002) “Pirates on the Web, Spoils on the Street,” New York Times, 11 July, http://www.nytimes.com/2002/07/11/technology/pirates-on-the-web-spoils-on-the-street.html?pagewanted=all&src=pm (accessed 25 July 2014).

    Google Scholar 

  • McIllwain, Jeffrey (2005) “Intellectual Property Theft and Organized Crime: The Case of Film Piracy,” Trends in Organized Crime 8 (4): 15–39.

    Article  Google Scholar 

  • Mandiant Intelligence Center (2013) APT1: Exposing One of China’s Cyber Espionage Units, http://intelreport.mandiant.com/ (accessed 25 July 2014).

  • Markoff, John (2009) “Vast Spy System Loots Computers in 103 Countries,” New York Times, 28 March, http://www.theglobeandmail.com /technology/meet-the-canadians-who-busted-ghostnet/article1214210/?page=all (accessed 25 July 2014).

    Google Scholar 

  • Markoff, John and Barboza, David (2010) “Researchers Trace Data Theft to Intruders in China,” New York Times, 5 April, http://www.nytimes.com/2010/04/06/science/06cyber.html?pagewanted=all (accessed 25 July 2014).

  • Martin, Brian G. (1996) The Shanghai Green Gang: Politics and Organized Crime 1919–1937, Berkeley, CA: University of California Press.

    Google Scholar 

  • Morselli, Carlo (2009) Inside Criminal Networks, New York: Springer.

    Book  Google Scholar 

  • New York Times (2013) “More Fog from the Spy Agencies,” New York Times, 31 July, http://www.nytimes.com/2013/08/01/opinion/more-fog-from-the-spy-agencies.html?emc=edit_tnt_20130731&tntemail0=y (accessed 25 July 2014).

  • Olson, Parmy (2012) We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency, New York: Little Brown.

    Google Scholar 

  • Paoli, L. (2003) Mafia Brotherhoods: Organized Crime Italian Style, New York: Oxford University Press.

    Google Scholar 

  • Perl, Raphael (2007) “Drug Trafficking and North Korea: Issues for US Policy,” Washington, DC: Congressional Research Service, http://fas.org/sgp/crs/row/RL32167.pdf (accessed 20 May 2013).

    Google Scholar 

  • Perlroth, N. (2012) “In Cyberattack on Saudi Firm, US Sees Iran Firing Back,” New York Times, 23 October, http://www.nytimes.com/2012/10/24/business/global/ cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=all (accessed 25 July 2014).

    Google Scholar 

  • Perlroth, N. and Hardy, Q. (2013) “Bank Hacking Was the Work of Iranians, Officials Say,” New York Times, 8 January, http://www.nytimes.com/2013/01/09/ technology/online-banking-attacks-were-work-of-iran-us-officials-say. html (accessed 25 July 2014).

  • Priest, Dana and Arkin, William (2011) Top Secret America: The Rise of the New American Security State, New York: Little Brown.

    Google Scholar 

  • Russell, Gabrielle (2008) “Pedophiles in Wonderland: Censoring the Sinful in Cyberspace,” Journal of Criminal Law and Criminology 98 (4): 1467–500.

    Google Scholar 

  • Schmidt, M. S. and Sanger, D. E. (2014) “5 in China Army Face US Charges of Cyberattacks,” New York Times, 19 May, http://www.nytimes.com/2014/05/20/ us/us-to-charge-chinese-workers-with-cyberspying.html# (accessed 25 July 2014).

    Google Scholar 

  • Sanger, David (2012) Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power, New York: Crown Publishers.

    Google Scholar 

  • Sanger, D., Barboza, D. and Perlroth, N (2013) “Chinese Army Unit Is Seen as Tied to Hacking Against US,” New York Times, 18 February, http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all (accessed 25 July 2014).

    Google Scholar 

  • Turns, David (2012) “Cyber Warfare and the Notion of Direct Participation in Hostilities,” Journal of Conflict Security Law 17 (2): 279–97.

    Article  Google Scholar 

  • Standing, Andre (2003) The Social Contradictions of Organized Crime on the Cape Flats, Institute for Security Studies Occasional paper 74, Pretoria, South Africa: Institute for Security Studies.

    Google Scholar 

  • US Department of Justice (2002) “Warez Leader Sentenced to 46 Months,” 17 May, http://www.justice.gov/criminal/cybercrime/press-releases/2002/sankusSent.htm (accessed 25 July 2014).

  • Urbas, Gregor (2006) “Cross-national Investigation and Prosecution of Intellectual Property Crimes: The Example of ‘Operation Buccaneer’,” Crime, Law and Social Change 46: 207–21.

    Article  Google Scholar 

  • Wakeman, Frederick Jr (1995) Policing Shanghai, 1927–1937, Berkeley, CA: University of California Press.

    Google Scholar 

  • Weiner, Tim (2007) Legacy of Ashes: The History of the CIA, New York: Doubleday.

    Google Scholar 

  • Williams, Phil (2001) “Transnational Criminal Networks,” in Networks and Netwars, J. Arquilla and D. Ronfeldt (eds.), Santa Monica, CA: Rand Corporation.

    Google Scholar 

  • Zetter, Kim (2014) Countdown to Zero Day: Stuxnet and the Launch of the World’sFirst Digital Weapon, New York: Crown.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Peter Grabosky

About this chapter

Cite this chapter

Grabosky, P. (2015). Organized Cybercrime and National Security. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_5

Download citation

Publish with us

Policies and ethics