Abstract
An earlier version of this chapter appeared in Korean Institute of Criminology Research Report Series 13-B-01 Information Society and Cybercrime: Challenges for Criminology and Criminal Justice. Korean Institute of Criminology and International Society of Criminology, Seoul, 2013.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Bibliography
Bamford, James (2004) A Pretext for War, New York: Doubleday.
Bamford, James (2008) The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America, New York: Random House.
Bradsher, Keith (2006) “North Korean Ploy Masks Ships Under Other Flags,” New York Times, 20 October, http://www.nytimes.com/2006/10/20/world/ asia/20shipping.html?pagewanted=print (accessed 25 July 2014).
Choo, Kim-Kwang Raymond and Grabosky, Peter (2014) “Cyber Crime,” in The Oxford Handbook of Organized Crime, L. Paoli (ed.), New York: Oxford University Press.
Coleman, Gabriella (2011) “Anonymous: From the Lulz to Collective Action,” The New Everyday, 6 April, http://mediacommons.futureofthebook.org/tne/pieces/anonymous-lulz-collective-action (accessed 25 July 2014).
Cowell, A. (1992) “Sicilians Jeer Italian Leaders at a Funeral Protest,” The New York Times, 22 July, http://www.nytimes.com/1992/07/22/world/sicilians-jeer-italian-leaders-at-a-funeral-protest.html (accessed 25 July 2014).
Cressey, Donald R. (1972) Criminal Organization: Its Elementary Forms, London: Heinemann Educational Books.
Denning, Dorothy (2001) “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in Networks and Netwars: The Future of Terror, Crime, and Militancy, J. Arquilla and D. F. Ronfeldt (eds.), Santa Monica, CA: Rand Corporation.
Donohue, Laura (2013) “NSA Surveillance May be Legal–But It’s Unconstitutional,” The Washington Post, 21 June, http://articles.washingtonpost.com/2013-06-21/opinions/40110321_1_electronic-surveillance-fisa-nsa-surveillance (accessed 25 July 2014).
Federal Bureau of Investigation (FBI) (2012) “Press Release: Another Cyber Fraud Defendant Charged in Operation Aching Mules Sentenced in Manhattan Federal Court,” 23 March, http://www.fbi.gov/press-releases/2012/another-cyber-fraud-defendant-charged-in-operation-aching-mules-sentenced -in-manhattan-federal-court (accessed 25 July 2014).
Gidda, Miren (2013) “Edward Snowden and the NSA Files-Timeline,” The Guardian, 26 July, http://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline?INTCMP=SRCH (accessed 25 July 2014).
Glenny, Misha (2011) Dark Market, New York: Knopf.
Grabosky, Peter (1995) “Using Non-governmental Resources to Foster Regulatory Compliance,” Governance: An International Journal of Policy and Administration 8 (4): 527–50.
Graham, William R, Jr (2000) “Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to ‘W0nderland’,” Law Review of Michigan State University-Detroit College of Law, 457–84.
Greenwald, Glenn (2014) No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, New York: Metropolitan Books.
Greitens, Sheena (2012) “A North Korean Corleone,” New York Times, 12 March, http://www.nytimes.com/2012/03/04/opinion/sunday/a-north-korean-corleone.html?pagewanted=all (accessed 25 July 2014).
Halstead, Boronia (1998) “The Use of Models in the Analysis of Organized Crime and Development of Policy,” Transnational Organized Crime 4 (1): 1–24.
Information Warfare Monitor (2010) “Shadows in the Cloud: Investigating Cyber Espionage 2.0,” http://www.nartv.org/mirror/shadows-in-the-cloud.pdf (accessed 25 July 2014).
Lee, Jennifer (2002) “Pirates on the Web, Spoils on the Street,” New York Times, 11 July, http://www.nytimes.com/2002/07/11/technology/pirates-on-the-web-spoils-on-the-street.html?pagewanted=all&src=pm (accessed 25 July 2014).
McIllwain, Jeffrey (2005) “Intellectual Property Theft and Organized Crime: The Case of Film Piracy,” Trends in Organized Crime 8 (4): 15–39.
Mandiant Intelligence Center (2013) APT1: Exposing One of China’s Cyber Espionage Units, http://intelreport.mandiant.com/ (accessed 25 July 2014).
Markoff, John (2009) “Vast Spy System Loots Computers in 103 Countries,” New York Times, 28 March, http://www.theglobeandmail.com /technology/meet-the-canadians-who-busted-ghostnet/article1214210/?page=all (accessed 25 July 2014).
Markoff, John and Barboza, David (2010) “Researchers Trace Data Theft to Intruders in China,” New York Times, 5 April, http://www.nytimes.com/2010/04/06/science/06cyber.html?pagewanted=all (accessed 25 July 2014).
Martin, Brian G. (1996) The Shanghai Green Gang: Politics and Organized Crime 1919–1937, Berkeley, CA: University of California Press.
Morselli, Carlo (2009) Inside Criminal Networks, New York: Springer.
New York Times (2013) “More Fog from the Spy Agencies,” New York Times, 31 July, http://www.nytimes.com/2013/08/01/opinion/more-fog-from-the-spy-agencies.html?emc=edit_tnt_20130731&tntemail0=y (accessed 25 July 2014).
Olson, Parmy (2012) We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency, New York: Little Brown.
Paoli, L. (2003) Mafia Brotherhoods: Organized Crime Italian Style, New York: Oxford University Press.
Perl, Raphael (2007) “Drug Trafficking and North Korea: Issues for US Policy,” Washington, DC: Congressional Research Service, http://fas.org/sgp/crs/row/RL32167.pdf (accessed 20 May 2013).
Perlroth, N. (2012) “In Cyberattack on Saudi Firm, US Sees Iran Firing Back,” New York Times, 23 October, http://www.nytimes.com/2012/10/24/business/global/ cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=all (accessed 25 July 2014).
Perlroth, N. and Hardy, Q. (2013) “Bank Hacking Was the Work of Iranians, Officials Say,” New York Times, 8 January, http://www.nytimes.com/2013/01/09/ technology/online-banking-attacks-were-work-of-iran-us-officials-say. html (accessed 25 July 2014).
Priest, Dana and Arkin, William (2011) Top Secret America: The Rise of the New American Security State, New York: Little Brown.
Russell, Gabrielle (2008) “Pedophiles in Wonderland: Censoring the Sinful in Cyberspace,” Journal of Criminal Law and Criminology 98 (4): 1467–500.
Schmidt, M. S. and Sanger, D. E. (2014) “5 in China Army Face US Charges of Cyberattacks,” New York Times, 19 May, http://www.nytimes.com/2014/05/20/ us/us-to-charge-chinese-workers-with-cyberspying.html# (accessed 25 July 2014).
Sanger, David (2012) Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power, New York: Crown Publishers.
Sanger, D., Barboza, D. and Perlroth, N (2013) “Chinese Army Unit Is Seen as Tied to Hacking Against US,” New York Times, 18 February, http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all (accessed 25 July 2014).
Turns, David (2012) “Cyber Warfare and the Notion of Direct Participation in Hostilities,” Journal of Conflict Security Law 17 (2): 279–97.
Standing, Andre (2003) The Social Contradictions of Organized Crime on the Cape Flats, Institute for Security Studies Occasional paper 74, Pretoria, South Africa: Institute for Security Studies.
US Department of Justice (2002) “Warez Leader Sentenced to 46 Months,” 17 May, http://www.justice.gov/criminal/cybercrime/press-releases/2002/sankusSent.htm (accessed 25 July 2014).
Urbas, Gregor (2006) “Cross-national Investigation and Prosecution of Intellectual Property Crimes: The Example of ‘Operation Buccaneer’,” Crime, Law and Social Change 46: 207–21.
Wakeman, Frederick Jr (1995) Policing Shanghai, 1927–1937, Berkeley, CA: University of California Press.
Weiner, Tim (2007) Legacy of Ashes: The History of the CIA, New York: Doubleday.
Williams, Phil (2001) “Transnational Criminal Networks,” in Networks and Netwars, J. Arquilla and D. Ronfeldt (eds.), Santa Monica, CA: Rand Corporation.
Zetter, Kim (2014) Countdown to Zero Day: Stuxnet and the Launch of the World’sFirst Digital Weapon, New York: Crown.
Editor information
Editors and Affiliations
Copyright information
© 2015 Peter Grabosky
About this chapter
Cite this chapter
Grabosky, P. (2015). Organized Cybercrime and National Security. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_5
Download citation
DOI: https://doi.org/10.1057/9781137474162_5
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)