Communication Interception Technology (CIT) and Its Use in the Fight against Transnational Organised Crime (TOC) in Australia: A Review of the Literature

Peter Bell, Mitchell Congram

Abstract


In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.


Full Text:

PDF

References


Abadinsky, H. (1994). Organized Crime (3rd ed.). Chicago: Nelson Hall.

Abadinsky, H. (2009). Organized Crime (9th ed.). Belmont, CA: Wadsworth Publishing.

Adams, R. E., Rohe, W. M., & Arcury, T. A. (2002). Implementing Community-Oriented Policing: Organizational Change and Street Officer Attitudes. Crime Delinquency, 48(3), 399-430. http://dx.doi.org/10.1177/0011128702048003003

Ahmed, S. (2007). B-Party Intercepts and the Telecommunications (Interception) Amendment Act 2006 (Cth). Internet Law Bulletin, 10(1).

Andreas, P., & Nadelmann, E. (2006). Policing the Globe: Criminalization and Crime Control in International Relations. New York: Oxford University Press.

Australian Crime Commission. (2009). Organised Crime in Australia. Canberra: Australian Crime Commission.

Bakier, A. H. (2007). The New Issue of Technical Mujahid: A Training Manual for Jihadis. Terrorism Monitor, 5(6).

Bazan, E. B. (2009), The Foreign Intelligence Surveillance Act: Comparison of the Senate Amendment to HR 3773 and the House Amendment to the Senate Amendment to HR 3773, 12 June 2008, in Confrontation or Collaboration: Congress and the Intelligence Community, Belfer Centre, Harvard Kennedy School of Government, 2009, p. 1.

Bhaskar, R., & Zhang, Y. (2007). Knowledge Sharing in Law Enforcement: A Case Study. Journal of Information Privacy & Security, 3(3), 45-68.

Borger, J. (2007). Organised Crime: The $2 trillion threat to the world's security. The Guardian. Retrieved from http://www.guardian.co.uk/world/2007/sep/12/topstories3.mainsection

Brady, H. (2008). Europol and the European Criminal Intelligence Model: A Non-State Response to Organised Crime. Policing, 2(1), 103-109. http://dx.doi.org/10.1093/police/pan014

Braga, A. A., & Weisburd, D. (2006). Problem-Oriented Policing: The Disconnect between Principles and Practice. In A. A. Braga & D. Weisburd (Ed.). Police Innovation: Contrasting Perspectives (pp. 133-152). New York: Cambridge University Press.

Branch, P. A. (2003). Lawful Interception of the Internet. The Australian Journal of Emerging Technologies and Society, 1(1), 1-7.

Bronitt, S. and Stellios, J. (2005). Telecommunications Interception in Australia: Recent trends and regulatory prospects. Telecommunications Policy, 29(11), 875-888. http://dx.doi.org/10.1016/j.telpol.2005.06.010

Bronitt, S. and Stellios, J. (2006). Regulating Telecommunications Interception and Access in the Twenty-first Century: Technological Evolution or Legal Revolution? Prometheus, 24(4), 413-428. http://dx.doi.org/10.1080/08109020601030001

Cahill, L. and Marshall, P. (2004). The Worldwide Fight Against Transnational Organised Crime: Australia. Canberra: Australian Institute of Criminology.

Centre for Problem Oriented Policing. (2009). Centre for Problem Oriented Policing. Retrieved August 27, 2009, from http://www.popcenter.org

Chalk, P., & Rosenau, W. (2004). Confronting the "Enemy Within": Security Intelligence, the Police, and Counterterrorism in Four Democracies. Santa Monica: RAND Corporation.

Chalk, P., Warnes, R., Clutterbuck, L., & Kirby, A. (2009). Considering the Creation of a Domestic Intelligence Agency in the United States: Lessons from the Experiences of Australia, Canada, France, Germany, and the United Kingdom. Santa Monica: RAND Corporation.

Chan, J. B. L. (1997). Changing Police Culture. Melbourne: Cambridge University Press. http://dx.doi.org/10.1017/CBO9780511518195

Conklin, J. E. (2009). Criminology (10th ed.). Boston: Pearson.

Conser, J. A., Russell, G. D., Paynich, R., & Gingerich, T. E. (2005). Law Enforcement in the United States (2nd ed.). Sudbury, MA: Jones and Bartlett Publishers.

Cornall, R. (2005). Australia’s Responses to Transnational Crime in the Region. Public Administration Today, 4(1), 61-65.

Cressey, D. R. (1997). The Functions and Structure of Criminal Syndicates. In P. J. Ryan & G. E. Rush (Ed.). Understanding Organized Crime in Global Perspective (pp. 3-15). London: Sage Publications.

Davies, S. (2007). JSB982 Transnational Organised Crime: Statistics/Typologies of Transnational Organised Crime. Queensland University of Technology.

Eck, J. E., & Rosenbaum, D. (1994). The new police order: Effectiveness, equity and efficiency in community policing. In D. Rosenbaum (Ed.). The Challenge of Community Policing: Testing the Promises (pp. 3-26). Thousand Oaks, CA: Sage Publishing.

Electronic Frontier Australia. (2006). Telecommunications Interception & Access Laws. Retrieved April 14, 2009, from http://www.efa.org.au/Issues/Privacy/tia.html

Flood, B. (2004). Strategic aspects of the UK National Intelligence Model. In J. H. Ratcliffe (Ed.). Strategic Thinking in Criminal Intelligence (pp. 37-52). Sydney: The Federation Press.

Flood, B. and Gasper, R. (2009). Strategic aspects of the UK National Intelligence Model. In J. H. Ratcliffe (Ed.), Strategic Thinking in Criminal Intelligence (2nd ed., pp. 47-65). Sydney: The Federation Press.

Gibson, S. (2004). Open Source Intelligence: An Intelligence Lifeline. Royal United Services Institute Journal, 149(1), 16-22.

Glenn, J. C., Gordon, T. J., & Florescu, E. (2008). 2008 State of Future. Washington DC: World Federation of UN Associations.

Goldstein, H. (1987). Toward Community-Oriented Policing: Potential, basic requirements and threshold questions. Crime and Delinquency, 33(1), 6-30. http://dx.doi.org/10.1177/0011128787033001002

Goldstein, H. (1990). Problem Oriented Policing. Ohio: McGraw-Hill.

Grabosky, P., & Smith, R. (1998). Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities. Sydney: The Federation Press.

Grabosky, P., & Smith, R. (1999). Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities. The FBI Law Enforcement Bulletin, July.

Grennan, S., & Britz, M. T. (2006). Organized Crime: A Worldwide Perspective Upper Saddle River. NJ: Pearson Prentice Hall.

Heldon, C. (2009). Exploratory Analysis Tools. In J. H. Ratcliffe (Ed.), Strategic Thinking in Criminal Intelligence (2nd ed., pp. 124-146). Sydney: The Federation Press.

Hughes, A. (1999). Liaison Officers play a major role in Australia’s fight against transnational crime. AFP News, 86(1), 10-12.

Irwin, M. P. (2001). Policing Organised Crime. In 4th National Outlook Symposium on Crime in Australia, New Crimes or New Responses. Canberra: Australian Institute of Criminology.

Jackson, B. A., Chalk, P., Cragin, R. K., Newsome, B., Parachini, J. V., Rosenau, W., … Temple, M. (2007), Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies. Santa Monica: RAND Corporation.

John, T., & Maguire, M. (2003). Rolling Out the National Intelligence Model: Key Challenges. In T. Newburn, T. Williamson & A. Wright (Ed.) Crime Reduction and Problem-Oriented Policing (pp. 38-68). Cullompton: Willan Publishing.

Lowenthal, M. (2009). Intelligence: From Secrets to Policy (4th ed.). Washington DC.: CQ Press, in in Confrontation or Collaboration: Congress and the Intelligence Community, Belfer Centre, Harvard Kennedy School of Government, 2009, pp. 4-5.

Lyman, M. D., & Potter, G. W. (2007). Organized Crime (4th ed.). New Jersey: Pearson Prentice Hall.

Malkin, S. (2007). Social Networks of Organized Crime: Towards a Communication Approach. Proceedings of the National Communication Association 93rd Annual Convention, November 15: Chicago.

Manning, P. K. (2005). Problem Solving? Criminology and Public Policy, 4(2), 149-154. http://dx.doi.org/10.1111/j.1745-9133.2005.00012.x

Mercado, S. C. (2004). Sailing the sea of OSINT in the information age: a venerable source in a new era. Studies in Intelligence, 48(3). Retrieved February 22, 2010, from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html

Ratcliffe, J. H. (2002). Intelligence-Led Policing and the Problems of Turning Rhetoric into Practice. Policing and Society, 12(1), 53-66. http://dx.doi.org/10.1080/10439460290006673

Ratcliffe, J. H. (2008a). Intelligence-Led Policing. In R. W. Wortley & L. Mazerolle (Ed.). Environmental Criminology and Crime Analysis (pp. 263-282). Cullompton, Devon: Willan Publishing.

Ratcliffe, J. H. (2008b). Intelligence-Led Policing. Cullompton, Devon: Willan Publishing.

Richelson, J. T. (1999). The U.S. Intelligence Community (4th ed.). Colorado: Westview Press.

Risen, J., & Lichtblau, E. (2005) Bush Lets US Spy on Callers Without Courts, New York Times, 16 December 2005, in Confrontation or Collaboration: Congress and the Intelligence Community, Belfer Centre, Harvard Kennedy School of Government, 2009 (pp. 2-3).

Robertson, S. (1997). Intelligence-Led Policing: A European Union View. In A. Smith (Ed.). Intelligence-Led Policing - International Perspectives on Policing within the 21st Century (pp. 21-23). New Jersey: International Association of Law Enforcement Intelligence Analysts Inc.

Scott, M. S. (2000). Problem-Oriented Policing: Reflections on the First 20 Years. Washington DC: COPS Office.

Shelley, L. I. (2002). The nexus of organised international criminals and terrorism. International Annals of Criminology. Retrieved February 28, 2010, from http://pagesperso-orange.fr/societe.internationale.de.criminologie/pdf/Intervention%20Shelle y.pdf

Starey, T. (2005). Getting the Message - A Comparative Analysis of Laws Regulating Law Enforcement Agencies' access to stored communications in Australia and the US. Media and Arts Law Review, 10(1), 23-55.

Stohl, M. (2006). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime, Law and Social Change, 46, 223-238. http://dx.doi.org/10.1007/s10611-007-9061-9

Strauss, A., & Corbin, J. (1998). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Thousand Oaks, CA: Sage Publications.

Telecommunications (Interception) Amendment Act Cth. (2006). Australia.

Umphress, D. A. (2005). Diving the digital dumpster: the impact of the Internet on collecting open-source intelligence. Air and Space Power Journal, 82-91.

United Nations. (2000). United Nations Covenant against Transnational Organised Crime. Geneva: United Nations General Assembly.

United Nations. (2002). Results of a Pilot Survey of Forty Selected Organized Criminal Groups in Sixteen Countries. Geneva: United Nations Office on Drugs and Crime.

United Nations Office of Drugs and Crime. (2008). World Drug Report. United Nations Office of Drugs and Crime.

Wardlaw, G. and Boughton, J. (2006). Intelligence-Led Policing: The AFP Approach. In J. Fleming & J. Wood (Ed.). Fighting Crime Together: The Challenges of Policing and Security Networks (pp. 133-149). Sydney: University of New South Wales Press.

Waters, G., Ball, D., & Dudgeon, I. (2008). Australia and Cyber-Warfare, Canberra Papers on Strategy and Defence (pp. 168). Canberra: Australian National University E Press.

Weisburd, D., & Eck, J. E. (2004). What Can Police Do to Reduce Crime, Disorder, and Fear? The Annals of the American Academy of Political and Social Science, 593(1), 42-65. http://dx.doi.org/10.1177/0002716203262548

Weisburd, D., Mastrofski, S., McNally, A. M., Greenspan, R., & Willis, J. (2003). Reforming to preserve: COMPSTAT and strategic problem-solving in American policing. Criminology and Public Policy, 2(3), 421-456. http://dx.doi.org/10.1111/j.1745-9133.2003.tb00006.x

Williams, E. S. (1980). Australian Royal Commission of Inquiry into Drugs. Canberra: Royal Commission.

Williams, P. (2001). Transnational Criminal Networks. In J. Arquilla & D. Ronfeldt (Ed.), Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 61-97). Santa Monica, CA: Rand Corporation.




DOI: https://doi.org/10.5296/ijssr.v2i1.4089

Refbacks

  • There are currently no refbacks.




International Journal of Social Science Research (Online ISSN: 2327-5510) E-mail: ijssr@macrothink.org

To make sure that you can receive messages from us, please add the 'macrothink.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

Copyright © Macrothink Institute   ISSN 2327-5510