Chapter 3 - Future trends in serious and organised crime

Navigation: Previous Page | Contents | Next Page

Chapter 3 - Future trends in serious and organised crime

Introduction

3.1        From the outset, it is difficult to predict accurately and in a detailed way the future trends in serious and organised crime. However, the committee has identified present and emerging activities of organised crime groups and has used this evidence to make observations about how these relate to likely future trends in the activities of organised crime.

High-tech crime[1]

3.2        The inquiry found that high-tech crime is a major area of opportunity for organised crime groups to pursue existing and new types of crime. The evidence provided some idea of the potential scope of high-tech crime, which includes:

...electronic piracy; counterfeiting and forgery; credit card fraud...child pornography; communications in the furtherance of criminal conspiracies; electronic funds transfer fraud; money laundering; advance fee frauds, like the Nigerian 419 offences; online dealing in illicit products of all kinds, from Viagra to drugs and so on; intelligence and counterintelligence—[and] there is a lot going on there in terms of industrial espionage, formal intelligence and counterintelligence; and, I think, denial of service...[2]

3.3        The committee heard that there are two aspects of high-tech crime: enabling and facilitating. Technology enabled crime is where technology creates entirely novel opportunities for criminal gain; for example, phishing.[3] Technology facilitated crime occurs where technology facilitates traditional or known types of crime, such as using the internet to launder the proceeds of real-world crimes.[4]

Incidence and growth of high-tech crime[5]

3.4        New and improved technologies offer great potential for serious and organised crime groups to undertake their existing activities and to enable new means and methods of criminal gain.

...organised crime groups will continue to exploit society’s increasing uptake of technology and the opportunities it provides to both target victims and make their own operations more efficient and secure.[6]

3.5        The Australian Institute of Criminology (AIC) submission highlights cost-benefit reasons for the growth in high-tech crime and argues that the movement by traditional transnational organised crime groups into fully-fledged high-tech crime will be determined as much by the diminished profitability, or increased risk, of real world criminal activities as it will by the innate attractiveness and relatively low risk of high-tech crimes.[7]

3.6        The committee notes that the benefits of technology are being delivered in near-equal measures to the criminal world as to legitimate business operations, and that developments in communications and information management, which have greatly enhanced the efficiency of legitimate businesses, are also being exploited by criminal organisations to enhance the efficiency and effectiveness of their own operations.[8] Advances in technology, readily available and often low cost, are increasing the effectiveness of many criminal activities.[9]

3.7        However, despite evidence of organised crime's growing online presence, organised crime groups have not as yet fully engaged with the online environment and still use the internet primarily to facilitate or commit real-world crimes.[10]

3.8        Nevertheless, once organised crime ultimately harnesses the online environment, the impact on society will be significant.[11] The committee heard that the this trend has already emerged with the activities of 'super-empowered criminals'—groups that use the internet to advertise their services to other criminal groups:

There have been examples of criminal elements (known colloquially as ‘super-empowered criminals’) operating in the online environment as obtainers and disseminators of identity and identity-related information. Operation Firewall, for example, in 2004 in the US and Canada culminated in the arrest of 28 people from six countries for offences including the buying and selling of 1.7 million credit card numbers...[12]

Crime in virtual worlds

3.9        High-tech crime is likely to pose considerable challenges to LEAs because the online environment blurs notions of identity and jurisdiction. A number of examples indicate the potential for technology to undermine some of the established foundations of Australia's criminal justice system.

3.10      One such example is the virtual world, such as Second Life or World of Warcraft. Large values of real-world money are transacted in virtual worlds. These developments make it difficult to identify offenders and capture virtual-world criminal communications.[13] Commissioner Mick Keelty, Australian Federal Police, commented that such developments had already changed the nature of how [the AFP] approached policing and how it would approach policing in the future.[14]

3.11      The jurisdictional issues raised by crime located in virtual worlds need to be settled so that clear approaches can be applied to the investigation and prosecution of online and high-tech crime:

...the internet poses a whole array of jurisdictional issues. One of the key planks in treating that risk...is to have strong linkages with our international counterparts and strong linkages with the attorneys­general departments and the departments of justice in the various jurisdictions, so that...we are able to nimbly, quickly and efficiently gather the data and the evidence that is needed to track these global criminals as they move in cyberspace.[15]

3.12      Detective Chief Superintendent Ross Barnett, Queensland Police Service, also drew attention to anticipated jurisdictional difficulties:

High take-up rates of home internet usage make the Queensland and Australian communities vulnerable to victimisation from groups who are often overseas based, making identification, enforcement, asset forfeiture and compensation action highly problematic.[16]

Denial-of-service attacks

3.13      Denial-of-service attacks involve the disruption of internet businesses and their services by concerted online attacks. Such attacks commonly involve botnets—remotely controlled individual computers—which are directed to the targeted website.[17] The sheer volume of traffic causes the target site to freeze, and in this way the attack causes commercial damage or facilitates extortion or some other offence. For example:

[One offender]...basically used thousands of computers as robots. He used their computer power to focus an attack on a particular enterprise in order to crash that enterprise, to bring that enterprise down so that they could not trade electronically, and he did that by stealing, without people knowing it, the computing power of thousands of individuals’ PCs.[18]

3.14      Denial-of-service attacks have immense potential to bring down banking, finance and government systems. In a recent program on online crime on ABC Radio's Background Briefing, the view was expressed that America's internet security is extremely weak and could not withstand a concerted denial-of-service attack. Elsewhere, the government computer network of Estonia has been disabled using botnets; the attackers were thought to be an organised crime group.[19]

3.15      In the same program, Mr David Vaile, from the Cyberspace Law Policy Centre at the University of New South Wales, expressed concerns about the vulnerability of government IT security generally, and how this could ultimately undermine systems vital to the maintenance of national security:

I'm hearing more and more about specifically targeted...attackers trying to breach the IT security of government agencies. But the other national security issue is probably a wider one, and that's to do with critical infrastructure. Both the Internet in general and the electronic payment systems are at the hear [sic] of what you'd call critical financial infrastructure, and to the extent that malware and other sorts of threats to that system, or even just the confidence in that system, undermine the capacity of that infrastructure to work, then it's a threat to national infrastructure.[20]

3.16      The Attorney-General's Department submission notes that the potential for damage from such attacks develops in step with society's increasing reliance on electronic infrastructure for dealing with information, transacting business and communicating.[21] The committee concurs with the Attorney-General's Department conclusion that attacks on electronic infrastructure motivated by political, malicious or criminal agents could have considerable and threatening consequences for Australia in the future.[22]

3.17      The committee accepts that organised crime groups have rapidly pursued high-tech opportunities for the support and furtherance of their criminal activities, and concludes that there is a vast potential for such exploitation of technology in the future. The characteristics of modern organised crime groups appear well suited to exploiting a range of opportunities provided by the internet.

3.18      The committee believes that technology enabled crime is a significant trend and area of growth in the activities of organised crime groups in Australia. In this, the committee agrees with the majority of witnesses, who saw high-tech crime as a considerable present and future danger:

...looking ahead over the next two to three years, I do not see it getting better in terms of the way organised crime is going to play with these sorts of new technologies. I see it getting more dangerous.[23]

3.19      The committee therefore believes that it is essential for Australian police forces to have the workforce, skills and legislative environment that allow them to quickly identify, adapt and react to technology based crime. The committee examines the need for appropriate numbers and training for LEAs to counter high-tech serious and organised crime in depth in chapter 7. The committee commends the AFP and other state and territory police services and agencies that are directing resources at this growing and harmful area of crime.[24]

Money laundering

3.20      Money laundering is a longstanding activity of organised crime groups that 'provides a cloak of legitimacy to wealth derived from crime and provides a funding base from which further criminal activity can be financed'.[25] The AIC submission notes:

The economic driver of serious and organised crime...remains a constant and this will continue to necessitate an understanding of money laundering typologies, both current and prospective.[26]

3.21      A range of criminal activities are undertaken by organised crime groups solely to facilitate money laundering. For example, while identity fraud and credit card fraud may be used to steal funds from individuals, they may also be utilised to legitimise illegally obtained funds. Of all organised crime activities, money laundering is perhaps the most consistently evolving activity.

3.22      The Australian Crime Commission (ACC) indicated that the estimated amount of money laundered globally in one year ranges between $500 billion and $1 trillion. The likely extent of money laundering in and through Australia has been estimated to be at least $3.5 billion and represents, among other consequences, a significant loss to taxation revenue. Furthermore, money laundering places a sizeable financial burden on associated regulatory and law enforcement response and control measures as well as on private sector companies.[27]

3.23      Much of the evidence received indicates a significant and growing nexus between money laundering and technology. For example, apart from money laundering opportunities through online banking and identity fraud, a range of new opportunities for organised crime groups to launder money are emerging:

One new prospective avenue for illicit transfer of money...is that of new payment methods (NPMs) such as internet payment systems, mobile payments and digital precious metals...Designed primarily to facilitate cross-border funds transfer they contain a number of potential risk factors:

3.24      The AUSTRAC submission notes that developments in technology offer criminal groups anonymity, opacity and liquidity in their money laundering activities.[29] The committee considers that the migration towards electronic banking and funds transfer will see the continued escalation of this area of organised crime; it will provide an environment that will cloud financial trails and make the recovery of proceeds of crime by authorities difficult and protracted.

Identity crime

3.25      Identity crime involves either the theft and fraudulent use of another's personal information or the manufacturing and use of entirely fictitious identities.[30] Identity theft is described as 'one of the world's fastest growing crimes'.[31]

3.26      Commissioner Ken Moroney,[32] NSW Police Force, highlighted the growth in identity crime and provided a useful overview of the various types of identity crime:

Identity crime is an issue of concern...[and] would appear to us to be becoming more prevalent. The use of stolen identity information to commit offences appears to be on the rise. Technology has enhanced criminal capability to produce false identities. We note the emergence of fraudulent identity manufacturers to service a number of separate organised crime groups at the one time. We also note the ease with which equipment capable of manufacturing identification can be bought...[33]

3.27      The Queensland Crime and Misconduct Commission rates the threat of identity crime as 'high' and as a priority for a whole-of-government response across Australia.[34] Incidents of identity theft and fraud are increasing, with the centralised online processing of banks and credit providers being chief targets.[35]

3.28      The illegal exchange and retrieval of personal information is also occurring,[36] with stolen identities being used as a means to commit further crimes.[37] The South Australia Police submission notes that advances in technology have enabled the production of better forgeries of identity documents.[38] This was confirmed by the South Australian Director of Public Prosecutions, who highlighted the use of forged identity documents to apply for personal loans:

...it has become a relatively easy matter for an offender to make an application for a personal loan or credit card with a significant credit facility either over the telephone, by facsimile or online...supported by forged documents as to the applicant's employment and financial status.[39]

3.29      The value of identity information to organised crime groups will result in the infiltration of legitimate businesses in order to access personal identity data.[40] The committee notes the involvement in this trend of transnational criminal groups:

This sharing has extended internationally, with evidence that international criminal syndicates have financed criminals to travel to Australia to commit identity theft offences.[41]

3.30      The anonymity and flexibility of the online environment suggests that identity crime is likely to continue to expand and to present ongoing costs and challenges for LEAs:

There are any number of variations of...[identity crime] limited only by the imagination of the offenders and the credulity of the potential victims. In most cases the relative anonymity afforded by electronic banking and communications is used to advantage by the offenders. This...can be difficult to prove and is investigated and prosecuted at great expense to the community.[42]

3.31      The committee considers that the intersection of technology and identity crime is a significant challenge for Australian authorities.[43] Identity crime is likely to be a major area of future organised crime activity, particularly as a facilitator of money laundering activities and the illegal attainment of funds, goods and services.

Credit card fraud

3.32      The escalation in credit card fraud is connected to the growth of opportunities for identity and fraud crime over the internet.[44] In a report on its inquiry into cybercrime, this committee previously observed:

With the credit card purchasing power...[comes] the potential for large scale fraud.[45]

3.33      The use of credit cards offers multiple ways to commit offences. For example, certain groups are engaging in the online theft and sale of credit card information to other criminal groups. Credit card fraud is often associated with identity fraud, and involves the fraudulent purchase of goods over the internet. In yet another example of organised crime's adaptable opportunism, recent security enhancements incorporating security chips and PINs in credit cards are being circumvented by online 'card not present' transactions.[46]

Financial crime

Tax-related crime

3.34      The Australian Taxation Office (ATO) reported a shift from opportunistic crime to organised crime, and an increasing degree of sophistication, organisation and collusion in taxation crimes.[47] Evidence suggests a relationship between taxation and other forms of crime—notably, money laundering and identity theft.[48] Tax crime usually involves the theft of another's identity to make a false taxation refund claim. The committee heard from the ATO that organised crime groups are systematically attacking the process:

We have seen...some fairly sophisticated attempts, where it almost looks like they have been piloting our system and trying a few to see if they get under the radar before going for one big attack. We have seen an instance of an operation almost like a call centre to change details in the system.[49]

Superannuation-related crime

3.35      The introduction in Australia of compulsory superannuation has seen massive wealth accumulate in superannuation funds. Considering the opportunism of organised crime groups, the committee considers it highly likely that such funds could be the target of serious and organised criminal activity. Additionally, retirees who are the recipients of a substantial superannuation payment may also be targeted by organised crime groups. The ACC submission notes:

Organised criminal groups will also continue to be attracted to opportunities for substantial levels of fraud across the financial sector (including superannuation, banks and securities) and in other related industries such as telecommunications and insurance. Characteristics of these sectors that are especially attractive to criminal groups include the availability of ‘arm’s length’ transactions and the growth, size and complexity of the markets, particularly those that facilitate cross-border trade.[50]

Illicit drugs

Amphetamines and other synthetic drugs

3.36      Illicit drugs have long been a significant aspect of organised criminal activity in Australia. In the 1970s, three royal commissions investigated organised crime and the drugs trade, finding substantial connections between the two.[51] Mr Christopher Keen, Director, Intelligence, Queensland Crime and Misconduct Commission, bluntly observed that illicit drugs are 'the major cash cow of organised crime';[52] and AOSD-related crime is the most significant organised crime activity in Australia at present.[53] Organised crime groups have gravitated toward the production of AOSD,[54] with OMCGs, in particular, largely responsible for their production and distribution.[55]

3.37      In the context of transnational crime, Australia is geographically vulnerable to the illicit drug trade, as pursued by organised crime groups:

Political instability in the South Pacific region presents opportunities for organised crime groups to base offshore operations focused on the large-scale production and/or transhipment of illegal drugs and precursor chemicals. Australia generally and Queensland specifically, due to its geographic proximity, loom as likely markets for both, based on the expanding demand for amphetamine type substances.[56]

3.38      The committee notes that the locating of illicit drug activities in overseas jurisdictions has the potential to increase, following recent moves to combat AOSD, such as the Project STOP program, which is a reporting initiative designed to reduce access to precursor chemicals in Australia.[57] It is likely that organised crime groups have already adjusted their production processes in response to stricter regulatory and legislative schemes.[58]

3.39      Given the importance of the profit motive to organised crime groups, these groups are not attached to a particular drug or method of production. These groups are already altering their behaviours in response to anti-AOSD initiatives:

...[organised crime groups] are very market driven, so where there is an opportunity to make inroads into a market—we are talking crime markets here, drug markets—we are seeing a move back into large-scale cannabis production. We have had some detections recently indicating that. Where there is money to be made, they have the distribution networks that they can utilise and exploit to be able to meet market demand.[59]

3.40      The committee notes that the involvement of organised crime in the illicit drug market is long established, and this is unlikely to change fundamentally in the foreseeable future. Whether it is new or newly in-vogue drugs, such as AOSD, the primacy of drugs as the economic engine of organised crime will undoubtedly continue.

3.41      The committee draws attention to its recent inquiry into the manufacture, importation and use of AOSD in Australia, in which it canvasses the growing trend in the supply and use of AOSD.[60]

Paedophilia

Online paedophilia

3.42      New technology has allowed the online and offline activities of paedophiles to converge. The online environment supports the easy exchange of images and information related to the procuring and abuse of children, and allows predators to groom children for future contact. The online environment presents an area of escalating risk to children.[61]

3.43      Commissioner Keelty outlined the issues for policing arising from these new forms of criminal congregation, communication and behaviour:

This convergence...is a new phenomenon and makes evidence gathering quite difficult. It will be a problem for us into the future, as will be the simple art of telephone interception and listening device activity. If you think about it, a lot of that activity could actually happen in the virtual world, where it will be difficult, if not almost impossible, to prove who indeed has had the conversations or who indeed has been part of the conspiracy...[62]

3.44      The internet is a 'powerful distributive network' for pornography.[63] The potential for this environment to provide paedophiles with the means of organisation and communication, as well a new forum for exchanging information on and targeting of victims is a development of great concern.

Family-based ritual child sexual abuse

3.45      The committee received a submission from the Advocates for Survivors of Child Abuse (ASCA), which raised allegations of organised family-based paedophilia, involving the exchange of children for the purposes of ritual or ongoing sexual abuse.

3.46      Mr Michael Salter, a member of the ASCA board, informed the committee that these groups employ psychologically damaging methods to subordinate their child victims and undermine their trust of law enforcement and health professionals. Such acts were claimed to successfully prevent the reporting and subsequent detection and prosecution of the offences alleged.[64]

3.47      The committee regards allegations of paedophilia with the utmost seriousness, and has carefully considered the evidence of ASCA as provided in their submission and at the Sydney hearing. The committee sought to establish the extent to which family-based sexual abuse of children was organised by criminal groups. At the Brisbane hearing, Ms Elizabeth Foulger, Manager, Intelligence, Queensland Crime and Misconduct Commission, told the committee that investigations of paedophile groups in Queensland had revealed a culture of 'loose associations' among paedophiles, as opposed to highly developed or sophisticated networks of offenders.[65]

3.48      Ultimately, the committee was unable to determine the extent of organised intra-familial ritual sexual abuse of children on the evidence received. The committee commends ASCA for its support of around 600-800 members, and acknowledges that the service this organisation renders is done without any government assistance. The committee believes that governments should give consideration to ensuring that funding for organisations such as ASCA is available.

Conclusion

3.49      The committee is concerned about the developing trends in serious and organised crime. Regardless of the type of activity, the increasing use of technology, transnational connections and fluidity of organised crime groups will make law enforcement's task of policing organised crime's illicit activities more difficult. The committee considers that trends in serious and organised crime will require an increasingly coordinated approach involving partnerships across agencies and jurisdictions as well as internationally. In the following chapter, the committee highlights matters around which successful strategies for countering serious and organised crime should be built.

Navigation: Previous Page | Contents | Next Page