The Impact of Modern Technologies on Transnational Organized Crime Networks

Authors

Mohamed Elguindy , , Patrick Laberche , , Alyaksandr Malyshau , , Maryem Ammi‭ ‬‬‬‬‬‬‬‬‬‬‬ , , Eman Ragab

Keywords:

Security Studies, Organized Crime, Modern Technologies, Border Security

Synopsis

While modern technological advancements play an increasingly important role in cross-border organized crime, they are not the sole determinant of criminal network operations. Various non-technological factors significantly shape how these networks leverage technology, influencing the scale of their cross-border activities and expansion. Similarly, these factors also affect law enforcement agencies’ ability to disrupt and weaken such criminal organizations.

 

This study provides an objective assessment of the effectiveness of law enforcement agencies in Arab countries in combating cross-border organized crime. It carefully evaluates the role of modern technologies within criminal networks without overstating or understating their impact. Through a comparative technical approach, the study examines global and regional practices to analyze how digital innovations enhance criminal capabilities and necessitate evolving law enforcement strategies.

 

Additionally, the study presents recommendations for Arab law enforcement agencies to strengthen their ability to counteract criminal networks. These recommendations focus not only on mitigating technological threats but also on addressing non-technological factors that contribute to the persistence and resilience of these organizations.

Alejandro SANTOS SID, « Drones, explosives, impunity : a mexican drug cartel flexes its muscle in Michoacan », EL PAIS, 17 janvier 2022.

Al-Rawi, A. K. (2020). Digital policing in the Arab Gulf countries. International Journal of Electronic Security and Digital Forensics, 12(3), 254-270.

Anderson, R., & Barton, C. (2013). Rethinking law enforcement for the cyber age. Harvard Journal of Law & Technology, 27(1), 1-22.

Bayoumi, A. (2021). Smart policing and public security technologies in the GCC. Journal of Policing and Security Studies, 5(2), 34-49.

Bellanova, R., & Duez, D. (2016). Making sense of security data: Categorization and visualization in OSINT practices. European Journal of Security Research, 1(2), 159-176.

Benjamin Chekroun, Sophie Deleuze, Quentin Stevenart,”Fascial Recognition and Human Rights: A Guide for the Investor”, CANDRIAM,.

Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W.W. Norton & Company.

CAPITAL, “Sky ECC: the Canadian private messaging service that housed the exchanges of hundreds of thousands of criminals”, , March 8, 2023.

Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet (3rd ed.). Academic Press.

Chainalysis. (2023). Crypto Crime Report 2023. Chainalysis.

Civil liberties and ethics: “Facial recognition: upholding the values of Europe”. June 2020.

Clark, G., & Osler, C. (2015). Money Laundering and Terrorist Financing: A Risk-Based Approach. Routledge.

Claude Castelluccia, Daniel Le Matayer,”Analysis of the impacts of facial recognition, some elements of method”, Hal Open Science.

Convention on Psychotropic Substances of 1971 (United Nations Conference of 1971).

Davis, J. H., & Clark, J. (2017). The dark web: A study in technology, security, and legal issues. Journal of Law, Technology & the Internet, 8(2), 99-115.

Edvardas Sileri, head of the European Cybercrime Centre at EUROPOL,”Crime on the internet: the dark web is no longer as hermetic a place as it used to be”, Le Monde, interview by Sophy Caulier, 15 November 2020.

Edwards, P., & Gill, J. (2002). Transnational Organized Crime: An Introduction. Routledge.

El-Guindy, M. (2008). Cybercrime in the Middle East. ISSA Journal.

El-Guindy, M. (2021). Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), 11–64. https://doi.org/10.54873/jolets.v1i1.32

Elodie MESSEAN, “Cryptocurrencies, the money of criminals?”, La Tribune, November 17, 2020.

EU Innovation Hub (2024), First Report on Encryption by EU Innovation Hub for Internal Security, Publication Office of the European Union, Luxembourg.

EUROPOL (2021), The use of violence by organised criminal groups, Spotligt Europol report series, Publications Office of the European Union, Luxembourg.

EUROPOL (2024), « decoding the EU’s most threatening criminal networks ». Publication office of the European Union Luxembourg.

Europol. (2023). European Cybercrime Report 2023. Europol.

Financial Action Task Force (FATF). (2019). Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers. FATF.

France-Monde, November 28, 2022.

Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144.

Gelgi, M., Guan, Y., Arunachala, S., Samba Siva Rao, M., & Dragoni, N. (2024). Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors, 24(11), 3571.

International Monetary Fund (IMF). (2018, September 11). Fintech, Inclusive Growth, and Cyber Risks: Focus on the MENAP and CCA Regions.

Interpol. (2020). I-24/7: Connecting police for a safer world. https://www.interpol.int

Joint report of EUROPOL and the security steering committee of the ports of Antwerp, Hamburg/Bremerhaven and Rotterdam, 30 March 2023.

Joint report of EUROPOL and the security steering committee of the ports of Antwerp, Hamburg/Bremerhaven and Rotterdam, 30 March 2023.

Julien Constant, “Nullities of procedure for drug traffickers: AI at the service of organized crime lawyers?”, , Le Parisien, June 6, 2024.

Jupp, S., & Garrod, J. (2019). Money Laundering: The Criminal Mind and Methods. Routledge.

Kassab, G., & Rosen, D. (2019). The Digital Silk Road: How the Internet is Transforming Global Drug Trafficking. Crime, Law and Social Change, 72(2), 157-178.

Kim, S., & Lee, J. (2019). Social media analysis in cyber investigation. International Journal of Law, Crime and Justice, 44(3), 251-264.

Kruisbergen, J., et al. (2019). The Darknet and Drug Markets: A Review of the Literature. International Journal of Drug Policy, 69, 101-111.

Kruse, W. G., & Heiser, J. G. (2002). Computer forensics: Incident response essentials. Addison-Wesley.

Laufs, J., & Borrion, H. (2021). Technological innovation in policing and crime prevention: Practitioner perspectives from London.

Levitt, K. (2020). AI and Crime: Understanding the Risks and Opportunities. Oxford University Press.

McDonald, A. (2021). Encryption: A Double-Edged Sword. Journal of Cybersecurity, 7(2), 115-132.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

O’Hara, K., & Hall, W. (2018). Four internets: The geopolitics of digital governance. Communications of the ACM, 61(6), 36-40.

Pomerleau, M. (2018). The role of web scraping in open source intelligence. Journal of Digital Investigation, 12(4), 102-113.

Professor Florence G’sell, “Is encryption a fundamental right?” Case study on the regulation of CSAM in the EU (Stravoula Chousou, Julia Magaud, Ludovica Pavoni and Morgan Williams). SciencesPo, Digital Chair, Governance and Sovereignty, Comparative Approaches to the Regulation of Big Technologies (Spring 2023),

Report 2022 of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA): the production of fake medicines such as oxycodone tablets which were also found to contain opioids with a high benzimidazole content, and fake Xanax and diazepam tablets containing new benzodiazepines was noted.

Saito, M. (2021). The Sky is Not the Limit: How Encrypted Communication Apps Facilitate International Drug Trafficking. Trends in Organized Crime, 24(1), 7-25.

Schär, F. (2018). Cryptocurrencies, Crypto-assets and Anti-Money Laundering: A Challenge for Financial Regulation. Palgrave Macmillan.

Smith, M. L. (2021). The rise of encrypted communications in the Middle East. Middle Eastern Studies, 57(4), 557-575.

The controversies of Mines 2022: “Facial recognition in the public space”.

Tuazon, O. M., Wickenheiser, R. A., Ansell, R., Guerrini, C. J., Zwenne, G., & Custers, B. (2024). Law enforcement use of genetic genealogy databases in criminal investigations: Nomenclature, definition and scope. Forensic Science International: Synergy, 8, 100460. https://doi.org/10.1016/j.fsisyn.2024.100460

United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances of 1988.

United Nations Convention on Narcotic Drugs.

United Nations Office on Drugs and Crime (UNODC). (2020). Global Report on Crime Trends and Developments. UNODC.

UNODC, « Physical and chemical concealment of cocaine, maritime narcotrafficking », STAND PROJECT, UNODC Laboratory and scientific service.

Wagdi Sabète-Gobrial, Les annales de droit, “The constitutionality review of measures limiting individual freedoms within the framework of Law No. 2017, strengthening internal security and the fight against terrorism”, (2020).

Weimann, G. (2016). Terrorist migration to social media. Georgetown Journal of International Affairs, 17(3), 180-188.

World Drug Report 2022, UNODC.

Yermack, D. (2018). Blockchain and the Future of Financial Markets. Pearson Education.

Cover Image

Published

19-March-2025

Online ISSN

1658-8770

Print ISSN

1658-8762

Details about this monograph

ISBN-13 (15)

978-603-8487-13-6

Publication date (01)

2025-03-19

Physical Dimensions

21cm x 28cm x 1.5cm