Social Media and Online Gaming: A Masquerading Funding Source

Social Media and Online Gaming: A Masquerading Funding Source

Pedro Ramos, Pierre Funderburk, Jennifer Gebelein
Copyright: © 2018 |Pages: 18
DOI: 10.4018/IJCWT.2018010103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This article describes how the rise in technological innovation has allowed for transnational criminal organizations (TCOs) to expand their operations using virtual platforms such as social media and online video games. These virtual platforms are utilized by TCOs to conduct some of their traditional forms of crimes, such a money laundering. These criminal practices have found solace in technological innovation, mainly through the exploitation of rising technologies, such as online video games, video game consoles and peripherals, such as Virtual Reality headsets, inconspicuous electronic devices for children, Near-Field Communication (NFC), and finally, social media as tool for recruitment and immediate communication. TCOs have managed to utilize these mediums to conduct their criminal activities in part due to the lack or nonexistence of new or proper legislation that regulates how these new mediums can function without facilitating illicit activities and the germination of illicit markets.
Article Preview
Top

1. Introduction

Crime and technology share a complex relationship. Crime thrives on innovation and ingenuity. Illicit markets and activities germinate where new legislations are in place, where proper legislation is lacking or nonexistent, or where there is a high demand for these illicit markets and their products. Despite strong regulation, transnational criminals are highly resilient and are always adapting to these new regulations and availability of better technologies. Based on the National Security Council’s definition, “transnational criminal organizations (TCOs) are criminal groups that operate across national borders and utilize corruption and violence to exploit transnational commerce and communications in order to disguise their illegal activities” (Harris, 2014). Innovation is an important aspect of TCOs that engage in criminal activities. Criminal organizations need to innovate in the interest of expanding and improving their operations. One of the several forms of illegal activities that TCOs engage in is the laundering of money obtained through criminal activities or corruption and concealing it through legitimate, legal means (Investopedia, 2017). Incidentally, money laundering helps finance other forms of illicit activities that range from drugs and illegal arms trade to terrorist activities.

Traditional forms of money laundering include cash smuggling, gambling, black market currency exchange, and other forms of fraudulent business operations (Richet, 2013). Nonetheless TCOs have progressively adopted new forms of money laundering in recent years. Due to the rapid technological development and the integration of financial transactions through online mediums such as social media and online gaming, criminal organizations have harnessed the ease of use provided by these virtual platforms and the light legislation focused on money laundering through such mediums.

This recent form of money laundering is the reason why crime is sometimes symbiotically dependent on technological development. Beyond digital money laundering, technology has enabled the proliferation of TCOs operations through the feasibility of online communication networks enabled by social media. Initially, online communication was facilitated by messaging services like AIM or Messenger where two or more individuals could communicate with each other by connecting to a server through their computers.

The detriment of these early online messaging services was that users were anchored to their computers in order to communicate with each other. Subsequently, this all changed with the introduction of newer technologies like cellphones that allowed text messaging. This was also further amended with the revolutionary introduction of smartphones, specifically the BlackBerry. Considered as the first “smart” device, the BlackBerry offered emails on the go as well as instant communication between other BlackBerry devices through BlackBerry Messenger (BBM) (O’Boyle, 2016). All these innovations in instant messaging became an integral part of smartphones since the introduction of the BlackBerry. Succeeding smartphones like iPhones and Android-based handhelds like Samsung Galaxy devices all adopted their own forms of instant messaging. WhatsApp (WA) is the clear example of the evolution of mobile instant messaging. This particular application has facilitated communication across the globe in ways never before imagined. Relying on both mobile data and WiFi, WA allows users to instantaneously send messages to other WA users. Long distance phone calls utilizing mobile data plans is also possible through WA. Furthermore, WA now offers end-to-end encryption when communicating with other users.

This is particularly important given the “golden age of leaks” presently afflicting issues of national security and whistleblowers (Sanders, 2017). There has been an increase in encrypted instant messaging applications that even government officials utilize to communicate with each other. Applications such as “Signal” allow for highly encrypted end-to-end communication (Sanders, 2017). Similar applications like “Confide” are even used by staffers in the White House. In addition to WhatsApp, other popular applications that offer instant messaging include Facebook Messenger, Viber, Line, SnapChat, and even Instagram.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing