Abstract
The development of information and communication technology (ICT), in providing opportunities for improved communication for both legitimate and criminal purposes, impedes traditional law enforcement strategies directed towards the disruption of criminal activities. This chapter introduces the research problem to be addressed by the remaining chapters: that the development of ICT and its use for illegitimate purposes presents a key vulnerability that can be exploited by law enforcement agencies (LEAs). Transnational organized crime (TOC) and corruption take advantage of modern information and communication technologies to communicate and in doing so communication interception technology (CIT) has become a crucial weapon in the fight against TOC and corruption. This chapter introduces the elements addressed throughout the book, explaining the underpinning research methodology, scope and limitations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Copyright information
© 2013 Mitchell Congram, Peter Bell and Mark Lauchs
About this chapter
Cite this chapter
Congram, M., Bell, P., Lauchs, M. (2013). Introduction. In: Policing Transnational Organized Crime and Corruption: Exploring the Role of Communication Interception Technology. Crime Prevention and Security Management. Palgrave Pivot, London. https://doi.org/10.1057/9781137333797_1
Download citation
DOI: https://doi.org/10.1057/9781137333797_1
Publisher Name: Palgrave Pivot, London
Print ISBN: 978-1-349-46237-7
Online ISBN: 978-1-137-33379-7
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)