Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Conflict Analysis
THE BUSINESS OF EXPLOITATION:  THE ECONOMICS OF CYBER SCAM OPERATIONS IN SOUTHEAST ASIA

By Kristina Amerhauser | Audrey Thill 

  Cyber scam operations in Southeast Asia rely heavily on information and communications technology, financial fraud, trafficking for forced criminality, corruption and elite capture. This creates what can be described as ‘compound crimes’, reflecting how cyber scam operations are both based in physical compounds and involve multiple criminal markets. While estimates vary, the scale of funds defrauded from scam victims each year is in the tens of billions of US dollars and trending upward. In addition, illicit proceeds are generated from exploitation of trafficked persons, illegal gambling and corruption. The scale of illicit financial flows represents a clear threat to national economies, governance and international security. Cyber scam operations and their enabling networks operate at scale across Southeast Asia and beyond. They have reportedly trapped hundreds of thousands of people inside compounds where they are forced to conduct scams. Some operations retain workers through debt bondage, psychological coercion and financial incentives. Significant diversity in operational models – from high-security compounds to thousands of smaller operations located in apartments and other small premises – creates varied patterns of financial flows across jurisdictions. The money laundering process is part of a sophisticated financial service ecosystem. Most concerning is how networks of actors operate at scale and at the intersection of legitimate and illegitimate economies by using licensed crypto exchanges, registered fintech platforms and traditional banking services. Some are ‘crime as a service’ providers, explicitly providing money laundering services to cyber scam operations and doing so with corporate efficiency. This means that moving and laundering money has evolved into a marketplace-type structure where actors remain anonymous to others within the network. Governments, the private sector and civil society actors have sought innovative responses to disrupt the illicit industry. These include initiatives that ‘follow the money’ and disrupt the money laundering networks used by cyber scam operations. While some work has begun to explore illicit financial flows stemming from scam operations, notably related to cryptocurrencies, important gaps persist. Less is known about the wider set of financial flows, the mechanisms used to transfer proceeds in and out of the region and the networks involved. This policy brief seeks to help fill this gap by mapping wider related payments and providing insights into how money is moved and where it ultimately ends up. It concludes by providing actionable policy recommendations for Southeast Asian governments as well as regional and global financial service providers. Crucially, these recommendations identify entry points for disrupting the operations of the transnational organized crime groups that run cyber scam operations. The key findings include: Actors involved in cyber scams and trafficking for forced criminality often use cryptocurrency to move illicit money. They also use cash, fintech – such as peer-to-peer (P2P) payment apps – gaming or gambling platforms, bank transfers, shell and front companies, credit cards and pre-paid cards. The role of the formal banking sector in these financial flows appears significant, as many scam-related transfers are initiated by the victim from their own bank accounts before being converted into cryptocurrencies at different steps of the laundering process. While most financial institutions likely process these transactions unwittingly, evidence suggests they may be enabled by regulatory loopholes such as weak know-your-customer (KYC) requirements and/or excessively high minimum thresholds for reporting suspicious transactions. After being laundered and converted back into fiat currency4 from cryptocurrency, illicit funds are also likely to be moved again through the formal financial system.

Many of the fintech and cryptocurrency platforms that money laundering networks use to convert cryptocurrencies back into fiat are registered companies and hold financial service licences. Some owners of these platforms have close connections to the political and business elites in the countries of registration, suggesting influence over financial regulation and an interest in maintaining a policy environment amenable to the large-scale laundering of criminal proceeds. Transnational organized crime groups in Southeast Asia generate highly lucrative profits. This creates a vicious cycle: greater profits enable these groups to expand their influence, including over public officials and the financial sector, which in turn reduces scrutiny of cyber scam compounds and related suspicious financial transactions. With their growing wealth, these criminal networks invest further into other types of crime and crime-as-a-service infrastructure, generating additional profits that allow them to strengthen their influence and market position   
Geneva: Global Initiative Against Transnational Organized Crime. 2025. 44p.

Cybercrime and strain theory: An examination of online crime and gender.

By Katalin Parti, Thomas Dearden

Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.

Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.

Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.

Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.

International Journal of Criminology and Sociology13, 211–226

Gangsters at War: Russia's Use of Organized Crime as an Instrument of Statecraft

By GALEOTTI, MARK

From the webpage description: "'Since 2012, Russia has strategically used criminal networks to evade sanctions, conduct intelligence, and destabilize the West. Under Putin's 'mobilization state,' illegal activities--from smuggling to cyberattacks--are seen as essential tools of warfare. This report delves into the Kremlin's alarming integration of organized crime into statecraft.' Russia's transition from a 'conscription state' to a full 'mobilization state', after the 2022 invasion of Ukraine, has intensified the involvement of criminal groups in operations tied to sanctions-busting, cyber warfare, and intelligence. Organized crime networks provide Russia with access to restricted goods, such as advanced electronics for its military, and facilitate money laundering and illegal financial flows. Notably, Russian intelligence services have relied on criminal syndicates to supplement their espionage activities, including sabotage, cyberattacks, and assassinations. The report also highlights Russia's weaponization of migration, using smuggling networks to create political instability across Europe. Meanwhile, Putin's regime has blurred the lines between state and criminal actors, using them as tools to evade international sanctions and expand Russian influence globally. 'Gangsters at War' reveals how Russian-based organized crime operates as a tool of Kremlin foreign policy, focusing not just on profits but on weakening geopolitical rivals. From sanctions evasion to destabilizing societies, criminal networks have become a key element in Russia's geopolitical arsenal. The report calls for increased vigilance, international cooperation, and stronger countermeasures to address this growing threat to global stability."

GLOBAL INITIATIVE AGAINST TRANSNATIONAL ORGANIZED CRIME. November. 2024. 82p.

Time to Make ‘Peace’ with the Bandits

By Claudia Wiehler and Medinat Malefakis

Nigeria has functioned as an anchor of stability in West Africa, a region that has been shaken by seven coups in three years. Yet, Nigeria is also grappling with several internal security crises including a violent-extremist insurgency and large-scale banditry, putting into question Nige ria’s ability to maintain this role. Reports about collaborations between bandit groups and Boko Haram extremists create fear about an unholy alliance across the country’s Northern region, potentially linking violent extremist groups in Mali and Niger with those in the Lake Chad region. It is against this backdrop of severe civilian suffering and potential transnational ripple effects that we argue for a pragmatic and rapid intervention in the banditry crisis. At this point, it is time to make ‘peace’ with the bandits.  

  Policy Perspectives Vol. 12/1. April 2024, 4pg