The Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts tagged global crime
A Report of Blockchain and Cryptocurrencies in Illegal Betting:

By The Asian Racing Federation Council on Anti-illegal Betting & Related Financial Crime

The purpose of this report is to explain how blockchain technology and cryptocurrencies are being used in the illegal betting industry in Asia. Blockchain and cryptocurrencies have been widely adopted in the betting industry in the form of payments, betting applications built on blockchain technology and to move funds. The emergence of this technology is a threat to legal betting because of the intrinsic features of many cryptocurrencies, such as: facilitating avoidance of anti-money laundering (AML) and know-your-customer (KYC) procedures by betting operators; circumvention by operators of international betting regulatory and licensing requirements; and instantaneous and anonymous cross-border transactions from bettors and operators. All of these features are attractive to bettors and operators in jurisdictions where online betting is illegal and/or restricted. Regulators in many jurisdictions have also been slow to keep up with the growth of blockchain,1 creating loopholes exploited by organised crime. International law enforcement and anti-money laundering bodies have highlighted that blockchain and cryptocurrencies facilitate illicit activities including illegal betting and money laundering. 2 As a measure of the growth of cryptocurrency in betting, Bitcoin is now accepted on at least 127 offshore sports betting websites and 284 online casinos, which is a seven- and 13-fold increase respectively since 2018.3 In addition to Bitcoin, at least 780 offshore websites accept one or more of the five biggest cryptocurrencies,4 and most of these websites accept players from jurisdictions such as Hong Kong (83%), Australia (78%), Japan (92%) and Singapore (82%). 5 Cryptocurrencies further facilitate illegal betting by giving the operators of illegal bookmaking syndicates and related entities such as Macau casino junket operators a means of transferring money without detection in order to offshore the criminal proceeds of their illegal betting operations, settle payments with customers, and pay employees in overseas illegal betting hubs such as the Philippines. For these reasons they have also been enthusiastically adopted by entities linked to the junket industry.

The Asian Racing Federation Council. 2021. 12p.

Money Laundering and Corruption in International Business: Study Based on Nordic Experiences

By Saana Rikkilä, Pirjo Jukarainen, Vesa MuttilainenNordic Council of Ministers

Nordic countries are viewed as having low levels of corruption. However, Nordic businesses can be exploited in corruption or money laundering schemes. The KORPEN project (Korruption i samband med näringsverksamhet i Norden) was funded by the Nordic Council of Ministers, coordinated by the Ministry of Justice, Finland and implemented by the Police University College. The project concludes that anti-corruption and anti-money laundering (AML) efforts share the same features and actors but are still rather separated. Some shared methods could be utilised in combatting both crimes. In general, the AML frameworks are more structured, whereas corruption and bribery are not viewed as such a serious issue in the Nordic countries. There are incidents in the Nordic region of interconnected corruption and money laundering. New risk assessment approaches and technology solutions could be of help.

Copenhagen: Nordic Council of Ministers, 2022. 104p.

The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives

By Nir Kshetri

This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities, takes a close look at cybercrime business models, explains the global variation in the pattern of cybercrimes and seeks to understand threats and countermeasures taken by key actors in this industry. This book’s distinguishing features include the newness, importance, controversiality and complexity of the topic; cross-disciplinary focus, orientation and scope; theory-based but practical and accessible to the wider audience; and illustration of various qualitative and quantitative aspects of the global cybercrime industry.

Cham: Springer, 2010. 252p.

Cybercrime, Organized Crime, and Societal Responses: International Approaches

Edited by Emilio C. Viano

This timely book provides contributions on international, comparative crime phenomena: gangs, trafficking, fear of crime, and crime prevention. It highlights contributions originally prepared for the XVII World Congress of Criminology and for the 2015 Cybercrime Conference in Oñati, Spain which have been selected, reviewed, and adapted for inclusion in this volume.

The work features international contributors sharing the latest research and approaches from a variety of global regions. The first part examines the impact of gangs on criminal activities and violence. The second part explores illegal trafficking of people, drugs, and other illicit goods as a global phenomenon, aided by the ease of international travel, funds transfer, and communication. Finally, international approaches to crime detection prevention are presented. The work provides case studies and fieldwork that will be relevant across a variety of disciplines and a rich resource for future research.

This work is relevant for researchers in criminology and criminal justice, as well as related fields such as international and comparative law, public policy, and public health.

Cham: Springer, 2017. 378p.

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities

Edited by Babak Akhgar and Ben Brewster

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues.

Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT.

  • This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.Description text goes here

Cham: Springer, 2016. 323p.

The Palgrave Handbook of International Cybercrime and Cyberdeviance

Edited by Thomas J. Holt and Adam M. Bossler

This Major Reference Work synthesizes the global knowledge on cybercrime from the leading international criminologists and scholars across the social sciences. The constant evolution of technology and our relationship to devices and their misuse creates a complex challenge requiring interdisciplinary knowledge and exploration. This work addresses this need by bringing disparate areas of social science research on cybercrime together. It covers the foundations, history and theoretical aspects of cybercrime, followed by four key sections on the main types of cybercrime: cyber-trespass, cyber-deception/theft, cyber-porn and obscenity, and cyber-violence, including policy responses to cybercrime. This work will not only demonstrate the current knowledge of cybercrime but also its limitations and directions for future study.

Cham: Palgrave Macmillan, 2010. 1467p.

Cyberdanger: Understanding and Guarding Against Cybercrime

By Eddy Willems

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.

Cham: Springer Nature, 2019. 231p.

Principles of Cybercrime

By Jonathan Clough

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes.

Cambridge, UK; New York: Cambridge University Press, 2010. 505p.

Cybercrime and Society

By Majid Yar

Cybercrime and Society provides a clear, systematic, and critical introduction to current debates about cybercrime. It locates the phenomenon in the wider contexts of social, political, cultural, and economic change. It is the first book to draw upon perspectives spanning criminology, sociology, law, politics, and cultural studies to examine the whole range of cybercrime issues.

Thousand Oaks, CA; London: SAGE, 2006. 200p.

Action Plan to Address Illicit Financing Risks of Digital Assets

By United States. Department of the Treasury

From the Introduction: "This action plan responds to Section 7(c) of Executive Order (E.O.) 14067, 'Ensuring Responsible Development of Digital Assets,' which calls for the development of a coordinated interagency action plan for mitigating the digital-asset-related illicit finance and national security risks as identified in the U.S. government's National Strategy for Combating Terrorist and Other Illicit Financing (Illicit Financing Strategy). [...] E.O. 14067 recognizes that digital assets may pose significant illicit financing risks and commits the U.S. government to mitigating these and any other national security risks. This action plan identifies priority and supporting actions to support this commitment in line with the priorities and supporting actions identified in the Illicit Financing Strategy specific to uncovering and mitigating the misuse of digital assets by illicit actors. These priority actions include monitoring risks, working with international partners to improve cooperation on and implementation of international AML/CFT [anti-money-laundering/countering-the-financing-of-terrorism] standards, strengthening our regulations and operational frameworks, and improving private sector compliance and information sharing, among others. The action plan begins with an overview of the illicit financing risks and U.S. government efforts to mitigate these risks before laying out these priority actions."

United States. Department of the Treasury. 2022-09-16. 20p.

Corporate Responses to Financial Crime: From Exposure to Investigation

By Petter Gottschalk

This brief extends studies on how corporations respond to scandals by examining the evolution of the accounts that corporate agents develop after a scandal becomes public. Guided by the theory of accounts and a recently developed perspective on crisis management, its examines how the accounts developed by thirteen corporations caught up in highly publicized scandals changed from the time of initial exposure to the issuance of an investigative report. This brief continues the discussion of the broader managerial and social implications of the analysis of accounts, and analyses their effect on our understanding of the ability of corporations to weather serious scandals. It includes four case studies; from Switzerland, Moldova, Denmark, and Norway respectively.

Cham: Springer, 2020. 147p

Encyclopedia Of White-collar and Corporate Crime

Edited by Lawrence M. Salinger

With more than 500 entries (including up-to-date information on such high profile cases as Martha Stewart and Enron), the <strong>Encyclopedia of White-Collar & Corporate Crime gathers history, definitions, examples, investigation, prosecution, assessments, challenges, and projections into one definitive reference work on the topic. This two-volume encyclopedia incorporates information about a variety of white-collar crimes, and provides examples of persons, statutes, companies, and convictions. Each entry offers a thorough and thoughtful summary of the topic. Rather than a simple definition, users are given a satisfying and sophisticated synopsis with references for further study.

London; Thousand Oaks, CA: SAGE, 2004p. 1016p.

Unchecked Corporate Power: Why the Crimes of Multinational Corporations are Routinized Away and What We Can Do About It

By Greg Barak

Why are crimes of the suite punished more leniently than crimes of the street? When police killings of citizens go unpunished, political torture is sanctioned by the state, and the financial frauds of Wall Street traders remain unprosecuted, nothing succeeds with such regularity as the active failures of national states to obstruct the crimes of the powerful.

Written from the perspective of global sustainability and as an unflinching and unforgiving exposé of the full range of the crimes of the powerful, Unchecked Corporate Power reveals how legalized authorities and political institutions charged with the duty of protecting citizens from law-breaking and injurious activities have increasingly become enablers and colluders with the very enterprises they are obliged to regulate. Here, Gregg Barak explains why the United States and other countries are duplicitous in their harsh reactions to street crimes in comparison to the significantly more harmful and far-reaching crimes of the powerful, and why the crimes of the powerful are treated as beyond incrimination.

London; New York: Routledge, 2017. 213p.

Bribery and Corruption: Navigating the Global Risks

By Brian Loughman and Richard Sibery

As businesses continue to expand globally into new and emerging markets, bribery and corruption risks have increased exponentially. Bribery and Corruption offers a comprehensive look at this growing problem, and at the Foreign Corrupt Practices Act (FCPA) and other international anti-bribery and corruption conventions. Presenting hypothetical examples of situations companies will face, along with practical solutions, the book offers detailed global guidance on a region and country-specific basis.

The FCPA prohibits US companies and their subsidiaries from bribing foreign officials, either directly or indirectly through intermediaries, for the purpose of obtaining or retaining business. It also requires companies to keep accurate records of all business transactions and maintain an effective system of internal accounting controls. Internationally, the Organization of Economic Cooperation and Development's (OECD's) anti-bribery convention has been adopted by 38 countries and creates legally binding standards related to bribery of foreign public officials.

Hoboken, NJ: Wiley, 2012. 417p.

Football, Gambling, and Money Laundering: A Global Criminal Justice Perspective

By Fausto De Sanctis

Professional football means many things to many people. For players, a means to possible fame and fortune. For fans, a source of local or national pride, and perhaps the chance to score with a few bets. For criminal organizations, a cover for making millions in corrupt enterprises. In the world of gambling this is no different.

Football, Gambling, and Money Laundering describes in impressive detail the scope of the problem, the layers of denial that allow sports-related financial crime to flourish, and the steps that are being taken--and that need to be taken--to combat illicit operations in the sports world. Expert analysis explains criminal activity in the context of football, and how sports governing bodies, the media, and others have created a culture that regularly turns a blind eye. International data and instructive legal case examples shed light on the role of the Internet in the spread of gambling and money laundering as well as the strengths and weaknesses of current law enforcement, legislative, and sports-based efforts in fighting corruption.

Cham, SWIT: Springer, 2014. 173p.

The Laundering Machine: How Fraud and Corruption in Peru's Concession System are Destroying the Future of its Forests

By The Environmental Investigation Agency (EIA)

In this report, EIA documents for the first time the systematic export and import of illegal wood from Peru to the United States. In many ways, this report not a new story: the system’s corruption is something of which everyone in the sector is aware. EIA’s contribution lies in having identified and patiently put together the pieces of the puzzle to reveal the mechanism that allows this trade to happen: what Peruvians call the “laundering machine”.

EIA’s investigative work focused on reconstructing the routes that timber takes from the Amazon to the warehouses of US importers, through use of official information obtained under Peru’s Transparency and Access to Public Information Law. The links in this chain are willfully obscured to perpetuate confusion about the origins of almost all timber traded in Peru. EIA was able to reconstruct the chain of custody for trade in cedar (Cedrela odorata) and bigleaf mahogany (Swietenia macrophylla) only because both species are protected under the Convention on International Trade in Endangered Species of Flora and Fauna (CITES) and thus require specific export permit documents. The same illegal modus operandi is being applied for other species, but the even more limited information available regarding non-CITES species trade makes it virtually impossible to connect the concession of origin with the shipments being exported.

Washington, DC; London:: EIA, 2012. 72p.

Cyber-OC – Scope and manifestations in selected EU member states

Edited by Gergana Bulanova-Hristova, Karsten Kasper, Geralda Odinot, Maite Verhoeven, Ronald Pool, Christianne de Poot, Yael Werner and Lars Korsell.

The threats arising from different types of cybercrime are real and constantly evolving, as the internet with its anonymity and borderless reach provides new opportunities for physical and virtual criminal activities. We can see complex cybercriminal networks connecting subgroups and also single individuals that are active on, through and against the internet. At the same time there are also ‘offline’ criminal organisations using the internet to facilitate their activities and to increase their profit. Even so-called ‘traditional’ organised crime groups are widening their criminal portfolios by committing cybercrime. By constantly evolving online opportunities, their acts of ‘traditional crimes’ become even more far-reaching and damaging, thus benefiting the criminal organisation. It is not only the involvement of organised crime in cybercrime that is dangerous, but also cybercrime committed in an organised manner. Cyber-OC represents the convergence of these two phenomena. Despite the huge threat arising from its cumulative character, Cyber-OC is frequently underestimated and differently defined even by law enforcement authorities.

Wiesbaden: Bundeskriminalamt Criminalistic Institute, 2016. 298p.

Global Report on Crime and Justice

Edited by Graeme R. Newman

This groundbreaking work reviews the global situation of crime and justice around the world. Volume 1 includes: 1. Data sources;. 2. Experience of crime and justice. 3. Bringing to Justice. 4. Punishment. 5. Resources in criminal justice. 6. Firearm abuse and regulation. 7. Drugs and drug control.

United Nations and Oxford. 1999.

The Concept And Measurement Of Violence Against Women And Men

By Sylvia Walby, Jude Towers, Susie Balderston, Consuelo Corradi, Brian Francis, Markku Heiskanen, Karin Helweg-Larsen, Lut Mergaert, Philippa Olive, Emma Palmer, Heidi Stöckl and Sofia Strid.

“Lethal violence is enormous. There are nearly half a million (437,000) intentional homicides globally each year. Lethal violence is gendered. Globally, 95% of perpetrators of intentional homicide are male. Every year, intimate partners or family members perpetrate nearly 64,000 intentional homicides; two thirds of victims are female. Half the intentional homicides of women are perpetrated by an intimate partner or other family members, compared to 6% of intentional homicides of men.“

Policy Press (2017) 193 pages.