Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Ciolence & Oppression
Report of the Blue-Ribbon Panel on MTA Fare and Toll Evasion

By The Blue Ribbon Panel on MTA Fare and Toll Evasion, Metropolitan Transportation Authority

Fare and toll evasion is a sensitive issue that raises difficult questions about social cohesion, inequality, and appropriate use of enforcement. But the situation in New York has reached a crisis level, and avoiding the topic is no longer a viable option. Losses to the MTA’s operating budget are staggering, with nearly $700 million in revenue not collected in 2022 alone. This includes $315 million lost in bus fares, $285 million in subway fares, $46 million in bridge and tunnel tolls, and $44 million in railroad fares. Fares and tolls account for a significant proportion of the MTA’s annual budget revenue — almost $7 billion a year. But every dollar lost to evasion impairs the MTA’s financial stability, threatens reliable transit for all New Yorkers, and increases the need for alternative revenue sources, including through larger fare and toll hikes. The MTA convened a Blue-Ribbon Panel of high-profile New Yorkers with expertise in relevant fields to better understand fare and toll evasion, and develop fresh solutions to the issue. Panelists spent the better part of a year meeting with stakeholders inside and outside the MTA, speaking with transit users, and observing fare and toll collection operations throughout the system. The panel’s final report proposes a cohesive and comprehensive set of strategies around education, environment, equity, and enforcement.

New York: MTA, 2023. 125p.

download
Online African organised crime from surface to darkweb

By INTERPOL

With the increase in Internet coverage, online trade of illicit goods is likely increasing on the African continent. In recent years, cyber-enabled crimes have increased on the African continent. This has been a result of a combination of factors, including, the improvement of Internet coverage, the wide availability of cyber-tools and the growing flexibility of cybercriminals. As a consequence, online crime nowadays represents a bigger security issue for law enforcement in African member countries than ever before. In this framework, INTERPOL, under the European Union funded ENACT Project, examines through this assessment the issue of cyber and cyber-enabled crimes in Africa in order to help drive a more strategic law enforcement response.

Lyon, France: INTERPOL, 2020. 79p.

download
Mobile money and organized crime in Africa

By INTERPOL

The development of mobile money services in Africa offer criminals a substantial opportunity to utilize these services to target victims in a variety of crimes as well as to further enable other forms of criminality. This rapid service development combined with criminal opportunities represents a security issue of interest to all member countries in Africa and poses a significant challenge to law enforcement agencies in member countries. As a result, INTERPOL, under the European Union funded ENACT Project, has assessed this issue in order to help drive a more strategic law enforcement response. Criminals and criminal organizations will most probably continue to utilize mobile money services following the recent increase in their popularity and the prominent role such services now play in society across Africa. This prominent role in society has enabled criminals to exploit weaknesses in regulations and identification systems, further enabled by a lack of experience and resources in law enforcement. Crime types have been identified that exploit mobile money services across Africa. These primarily include various types of fraud that target the distinct stages of deployment for mobile money services. Whilst acquisitive crimes significantly impact the lives of victims, criminals have also identified further opportunities to exploit mobile money services to assist other criminal activities. These ‘mobile money enabled crimes’ include illicit commodities purchases, terrorism financing and firearm enabled crime. Such significant crimes pose a threat to stability and security across Africa if not addressed by member countries. The threat from criminality facilitated by mobile money services in Africa is substantial, yet there is sometimes limited capacity amongst law enforcement to manage this complex issue, especially concerning the technical expertise required to utilise relevant evidence in the criminal justice system. As mobile money services develop interoperability across Africa, stronger partnerships amongst all law enforcement agencies, greater awareness of the overall issue at a regional level and identification of best practice responses from such agencies will be required. INTERPOL is in a position to support member countries through coordinated, intelligence led support to law enforcement using a range of police databases and operational support techniques.

Lyon, France: INTERPOL, 2020. 63p.

download
Financial Crime and Punishment: A Meta-Analysis

By Laure de Batza and Evžen Kočendab

We provide the first quantitative synthesis of the literature on how financial markets react to the disclosure of financial crimes committed by listed firms. While consensus expects negative stock price returns, the exact size of the effect is far from clear. We surveyed 111 studies published over three decades, from which we collected 480 estimates from event studies. Then, we perform a thorough meta-analysis based on the most recent available techniques. We show that the negative abnormal returns found in the literature seem to be exaggerated by more than three times. Hence, the “punishment” effect, including a reputational penalty, suffers from a serious publication bias. After controlling for this bias, negative abnormal returns suggest the existence of an informational effect. We also document that accounting frauds, crimes committed in common-law countries such as the United States, and allegations are particularly severely sanctioned by financial markets, while the information channels and types of procedures do not influence market reactions.

Munich : Munich Society for the Promotion of Economic Research - CESifo, 2023. 82p.

download
Digital Vigilantism, Social Media And Cyber Criminality

By Karen Allen and Isel van Zyl

This paper explores the links between digital vigilantism and organised crime in South Africa and Kenya.

Social media platforms have become powerful tools to amplify and share narratives. Like many evolving technologies, platforms such as Twitter or Facebook may be used for social good or for ill. Digital vigilantism (whereby social media platforms are used for organised shaming, hounding or doxing of a target deemed by the online community to have transgressed norms) may have real-world consequences. In extreme cases this may result in acts of ‘terrorism’ or other forms of unlawful killing. Yet while digital vigilantism may appropriate traditional law enforcement mechanisms, in some cases it may also try to hold law enforcement to account.

ENACT-Africa, 2020. 16p.

download
Internet Organised Crime Threat Assessment (IOCTA) 2023

By EUROPOL

Cybercrime, in its various forms, represents an increasing threat to the EU. Cyber-attacks, online child sexual exploitation, and online frauds are highly complex crimes and manifest in diverse typologies. Meanwhile the perpetrators behind these crimes are becoming increasingly agile, exploiting new situations created by geopolitical and technological changes. The Internet Organised Crime Assessment (IOCTA) is Europol’s assessment of the cybercrime landscape and how it has changed over the last 24 months. Accompanying this report will be a series of spotlight reports released later this year, each of which examines a specific crime area relating to cybercrime.

Luxembourg: Publications Office of the European Union, 2023 14p.

download
Improving Cybercrime Reporting in Scotland: A Systematic Literature Review

By Juraj Sikra

I have explored how to improve cybercrime reporting in Scotland by conducting a systematic literature review. Due to the lack of data on Scotland, I have frequently extrapolated from both the UK and the West. The research questions were: 1. What is known about cybercrime in the UK to date? 2. What is known about cybercrime victims in the UK to date? 3. What is known about cybercrime reporting to date? The answers were retrieved by combining Boolean variables with keywords into Scopus, Web of Science and ProQuest. This resulted in the analysis of 100 peer-reviewed articles. This analysis revealed a common trend, a novel taxonomy, and an original conclusion. The common trend is that of responsibilisation, which is the shifting of responsibility for policing cybercrime from the government onto the citizens and private sector, which will inevitably responsibilise consumers. The novel taxonomy is for classifying cybercrime reporting systems according to three pillars, which I referred to as Human-ToHuman (H2H), Human-To-Machine (H2M) and Machine-To-Machine (M2M). The original conclusion is that to improve cybercrime reporting in Scotland, the process needs to be treated also as a social one rather than a purely mathematical one.

Glasgow: University of Strathclyde, 2022. 60p.

download
Reexamining the anti-money laundering framework: a legal critique and new approach to combating money laundering

By Paul Michael Gilmour

Purpose – Money laundering poses significant challenges for policymakers and law-enforcement authorities. The money-laundering phenomenon is often acknowledged as a type of “serious and organised crime” yet has traditionally been described as a complicated three-stage process, involving the “placement, layering and integration” of criminal proceeds. This article aims to reexamine the money-laundering concept within the realm of organised crime and critique its legal underpinnings. Design/methodology/approach – This paper explores how criminal actors collude in organised money laundering schemes to circumvent laws and frustrate the efforts of officials, while advancing the regulatory-spatial paradigms of which organised money launderers operate. In doing so, it reframes the debate towards the “who” and “where” of money laundering. Findings – This paper argues that authorities’ efforts to combat money laundering relies on rigid legal definitions and flawed ideals that fail to address the money-laundering problem. Originality/value – There has been little scholarly debate that questions the fundamental approach to conceptualising money laundering. This paper proposes a new approach to combating money laundering that better incorporates the actors involved in money laundering and the spaces in which it occurs.

Journal of Financial Crime , 2022

download
Market Structure and Extortion: Evidence from 50,000 Extortion Payments

By Zach Y. Brown & Eduardo Montero & Carlos Schmidt-Padilla & Maria Micaela Sviatschi

How does gang competition affect extortion? Using detailed data on individual extortion payments to gangs and sales from a leading wholesale distributor of consumer goods and pharmaceuticals in El Salvador, we document evidence on the determinants of extortion payments and the effects of extortion on firms and consumers. We exploit a 2016 nonaggression pact between gangs to examine how collusion affects extortion in areas where gangs previously competed. While the pact led to a large reduction in competition and violence, we find that it increased the amount paid in extortion by approximately 20%. Much of this increase was passed through to retailers and consumers: retailers experienced an increase in delivery fees, leading to an increase in consumer prices. In particular, we find an increase in prices for pharmaceutical drugs and a corresponding increase in hospital visits for chronic illnesses. The results point to an unintended consequence of policies that reduce competition between criminal organizations.

Cambridge, MA: National Bureau of Economic Research, 2023. 67p.

download
Cybercrime: Reporting Mechanisms Vary, and Agencies Face Challenges in Developing Metrics

By Marisol Cruz Cain, Gretta L. Goodwin

Cybercrime, such as hacking and ransomware attacks, is increasing in the United States—leading to billions of dollars in losses and threatening public safety. Several federal agencies work to detect, investigate, and prosecute cybercrimes. Agencies vary in how they collect data on these crimes, and there is no official definition of cybercrime. As a result, this data may not be consistent or complete. In 2022, Congress required the Department of Justice to develop definitions and categories for cybercrimes in its national crime reporting system—which should help law enforcement agencies comprehensively track and monitor these crimes.

Washington DC: U.S. Government Accountability Office, 2023. 40p.

download
Data breaches and cybercrime victimisation

By Anthony Morgan and Isabella Voce

This paper draws on data from a large national survey conducted in 2021 to examine the prevalence of data breaches among Australian computer users and the relationship between data breaches and other forms of cybercrime victimisation. Almost one in 10 respondents (9.3%) said they were notified their information was exposed in a data breach in the 12 months prior to the survey. Nearly one-third of these respondents (28.0%) had also been a victim of identity crime in the same period. Respondents who had been notified of a data breach were 34 percent more likely than other respondents to have been a victim of identity crime in the 12 months prior to the survey. They were also more likely to have been a victim of online scams or fraud and ransomware. Measures to protect individuals whose information has been exposed in a data breach from other potentially related cybercrimes are essential and should be prioritised when data breaches occur.

Statistical Bulletin no. 40. Canberra: Australian Institute of Criminology. 2022. 16p.

download
Identity crime and misuse in Australia 2023

By Merran McAlister, Emily Faulconbridge, Isabella Voce and Samantha Bricknell

This study presents findings from the Australian Cybercrime Survey related to identity crime and misuse. Thirty-one percent of respondents experienced identity crime in their lifetime and 20 percent in the past 12 months. Almost half of identity crime victims reported that suspicious transactions appeared in their bank statements or accounts. The type of personal information most commonly misused was names, followed by credit or debit card information. While one quarter of respondents did not know how their information was obtained, 16 percent believed it to be due to the hacking of a computer or device. Twenty-nine percent of past 12 month victims experienced a financial loss. The median amount initially lost was $300. Nineteen percent of victims had money reimbursed, the median amount being $250.

Statistical Bulletin 42. Canberra: Australian Institute of Criminology, 2023. 18p.

download
Cybercrime in Australia 2023

By Isabella Voce and Anthony Morgan

This is the first report in the Cybercrime in Australia series, which aims to provide a clearer picture of the extent of cybercrime victimisation, help-seeking and harms among Australian computer users. It is based on a survey of 13,887 computer users conducted in early 2023. In the 12 months prior to the survey, 27 percent of respondents had been a victim of online abuse and harassment, 22 percent had been a victim of malware, 20 percent had been a victim of identity crime and misuse, and eight percent had been a victim of fraud and scams. Overall, 47 percent of respondents experienced at least one cybercrime in the 12 months prior to the survey—and nearly half of all victims reported experiencing more than one type of cybercrime. Thirty-four percent of respondents had experienced a data breach. Cybercrime victimisation was not evenly distributed, with certain sections of the community more likely to have been a victim, and certain online activities associated with a higher likelihood of victimisation.

Most cybercrime victimisation went unreported to police or to ReportCyber, meaning official statistics significantly underestimate the size of the problem. Satisfaction with the outcomes of these reports was mixed, and relatively few reports resulted in an offender being apprehended. Rates of help-seeking varied and were influenced by the perceived seriousness of cybercrime and knowledge of how and where to report it.

The financial losses experienced by victims were wide ranging. Some victims reported losing large sums of money, but most victims reported relatively small financial losses. This report measures, for the first time, the harms experienced by individual victims and small businesses that extend beyond these financial costs. Twenty-five percent of respondents were negatively impacted by cybercrime in the 12 months prior to the survey, while 22 percent of respondents who owned or operated a small to medium business said their business was negatively impacted by cybercrime.

Statistical Bulletin, 43. Canberra: Australian Institute of Criminology, 2023. 113p.

download
Assessing the Risk of Repeat Victimization Using Structured and Unstructured Police Information

By Roos Geurts, Niels Raaijmakers, Marc J. M. H. Delsing, Toine Spapens, Jacqueline Wientjes, Dick Willems and Ron H. J. Scholte

Following the EU Victim Directive, Dutch police officers are obliged to assess a victim’s vulnerability to repeat victimization. This study explored the utility of unstructured police information for the prediction of repeat victimization, as well as its incremental value over and above structured police information. Police records over a period of 6 years were retrieved for a sample of 116,680 victims. Unstructured information was transformed into numeric features using count-vector and TF/IDF methods. Classification models were built using decision tree and random forest models. AUC values indicate that a combination of structured and unstructured police information could be used to correctly classify a majority of repeat and non-repeat victims.

Crime & DelinquencyVolume 69, Issue 9 Aug 2023 Pages 1567-1784

download pdf
download epub
Breaking Bans: The Scourge of Synthetic Drugs in Mauritius

by Richard Chelin

Synthetic drugs have created a public-health crisis and changed drug market dynamics in the country. Synthetic drugs, more specifically, new psychoactive substances (NPSs), were first detected in Mauritius in 2013 and since then have had a significant negative impact, overtaking heroin as the most popular drug among young people. The government has developed various policies to address the issue, the most recent being the National Drug Control Masterplan, which promotes collaboration among law enforcement agencies. However, the success of the strategy will depend on its effective implementation.

ENACT-Africa, 2020. 20p.

download
Building Barriers and Bridges: The Need for International Cooperation to Counter the Caribbean-Europe Drug Trade

by Christopher Hernandez-Roy and Rubi Bledsoe

Drug trafficking, especially cocaine trafficking, from source countries in South America to Europe has produced alarming and lasting effects on both sides of the Atlantic. While various trafficking routes to Europe exist, transshipment through the Caribbean, including through the European territories in the region, is of growing concern. In Europe, the expanding cocaine market has brought a rise in homicides, kidnappings, and intimidation. In the city of Antwerp, for example, there were around 200 drug-related violent incidents in the past five years as competing gangs fought over control of territory. In the Caribbean, drug trafficking by organized crime has been associated with record homicide levels, corruption, democratic backsliding, and money laundering, among other pernicious effects. It has also prompted wars between gangs over the control of criminal economies, expanded illegal firearms trafficking, and exacerbated human trafficking both within the region and beyond. Shedding light on the complexity of the issue—while providing policy recommendations for increased cooperation between the United States, Europe, and Caribbean countries—is necessary as both continents seek regional and extra-regional security.

Washington DC: Center for Strategic and International Studies (CSIS),, 2023. 11p

download
Ranking Trust Factors Affecting Risk Perception in Illicit Drug Purchase on the Darknet: A Large-Scale Survey Study in Hungary

By Tibor Kiss & Ákos Szigeti

The process of illicit drug trafficking on darknet markets is highly affected by various trust factors. Although the factors potentially affecting customers’ risk perception can be identified based on previous research, cyber criminology has not produced empirical research ranking the importance of the specific factors. This study was designed to fill this gap by developing a tool that measures the importance of the various trust factors. To test out the measurement tool, a large-scale survey with projective situational questions was conducted among university students in Hungary. The sample (n = 5481) was compiled to include potential darknet market customers, respondents with above-average computer skills needed to access the darknet, and taking into account that university students are a group of society particularly exposed to drug consumption. The end product of this research is a trust matrix ranking the factors affecting illicit drug purchases on darknet markets. Among the factors, the survey’s target group ranked reliable and undamaged delivery of goods and the reliability of vendors as the most important. The measurement tool developed in this research will facilitate further criminological research on vendor reputation. Its findings also point to the need for further research on delivery providers and predict that influencing the delivery-related risk perception of potential customers could effectively reduce demand.

May 2023 European Journal on Criminal Policy and Research

download
Enablers of Cocaine Trafficking : Evidence of the STate Crime Nexus from Contemporary Honduras

By Emilia Ziosi

Honduras has been Central America’s focal point for drug trafficking towards the United States for years as the region’s main transit country. Recent court cases held in the United States have revealed the symbiotic relationship between state actors, business elites and drug trafficking organisations in contemporary Honduras, uncovering the blurred boundaries between the licit and illicit, the upper and underworld in the country. In this article, a drug-trafficking family – ‘Los Cachiros’ transportista (transport) group – is analysed as a case study with the aim of exploring state actors’ involvement in cocaine trafficking.

Drawing on publicly available official judicial documents, this article explores the interpenetrations between formal and informal institutions in the country, arguing that state actors’ involvement in the drug trade in Honduras goes far beyond protection, and has evolved into a powerful network of public, private and criminal actors that has been able to capture the state’s basic sovereign functions with the aim of protecting and promoting their own private interests. In doing so, this article takes forward the state-crime nexus literature. Building on Hall’s (2018) networked approach in the study of illicit economies, this article proposes a conceptual framework to re-theorise the state-crime nexus as a transnationally networked set of relations, which considers the role of external states as actors of power within a country’s state-crime nexus. Looking at the unique relationship between Honduras and the United States, I argue that the concept is useful to understand the role of the United States as a transnational actor of power within the Honduran state-crime nexus.

Journal of Illicit Economies and Development, 4(2), pp. 144–159.

download
Smugglers and states: illegal trade in the political settlements of North Africa

By Max Gallien

This project explores the political economy of informal and illegal cross-border trade in North Africa, focusing in particular on Tunisia’s border with Libya, and Morocco’s North-East bordering Algeria and the Spanish enclave of Melilla. Based on extensive fieldwork, the project traces the informal institutions that regulate smuggling across the region, examines the resulting rent streams, and analyses their relationship to the region’s states through a political settlement framework. Following shifts in the domestic politics of Tunisia and Morocco as well as the regional border infrastructure, the project also traces the recent re-negotiation of the role of smuggling in the region. It argues that contrary to common assumptions, smuggling rarely occurs 'under the radar' of the state, but is instead embedded in a tight network of institutional regulation in which the regions' states play a key role. Furthermore, rather than subverting states, smuggling activities are a central feature of the region’s political settlements. The project highlights that the ability of different groups to navigate and negotiate the terms of their inclusion into these settlements is highly uneven, posing serious challenges for borderland populations.

London: The London School of Economics and Political Science, 2020. 333p.

download
Illicit Financial Flows, Theft and Gold Smuggling in Africa

By Roman Grynberg, Jacob Nyambe & Fwasa Singogo

The article reviews recent research and controversies surrounding the quantification of illicit financial flows (IFF) in the gold mining sector in Africa. It is argued that the methodology and data used in the quantification of the most frequently analysed technique, i.e., export undervaluation, is flawed not only because of the recognized weakness of the international trade data, but also because it focuses only on one aspect of IFF, and does not attempt to address issues pertaining to actual under measurement or misspecification of volumes. It is argued that estimates of tax evasion activities can only be determined through forensic economic and accounting techniques, and not through macro-economic or trade data. The last section considers the increased evidence of gold smuggling to the UAE from various African countries, some of which produce no gold of any significance, but appear to export in very large volumes; and at unit import values well below world market prices.

Tanzanian Economic Review, Vol. 9 No. 1, 2019: 35–59

download