Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in violence and oppression
Left Undefended: Killings of Rights Defenders in Colombia’s Remote Communities

By Human Rights Watch

Since 2016, over 400 human rights defenders have been killed in Colombia—the highest number of any country in Latin America, according to the United Nations Office of the High Commissioner for Human Rights (OHCHR). In November 2016, the Colombian government and the Revolutionary Armed Forces of Colombia (Fuerzas Armadas Revolucionarias de Colombia, FARC) guerrillas reached a landmark peace accord, leading to the demobilization of the country’s then-largest armed group. The agreement included specific initiatives to prevent the killing of human rights defenders. Separately, that year the Attorney General’s Office decided to prioritize investigations into any such killings occurring as of the beginning of 2016.

New York: HRW, 2021. 135p.

Europe in Crisis: Crime, Criminal Justice, and the Way Forward. Essays in Honour of Nestor Courakis.

Edited by C.D. Spinellis / Nikolaos Theodorakis Emmanouil Billis / George Papadimitrakopoulos.

Volume Ii: Essays In English, German, French, And Italian. Nestor Courakis is Emeritus Professor of Criminology and Penology at the National and Kapodistrian University of Athens, Faculty of Law and a full-time Professor at the University of Nicosia.

Athens: ANT. N. Sakkoulas Publishers L.P , 2017. 1899p.

The Good Cause: Theoretical Perspectives on Corruption

Edited by Gjalt de Graaf , Patrick von Maravić. and Pieter Wagenaar

Money makes the world go round - corruption The book presents the state of the art in studying the causes of corruption from a comparative perspective. Leading scholars in the field of corruption analysis shed light on the issue of corruption from different theoretical perspectives. Understanding how different theories define, conceptualize, and eventually deduce policy recommendations will amplify our understanding of the complexity of this social phenomenon and illustrate the spectrum of possibilities to deal with it analytically as well as practically.

Opladen & Farmington Hills, MI. Barbara Budrich Publishers. 2010. 207p.

Commerce Raiding: Historical Case Studies, 1755–2009

By Elleman, Bruce A. and Paine, S.C.M

The sixteen case studies in this book reflect the extraordinary diversity of experience of navies attempting to carry out, and also to eliminate, commerce raiding. Because the cases emphasize conflicts in which commerce raiding had major repercussions, they shed light on when, how, and in what manner it is most likely to be effective. The authors have been asked to examine the international context, the belligerents, the distribution of costs and benefits, the logistical requirements, enemy countermeasures, and the operational and strategic effectiveness of these campaigns.

Newport, RI: U.S. Naval War College Press, 2010. 277p.

Piracy: The Best Business Model Available

By John Alexander

In this monograph, Dr. Alexander sets the stage with a brief historical account of how maritime piracy has evolved over the centuries to its current state: a vast enterprise whose increasing profitability has attracted a confluence of nefarious actors including warlords and international criminal organizations. Dr. Alexander speculates on the potential for intersection between pirates and ideological terrorist movements such as al-Qaeda and Associated Movements. Such a future would significantly elevate the stakes in a U.S. whole-of-government counter-piracy response. What role should the U.S. military, and Special Operations Forces (SOF) in particular, play in addressing the global issue of maritime piracy? Dr. Alexander points out many of the thorny legal considerations that contextually color any efforts to address counter-piracy and notes that the best solution to criminal acts occurring hundreds of miles at sea may in fact lie with efforts, including the use of SOF, to improve the security apparatus on shore.

MacDill Air Force Base, Florida: Joint Special Operations University Press. 2013. 102p

Piracy and Maritime Crime: Historical and Modern Case Studies

By Elleman, Bruce A.; Forbes, Andrew; and Rosenberg, David

As modern nation-states emerged from feudalism, privateering for both profit and war supplemented piracy at the margins of national sovereignty. More recently, an ocean enclosure movement under the aegis of the United Nations Convention on the Law of the Sea 1982 has granted states access to maritime resources far beyond their territorial limits.

Newport, RI: U.S. Naval War College Press, 2010. 277p.

The limits of the fight against money laundering in the European Union : state of play, challenges and perspectives.

By Davin Nina 1 Péan Maxence

Money laundering is an activity that consists of legitimizing the proceeds of crime by integrating them into the economic system. The primary objective of this process is to conceal the origin of money from illegal activities (drug trafficking, insider trading, corruption, etc.). The proceeds of these crimes take different forms. It can be cash, financial assets or material objects (works of art, jewelry, etc.). Money laundering is most often carried out in three distinct stages: placement, layering and integration. The placement stage consists of placing the dirty money in the financial system. Most often, criminal organizations come through companies to increase the inflow of capital, which is then deposited in a banking institution. Afterwards, the stratification process takes place, which consists of a large series of conversions and movements of funds in order to mask the origin of these products. Finally, once the money is laundered, it is reused by criminals to finance their activities. Today, the emergence of new information and communication technologies (NICT) in particular is giving a new boost to money laundering activities. The advent of online payment systems, crypto-currencies and dematerialized cash transfers make it even more difficult to track down illegal money transfers. Moreover, the multiplication of online auctions or gambling sites greatly facilitates money laundering. Faced with the development of these new methods, the authorities of European countries are trying to set up a new system to fight against money laundering, in particular by strengthening their cooperation. In addition, following the numerous attacks that occurred in the decade 2010-2020, the fight against the financing of terrorism has become the focus of these institutions. Despite the strengthening of the fight against money laundering and terrorist financing (AML/CFT), the latter "has weaknesses1". These weaknesses are based on "institutional fragmentation and insufficient coordination at the European Union level2" but also because the EU bodies have "limited tools". Furthermore, following the work of many researchers, it is estimated that today the fight against money laundering and terrorist financing is liberticide. Indeed, as early as 2003, a report by the CNIL pointed out the numerous liberticidal measures to fight against money laundering. In this paper, we will first present the framework of the fight against money laundering and terrorist financing in the European Union (I), then we will describe the main flaws of this system (II), and finally we will demonstrate that this fight is today deeply liberticidal, notably because of the tools it uses (III)

Sciencespo.aix. ND. ca. 2021.p.12.

Drug Money and Bank Lending: The Unintended Consequences of Anti-Money Laundering

By Tomas Williams, Pablo Slutzky, and Mauricio Villamizar-Villegas

We explore how anti-money laundering (AML) policies affect banks and credit provision to firms. For identification we exploit the enactment of a financial regulation in Colombia. Aimed at controlling the flow of money from drug trafficking into the financial system, we find that after implementation bank deposits in municipalities with high drug trafficking decline. This negative liquidity shock has consequences for credit in other municipalities. Banks sourcing their deposits from areas with high drug trafficking cut lending relative to other banks. Using a proprietary database containing data on bank-firm credit relationships, we show that small firms that rely on credit from affected banks experience a negative shock to sales, investment, and profitability. Furthermore, we use night-lights data to show that these results are not due to a reallocation of activity across firms nor between the formal and informal sectors. Our evidence uncovers a hidden to be considered when implementing AML policies.

Washington, DC: Elliott School of International Affairs, The George Washington University, 2020. 62p.

Dirty Money: How Banks Influence Financial Crime

By Pacelli, Joseph, Janet Gao, Jan Schneemeier, and Yufeng Wu.

Bank employees face discretion in investigating and reporting money laundering activities via suspicious activity reports (SARs), a primary tool to combat financial crimes. We investigate the incentives banks face to initiate SARs and the implications for criminal activity. Our theoretical and empirical analyses document that banks with more profit-seeking pressure adopt lax reporting policies to attract criminal customers, ultimately leading to more suspicious activity reports. A structural estimation approach helps us uncover the relation between bank profitability, reporting stringency, and the demand from criminal customers. Our results also suggest an assortative matching between lax banks and criminal clientele.

Boston, MA: Harvard Business School, 2021. 61p.,

Job Loss, Credit and Crime in Colombia

By Gaurav Khanna, Carlos Medina, Anant Nyshadham, Christian Posso, Jorge Tamayo

We investigate the effects of job displacement, as a result of mass-layoffs, on criminal arrests using a matched employer-employee-crime dataset from Medellín, Colombia. Job displacement leads to immediate and persistent earnings losses, and higher probability of arrest for both the displaced worker and family members. Leveraging a banking policy-reform, we find that greater access to credit attenuates the criminal response to job loss. Impacts on arrests are pronounced for property crimes and among younger men for whom opportunities in criminal enterprises are prevalent. Taken together, our results are consistent with economic incentives contributing to criminal participation decisions after job losses.

Boston, MA: Harvard Business School, 2020. 35p.

The Vanishing Point: Criminality, Corruption and the Devastation of Tanzania’s Elephants

By Environmental Investigation Agency

EIA’s latest report, The Vanishing Point: Criminality, Corruption and the Devastation of Tanzania’s Elephants, delves into how Tanzania’s elephants are once more being slaughtered in vast numbers to feed a resurgent ivory trade in China in an illegal trade driven by Chinese criminal syndicates and Tanzanian corruption. Vanishing Point reveals how some politicians from Tanzania’s ruling Chama Cha Mapinduzi (CCM) party and well-connected businesspeople use their influence to protect ivory traffickers. The video below provides an overview, complemented by firsthand accounts, of the corruption in Tanzania and the Chinese market providing an outlet for illegal poaching.

London; Washington, DC: EIA, 2015. 36p.

Diplomats and Deceit: North Korea’s Criminal Activities in Africa

By Julian Rademeyer.

Much has been written about state-sponsored North Korean criminal activity in Asia and Europe. But relatively little attention has been devoted to North Korea’s illicit activities in Africa, which run the gamut from trafficking of rhino horn and ivory to gold and tobacco. This report – which draws on hundreds of pages of documents, academic research, press reports and interviews with government officials, diplomats and defectors in Southern Africa and South Korea – presents an overview of evidence implicating North Korea in criminal activity ranging from smuggling and drug trafficking to the manufacturing of counterfeit money and black market cigarettes. It examines North Korea’s current involvement in Africa, the complex history of African-North Korean relations and allegations that the country’s embassies in several African states are intimately connected to a complex web of illicit activity aimed at bolstering the Kim Jong-un regime and enriching cash-strapped diplomats. An analysis of press reports and other publicly available information conducted by the Global Initiative Against Transnational Organised Crime shows that North Korean diplomatic passport holders have been implicated in at least 18 cases of rhino horn and ivory smuggling in Africa since 1986. Despite North Korea’s waning influence on the continent, incriminating evidence linking its diplomats to ivory and rhino horn smuggling continues to emerge. The report includes interviews with a number of high-level North Korean defectors about their knowledge of, and stated involvement in, a range of criminal activities. They claim that smuggling by North Korean diplomats is widespread, with couriers traveling regularly to Pyongyang and Beijing in China with diplomatic bags stuffed with contraband. “[D]iplomats…would come from Africa carrying rhino horn, ivory and gold nuggets,” explained one defector who ran a North Korean front company in Beijing. “Every embassy [in Africa] was coming two or three times every year.” The persistent abuse of diplomatic immunity by North Korean diplomats and agents poses a particularly vexing problem for law enforcement. Increasing economic sanctions and isolationist policies designed to cripple North Korea’s nuclear weapons capabilities are likely to fuel the expansion of the regime’s illicit activities and statesponsored criminal networks.

Geneva: Global Initiative Against Transnational Organized Crime, 2017. 40p.

Rebellion As Racket: Crime and the Donbas conflict, 2014–2022

By Mark Galeotti and Anna Arutunyan.

Globally, connections between crime, war and insurrection are inescapable, and the undeclared struggle over the Donbas region in eastern Ukraine, before Russia’s open invasion in February 2022, was no exception to the rule. Since Russia first encouraged, facilitated, armed and bankrolled the rising of the rebellious pseudo-states of south-eastern Donbas in 2014, there had been a pervasive connection between crime, war and insurrection. Despite continued sporadic skirmishes, by 2015, it seemed that the conflict had largely stabilized. A violent and confused hybrid of insurrection and foreign invasion, had led to the creation of the self-proclaimed pseudo-states of the Donetsk and Lugansk People’s Republics (DNR and LNR, respectively). Together, they controlled roughly 30% of the Donetsk and Luhansk regions, and had a combined population of approximately 2 to 2.3 million people. This was a status quo that not only encouraged criminalization, but was based on it. Industrial-scale smuggling of everything from coal to narcotics helped sustain the internationally unrecognized pseudo-states of Donbas; gangsters became militiamen; and money-laundering networks meanwhile bypassed sanctions

Geneva: Global Initiative Against Transnational Organized Crime, 2022. 56p.

The Crime of the Congo

By Arthur Conan Doyle .

Sir Arthur Conan Doyle came to the fore to publicize the dreadful massacres and genocidal crimes of Belgium’s King Leopold, who, fraudulently bought up all the land that he could then call it his Congo. He actually “owned” his own country. He then proceeded to exploit the indigenous peoples of the Congo to rob the Congo of its “riches.” He treated all the Congolese peoples as his personal slaves and used them to produce sugar, rubber and whatever else he could export and build his own riches and the lavish mansion in France and Belgium. An influential writer like Conan Doyle was needed to expose Leopold for the evil tyrant that he was, because, incredibly, Leopold achieved all his horrible gains under the guise of “humanity” and “charity” in helping the Congo people to become civilized.

NY. Doubleday. (1909) 156 pages.

Carnival of Crime

By Mark Twain.

The Facts Concerning The Recent Carnival Of Crime In Connecticut. “Straightway the door opened, and a shriveled, shabby dwarf entered. He was not more than two feet high. He seemed to be about forty years old. Every feature and every inch of him was a trifle out of shape; and so, while one could not put his finger upon any particular part and say, “This is a conspicuous deformity,” the spectator perceived that this little person was a deformity as a whole—a vague, general, evenly blended, nicely adjusted deformity. There was a fox-like cunning in the face and the sharp little eyes, and also alertness and malice. And yet, this vile bit of human rubbish seemed to bear a sort of remote and ill-defined resemblance to me! “

Atlantic Monthly June (1876) 17 pages.

The Story of Crime

By Hargrave Lee Adam.

From the Cradle to the Grave. “Some years ago I set myself the task of studying crime and prison life in all its phases. Not merely to accept hearsay evidence, but to see and hear with my own eyes and ears all that was significant on the subject that I could. Therefore, whereever anything was to be learned concerning crime I there prosecuted and observed for my inquiries myself what transpired.”

London: T. Werner Laurie, 346p.

Crimes Against Criminals

By Robert J. Ingersoll.

In addition to these, nations have relied on confiscation and degradation, on maimings, whippings, brandings, and exposures to public ridicule and contempt. Connected with the court of justice was the chamber of torture. The ingenuity of man was exhausted in that would surely the construction the most reach of instruments sensitive nerve. All this was in the interest protection of virtue, and done of civilization — for the states. the well-being of how Curiously enough, the fact is that, no matter severe the punishments were, the crimes increased.

NY. Farrell (1892) 49 pages.

The Complete Celebrated Crimes

By Alexander Dumas.

“The Crimes were published in Paris, in 1839-40, in eight volumes, comprising eighteen titles…. The success of the original work was instantaneous. Dumas laughingly said that he thought he had exhausted the subject of famous crimes, until he became deluged with letters from every province in France, supplying him with material upon other deeds of violence! The subjects which he has chosen, however, are of both historic and dramatic importance.

Harrow and Heston Classic Reprint. (1910) 1,565 pages.

Cyber-OC – Scope and manifestations in selected EU member states

Edited by Gergana Bulanova-Hristova, Karsten Kasper, Geralda Odinot, Maite Verhoeven, Ronald Pool, Christianne de Poot, Yael Werner and Lars Korsell.

The threats arising from different types of cybercrime are real and constantly evolving, as the internet with its anonymity and borderless reach provides new opportunities for physical and virtual criminal activities. We can see complex cybercriminal networks connecting subgroups and also single individuals that are active on, through and against the internet. At the same time there are also ‘offline’ criminal organisations using the internet to facilitate their activities and to increase their profit. Even so-called ‘traditional’ organised crime groups are widening their criminal portfolios by committing cybercrime. By constantly evolving online opportunities, their acts of ‘traditional crimes’ become even more far-reaching and damaging, thus benefiting the criminal organisation. It is not only the involvement of organised crime in cybercrime that is dangerous, but also cybercrime committed in an organised manner. Cyber-OC represents the convergence of these two phenomena. Despite the huge threat arising from its cumulative character, Cyber-OC is frequently underestimated and differently defined even by law enforcement authorities.

Wiesbaden: Bundeskriminalamt Criminalistic Institute, 2016. 298p.

Outsourcing Cybercrime

By R. S. van Wegberg.

Many scientific studies and industry reports have observed the emergence of so-called cybercrime-as-a-service. The idea is that specialized suppliers in the underground economy cater to criminal entrepreneurs in need of certain capabilities – substituting specialized technical knowledge with “knowing what to buy”. The impact of this trend could be dramatic, as technical skill becomes an insignificant entry barrier for cybercrime. Forms of cybercrime motivated by financial gain, make use of a unique configuration of technical capabilities to be successful. Profit-driven cybercrimes, as they are called, range from carding to financial malware, and from extortion to cryptojacking. Given their reliance on technical capabilities, particularly these forms of cybercrime benefit from a changing crime paradigm: the commoditization of cybercrime. That is, standardized offerings of technical capabilities supplied through structured markets by specialized vendors that cybercriminals can contract to fulfill tools and techniques used in their business model. Commoditization enables outsourcing of components used in cybercrime - i.e., a botnet or cash-out solution. Thus lowering entry barriers for aspiring criminals, and potentially driving further growth in cybercrime. As many cybercriminal entrepreneurs lack the skills to provision certain parts of their business model, this incentivizes them to outsource these parts to specialized criminal vendors. With online anonymous markets - like Silk Road or AlphaBay - these entrepreneurs have found a new platform to contract vendors and acquire technical capabilities for a range of cybercriminal business models. A configuration of technical capabilities used in a business model reflects the value chain of resources. Here, not the criminal activities themselves, but the technical enablers for all these criminal activities are depicted. To create a comprehensive understanding of how businessmodels in profit-driven cybercrime are impacted by the commoditization of cybercrime, we investigate how outsourced components can fulfill technical capabilities needed in profit-driven cybercrime. This is where we use an economic lens to deliver an overview of criminal activities, resources and strategies in profit-driven cybercrime. In turn, knowing how outsourcing fulfils A study into the treatment of victims and its effects on their attitudes and behaviourparts of the value chain, can help law enforcement exploit ‘chokepoints’ – i.e., use the weakest link in the value chain where criminals appear to be vulnerable.

Delft University of Technology, 2020. 202p.