Open Access Publisher and Free Library
01-crime.jpg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Child Pornography: An Internet Crime

By Ethel Quayle

Child pornography, particularly that available via the Internet, has become a cause of huge social concern in recent years. This book examines the reality behind the often hysterical media coverage of the topic. Drawing on extensive new research findings, it examines how child pornography is used on the Internet and the social context in which such use occurs, and develops a model of offending behaviour to better help understand and deal with the processes of offending. Detailed case studies and offenders' own accounts are used to illustrate the processes involved in offending and treatment.The authors argue that we need to refine our ideas of offending, and that while severe deterrents need to be associated with possession of child pornography, a better understanding is needed of the links between possession and committing a contact offence. Only by improving our understanding of this complex and very controversial topic can we hope to deal effectively with offenders and with their child victims

Hove, East Sussex, UK: Brunner-Routledge, 2003. 248p.

Runaway Kids and Teenage Prostitution: America's Lost, Abandoned, and Sexually Exploited Children

By R. Barri Flowers

At the dawn of the twenty-first century, we are confronted with a number of serious social issues that have carried over from the past century. One of these relates to the growing phenomenon of runaway prostitution involved children and the implications. Each year in the United States, as many as 2 million children leave home for whereabouts unknown by the parents or caretakers. Tens of thousands of other children are pushed out of the house or abandoned by parents or guardians. These caretakers may be aware of where these youths are located, but do not want to find them and bring them back home. This only exacerbates the problem of homeless street kids who must not only search for survival but also search for love in all the wrong places. However, not all runaways leave home due to intolerable conditions or family dysfunction. Some find they prefer to be on their own for various reasons including independence, sex, problems at school, rebellion, drug addiction, and adventure. Rarely do they find a better life away from home. The correlation between running away from home and harsh street life such as exposure to prostitution, substance abuse, AIDS, sexually transmitted diseases, violence, criminality, and victimization has been well documented, as have findings that many children who run away from home were victims of child sexual abuse, neglect, family violence, broken homes, impoverishment, mental illness, and other familial and personal conflicts. Given the convergence of past, present, and future abuses and traumas the runaway is typically exposed to, it is obvious that most are caught up in a horrible cycle for which there seems no escape. Of course, there is a way out, but only if we as a society come to better understand how and why children leave home in the first place, and how their needs can most effectively be addressed and acted upon.

Westport, CT: Praeger, 2001. 232p.

Women Who Sexually Abuse Children

By Hannah Ford

Until recently, the topic of female sexual offenders remained under-researched, and many incorrect assumptions and beliefs still surround the subject. This book is organised in to five parts around eleven chapters. It provides a comprehensive overview of the latest research in this often overlooked area and discusses both adult female offenders and adolescents/younger children who commit sexual offences against children. After an in-depth evaluation of research literature, the author then considers a range of treatment approaches and directions for future research.

Chichester, UK: Wiley, 2004. 206p.

The Politics of Child Sexual Abuse: Emotion, Social Movements, and the State

By Nancy Whittier

The Politics of Child Sexual Abuse is the first study of activism against child sexual abuse, tracing its emergence in feminist anti-rape efforts, its development into mainstream self-help, and its entry into mass media and public policy. Nancy Whittier deftly charts the development of the movement's "therapeutic politics," demonstrating that activists viewed tactics for changing emotions and one's sense of self as necessary for widespread social change and combined them with efforts to change institutions and the state. Though activism originated with feminists, the movement grew and spread to include the goals of non-feminist survivors, opponents, therapists, law enforcement, and elected officials. In the process, the movement both succeeded beyond its wildest dreams and saw its agenda transformed in ways that were sometimes unrecognizable. A moving account, The Politics of Child Sexual Abuse draws powerful lessons about the transformative potential of therapeutic politics, their connection to institutions, and the processes of incomplete social change that characterize American politics today

Oxford, UK: Oxford University Press, 2009. 273p.

Child Pornography and Sexual Grooming: Legal and Societal Responses

By Suzanne Ost

Child pornography and sexual grooming provide case study exemplars of problems that society and law have sought to tackle to avoid both actual and potential harm to children. Yet despite the considerable legal, political and societal concern that these critical phenomena attract, they have not, thus far, been subjected to detailed socio-legal and theoretical scrutiny. How do society and law construct the harms of child pornography and grooming? What impact do constructions of the child have upon legal and societal responses to these phenomena? What has been the impetus behind the expanding criminalisation of behaviour in these areas? Suzanne Ost addresses these and other important questions, exploring the critical tensions within legal and social discourses which must be tackled to discourage moral panic reactions towards child pornography and grooming, and advocating a new, more rational approach towards combating these forms of exploitation.

New York: Cambridge University Press, 2009. 289p.

Child Exploitation in the Global South

Edited by Jérôme Ballet , Augendra Bhukuth

This edited volume examines child exploitation in the Global South. It introduces several case studies and interviews articulated around two features: exploitation within the family and exploitation in relation to social contexts. The research shows that both of the features are linked and, generally, they are not separate. It makes several important arguments which challenge the most common view on how children are perceived and exploited in Africa, Latin America, and the Middle East. Additionally, it explores the social representation of exploited children as well as their general well-being.

Cham, SWIT: Palgrave Macmillan, 2019. 221p.

Effects of Federal Legislation on the Commercial Sexual Exploitation of Children

By William Adams, Colleen Owens, and Kevonne Small

Each year, as many as 300,000 children become victims of commercial sexual exploitation in the United States. Such victimization can have devastating effects on a child’s physical and mental health and well-being. In an effort to stop the commercial sexual exploitation of children (CSEC), Congress enacted the Victims of Trafficking and Violence Prevention Act (TVPA) in 2000. As the seminal legislation in America’s efforts to end CSEC, the Act criminalizes human trafficking on a federal level. This bulletin describes the results of a study funded by OJJDP to examine TVPA’s impact on the prosecution of CSEC cases. The authors draw on CSEC cases processed in federal courts between 1998 and 2005 to take a look at how current laws addressing CSEC are enforced, indicate key features of successful CSEC prosecutions, and describe how legislation has affected sentences imposed on CSEC perpetrators, as well as legislation’s effects on the provision of services to victims. The bulletin concludes with a discussion of how the juvenile justice community and policymakers could improve the prosecution of CSEC crimes.

Washington, DC: Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, 2010. 12p.

Commercial Sexual Exploitation of Children

By Brandy Bang, Paige L. Baker, Alexis Carpinteri, and Vincent B. Van Hasselt

"Biological, psychological, and environmental risk factors leave children and adolescents vulnerable to corruption, coercion, and violence, as in cases of young people being trafficked and sexually exploited. While the public tends to associate such abuses with far-off locales, the numbers of American-born children targeted by sex traffickers, and of international youth brought to the U.S. by these exploiters, are growing and disturbing. Concise and well-detailed, Commercial Sexual Exploitation of Children examines the severity and complexity of this form of crime, and how it is being addressed through law enforcement and legal channels. The book examines variables that make children susceptible to exploitation, with a special focus on male victims. Mechanisms of the offenses are covered, as are the current state of federal laws and strengths and shortcomings of prosecution efforts. Real-life case examples from federal law enforcement describe major forms of exploitation and victim and offender characteristics, with clear focus on such areas as: Sex trafficking risk factors. Methods of victimization by child prostitution. Consumers, traders, and distributors of child pornography. Offender networks in child pornography. The preferential sex tourist. Enticement/grooming processes of the sex traveler. Commercial Sexual Exploitation of Children is a ready source of facts geared toward assisting professionals on the frontlines of intervention and prevention with this often-marginalized population, from health care and mental health providers and researchers to legislative bodies and law enforcement, as well as students interested in criminal justice, psychology, or law.

Cham: Springer, 2014. 62p.

Increasing the Efficacy of Investigations of Online Child Sexual Exploitation: Report to Congress

By Brian Neil Levine

Nothing in history has transformed the character and practice of child sexual exploitation more than the internet. Individuals who commit child sex crimes use internet services, social networks, and mobile apps to meet minors and each other in ways they cannot in person and to groom victims by normalizing abusive sexual acts. Many of those who commit child sex crimes deceive, coerce, and sexually extort child victims with threats that too often are realized. Individuals who commit child sex crimes use the internet to arrange in-person meetings for hands-on abuse, and they use it to remotely coerce young children to selfproduce sexual and sadistic acts. Whether the abuse is hands-on or remote, the images or videos in which an individual captures their rape of a child are referred to as child sexual abuse materials (CSAM). An ever-growing set of online services are misused daily for the upload and immediate distribution of CSAM, supporting worldwide sharing. The harms to victims of child sexual abuse and exploitation are lifelong.

Bribery and Corruption: Navigating the Global Risks

By Brian Loughman and Richard Sibery

As businesses continue to expand globally into new and emerging markets, bribery and corruption risks have increased exponentially. Bribery and Corruption offers a comprehensive look at this growing problem, and at the Foreign Corrupt Practices Act (FCPA) and other international anti-bribery and corruption conventions. Presenting hypothetical examples of situations companies will face, along with practical solutions, the book offers detailed global guidance on a region and country-specific basis.

The FCPA prohibits US companies and their subsidiaries from bribing foreign officials, either directly or indirectly through intermediaries, for the purpose of obtaining or retaining business. It also requires companies to keep accurate records of all business transactions and maintain an effective system of internal accounting controls. Internationally, the Organization of Economic Cooperation and Development's (OECD's) anti-bribery convention has been adopted by 38 countries and creates legally binding standards related to bribery of foreign public officials.

Hoboken, NJ: Wiley, 2012. 417p.

The OECD Convention on Bribery: A Commentary

By Mark Pieth , Lucinda A. Low and Peter J. Cullen

The OECD Convention is the first major international treaty specifically to address 'supply-side bribery' by sanctioning the briber. The OECD Convention establishes an international standard for compliance with anti-corruption rules by 36 countries, including the 30 OECD members and six non-member countries, with the leading OECD exporting countries receiving particular attention. This book is an article-by-article commentary which gives particular attention to the results of the OECD monitoring process as applied to state implementation. Companies in particular are at ever greater risk of legal and 'reputational' damage resulting from failure to comply with the anti-corruption standards set inter alia, by the OECD Convention. This book provides them with comprehensive guidance on the OECD standards. The commentary also constitutes a significant work of comparative criminal law. It is written and edited by persons who include experts involved in development of the Convention standards as well as academics and legal practitioners.

Cambridge, UK: Cambridge University Press, 2007. 654p.

Ransomware. Defending Against Digital Extortion

By Allan Liska and Timothy Gallo

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place"

Sebastopol, CA: O'Reilly Media, 2017. 174p.

The Language of Bribery Cases

By Roger W. Shuy

In The Language of Bribery Cases, Roger W. Shuy analyzes the role that language plays in bribery cases. He describes twelve court cases for which he served as an expert witness or consultant and explains the issues at stake in each of these cases, for both lawyers and linguists. The cases described include the bribery or alleged bribery of United States senators, congressmen, judges, businessmen, and brothel owners. Shuy describes the often-unused linguistic analytical tools that are available to both the prosecution and defense as they argue these cases. He illustrates how grammatical referencing, speech acts, discourse structure, framing, conveyed meaning, and intentionality can be useful, describing how these tools affected the outcomes of the particular cases discussed in this book. The cases, fascinating in their own right, offer valuable insights not only to linguists, but also to lawyers who argue bribery cases, many of whom may not be aware of the linguistic tools available to them.

Oxford, UK: Oxford University Press, 2013. 288p.

OECD Foreign Bribery Report : An Analysis of the Crime of Bribery of Foreign Public Officials

By OECD

Bribes are being paid across sectors to officials from countries at all stages of economic development. Corporate leadership is involved, or at least aware, of the practice of foreign bribery in most cases, rebutting perceptions of bribery as the act of rogue employees. Intermediaries, both agents and corporate vehicles, are used in most corrupt transactions while the majority of bribes are paid to obtain public procurement contracts. Corruption, and the perception of corruption, erodes trust in governments, businesses and markets. In the aftermath of the greatest financial crisis of our time, we need to rebuild that trust more than ever before. Corruption also undermines growth and development. On the one hand, businesses forego innovation and competitiveness for bribery. On the other hand, individuals within governments divert funds for their own personal use that should be used to promote the well-being of people. By ending impunity and holding corrupt people to account, we can begin to restore faith in institutions and industries. The OECD has an arsenal of legal instruments and recommendations for fighting corruption in its many forms, including through criminalising bribery in international business, promoting responsible business conduct, protecting whistleblowers and insisting on integrity and transparency in public procurement processes. This report endeavours to measure, and to describe, transnational corruption based on data from the 427 foreign bribery cases that have been concluded since the entry into force of the OECD Anti-Bribery Convention in 1999,

OECD, 2014. 51p.

Organized Crime, Violent Conflict and Fragile Situations Assessing Relationships through a Review of USAID Programs

By Phyllis Dininio

The USAID Bureau for Democracy, Conflict, and Humanitarian Assistance Office of Conflict Management and Mitigation (DCHA/CMM) commissioned Management Systems International (MSI) to conduct research on the relationship between organized crime, conflict and fragility. The year-long research project included a literature review and country case studies in Guatemala, Nigeria and the Democratic Republic of the Congo (DRC) that examine the interaction between organized criminality and USAID conflict and fragility programming in both causal directions—with regard to how criminality affects USAID implementation and results, and how assistance affects criminality. ..The report concludes with a set of key findings and recommendations. Organized crime is both facilitated by, and contributor to, state fragility.

Arlington, VA: Management Systems International, 2015. 61p.

Organized Crime, Conflict, and Fragility: A New Approach

By Rachel Locke

Transnational organized crime (TOC) is a global challenge posing serious threats to our collective peace and security. But in conflict-affected and fragile states the threats of transnational organized crime present particular and insidious challenges requiring new and innovative responses. Not only does TOC undermine the strength of the state, it further affects the critical and often contested relationship between the state and society. In fragile and conflict-affected states it is precisely the degraded nature of this relationship that often prevents progress toward greater peace and prosperity. While there is now an established correlation between conflict and state fragility, much less is understood about the relationship between transnational organized crime, conflict, and fragility. This report examines the dynamics between conflict, state fragility, and TOC, demonstrating how the three fit together in an uneasy triumvirate, and it presents ideas for a more effective response. Roughly half of all illicit transactions in the world are taking place in countries experiencing a range of weak enforcement mechanisms, low levels of economic well-being, insufficient government capacity, and significant societal divisions. In these contexts, transnational criminal networks further erode state legitimacy by incentivizing corruption, infiltrating state structures, and competing with the state in the provision of services. Yet the dominant approach to tackling organized crime, what I term a “law-and-order” approach, frequently fails to account for the complex dynamics associated with criminal networks in fragile and conflict-affected contexts. This approach, which is primarily focused on security, sanctions, and the rule of law, is rarely tailored to the needs of countries suffering from severe governance deficits or those with a history of conflict. On the contrary, it has the potential to reinforce historical enmities between the state and its citizens and notions of state power as coercive control rather than legitimate representation

New York: International Peace Institute, July 2012. 24p.

Organised Crime Index Africa 2019

By ENACT Africa

Lives are lost, forests and oceans are pillaged beyond the point of replenishment, animals are slaughtered, women, men, girls and boys are held in situations of violent abuse and exploitation. Customs officials receive bribes to turn their backs to a shipment of drugs. Police officers and soldiers sell their weapons on to street gangs. Politicians accept kickbacks, fix contracts and sell concessions to criminal groups and unethical corporations, so that they can profit from resources that were intended to improve the development opportunities of citizens. The harms caused by organised crime are widespread and profound. Yet because it is almost always obscured in the 'underworld', hidden in the shadows of remote borderlands, concealed in secrecy jurisdictions or felt most keenly by underserved communities, organised crime is a threat too easily overlooked. 'Organised crime' is not a term that has tended to be used in the African context. However, as the political economy of the continent is evolving and intertwining with other geopolitical and globalisation dynamics, the term is currently being applied to the continent with increasing frequency – and urgency. It describes everything from a range of illicit activities and actors, from human smuggling by militia groups along the North African coast, to the consorts and cronies aligned with heads of state.

ENACT Africa; 2019. 130p.

Bribery and Extortion: Undermining Business, Governments, and Security

By Alexandra Addison Wrage

Bribery plays a significant role in international criminal activity. Terrorists pay bribes. Money-launderers pay bribes. Those who traffic in people, narcotics, and illegal arms pay bribes. People pay immigration officers not to ask, customs officials not to inspect, and police officers not to investigate. Bribes follow patterns that are not at all mysterious to the officials, salesmen, and citizens who seek them and pay them. Using a series of international cases, Wrage examines bribery, peeling back the mystique and ambiguity and exposing the very simple transactions that lie beneath. She shows how these seemingly everyday transactions can affect security, democratization, and human aid. Examples from around the world help to illustrate the nature of the problem and efforts at combating it.Bribery plays a significant role in international criminal activity. Terrorists pay bribes. Money-launderers pay bribes. Those who traffic in people, narcotics, and illegal arms pay bribes. People pay immigration officers not to ask, customs officials not to inspect, and police officers not to investigate. At corporate headquarters in the United States, it can be easy to dismiss modest bribes in distant countries as an unfortunate cost of doing business. Bribes follow patterns that are not at all mysterious to the officials, salesmen, and citizens who seek them and pay them. Using a series of international cases, Wrage examines bribery, peeling back the mystique and ambiguity and exposing the very simple transactions that lie beneath. She shows how these seemingly everyday transactions can affect security, democratization, and human aid around the globe.Bribery and Extortion presents a clear picture of the world of bribery and the havoc it can wreak on whole populations. Wrage covers commercial bribery, administrative and service-based bribery, and extortion. She considers bribery and extortion at both high levels of government and lower levels on the street. Examples from around the world help to illustrate the nature of the problem and efforts at combating it. The book concludes with practical suggestions and an assessment of current efforts to stem the tide of bribery and restore transparency to everyday transactions in all realms.

Westport, CT: Praeger Security International, 2007. 177p.

Kidnap, Hijack and Extortion: The Response

By Richard Clutterbuck

Sources and Forms of Attack Kidnap and extortion in perspective - Types of abduction, extortion and intimidation - Criminal gangs - Politiecal terrorists - International exploitation and support Teehnological developments - The Growth of Kidnap and Extortion - Cost effeetiveness: high yield, low risk - Diplomatic kidnappings 1968--73 - Changing pattern of attaeks on diplomatie targets - Hijacking Kidnap and extortion in the business world

London; Palgrave Macmillan; New York: St. Martin's Press, 1987. 252p.

Social Dimension of Organised Crime: Modelling The Dynamics Of Extortion Rackets

Edited by Corinna Elsenbroich, David Anzola and Nigel Gilbert

This book presents a multi-disciplinary investigation into extortion rackets with a particular focus on the structures of criminal organisations and their collapse, societal processes in which extortion rackets strive and fail and the impacts of bottom-up and top-down ways of fighting extortion racketeering. Through integrating a range of disciplines and methods the book provides an extensive case study of empirically based computational social science. It is based on a wealth of qualitative data regarding multiple extortion rackets, such as the Sicilian Mafia, an international money laundering organisation and a predatory extortion case in Germany. Computational methods are used for data analysis, to help in operationalising data for use in agent-based models and to explore structures and dynamics of extortion racketeering through simulations. In addition to textual data sources, stakeholders and experts are extensively involved, providing narratives for analysis and qualitative validation of models. The book presents a systematic application of computational social science methods to the substantive area of extortion racketeering. The reader will gain a deep understanding of extortion rackets, in particular their entrenchment in society and processes supporting and undermining extortion rackets. Also covered are computational social science methods, in particular computationally assisted text analysis and agent-based modelling, and the integration of empirical, theoretical and computational social science.

Cham, SWIT: Springer, 2016. 250p.