Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Crime and Criminal Justice in Modern Germany

Edited by Richard F. Wetzell.

”There is a notable asymmetry between the early modern and modern German historiographies of crime and criminal justice. Whereas most early modern studies have focused on the criminals themselves, their socioeconomic situations, and the meanings of crime in a particular urban or rural milieu, late modern studies have tended to focus on penal institutions and the discourses of prison reformers, criminal law reformers, criminologists, and psychiatrists.”

Open Access Book (2018) 325p.

Rural Crime and Community Safety

By Vania Ceccato.

Rural Crime and Community Safety makes a significant contribution to crime science and integrates a range of theories to understand patterns of crime and perceived safety in rural contexts. Based on a wealth of original research, Ceccato combines spatial methods with qualitative analysis to examine, in detail, farm and wildlife crime, youth related crimes and gendered violence in rural settings.

NY. Routledge (2016) 425 pages.

Read-Me.Org
Lifting the Veil of Extortion in Cape Town

By Peter Gastrow

Extortion is not likely to be uppermost in the minds of those South Africans, or the tens of thousands of international tourists, businesspersons and migrants who regularly flock to Cape Town to enjoy the beauty and prospects that the city has to offer. In the past, public discussion about extortion in South Africa was limited and media coverage sporadic. Reports focused mainly on isolated instances of extortion in the entertainment and nightclub areas of central Cape Town. Extortion-linked murders of foreign nationals running shops also received only occasional coverage. But the silence around extortion changed significantly during 2020. From about August and September 2020, the media began to increasingly report on a significant expansion of extortion rackets in central Cape Town.

The phenomenon, reportedly, was no longer confined to the night-time entertainment industry but increasingly affected small day-time businesses, including restaurants and coffee bars. This is likely to have been linked to the effect of the COVID-19 lockdown restrictions, which affected the night-time entertainment industry. More alarmingly, reports appeared of a surge in extortion incidents in township areas on the periphery of the city. In places such as Khayelitsha, Gugulethu and Philippi, South African residents were being targeted by extortion gangs.

Geneva: Global Initiative Against Transnational Organized Crime, 2021. 63p.

Read-Me.Org
The Message is Murder: Substrates of Computational Capital

By Jonathan Beller

The Message is Murder analyses the violence bound up in the everyday functions of digital media. At its core is the concept of 'computational capital' - the idea that capitalism itself is a computer, turning qualities into quantities, and that the rise of digital culture and technologies under capitalism should be seen as an extension of capitalism's bloody logic. Engaging with Borges, Turing, Claude Shannon, Hitchcock and Marx, this book tracks computational capital to reveal the lineages of capitalised power as it has restructured representation, consciousness and survival in the twentieth and twenty-first centuries. Ultimately The Message is Murder makes the case for recognising media communications across all platforms - books, films, videos, photographs and even language itself - as technologies of political economy, entangled with the social contexts of a capitalism that is inherently racial, gendered and genocidal.

London: Pluto Press, 2018. 225p.

Read-Me.Org
Haiti Situation Report: Gang-related political violence and kidnappings, January 2022

By Insecurity Insight

• Gang-related violence has continued to increase due to the worsening security situation and the growing power of the gangs. • On New Year’s Day, Prime Minister Ariel Henry fled a mass he was attending to celebrate Haiti’s Independence Day before he could give his planned speech. • Gang leaders have continued to exert their power over the territories they control, defying the rule of law and committing more acts of violence and extortion. The leader of a gang operating in Gonaïves threatened to kill the judge in charge of an investigation case that involves several gang leaders. The gang leader warned in an audio message that he had killed the judge’s cousin and another man who were discovered to be informants for the police. • There have been numerous other kidnaps for ransom and killings, including the murder of two Haitian journalists who were shot and then burned alive just outside Port-au-Prince. These are VERY LIKELY to increase further in the coming months given the grim security situation and political power vacuum. • Six political blocs, as well as academics and Haitian NGOs, met at the Haiti Unity Summit in Baton Rouge, Louisiana from 13 – 19 January. • Haiti’s Senate sat for the first time in a year on 10 January. • Despite both the Summit and the Senate meeting, concern is building on the ability to develop governance structures.

Switzerland: Insecurity Insight, 2022. 11p.

Read-Me.Org
Belize City Community Gang Assessment

By Michelle Young

A new diagnosis of gang activity in Belize City, sponsored by the government of Belize and undertaken with the support of the Inter-American Development Bank, reveals issues of significant concern not only for Belize, but also for the Latin American and Caribbean region as a whole. Gang violence has dramatically increased with increased gang access to guns; the risk factors for gang involvement show broader and deeper risk exposure, expanding the pool of youth vulnerable to gang recruitment; and these developments have exposed the weaknesses of government responses to the gang problem, highlighting the need for a sustained and coordinated response across agencies. The assessment explores three years of violent crime incident reports; local demographic data; interviews with current and former gang members; interviews with key leaders and professionals who regularly interact with gang members; surveys of youth, community residents, and community leaders; surveys and focus groups with teachers, youth-serving professionals, and parents; and school performance data. It concludes with broad recommendations for future strategies and activities to reduce gang-related violence in Belize City.

Washington, DC: Inter-American Development Bank, 2019. 75p.

Read-Me.Org
Killing with Impunity: State-Sanctioned Massacres in Haiti

By The Harvard Law School International Human Rights Clinic

Over the course of President Jovenel Moïse’s presidency, Haitian civil society has raised alarm that armed gangs are carrying out heinous, state-sanctioned attacks against civilians in impoverished neighborhoods in Port-au-Prince. The scale, pattern, and context of the attacks indicate that they may amount to crimes against humanity. The attacks have taken place in the context of an escalating political crisis. President Moïse’s rule has become increasingly authoritarian and has turned to repression to quell dissent. Since 2018, massive public protests calling for government accountability and Moïse’s resignation have periodically shut down the country. The government has responded to the protests with aggressive measures, including criminalizing common non-violent protest tactics and increasing illegal surveillance of opponents. Targeted assassinations and threats against government critics have been carried out with impunity. During the four years of Moïse’s presidency, human rights observers have documented at least ten brutal attacks in impoverished parts of the capital where opposition against his administration runs strong. Three attacks—in La Saline, Bel-Air, and Cité Soleil—are particularly well-documented and severe. These three attacks offer insights into the means and methods used to carry out the assaults, and the ways in which state actors have supported the orchestration and execution of the attacks. When viewed together, they reveal a pattern of state-sanctioned violence, human rights abuses, and refusal to hold perpetrators accountable that likely amounts to crimes against humanity.

Cambridge, MA: Harvard Law School International Human Rights Clinic, 2021. 57p.

Read-Me.Org
Estimating Illicit Financial Flows: A Critical Guide to the Data, Methodologies, and Findings

By Alex Cobham and Petr Jansky

Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreement on how that target should be monitored—to say nothing of how it will be achieved. The term ‘illicit financial flows’ covers a range of corrupt practices, aimed at obtaining immunity or impunity from criminal law, from market regulation and from taxation. Illicit flows occur through many different channels, whether they involve laundering the proceeds of crime, for example, or shifting the profits of multinational companies. There are two consistent features. First, illicit flows are deliberately hidden. These cross-border movements of assets and income streams depend on a set of common tools including opaque company accounts, legal vehicles for anonymous ownership, and the secrecy jurisdictions that provide these services. Second, the overall effect of illicit flows is to reduce the revenue available to states, and to weaken the quality of governance—so there is less money to support human development, and it is less likely to be spent well. In this book, two of the economists most closely involved in the process to develop UN indicators of illicit financial flows offer a critical survey of the existing data and methodologies, identifying the most promising avenues for future improvement and setting out their own proposals.

Oxford, UK; New York: Oxford University Press, 2020. 224p.

Read-Me.Org
Russian Capitalism and Money-Laundering

By Dolgor Solongo

The period of transition from socialism to capitalism in the Russian Federation has appeared to present limitless opportunities for international money-laundering. This publication discusses this issue under such topics as: capital flight and money-laundering; dollarization of the Russian economy; privatization; shadow economy, tax evasion and lawlessness; financial liberalization and the banking system; crime and business; and countering money-laundering

United Nations Office on Drugs and Crime, 2001. 31p.

Read-Me.Org
Crime Is Not The Problem: Lethal Violence in America

By Franklin E. Zimring and Gordon Hawkins

In Crime is Not the Problem, Franklin Zimring and Gordon Hawkins revolutionize the way we think about crime and violence--by forcing us to distinguish between crime and violence. The authors reveal that compared to other industrialized nations, in most categories of nonviolent crime, American crime rates are comparable--even lower, in some cases. Only when it comes to lethal violence does the United States outpace other Western nations, with homicide rates many, many times greater. London and New York City have nearly the same number of robberies and burglaries each year, but robbers and burglars kill 54 victims in New York for every victim death in London.

Oxford, UK; New York: Oxford University Press, 1997. 286p.

Read-Me.Org
Examining the Structure, Organization, and Processes of the International Market for Stolen Data

By Thomas J. Holt and Olga Smirnova

As consumers and businesses have come to rely on computers and the Internet to buy and sell, manage finances, and retain customer information, opportunities for financial data theft and fraud have skyrocketed. Recent evidence suggests that cybercriminals often buy and sell stolen credit card, bank and online account data through online discussion forums.

A Michigan State University study examined how cybercriminals use international Web forums as advertising spaces for buying and trading stolen financial information, especially credit cards. Researchers analyzed almost 2,000 discussion threads from 13 easily accessible Web forums, 10 of which use Russian as their primary language and three of which use English. The study found that cybercriminals often group information from tens to hundreds of bank and credit card accounts into “dumps” that they then sell for an average of $100. Dumps were the most common product sold (44.7 percent), followed by CVV (card verification value code) data from credit cards (34.9 percent), and various forms of electronic data, such as eBay and PayPal account information (1.4 percent).

  • Most of the data came from continental European nations, but much also came from Canada, the United States and the United Kingdom. The more data available from a country, the lower the price. Bank account data from the European Union, for example, sold for about $4, whereas data from the U.S. sold for about $5.

    The forums are particularly collaborative and social in nature, unlike traditional crime networks, such as the Italian Mafia or Yakuza. Participation costs little, and cybercriminals of various skill levels can find the products and services they want through a range of sellers.

    The lack of hierarchy suggests that law enforcement attempts to target individuals would cause little disruption to the overall network. Instead, the study proposes that one of the most effective mechanisms to disrupt the sale of stolen data may be law enforcement investigation into the payment systems the criminals use, such as WebMoney and Liberty Reserve.Description text goes here

East Lansing, MI: Michigan State University, 2014. 156p.

Kingpin: How One Hacker Took Over the Billion-dollar Cybercrime Underground

By Kevin Poulsen

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime. The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots. The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses.

  • . Together with a smooth-talking con artist, he ran a massive real-world crime ring. And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police. Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead. Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today. Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.Description text goes here

New York: Crown Publishing, 211. 288p.

The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives

By Nir Kshetri

This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities, takes a close look at cybercrime business models, explains the global variation in the pattern of cybercrimes and seeks to understand threats and countermeasures taken by key actors in this industry. This book’s distinguishing features include the newness, importance, controversiality and complexity of the topic; cross-disciplinary focus, orientation and scope; theory-based but practical and accessible to the wider audience; and illustration of various qualitative and quantitative aspects of the global cybercrime industry.

Cham: Springer, 2010. 252p.

Cybercrime, Organized Crime, and Societal Responses: International Approaches

Edited by Emilio C. Viano

This timely book provides contributions on international, comparative crime phenomena: gangs, trafficking, fear of crime, and crime prevention. It highlights contributions originally prepared for the XVII World Congress of Criminology and for the 2015 Cybercrime Conference in Oñati, Spain which have been selected, reviewed, and adapted for inclusion in this volume.

The work features international contributors sharing the latest research and approaches from a variety of global regions. The first part examines the impact of gangs on criminal activities and violence. The second part explores illegal trafficking of people, drugs, and other illicit goods as a global phenomenon, aided by the ease of international travel, funds transfer, and communication. Finally, international approaches to crime detection prevention are presented. The work provides case studies and fieldwork that will be relevant across a variety of disciplines and a rich resource for future research.

This work is relevant for researchers in criminology and criminal justice, as well as related fields such as international and comparative law, public policy, and public health.

Cham: Springer, 2017. 378p.

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities

Edited by Babak Akhgar and Ben Brewster

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues.

Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT.

  • This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.Description text goes here

Cham: Springer, 2016. 323p.

The Palgrave Handbook of International Cybercrime and Cyberdeviance

Edited by Thomas J. Holt and Adam M. Bossler

This Major Reference Work synthesizes the global knowledge on cybercrime from the leading international criminologists and scholars across the social sciences. The constant evolution of technology and our relationship to devices and their misuse creates a complex challenge requiring interdisciplinary knowledge and exploration. This work addresses this need by bringing disparate areas of social science research on cybercrime together. It covers the foundations, history and theoretical aspects of cybercrime, followed by four key sections on the main types of cybercrime: cyber-trespass, cyber-deception/theft, cyber-porn and obscenity, and cyber-violence, including policy responses to cybercrime. This work will not only demonstrate the current knowledge of cybercrime but also its limitations and directions for future study.

Cham: Palgrave Macmillan, 2010. 1467p.

Cyberdanger: Understanding and Guarding Against Cybercrime

By Eddy Willems

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.

Cham: Springer Nature, 2019. 231p.

Principles of Cybercrime

By Jonathan Clough

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes.

Cambridge, UK; New York: Cambridge University Press, 2010. 505p.

Cybercrime and Society

By Majid Yar

Cybercrime and Society provides a clear, systematic, and critical introduction to current debates about cybercrime. It locates the phenomenon in the wider contexts of social, political, cultural, and economic change. It is the first book to draw upon perspectives spanning criminology, sociology, law, politics, and cultural studies to examine the whole range of cybercrime issues.

Thousand Oaks, CA; London: SAGE, 2006. 200p.

Action Plan to Address Illicit Financing Risks of Digital Assets

By United States. Department of the Treasury

From the Introduction: "This action plan responds to Section 7(c) of Executive Order (E.O.) 14067, 'Ensuring Responsible Development of Digital Assets,' which calls for the development of a coordinated interagency action plan for mitigating the digital-asset-related illicit finance and national security risks as identified in the U.S. government's National Strategy for Combating Terrorist and Other Illicit Financing (Illicit Financing Strategy). [...] E.O. 14067 recognizes that digital assets may pose significant illicit financing risks and commits the U.S. government to mitigating these and any other national security risks. This action plan identifies priority and supporting actions to support this commitment in line with the priorities and supporting actions identified in the Illicit Financing Strategy specific to uncovering and mitigating the misuse of digital assets by illicit actors. These priority actions include monitoring risks, working with international partners to improve cooperation on and implementation of international AML/CFT [anti-money-laundering/countering-the-financing-of-terrorism] standards, strengthening our regulations and operational frameworks, and improving private sector compliance and information sharing, among others. The action plan begins with an overview of the illicit financing risks and U.S. government efforts to mitigate these risks before laying out these priority actions."

United States. Department of the Treasury. 2022-09-16. 20p.