Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Synthetic cannabinoid availability on darknet drug markets—changes during 2016–2017

By Andrew Scourfield, Catherine Flick, Jack Ross, David M. Wood, Natalie Thurtle, Darryl Stellmach & Paul I. Dargan

Changes in legislation have affected supply routes of new psychoactive substances such as synthetic cannabinoids with evidence of supply over the darknet. We identified darknet drug markets using an index database and Tor Browser to access markets. We identified SC in product listings using a custom-programmed script. We collected data at bimonthly intervals (August 2016–April 2017). Eleven darknet markets listed SC for sale, the largest number from China, UK, US, Netherlands, and Germany. Formulations available were high purity powder/crystal, smoking preparations and vape preparations. The top five listed compounds from China across the time points were FUB-AMB, ABD-FUBINACA, 5F-NPB-22, MAB-CHMINACA, and NM-2201. 5F-CUMYL4CN-PINACA was unavailable at early time points but emerged during the study. Cost of high purity formulations from China ranged from 1.3 to 3.1 Euro per gram for quantities 1000 g. Europe and North America accounted for 99% smoking preparations predominantly in small packages (<50 g). SC are widely available on the darknet with availability changing over time. High purity formulations are predominantly available from China in quantities up to kilograms with price per gram reducing with increased quantity. Small packages of ready-made smoking mixtures are available from Europe and North America.

Toxicology Communications, 3:1, 7-15, DOI: 10.1080/24734306.2018.1563739 To link to this article: https://doi.org/10.10 , 2019.

The potential for using web surveys to investigate drug sales through cryptomarkets on the darknet

By Alexandra Karden; Julian Strizek

Over the last decade, drug sales through cryptomarkets located on the so-called darknet have received increasing attention. This paper considers how web surveys might be used to provide insights concerning those people who purchase drugs on cryptomarkets. First, it analyses data from the European Web Survey on Drugs (EWSD), with a view to identifying differences between respondents who buy drugs on cryptomarkets and those who acquire drugs from other sources. The study shows that people using cryptomarkets as a usual source of supply were a small group of users in most participating countries, but that proportions differ significantly, and that buyers were more likely to be male and consume more substances on average. Second, the sampling of web survey respondents on the darknet is discussed based on a sampling strategy tested in Austria, highlighting the challenges and opportunities involved in undertaking survey recruitment on the darknet. The paper highlights the importance of building trust, establishing credibility and guaranteeing anonymity, since awareness of privacy issues is seemingly higher among darknet users than surface web users. By doing so, the authors show how people who buy drugs on cryptomarkets might be reached to improve their representation in future web surveys for drug data collection.

Lisbon: European Monitoring Centre for Drugs and Drug Addiction. 2022. 9p.

Balancing Privacy and Free Speech: Unwanted Attention in the Age of Social Media

By Mark Tunick

In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society’s interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a ‘right to be forgotten’, Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.

Abington, Oxon, UK; New York: Routledge, 2015. 229p.

Online Fraud: What does the public think?

By Amber Evans, Strategy & Insight Manager | Fernanda Reynoso-Serna, Analyst | Freya Smith, Analyst | Dr Ellie Brown, Head of Strategy | Sophie Davis

Most people are more worried about being affected by online fraud than other crimes, such as knife crime, burglary and sexual offences, according to a new large-scale survey – which also highlights the emotional impact of being an online fraud victim. The research, funded by the Dawes Trust, was based on a nationally representative sample of over 3,313 adults across England and Wales as part of a survey conducted by data organisation WALR. The vast majority of those polled, 92%, said online fraud was a very big or quite big problem in the UK. When asked what crimes they were most worried about being affected by, 55% said online fraud, 44% burglary and 47% knife crime. The poll also found that younger people (aged 18-34) were most likely to be affected by online fraud, with 32% reporting having been a victim in the last twelve months compared to 16% of over-35s. However, half of those questioned believed the elderly were most at risk. Of those who had been victims of online fraud: 20% said their physical health had suffered, 32% reported a psychological impact, 42% were affected financially, 47% experienced an emotional impact, including feeling embarrassed, angry or ashamed. 23% of all victims said they had experienced anxiety, 12% experienced disturbed sleep and 11% experienced depression as a result of the online fraud. The survey also shows that just over half of victims reported the fraud to either the police or Action Fraud. Victims were more likely to contact their bank (41%) than to go to the police (32%) or Action Fraud (28%), the UK’s national fraud reporting centre.

London: Crest Advisory, 2023. 32p.

Reconceptualising organised (cyber)crime: The case of ransomware

By Chad Whelan, David Bright, and James Martin

The concept of organised cybercrime has been the subject of much debate over the last decade. Many researchers who have applied scholarly definitions of organised crime to cyber-criminal groups have concluded that such groups are not “organised criminal groups” and do not engage in “organised crime”. This paper adopts a different perspective to argue that certain cyber-criminal groups involved in ransomware can and should be considered organised crime if a more contemporary and flexible framework for conceptualising organised crime is adopted. We make this argument using three primary domains of organised crime first described by von Lampe: criminal activities, offender social structures, and extra-legal governance. We narrow in on the concepts of violence and extra-legal governance in particular as they have been interpreted to hold significant differences for criminal groups operating in physical and digital domains. The paper argues that it is time to move on from criminological debates regarding whether organised cybercrime can exist to focus on the many rich questions that researchers can take from organised crime scholarship and apply to cyber-criminal groups. We put forward a reconceptualisation of organised cybercrime towards this end.

Journal of Criminology, 0(0). https://doi.org/10.1177/26338076231199793, Preprint 2023.

The Gozi group: A criminal firm in cyberspace?

By Jonathan Lusthaus, Jaap van Oss, and Philipp Amann

The relative glut of data on cybercriminal forums has led to a growing understanding of the functioning of these virtual marketplaces. But with a focus on illicit online trading, less attention has been paid to the structures of groups that carry out cybercrimes in an operational sense. In economic parlance, some such groups may be known as ‘firms’. This concept has been a significant part of the literature on more traditional forms of organised crime, but is not widely discussed in the cybercrime discourse. The focus of this article is, by way of a case study of the Gozi malware group, to explore the applicability of the concept of firms to the novel environment of cybercrime.

European Journal of Criminology, 20(5), 1701-1718. https://doi.org/10.1177/14773708221077615

Shoplifting in mobile checkout settings: cybercrime in retail stores

By John Aloysius, Ankur Arora, Viswanath Venkatesh

Purpose: Retailers are implementing technology-enabled mobile checkout processes in their stores to improve service quality, decrease labor costs and gain operational efficiency. These new checkout processes have increased customer convenience primarily by providing them autonomy in sales transactions in that store employee interventions play a reduced role. However, this autonomy has the unintended consequence of altering the checks and balances inherent in a traditional employee-assisted checkout process. Retailers, already grappling with shoplifting, with an estimated annual cost of billions of dollars, fear that the problem may be exacerbated by mobile checkout and concomitant customer autonomy. The purpose of this paper is to understand the effect of mobile checkout processes in retail stores on cybercrime in the form of shoplifting enabled by a technology transformed the retail environment. Design/methodology/approach The authors conducted an online survey of a US sample recruited from a crowdsourced platform. The authors test a research model that aims to understand the factors that influence the intention to shoplift in three different mobile checkout settings − namely, smartphone checkout settings, store-provided mobile device checkout settings, and employee-assisted mobile checkout settings − and compare it with a traditional fixed location checkout setting. Findings: The authors found that, in a smartphone checkout setting, intention to shoplift was driven by experiential beliefs and peer influence, and experiential beliefs and peer influence had a stronger effect for prospective shoplifters when compared to experienced shoplifters; in a store-provided mobile devices checkout setting, experiential beliefs had a negative effect on shoplifters’ intention to shoplift and the effect was weaker for prospective shoplifters when compared to experienced shoplifters. The results also indicated that in an employee-assisted mobile checkout setting, intention to shoplift was driven by experiential beliefs and peer influence, and experiential beliefs had a stronger effect for prospective shoplifters when compared to experienced shoplifters. Originality/value: This study is the among the first, if not first, to examine shoplifters’ intention to shoplift in mobile checkout settings. We provide insights into how those who may not have considered shoplifting in less favorable criminogenic settings may change their behavior due to the autonomy provided by mobile checkout settings and also provide an understanding of the shoplifting intention for both prospective and experienced shoplifters in different mobile checkout settings.

Information Technology and People, April 2019, 32(5):1234-1261

The Port-Crime Interface: A Report on Organised Crime and Corruption in Seaports

By  Anna Sergi

This project involved qualitative primary research into criminality within seaports, by observing how ports, as microcosmic realities run through formal and informal relationships and have specific security vulnerabilities, which facilitate different types of illegal or deviant behaviours. Research has been carried out in two European ports (Liverpool and Genoa) and three non-European ones (Montreal, New York and Melbourne), which are either targets of, or transit zones for, criminal activities and criminal networks.  The main aim of this comparative research project was to improve policy understanding of how the complex relationships within ports act as conduits or facilitators in how criminal networks operate in the territory of and around the ports. With specific attention to the changing geopolitical conditions surrounding the port of Liverpool within the Brexit scenario, the study has looked at what could be learned in the British experience from international ones both in terms of security and in terms of transnational risk assessments. 

London: University of Essex, 2020.    230p.

Economic Crime and Illicit Finance in Russia’s Occupation Regime in Ukraine

By David Lewis

Despite Ukraine's ongoing counter-offensive, in September 2023 Russia still controlled around 17% of Ukrainian territory, an area roughly the size of Denmark. Russia's occupation of these Ukrainian territories relied primarily on repression and violence, but economic levers also played an important role in consolidating Russian rule. This paper details Russia's illicit economic activity in the occupied territories and calls for more international attention to this aspect of Russia's invasion. Since Russia occupied large parts of south-eastern Ukraine in March 2022, it has worked rapidly to incorporate these regions into Russia's economic and financial system. Key elements in this 'economic occupation' include: • The seizure of many Ukrainian businesses and assets. The occupation authorities 'nationalised' many companies and re-registered them as Russian businesses with new management. • The imposition of the Russian currency, financial and tax system, and the forced closure of Ukrainian banks. • The forcible takeover of farms or pressure on farmers to cooperate with the occupation authorities. Russian officials oversaw the illegal export of Ukrainian grain from the occupied territories. • The reconstruction of cities such as Mariupol, the city destroyed by Russian forces in spring 2022, in a multi-billion-dollar government programme that is profiting well-connected Russian companies. These acts were all illegal under Ukrainian law and some may constitute potential war crimes under international law. There should be more attention paid to these economic crimes internationally – with clear warnings for Russian business about the consequences under international law of seizing Ukrainian businesses and assets. Although international sanctions have targeted many officials in the Russian occupation structures, the approach should be more coordinated and systematic to raise the costs of Russian occupation. More international attention now would also assist in eventual reintegration and reconstruction of these regions. For example, a database of business seizures and economic crimes in the occupied territories would help to resolve legal issues and ensure business restitution in the aftermath of the war, while also serving as a potential basis for sanctions and eventual prosecutions. The economic aspects of occupation also raise complex questions of transitional justice for those who lived under Russian occupation. Ukrainian society is discussing how to define and respond to acts of collaboration in the occupied territories. International experience could help to inform legal and political solutions that meet the needs of justice but also seek to unite post-war Ukrainian society  

SOC ACE Research Paper No 20. 

Birmingham, UK: University of Birmingham , 2023. 43p.

Supply Chain Risks of Illicit Trade in Counterfeit Pharmaceuticals

By Jay P. Kennedy

 Nearly every type of product that has ever been produced has been counterfeited. While the most counterfeited goods tend to be footwear, luxury items, watches, and jewelry, in recent years there has been a dramatic increase in the prevalence of pharmaceutical counterfeits. The World Health Organization (WHO) defines counterfeit medicines as “medicines that are mislabeled deliberately and fraudulently”, yet counterfeit medicines are generally discussed alongside other forms of harmful medical products such as adulterated, expired, substandard, stolen, and falsified medicines. Each of these products moves through a mix of illegitimate and legitimate intermediaries and distribution channels before making their way into healthcare systems and ultimately to patients. Counterfeit pharmaceuticals harm patients, the healthcare system, legitimate companies, and society. While their presence within the legitimate supply chain is increasing, the threats posed by these illicit goods can be countered through focused action and collaboration amongst industry, healthcare, and law enforcement. This paper discusses three primary risks to consumers and the healthcare infrastructure of Texas: (1) the infiltration of counterfeit drugs into the legitimate supply chain; (2) the direct threat posed by counterfeit pharmaceuticals; and (3) the risks posed by counterfeit drugs to national security and the legitimate supply chain. The paper concludes with a discussion of policy and anti-counterfeiting strategy recommendations aimed at addressing each of the identified risks and protecting Texans, Americans, and the healthcare supply chain.   

Huntsville, TX: Institute for Homeland Security, Sam Houston State University, 2023. 18p.

PreventionGuest User
Online Fraud Schemes: A Web of Deceit

By Europol

Europol's spotlight report on online fraud highlights that online fraud schemes represent a major crime threat in the EU and beyond as online fraudsters generate multiple billions in illicit profits every year to the detriment of individuals, companies and public institutions.
Fraud schemes are perpetrated with the intention of defrauding victims of their assets using false and deceitful pretexts, or with the use of cyberattack techniques. This results in the voluntary or involuntary transfer of personal or business information, money or goods to criminals.

From ATM attacks and account takeovers to skimming and shimming, the wide availability of crime-as-a-service has made this criminal activity more accessible. Criminals show great versatility and adaptability in adjusting their modi operandi and modelling their narratives around socio-economic trends as well as current crises, taking advantage of emergency situations to create charity scams.

This report is an accompanying module to Europol’s IOCTA, which aims at providing and understanding of modern cybercrime to equip law enforcement with the knowledge to tackle it and keep people safe. It delves into the complexities of online fraud schemes and sheds light on how different schemes overlap and victimise targets multiple times.

Key findings:

Relay attacks targeting payment card chips (shimming) are increasingly detected.

Charity scams leveraging emergency situations have increased. This was visible during the COVID-19 pandemic, the Russian invasion of Ukraine and the earthquake in Türkiye and Syria.

Logical attacks on ATMs still occur in the EU, with criminal networks testing ways to exploit new vulnerabilities at the ATMs they target.

Fraudsters display sophisticated modi operandi, which are usually a combination of different types of fraud. Victims of fraud are often re-victimised within the same criminal scheme.

Social engineering techniques that fraudsters use have been growing in complexity. Criminals adapt their techniques according to the profile of the victim and the typology of fraud.

Spotlight Series Report.

The Hague: EUROPOL, 2023. 20p.

Social SciencesGuest User
Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts

By Jack Whittaker and Mark Button

Advance fee and non-delivery frauds have become very common with the growing preference for online shopping and the new opportunities this brings for online offenders. This article uses unique access to a volunteer group’s database focused on preventing pet scams to explore this type of crime. Distances, among other factors, make the purchase of pets online common in countries such as the USA, Australia and South Africa. This modality of purchase has been exploited by organized criminals largely based in Cameroon to conduct advance fee and non-delivery frauds. The article uses data from the volunteer group Petscams.com to provide unique insights on the techniques of the offenders with particular reference to the strategies used to maximize victimization by using real accounts of victims of such frauds. It also briefly notes how the COVID-19 crisis has been used to adapt this type of scam. The article’s discussion identifies the need for a more nuanced assessment into the role of victim-oriented voluntary organizations.

Australian & New Zealand Journal of Criminology 2020, Vol. 53(4) 497–514

Fraud and its relationship to pandemics and economic crises: From Spanish flu to COVID-19

By Michael Levi and Russell G Smith

This report seeks to draw out the common characteristics of frauds associated with pandemics, and to identify any risks unique to pandemics and financial crises, beginning with the Spanish flu pandemic of 1918, as the closest to COVID-19 in the modern era. It summarises the general influence of the internet or remote intrusions on contemporary frauds and allied corporate/ organised crimes against individuals, businesses and government, using plausibly reliable data from Australia and the United Kingdom as indicative of more general trends. The report identifies some novel crime types and methodologies arising during the COVID-19 pandemic of 2020 that were not seen in previous pandemics. These changes may result from public health measures taken in response to COVID-19, the current state of technologies and the activities of law enforcement and regulatory guardians. The report notes that many frauds occur whatever the state of the economy, but that some specific frauds occur during pandemics, especially online fraud. Similarly, some previously occurring frauds are revealed by economic crises, while frauds arising from and causing insolvencies are stimulated by economic crises. The report concludes with a discussion of the policy implications for prevention, resilience and for private and public policing and criminal justice in Australia. It stresses the need for plans for future pandemics and economic crises to include provisions for better early monitoring and control of fraud and procurement corruption. Research Report no. 19.

Canberra: Australian Institute of Criminology, 2021. 74p.

Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits

By Marianne Junger*, Victoria Wang, Marleen Schlömer

This study analyses 300 cases of fraudulent activities against Dutch businesses, 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice. We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort and output financial benefit. Results indicate that whilst all CEO-frauds are conducted online, most of the fraudulent contracts and ghost invoices are undertaken via offline means. Both Routine Activity Theory and Rational Choice Model are evidenced-fraudsters clearly take the business size and seasonality into account, and the input criminal effort and output criminal benefit are positively correlated. Having vigilant employees is evidenced as the most effective way of fraud prevention, both online and offline.

Crime Science 9(1): 1–15. 2020.

Online fraud victimization in Australia: Risks and protective factors.

By: Catherine Emami, Russell G Smith and Penny Jorna

Online fraud includes dating or romance scams, deceptive sales of products and services, dishonest investment schemes, lottery or inheritance scams, working from home scams or lottery fraud involving false prize draws or sweepstakes. These frauds are costly not only in their financial impact on business and government, but also because of the detrimental impact they have on victims. To gain a better understanding of online consumer fraud, the Australian Institute of Criminology worked with the Australian Competition and Consumer Commission to compare a matched sample of victims and non-victims. This study aimed to identify and quantify the factors that make some individuals more vulnerable to consumer fraud than others. It was found that greater familiarity with online activities resulted in a reduced likelihood of victimization and that victims were more likely to have used money wire transfers and electronic funds transfers to send money in response to scam invitations than other forms of payment. These findings support the development of targeted awareness-raising campaigns focusing on the online behaviour most likely to lead to fraud victimization. It offers policymakers and consumer affairs organisations opportunities to better target fraud prevention and education initiatives.

Research Report no. 16. Canberra: Australian Institute of Criminology, 2019. 98p.

Examining emerging fraud facilitated by the internet through crime scripts

By Benoit Leclerc and Elena Morgenthaler

The rise of the internet or, more specifically, of services offered and conducted online has led to a dramatic rise in frauds and scams. This study is a systematic review of the literature on the use of crime script analysis in the field of fraud facilitated by the internet to identify stages of the crime commission process across different forms of fraud and examine ways to disrupt those crimes. The scripts for different forms of fraud shared three common elements: communicating with the victim, recruiting enablers, and using money mules. These common elements suggest possible prevention measures. Future applications of crime scripts in the field of fraud and financial crime more broadly are discussed.

Trends & issues in crime and criminal justice no. 680.

Canberra: Australian Institute of Criminology. 2023. 28p.

Laundering Love: A Multi-Case Analysis of the Evolution of Romance Scam Victims into Co-Offending Money Mules

By: Christopher k. Huhn

From the thesis: "This thesis addresses the problems of rapidly rising cyber-enabled fraud and concomitant money laundering by focusing on romance scam victims who evolve into willing partners in money laundering schemes, known as 'witting money mules.' This thesis explores how and why individuals become money mules after victimization in online romance scams. The thesis employs a grounded theory approach and investigates data from over 134,000 historical text messages between three offenders and 22 victims, as well as three participant interviews with romance scam victims. The data resulted in a grounded theory that a romantically lonely victim who persistently engages online with an offender that strategically repeats scheme-relevant premises in the guise of a romantic partner can result in the victim acceding to the offender's exploitative requests and the eventual decision to co-offend. This theory also explains how a person can simultaneously be a victim and offender and why they would intentionally choose to help the romance scammer launder money. The literature and data similarly support a suggested definition for 'grooming' in the context of romance scams. As a whole, this thesis provides insight into romance scams and money mules as a strategic pivot point that, if disrupted, can simultaneously impact a criminal organization's ability to profit from romance scams and launder the proceeds of cyber-enabled fraud."

Monterey, CA: Naval Postgraduate School (U.S.). Center for Homeland Defense and Security, 2023. 182p.

Financial Crime Scripting: an Analytical Method to Generate, Organise and Systematise Knowledge on the Financial Aspects of Profit-Driven Crime

By Thom Snaphaan and Teun van Ruitenburg

This article presents a further development of the existing crime scripting framework to enhance insight in the financial aspects of profit-driven crime: financial crime scripting. By drawing on the foundations of crime script analysis, financial crime scripting allows to generate, organize and systematize knowledge about the financial aspects of the crime commission processes of a variety of crime types, and accounts for linking the dots with financial crimes, such as bribery, bankruptcy fraud and money laundering. Viewing these financial crimes as supporting or succeeding offences in light of profit-driven crimes, and at the same time providing guidance to analyze these offences as profit-driven crimes in itself, opens the door for detailed analyses without losing sight of the bigger picture, i.e., the interconnectedness with other crimes. This analytical method helps crime researchers to take into account the financial aspects of crime-commission processes in crime script analyses and could help law enforcement agencies and other crime prevention partners to go beyond a proceeds-of-crime approach and put a follow-the-money approach in practice. Financial crime scripting takes full account of the financial aspects of profit-driven crime and puts relevant concepts in broader perspective, enhancing understanding with conceptual clarity. In addition to outlining the framework, the relevance for policy and practice is unraveled and avenues for future research are discussed.)

European Journal on Criminal Policy and Research, 2024.

Video Games, Crime and Next-Gen Deviance: Reorienting the Debate

Edited by Adam Lynes, Craig Kelly, and Kevin Hoffin

In recent decades the video games industry has grown astronomically, quickly becoming a substantial part of our everyday lives. Alongside the rise of this technology, the media, academia and, in some cases, governments, have drawn correlations between video games and serious instances of violence, focusing most notably on mass shootings. This narrow debate has distracted from our understanding of many of the harms which video games can, in some cases, cause, perpetuate or hide. Drawing upon the emerging deviant leisure perspective, this book seeks to re-orientate the debate on video games and their associated potential harms. Through the examination of culturally embedded harms such as gambling, sexual violence and addiction, together with the rise in swatting and other activities, the authors explore the notion that video games are inexplicably intertwined with aspects of deviancy.

Bingley, UK: Emerald Publishing, 2020. 208p.