27.03.2019 Views

Organized Crime In The New Millennium

Organized Crime In The New Millennium

Organized Crime In The New Millennium

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>The</strong> e-Advocate<br />

Monthly<br />

…a Compendium of Works on:<br />

<strong>Organized</strong> <strong>Crime</strong><br />

<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

Exodus 20<br />

Proverbs 28:5 | 1 Samuel 8:3 | 2 Samuel 11:2-17<br />

Matthew 2:16 | Mark 14:55-56 | Acts 6:13; 25:7<br />

“Helping <strong>In</strong>dividuals, Organizations & Communities<br />

Achieve <strong>The</strong>ir Full Potential”<br />

Special Edition| ALG – May 2022


Page 2 of 372


Walk by Faith; Serve with Abandon<br />

Expect to Win!<br />

Page 3 of 372


Page 4 of 372


<strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />

Helping <strong>In</strong>dividuals, Organizations & Communities<br />

Achieve <strong>The</strong>ir Full Potential<br />

Since its founding in 2003, <strong>The</strong> Advocacy Foundation has become recognized as an effective<br />

provider of support to those who receive our services, having real impact within the communities<br />

we serve. We are currently engaged in community and faith-based collaborative initiatives,<br />

having the overall objective of eradicating all forms of youth violence and correcting injustices<br />

everywhere. <strong>In</strong> carrying-out these initiatives, we have adopted the evidence-based strategic<br />

framework developed and implemented by the Office of Juvenile Justice & Delinquency<br />

Prevention (OJJDP).<br />

<strong>The</strong> stated objectives are:<br />

1. Community Mobilization;<br />

2. Social <strong>In</strong>tervention;<br />

3. Provision of Opportunities;<br />

4. Organizational Change and Development;<br />

5. Suppression [of illegal activities].<br />

Moreover, it is our most fundamental belief that in order to be effective, prevention and<br />

intervention strategies must be Community Specific, Culturally Relevant, Evidence-Based, and<br />

Collaborative. <strong>The</strong> Violence Prevention and <strong>In</strong>tervention programming we employ in<br />

implementing this community-enhancing framework include the programs further described<br />

throughout our publications, programs and special projects both domestically and<br />

internationally.<br />

www.<strong>The</strong>Advocacy.Foundation<br />

ISBN: ......... ../2017<br />

......... Printed in the USA<br />

Advocacy Foundation Publishers<br />

Philadelphia, PA<br />

(878) 222-0450 | Voice | Data | SMS<br />

Page 5 of 372


Page 6 of 372


Dedication<br />

______<br />

Every publication in our many series’ is dedicated to everyone, absolutely everyone, who by<br />

virtue of their calling and by Divine inspiration, direction and guidance, is on the battlefield dayafter-day<br />

striving to follow God’s will and purpose for their lives. And this is with particular affinity<br />

for those Spiritual warriors who are being transformed into excellence through daily academic,<br />

professional, familial, and other challenges.<br />

We pray that you will bear in mind:<br />

Matthew 19:26 (NLT)<br />

Jesus looked at them intently and said, “Humanly speaking, it is impossible.<br />

But with God everything is possible.” (Emphasis added)<br />

To all of us who daily look past our circumstances, and naysayers, to what the Lord says we will<br />

accomplish:<br />

Blessings!!<br />

- <strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />

Page 7 of 372


Page 8 of 372


<strong>The</strong> Transformative Justice Project<br />

Eradicating Juvenile Delinquency Requires a Multi-Disciplinary Approach<br />

<strong>The</strong> Juvenile Justice system is incredibly<br />

overloaded, and Solutions-Based programs are<br />

woefully underfunded. Our precious children,<br />

therefore, particularly young people of color, often<br />

get the “swift” version of justice whenever they<br />

come into contact with the law.<br />

Decisions to build prison facilities are often based<br />

on elementary school test results, and our country<br />

incarcerates more of its young than any other<br />

nation on earth. So we at <strong>The</strong> Foundation labor to<br />

pull our young people out of the “school to prison”<br />

pipeline, and we then coordinate the efforts of the<br />

legal, psychological, governmental and educational<br />

professionals needed to bring an end to<br />

delinquency.<br />

We also educate families, police, local businesses,<br />

elected officials, clergy, schools and other<br />

stakeholders about transforming whole communities, and we labor to change their<br />

thinking about the causes of delinquency with the goal of helping them embrace the<br />

idea of restoration for the young people in our care who demonstrate repentance for<br />

their mistakes.<br />

<strong>The</strong> way we accomplish all this is a follows:<br />

1. We vigorously advocate for charges reductions, wherever possible, in the<br />

adjudicatory (court) process, with the ultimate goal of expungement or pardon, in<br />

order to maximize the chances for our clients to graduate high school and<br />

progress into college, military service or the workforce without the stigma of a<br />

criminal record;<br />

2. We then endeavor to enroll each young person into an Evidence-Based, Data-<br />

Driven Transformative Justice program designed to facilitate their rehabilitation<br />

and subsequent reintegration back into the community;<br />

3. While those projects are operating, we conduct a wide variety of ComeUnity-<br />

ReEngineering seminars and workshops on topics ranging from Juvenile Justice<br />

to Parental Rights, to Domestic issues to Police friendly contacts, to Mental<br />

Health intervention, to CBO and FBO accountability and compliance;<br />

Page 9 of 372


4. Throughout the process, we encourage and maintain frequent personal contact<br />

between all parties;<br />

5 Throughout the process we conduct a continuum of events and fundraisers<br />

designed to facilitate collaboration among professionals and community<br />

stakeholders; and finally<br />

6. 1 We disseminate Monthly and Quarterly publications, like our e-Advocate series<br />

<strong>New</strong>sletter and our e-Advocate Monthly and Quarterly Electronic Compilations to<br />

all regular donors in order to facilitate a lifelong learning process on the everevolving<br />

developments in both the Adult and Juvenile Justice systems.<br />

And in addition to the help we provide for our young clients and their families, we also<br />

facilitate Community Engagement through the Transformative Justice process,<br />

thereby balancing the interests of local businesses, schools, clergy, social<br />

organizations, elected officials, law enforcement entities, and other interested<br />

stakeholders. Through these efforts, relationships are built, rebuilt and strengthened,<br />

local businesses and communities are enhanced & protected from victimization, young<br />

careers are developed, and our precious young people are kept out of the prison<br />

pipeline.<br />

Additionally, we develop Transformative “Void Resistance” (TVR) initiatives to elevate<br />

concerns of our successes resulting in economic hardship for those employed by the<br />

penal system.<br />

TVR is an innovative-comprehensive process that works in conjunction with our<br />

Transformative Justice initiatives to transition the original use and purpose of current<br />

systems into positive social impact operations, which systematically retrains current<br />

staff, renovates facilities, creates new employment opportunities, increases salaries and<br />

is data-proven to enhance employee’s mental wellbeing and overall quality of life – an<br />

exponential Transformative Social Impact benefit for ALL community stakeholders.<br />

This is a massive undertaking, and we need all the help and financial support you can<br />

give! We plan to help 75 young persons per quarter-year (aggregating to a total of 250<br />

per year) in each jurisdiction we serve) at an average cost of under $2,500 per client,<br />

per year. *<br />

Thank you in advance for your support!<br />

* FYI:<br />

1<br />

<strong>In</strong> addition to supporting our world-class programming and support services, all regular donors receive our Quarterly e-<strong>New</strong>sletter<br />

(<strong>The</strong> e-Advocate), as well as <strong>The</strong> e-Advocate Quarterly Magazine.<br />

Page 10 of 372


1. <strong>The</strong> national average cost to taxpayers for minimum-security youth incarceration,<br />

is around $43,000.00 per child, per year.<br />

2. <strong>The</strong> average annual cost to taxpayers for maximum-security youth incarceration<br />

is well over $148,000.00 per child, per year.<br />

- (US <strong>New</strong>s and World Report, December 9, 2014);<br />

3. <strong>In</strong> every jurisdiction in the nation, the Plea Bargaining rate is above 99%.<br />

<strong>The</strong> Judicial system engages in a tri-partite balancing task in every single one of these<br />

matters, seeking to balance Rehabilitative Justice with Community Protection and<br />

Judicial Economy, and, although the practitioners work very hard to achieve positive<br />

outcomes, the scales are nowhere near balanced where people of color are involved.<br />

We must reverse this trend, which is right now working very much against the best<br />

interests of our young.<br />

Our young people do not belong behind bars.<br />

- Jack Johnson<br />

Page 11 of 372


Page 12 of 372


<strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />

Helping <strong>In</strong>dividuals, Organizations & Communities<br />

Achieve <strong>The</strong>ir Full Potential<br />

…a compendium of works on<br />

<strong>Organized</strong> <strong>Crime</strong><br />

<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

“Turning the Improbable <strong>In</strong>to the Exceptional”<br />

Atlanta<br />

Philadelphia<br />

______<br />

John C Johnson III<br />

Founder & CEO<br />

(878) 222-0450<br />

Voice | Data | SMS<br />

www.<strong>The</strong>Advocacy.Foundation<br />

Page 13 of 372


Page 14 of 372


And God spoke all these words:<br />

Biblical Authority<br />

______<br />

Exodus 20:1-20 (NIV)<br />

<strong>The</strong> Ten Commandments<br />

2<br />

“I am the Lord your God, who brought you out of Egypt, out of the land of slavery.<br />

3<br />

“You shall have no other gods before me.<br />

4<br />

“You shall not make for yourself an image in the form of anything in heaven above or<br />

on the earth beneath or in the waters below. 5 You shall not bow down to them or<br />

worship them; for I, the Lord your God, am a jealous God, punishing the children for the<br />

sin of the parents to the third and fourth generation of those who hate me, 6 but showing<br />

love to a thousand generations of those who love me and keep my commandments.<br />

7<br />

“You shall not misuse the name of the Lord your God, for the Lord will not hold anyone<br />

guiltless who misuses his name.<br />

8<br />

“Remember the Sabbath day by keeping it holy. 9 Six days you shall labor and do all<br />

your work, 10 but the seventh day is a sabbath to the Lord your God. On it you shall not<br />

do any work, neither you, nor your son or daughter, nor your male or female servant,<br />

nor your animals, nor any foreigner residing in your towns. 11 For in six days<br />

the Lord made the heavens and the earth, the sea, and all that is in them, but he<br />

rested on the seventh day. <strong>The</strong>refore the Lord blessed the Sabbath day and made it<br />

holy.<br />

12<br />

“Honor your father and your mother, so that you may live long in the<br />

land the Lord your God is giving you.<br />

13<br />

“You shall not murder.<br />

14<br />

“You shall not commit adultery.<br />

15<br />

“You shall not steal.<br />

16<br />

“You shall not give false testimony against your neighbor.<br />

17<br />

“You shall not covet your neighbor’s house. You shall not covet your neighbor’s wife,<br />

or his male or female servant, his ox or donkey, or anything that belongs to your<br />

neighbor.”<br />

Page 15 of 372


18<br />

When the people saw the thunder and lightning and heard the trumpet and saw the<br />

mountain in smoke, they trembled with fear. <strong>The</strong>y stayed at a distance 19 and said to<br />

Moses, “Speak to us yourself and we will listen. But do not have God speak to us or we<br />

will die.”<br />

20<br />

Moses said to the people, “Do not be afraid. God has come to test you, so that the<br />

fear of God will be with you to keep you from sinning.”<br />

Proverbs 28:5<br />

5<br />

Evildoers do not understand what is right,<br />

but those who seek the Lord understand it fully.<br />

1 Samuel 8:3<br />

3<br />

But his sons did not follow his ways. <strong>The</strong>y turned aside after dishonest gain and<br />

accepted bribes and perverted justice.<br />

2 Samuel 11:2-17<br />

2<br />

One evening David got up from his bed and walked around on the roofof the palace.<br />

From the roof he saw a woman bathing. <strong>The</strong> woman was very beautiful, 3 and David<br />

sent someone to find out about her. <strong>The</strong> man said, “She is Bathsheba, the daughter of<br />

Eliam and the wife of Uriah the Hittite.” 4 <strong>The</strong>n David sent messengers to get her. She<br />

came to him, and he slept with her. (Now she was purifying herself from her monthly<br />

uncleanness.) <strong>The</strong>n she went back home. 5 <strong>The</strong> woman conceived and sent word to<br />

David, saying, “I am pregnant.”<br />

6<br />

So David sent this word to Joab: “Send me Uriah the Hittite.” And Joab sent him to<br />

David. 7 When Uriah came to him, David asked him how Joab was, how the soldiers<br />

were and how the war was going. 8 <strong>The</strong>n David said to Uriah, “Go down to your house<br />

and wash your feet.” So Uriah left the palace, and a gift from the king was sent after<br />

him. 9 But Uriah slept at the entrance to the palace with all his master’s servants and did<br />

not go down to his house.<br />

10<br />

David was told, “Uriah did not go home.” So he asked Uriah, “Haven’t you just come<br />

from a military campaign? Why didn’t you go home?”<br />

11<br />

Uriah said to David, “<strong>The</strong> ark and Israel and Judah are staying in tents, [a] and my<br />

commander Joab and my lord’s men are camped in the open country. How could I go to<br />

my house to eat and drink and make love to my wife? As surely as you live, I will not do<br />

such a thing!”<br />

12<br />

<strong>The</strong>n David said to him, “Stay here one more day, and tomorrow I will send you back.”<br />

So Uriah remained in Jerusalem that day and the next. 13 At David’s invitation, he ate<br />

Page 16 of 372


and drank with him, and David made him drunk. But in the evening Uriah went out to<br />

sleep on his mat among his master’s servants; he did not go home.<br />

14<br />

<strong>In</strong> the morning David wrote a letter to Joab and sent it with Uriah. 15 <strong>In</strong> it he wrote, “Put<br />

Uriah out in front where the fighting is fiercest. <strong>The</strong>n withdraw from him so he will be<br />

struck down and die.”<br />

16<br />

So while Joab had the city under siege, he put Uriah at a place where he knew the<br />

strongest defenders were. 17 When the men of the city came out and fought against<br />

Joab, some of the men in David’s army fell; moreover, Uriah the Hittite died.<br />

Matthew 2:16<br />

16<br />

When Herod realized that he had been outwitted by the Magi, he was furious, and he<br />

gave orders to kill all the boys in Bethlehem and its vicinity who were two years old and<br />

under, in accordance with the time he had learned from the Magi.<br />

Mark 14:55-56<br />

55<br />

<strong>The</strong> chief priests and the whole Sanhedrin were looking for evidence against Jesus so<br />

that they could put him to death, but they did not find any. 56 Many testified falsely<br />

against him, but their statements did not agree.<br />

Acts 6:13<br />

13<br />

<strong>The</strong>y produced false witnesses, who testified, “This fellow never stops speaking<br />

against this holy place and against the law.<br />

Acts 25:7<br />

7<br />

When Paul came in, the Jews who had come down from Jerusalem stood around him.<br />

<strong>The</strong>y brought many serious charges against him, but they could not prove them.<br />

Page 17 of 372


Page 18 of 372


Table of Contents<br />

…a compilation of works on<br />

<strong>Organized</strong> <strong>Crime</strong><br />

<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

Biblical Authority<br />

I. <strong>In</strong>troduction: <strong>Organized</strong> <strong>Crime</strong> and White Collar <strong>Crime</strong>……………….. 21<br />

II. Arms Trafficking………………………………………………………….... 57<br />

III. Bribery………………………………………………………………………. 63<br />

IV. Cybercrime…………………………………………………………………. 73<br />

V. Drug Trafficking……………………………………………………………. 85<br />

VI. Embezzlement……………………………………………………………. 105<br />

VII. Extortion…………………………………………………………………… 111<br />

VIII. Fencing Stolen Goods…………………………………………………… 115<br />

IX. Fraud………………………………………………………………………. 123<br />

X. Identity <strong>The</strong>ft……………………………………………………………… 133<br />

XI. Kidnapping…………….………………………………………………….. 155<br />

XII. Loan Sharking………………………………………………………......... 161<br />

XIII. Money Laundering……………………………………………………….. 169<br />

XIV. Murder……………………………………………………………………… 201<br />

XV. Prostitution………………………………………………………………… 219<br />

XVI. Racketeering……………………………………………………………… 245<br />

XVII. Terrorism………………………………………………………………….. 249<br />

XVIII. <strong>The</strong>ft……………………………………………………………………….. 275<br />

XIX. Witness Tampering and <strong>In</strong>timidation......………………………….…… 293<br />

XX. Transnational <strong>Crime</strong>……………………………………………………… 299<br />

XXI. Criminal Enterprises, Gangs and Syndicates…………………………. 303<br />

XXII. References……………………………………………………................. 337<br />

________<br />

Attachments<br />

A. Biblical Atonement and Modern Criminal Law<br />

B. <strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for Law Enforcement<br />

C. Transnational <strong>Organized</strong> <strong>Crime</strong> – <strong>The</strong> Globalized Illegal Economy<br />

Copyright © 2003 – 2019 <strong>The</strong> Advocacy Foundation, <strong>In</strong>c. All Rights Reserved.<br />

Page 19 of 372


This work is not meant to be a piece of original academic<br />

analysis, but rather draws very heavily on the work of<br />

scholars in a diverse range of fields. All material drawn upon<br />

is referenced appropriately.<br />

Page 20 of 372


I. <strong>In</strong>troduction<br />

<strong>Organized</strong> <strong>Crime</strong><br />

<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

<strong>Organized</strong> <strong>Crime</strong> is a category of transnational, national, or local groupings of highly<br />

centralized enterprises run by criminals who intend to engage in illegal activity, most<br />

commonly for profit. Some criminal organizations, such as terrorist groups, are politically<br />

motivated. Sometimes criminal organizations force people to do business with them,<br />

such as when a gang extorts money from shopkeepers for "protection". Gangs may<br />

become disciplined enough to be considered organized. A criminal organization or<br />

gang can also be referred to as a mafia, mob, or crime syndicate; the network,<br />

subculture and community of criminals may be referred to as the underworld.<br />

European sociologists (e.g. Diego Gambetta) define the mafia as a type of organized<br />

crime group that specializes in the supply of extra-legal protection and quasi law<br />

enforcement. Gambetta's classic work on the Sicilian Mafia generates an economic<br />

study of the mafia, which exerts great influence on studies of the Russian Mafia, the<br />

Chinese Mafia, Hong Kong Triads and the Japanese Yakuza.<br />

Page 21 of 372


Other organizations—including states, churches, militaries, police forces, and<br />

corporations—may sometimes use organized-crime methods to conduct their activities,<br />

but their powers derive from their status as formal social institutions. <strong>The</strong>re is a<br />

tendency to distinguish organized crime from other forms of crime, such as white-collar<br />

crime, financial crimes, political crimes, war crime, state crimes, and treason.<br />

This distinction is not always apparent and academics continue to debate the matter.<br />

For example, in failed states that can no longer perform basic functions such as<br />

education, security, or governance (usually due to fractious violence or to extreme<br />

poverty), organized crime, governance and war sometimes complement each other.<br />

<strong>The</strong> term "Oligarchy" has been used to describe democratic countries whose political,<br />

social and economic institutions come under the control of a few families and business<br />

oligarchs.<br />

<strong>In</strong> the United States, the <strong>Organized</strong> <strong>Crime</strong> Control Act (1970) defines organized crime<br />

as "[t]he unlawful activities of [...] a highly organized, disciplined association<br />

[...]".Criminal activity as a structured process is referred to as racketeering. <strong>In</strong> the UK,<br />

police estimate that organized crime involves up to 38,000 people operating in 6,000<br />

various groups.<br />

Due to the escalating violence of Mexico's drug war, a report issued by the United<br />

States Department of Justice characterizes the Mexican drug cartels as the "greatest<br />

organized crime threat to the United States".<br />

Organizational<br />

Patron-Client Networks<br />

Models<br />

Patron-client networks are defined by fluid interactions. <strong>The</strong>y produce crime groups that<br />

operate as smaller units within the overall network, and as such tend towards valuing<br />

significant others, familiarity of social and economic environments, or tradition. <strong>The</strong>se<br />

networks are usually composed of:<br />

<br />

<br />

<br />

<br />

<br />

<br />

Hierarchies based on 'naturally' forming family, social and cultural traditions;<br />

'Tight-knit' focus of activity/labor;<br />

Fraternal or nepotistic value systems;<br />

Personalized activity; including family rivalries, territorial disputes, recruitment<br />

and training of family members, etc.;<br />

Entrenched belief systems, reliance of tradition (including religion, family values,<br />

cultural expectations, class politics, gender roles, etc.); and,<br />

Communication and rule enforcement mechanisms dependent on organizational<br />

structure, social etiquette, history of criminal involvement, and collective decisionmaking.<br />

Page 22 of 372


Bureaucratic/ Corporate Operations<br />

Bureaucratic/corporate organized crime groups are defined by the general rigidity of<br />

their internal structures. <strong>The</strong>y focus more on how the operations works, succeeds,<br />

sustains itself or avoids retribution, they are generally typified by:<br />

<br />

<br />

<br />

<br />

<br />

<br />

A complex authority structure;<br />

An extensive division of labor between classes within the organization;<br />

Meritocratic (as opposed to cultural or social attributes);<br />

Responsibilities carried out in an impersonal manner;<br />

Extensive written rules/regulations (as opposed to cultural praxis dictating<br />

action); and,<br />

'Top-down' communication and rule enforcement mechanisms.<br />

However, this model of operation has some flaws:<br />

<br />

<br />

<br />

<strong>The</strong> 'top-down' communication strategy is susceptible to interception, more so<br />

further down the hierarchy being communicated to;<br />

Maintaining written records jeopardizes the security of the organization and relies<br />

on increased security measures;<br />

<strong>In</strong>filtration at lower levels in the hierarchy can jeopardize the entire organization<br />

(a 'house of cards' effect); and,<br />

Page 23 of 372


Death, injury, incarceration or internal power struggles dramatically heighten the<br />

insecurity of operations.<br />

While bureaucratic operations emphasize business processes and strongly authoritarian<br />

hierarchies, these are based on enforcing power relationships rather than an overlying<br />

aim of protectionism, sustainability or growth.<br />

Youth and Street Gangs<br />

An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an<br />

increase of 35% between 2002 and 2010. A distinctive gang culture underpins many,<br />

but not all, organized groups; this may develop through recruiting strategies, social<br />

learning processes in the corrective system experienced by youth, family or peer<br />

involvement in crime, and the coercive actions of criminal authority figures. <strong>The</strong> term<br />

“street gang” is commonly used interchangeably with “youth gang,” referring to<br />

neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992)<br />

defines a street gang as “a self-formed association of peers, united by mutual interests,<br />

with identifiable leadership and internal organization, who act collectively or as<br />

individuals to achieve specific purposes, including the conduct of illegal activity and<br />

control of a particular territory, facility, or enterprise." Some reasons youth join gangs<br />

include to feel accepted, attain status, and increase their self-esteem. A sense of unity<br />

brings together many of the youth gangs that lack the family aspect at home.<br />

"Zones of transition" are deteriorating neighborhoods with shifting populations. <strong>In</strong> such<br />

areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and<br />

cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of<br />

inability to achieve status and goals of the middle class; Cloward and Ohlin (1960):<br />

blocked opportunity, but unequal distribution of opportunities lead to creating different<br />

types of gangs (that is, some focused on robbery and property theft, some on fighting<br />

and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one<br />

of the first criminologists to focus on evidence-based practice rather than intuition into<br />

gang life and culture. Participation in gang-related events during adolescence<br />

perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like<br />

Spergel studied the effects on members of social workers’ interventions. More<br />

interventions actually lead to greater gang participation and solidarity and bonds<br />

between members. Downes and Rock (1988) on Parker’s analysis: strain theory<br />

applies, labeling theory (from experience with police and courts), control theory<br />

(involvement in trouble from early childhood and the eventual decision that the costs<br />

outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang<br />

involvement than another, rather it is the status of being marginalized, alienated or<br />

rejected that makes some groups more vulnerable to gang formation, and this would<br />

also be accounted for in the effect of social exclusion, especially in terms of recruitment<br />

and retention. <strong>The</strong>se may also be defined by age (typically youth) or peer group<br />

influences, and the permanence or consistency of their criminal activity. <strong>The</strong>se groups<br />

also form their own symbolic identity or public representation which are recognizable by<br />

the community at large (include colors, symbols, patches, flags and tattoos).<br />

Page 24 of 372


Research has focused on whether the gangs have formal structures, clear hierarchies<br />

and leadership in comparison with adult groups, and whether they are rational in pursuit<br />

of their goals, though positions on structures, hierarchies and defined roles are<br />

conflicting. Some studied street gangs involved in drug dealing - finding that their<br />

structure and behavior had a degree of organizational rationality. Members saw<br />

themselves as organized criminals; gangs were formal-rational organizations, Strong<br />

organizational structures, well defined roles and rules that guided members’ behavior.<br />

Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with<br />

the two above. However some have found these to be loose rather than well-defined<br />

and lacking persistent focus, there was relatively low cohesion, few shared goals and<br />

little organizational structure. Shared norms, value and loyalties were low, structures<br />

"chaotic", little role differentiation or clear distribution of labor. Similarly, the use of<br />

violence does not conform to the principles behind protection rackets, political<br />

intimidation and drug trafficking activities employed by those adult groups. <strong>In</strong> many<br />

cases gang members graduate from youth gangs to highly developed OC groups, with<br />

some already in contact with such syndicates and through this we see a greater<br />

propensity for imitation. Gangs and traditional criminal organizations cannot be<br />

universally linked (Decker, 1998), however there are clear benefits to both the adult and<br />

youth organization through their association. <strong>In</strong> terms of structure, no single crime group<br />

is archetypal, though in most cases there are well-defined patterns of vertical integration<br />

(where criminal groups attempt to control the supply and demand), as is the case in<br />

arms, sex and drug trafficking.<br />

Entrepreneurial<br />

<strong>In</strong>dividual Difference<br />

<strong>The</strong> entrepreneurial model looks at either the individual criminal or a smaller group of<br />

organized criminals, that capitalize off the more fluid 'group-association' of<br />

contemporary organized crime. This model conforms to social learning theory or<br />

differential association in that there are clear associations and interaction between<br />

criminals where knowledge may be shared, or values enforced, however, it is argued<br />

that rational choice is not represented in this. <strong>The</strong> choice to commit a certain act, or<br />

associate with other organized crime groups, may be seen as much more of an<br />

entrepreneurial decision - contributing to the continuation of a criminal enterprise, by<br />

maximizing those aspects that protect or support their own individual gain. <strong>In</strong> this<br />

context, the role of risk is also easily understandable, however it is debatable whether<br />

the underlying motivation should be seen as true entrepreneurship or entrepreneurship<br />

as a product of some social disadvantage.<br />

<strong>The</strong> criminal organization, much in the same way as one would assess pleasure and<br />

pain, weighs such factors as legal, social and economic risk to determine potential profit<br />

and loss from certain criminal activities. This decision-making process rises from the<br />

entrepreneurial efforts of the group's members, their motivations and the environments<br />

in which they work. Opportunism is also a key factor – the organized criminal or criminal<br />

Page 25 of 372


group is likely to frequently reorder the criminal associations they maintain, the types of<br />

crimes they perpetrate, and how they function in the public arena (recruitment,<br />

reputation, etc.) in order to ensure efficiency, capitalization and protection of their<br />

interests.<br />

Multi-Model Approach<br />

Culture and ethnicity provide an environment where trust and communication between<br />

criminals can be efficient and secure. This may ultimately lead to a competitive<br />

advantage for some groups; however, it is inaccurate to adopt this as the only<br />

determinant of classification in organized crime. This categorization includes the Sicilian<br />

Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan),<br />

Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia,<br />

Korean criminal groups and Jamaican posses. From this perspective, organized crime<br />

is not a modern phenomenon - the construction of 17th and 18th century crime gangs<br />

fulfill all the present day criteria of criminal organizations (in opposition to the Alien<br />

Conspiracy <strong>The</strong>ory). <strong>The</strong>se roamed the rural borderlands of central Europe embarking<br />

on many of the same illegal activities associated with today’s crime organizations, with<br />

the exception of money laundering. When the French revolution created strong nation<br />

states, the criminal gangs moved to other poorly controlled regions like the Balkans and<br />

Southern Italy, where the seeds were sown for the Sicilian Mafia - the lynchpin of<br />

organized crime in the <strong>New</strong> World.<br />

Model Type Environment Group Processes Impacts<br />

National<br />

Transnational<br />

Transnational/Transactional<br />

Entrepreneurial/Transactional<br />

Historical or<br />

cultural basis<br />

Politically and<br />

economically<br />

unstable<br />

Any<br />

Developed/high<br />

technology<br />

regions<br />

Family or<br />

hierarchy<br />

Vertical<br />

integration<br />

Flexible.<br />

Small<br />

size.<br />

<strong>In</strong>dividuals<br />

or pairs.<br />

Secrecy/bonds.<br />

Links to<br />

insurgents<br />

Legitimate<br />

cover<br />

Violent.<br />

Opportunistic.<br />

Risk taking<br />

Operating<br />

through<br />

legitimate<br />

enterprise<br />

Local<br />

corruption/influence.<br />

Fearful community.<br />

Stable supply of illicit<br />

goods. High-level<br />

corruption.<br />

Unstable supply of<br />

range of illicit goods.<br />

Exploits young local<br />

offenders.<br />

Provision of illicit<br />

services, e.g.,<br />

money laundering,<br />

fraud, criminal<br />

networks.<br />

Typical Activities<br />

<strong>Organized</strong> crime groups provide a range of illegal services and goods. <strong>Organized</strong> crime<br />

often victimizes businesses through the use of extortion or theft and fraud activities like<br />

hijacking cargo trucks, robbing goods, committing bankruptcy fraud (also known as<br />

"bust-out"), insurance fraud or stock fraud (inside trading). <strong>Organized</strong> crime groups also<br />

victimize individuals by car theft (either for dismantling at "chop shops" or for export), art<br />

Page 26 of 372


theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer<br />

hacking, credit card fraud, economic espionage, embezzlement, identity theft, and<br />

securities fraud ("pump and dump" scam). Some organized crime groups defraud<br />

national, state, or local governments by bid rigging public projects, counterfeiting<br />

money, smuggling or manufacturing untaxed alcohol (bootlegging) or cigarettes<br />

(buttlegging), and providing immigrant workers to avoid taxes.<br />

<strong>Organized</strong> crime groups seek out corrupt public officials in executive, law enforcement,<br />

and judicial roles so that their activities can avoid, or at least receive early warnings<br />

about, investigation and prosecution.<br />

Activities of organized crime include loansharking of money at very high interest rates,<br />

assassination, blackmailing, bombings, bookmaking and illegal gambling, confidence<br />

tricks, copyright infringement, counterfeiting of intellectual property, fencing, kidnapping,<br />

prostitution, smuggling, drug trafficking, arms trafficking, oil smuggling, antiquities<br />

smuggling, organ trafficking, contract killing, identity document forgery, money<br />

laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price<br />

fixing, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear<br />

materials, military equipment smuggling, nuclear weapons smuggling, passport fraud,<br />

providing illegal immigration and cheap labor, people smuggling, trading in endangered<br />

species, and trafficking in human beings. <strong>Organized</strong> crime groups also do a range of<br />

Page 27 of 372


usiness and labor racketeering activities, such as skimming casinos, insider trading,<br />

setting up monopolies in industries such as garbage collecting, construction and cement<br />

pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and<br />

bullying.<br />

Assault<br />

Violence<br />

<strong>The</strong> commission of violent crime may form part of a criminal organization's 'tools' used<br />

to achieve criminogenic goals (for example, its threatening, authoritative, coercive,<br />

terror-inducing, or rebellious role), due to psychosocial factors (cultural conflict,<br />

aggression, rebellion against authority, access to illicit substances, counter-cultural<br />

dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and<br />

the groups they form. Assaults are used for coercive measures, to "rough up" debtors,<br />

competition or recruits, in the commission of robberies, in connection to other property<br />

offenses, and as an expression of counter-cultural authority; violence is normalized<br />

within criminal organizations (in direct opposition to mainstream society) and the<br />

locations they control.<br />

Whilst the intensity of violence is dependent on the types of crime the organization is<br />

involved in (as well as their organizational structure or cultural tradition) aggressive acts<br />

range on a spectrum from low-grade physical assaults to murder. Bodily harm and<br />

grievous bodily harm, within the context of organized crime, must be understood as<br />

indicators of intense social and cultural conflict, motivations contrary to the security of<br />

the public, and other psychosocial factors.<br />

Murder<br />

Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian<br />

mafia which placed large physical and symbolic importance on the act of murder, its<br />

purposes and consequences, to a much less discriminate form of expressing power,<br />

enforcing criminal authority, achieving retribution or eliminating competition. <strong>The</strong> role of<br />

the hit man has been generally consistent throughout the history of organized crime,<br />

whether that be due to the efficiency or expediency of hiring a professional assassin or<br />

the need to distance oneself from the commission of murderous acts (making it harder<br />

to prove liability). This may include the assassination of notable figures (public, private<br />

or criminal), once again dependent on authority, retribution or competition. Revenge<br />

killings, armed robberies, violent disputes over controlled territories and offenses<br />

against members of the public must also be considered when looking at the dynamic<br />

between different criminal organizations and their (at times) conflicting needs.<br />

Terrorism<br />

<strong>In</strong> addition to what is considered traditional organized crime involving direct crimes of<br />

fraud swindles, scams, racketeering and other Racketeer <strong>In</strong>fluenced and Corrupt<br />

Organizations Act (RICO) predicate acts motivated for the accumulation of monetary<br />

Page 28 of 372


gain, there is also non-traditional organized crime which is engaged in for political or<br />

ideological gain or acceptance. Such crime groups are often labelled terrorist groups.<br />

<strong>The</strong>re is no universally agreed, legally binding, criminal law definition of terrorism.<br />

Common definitions of terrorism refer only to those violent acts which are intended to<br />

create fear (terror), are perpetrated for a religious, political or ideological goal,<br />

deliberately target or disregard the safety of non-combatants (e.g., neutral military<br />

personnel or civilians), and are committed by non-government agencies. Some<br />

definitions also include acts of unlawful violence and war, especially crimes against<br />

humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi<br />

Party, its paramilitary and police organizations, and numerous associations subsidiary<br />

to the Nazi Party "criminal organizations". <strong>The</strong> use of similar tactics by criminal<br />

organizations for protection rackets or to enforce a code of silence is usually not labeled<br />

terrorism though these same actions may be labeled terrorism when done by a<br />

politically motivated group.<br />

Notable groups include Al-Qaeda, Animal Liberation Front, Army of God, Black<br />

Liberation Army, <strong>The</strong> Covenant, <strong>The</strong> Sword, and the Arm of the Lord, Earth Liberation<br />

Front, Irish Republican Army, Kurdistan Workers' Party, Lashkar e Toiba, May 19th<br />

Communist Organization, <strong>The</strong> Order, Revolutionary Armed Forces of Colombia,<br />

Page 29 of 372


Symbionese Liberation Army, Taliban, United Freedom Front and Weather<br />

Underground.<br />

Other<br />

<br />

<br />

<br />

<br />

<br />

<br />

Arms trafficking<br />

Arson<br />

Coercion<br />

Extortion<br />

Protection racket<br />

Sexual assault<br />

Financial <strong>Crime</strong><br />

<strong>Organized</strong> crime groups generate large amounts of money by activities such as drug<br />

trafficking, arms smuggling and financial crime. This is of little use to them unless they<br />

can disguise it and convert it into funds that are available for investment into legitimate<br />

enterprise. <strong>The</strong> methods they use for converting its ‘dirty’ money into ‘clean’ assets<br />

encourages corruption. <strong>Organized</strong> crime groups need to hide the money’s illegal origin.<br />

It allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to<br />

cover the money trail and convert proceeds of crime into usable assets.<br />

Money laundering is bad for international and domestic trade, banking reputations and<br />

for effective governments and rule of law. Accurate figures for the amounts of criminal<br />

proceeds laundered are almost impossible to calculate, and the Financial Action Task<br />

Force on Money Laundering (FATF), an intergovernmental body set up to combat<br />

money laundering, has stated that "overall it is absolutely impossible to produce a<br />

reliable estimate of the amount of money laundered and therefore the FATF does not<br />

publish any figures in this regard". However, in the US estimated figures of money<br />

laundering have been put at between $200 – $600 billion per year throughout the 1990s<br />

(US Congress Office 1995; Robinson 1996), and in 2002 this was estimated between<br />

$500 billion to $1 trillion per year (UN 2002). This would make organized crime the third<br />

largest business in world after foreign exchange and oil (Robinson 1996). <strong>The</strong> rapid<br />

growth of money laundering is due to:<br />

<br />

<br />

<br />

the scale of organized crime precluding it from being a cash business - groups<br />

have little option but to convert its proceeds into legitimate funds and do so by<br />

investment, by developing legitimate businesses and purchasing property;<br />

globalization of communications and commerce - technology has made rapid<br />

transfer of funds across international borders much easier, with groups<br />

continuously changing techniques to avoid investigation; and,<br />

a lack of effective financial regulation in parts of the global economy.<br />

Page 30 of 372


Money laundering is a three-stage process:<br />

<br />

Placement: (also called immersion) groups ‘smurf’ small amounts at a time to<br />

avoid suspicion; physical disposal of money by moving crime funds into the<br />

legitimate financial system; may involve bank complicity, mixing licit and illicit<br />

funds, cash purchases and smuggling currency to safe havens.<br />

<br />

Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves<br />

creating false paper trails, converting cash into assets by cash purchases.<br />

<br />

<strong>In</strong>tegration: (also called ‘spin dry): Making it into clean taxable income by realestate<br />

transactions, sham loans, foreign bank complicity and false import and<br />

export transactions.<br />

Means of money laundering:<br />

<br />

<br />

<br />

Money transmitters, black money markets purchasing goods, gambling,<br />

increasing the complexity of the money trail.<br />

Underground banking (flying money), involves clandestine ‘bankers’ around the<br />

world.<br />

It often involves otherwise legitimate banks and professionals.<br />

Page 31 of 372


<strong>The</strong> policy aim in this area is to make the financial markets transparent, and minimize<br />

the circulation of criminal money and its cost upon legitimate markets.<br />

Counterfeiting<br />

<strong>In</strong> 2007, the OECD reported the scope of counterfeit products to include food,<br />

pharmaceuticals, pesticides, electrical components, tobacco and even household<br />

cleaning products in addition to the usual films, music, literature, games and other<br />

electrical appliances, software and fashion. A number of qualitative changes in the trade<br />

of counterfeit products:<br />

<br />

<br />

<br />

<br />

a large increase in fake goods which are dangerous to health and safety;<br />

most products repossessed by authorities are now household items rather than<br />

luxury goods;<br />

a growing number of technological products; and,<br />

production is now operated on an industrial scale.<br />

Tax evasion<br />

<strong>The</strong> economic effects of organized crime have been approached from a number of both<br />

theoretical and empirical positions, however the nature of such activity allows for<br />

misrepresentation. <strong>The</strong> level of taxation taken by a nation-state, rates of unemployment,<br />

mean household incomes and level of satisfaction with government and other economic<br />

factors all contribute to the likelihood of criminals to participate in tax evasion. As most<br />

organized crime is perpetrated in the liminal state between legitimate and illegitimate<br />

markets, these economic factors must adjusted to ensure the optimal amount of<br />

taxation without promoting the practice of tax evasion. As with any other crime,<br />

technological advancements have made the commission of tax evasion easier, faster<br />

and more globalized. <strong>The</strong> ability for organized criminals to operate fraudulent financial<br />

accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and<br />

operating goods smuggling syndicates to evade importation taxes help ensure financial<br />

sustainability, security from law enforcement, general anonymity and the continuation of<br />

their operations.<br />

<strong>In</strong>ternet Fraud<br />

Cybercrime<br />

Identity theft is a form of fraud or cheating of another person's identity in which<br />

someone pretends to be someone else by assuming that person's identity, typically in<br />

order to access resources or obtain credit and other benefits in that person's name.<br />

Victims of identity theft (those whose identity has been assumed by the identity thief)<br />

can suffer adverse consequences if held accountable for the perpetrator's actions, as<br />

can organizations and individuals who are defrauded by the identity thief, and to that<br />

extent are also victims. <strong>In</strong>ternet fraud refers to the actual use of <strong>In</strong>ternet services to<br />

present fraudulent solicitations to prospective victims, to conduct fraudulent<br />

Page 32 of 372


transactions, or to transmit the proceeds of fraud to financial institutions or to others<br />

connected with the scheme. <strong>In</strong> the context of organized crime, both may serve as<br />

means through which other criminal activity may be successfully perpetrated or as the<br />

primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment<br />

scams, and other phishing scams are the most common and most widely used forms of<br />

identity theft, though with the advent of social networking fake websites, accounts and<br />

other fraudulent or deceitful activity has become commonplace.<br />

Copyright <strong>In</strong>fringement<br />

Copyright infringement is the unauthorized or prohibited use of works under copyright,<br />

infringing the copyright holder's exclusive rights, such as the right to reproduce or<br />

perform the copyrighted work, or to make derivative works. Whilst almost universally<br />

considered under civil procedure, the impact and intent of organized criminal operations<br />

in this area of crime has been the subject of much debate. Article 61 of the Agreement<br />

on Trade-Related Aspects of <strong>In</strong>tellectual Property Rights (TRIPs) requires that signatory<br />

countries establish criminal procedures and penalties in cases of willful trademark<br />

counterfeiting or copyright piracy on a commercial scale.<br />

More recently copyright holders have demanded that states provide criminal sanctions<br />

for all types of copyright infringement. <strong>Organized</strong> criminal groups capitalize on<br />

consumer complicity, advancements in security and anonymity technology, emerging<br />

markets and new methods of product transmission, and the consistent nature of these<br />

provides a stable financial basis for other areas of organized crime.<br />

Page 33 of 372


Cyberwarfare<br />

Cyberwarfare refers to politically motivated hacking to conduct sabotage and<br />

espionage. It is a form of information warfare sometimes seen as analogous to<br />

conventional warfare although this analogy is controversial for both its accuracy and its<br />

political motivation. It has been defined as activities by a nation-state to penetrate<br />

another nation's computers or networks with the intention of causing civil damage or<br />

disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S.<br />

Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has<br />

formally recognized cyberspace as a new domain in warfare . . . [which] has become<br />

just as critical to military operations as land, sea, air, and space." Cyber espionage is<br />

the practice of obtaining confidential, sensitive, proprietary or classified information from<br />

individuals, competitors, groups, or governments using illegal exploitation methods on<br />

internet, networks, software and/or computers. <strong>The</strong>re is also a clear military, political, or<br />

economic motivation. Unsecured information may be intercepted and modified, making<br />

espionage possible internationally. <strong>The</strong> recently established Cyber Command is<br />

currently debating whether such activities as commercial espionage or theft of<br />

intellectual property are criminal activities or actual "breaches of national security."<br />

Furthermore, military activities that use computers and satellites for coordination are at<br />

risk of equipment disruption. Orders and communications can be intercepted or<br />

replaced. Power, water, fuel, communications, and transportation infrastructure all may<br />

be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting<br />

that the security breaches have already gone beyond stolen credit card numbers, and<br />

that potential targets can also include the electric power grid, trains, or the stock market.<br />

Computer Viruses<br />

<strong>The</strong> term "computer virus" may be used as an overarching phrase to include all types of<br />

true viruses, malware, including computer worms, Trojan horses, most rootkits,<br />

spyware, dishonest adware and other malicious and unwanted software (though all are<br />

technically unique), and proves to be quite financially lucrative for criminal<br />

organizations, offering greater opportunities for fraud and extortion whilst increasing<br />

security, secrecy and anonymity. Worms may be utilized by organized crime groups to<br />

exploit security vulnerabilities (duplicating itself automatically across other computers a<br />

given network), while a Trojan horse is a program that appears harmless but hides<br />

malicious functions (such as retrieval of stored confidential data, corruption of<br />

information, or interception of transmissions). Worms and Trojan horses, like viruses,<br />

may harm a computer system's data or performance. Applying the <strong>In</strong>ternet model of<br />

organized crime, the proliferation of computer viruses and other malicious software<br />

promotes a sense of detachment between the perpetrator (whether that be the criminal<br />

organization or another individual) and the victim; this may help to explain vast<br />

increases in cyber-crime such as these for the purpose of ideological crime or terrorism.<br />

<strong>In</strong> mid July 2010, security experts discovered a malicious software program that had<br />

infiltrated factory computers and had spread to plants around the world. It is considered<br />

Page 34 of 372


"the first attack on critical industrial infrastructure that sits at the foundation of modern<br />

economies," notes the <strong>New</strong> York Times.<br />

Corporate <strong>Crime</strong><br />

White-Collar <strong>Crime</strong> and Corruption<br />

Corporate crime refers to crimes committed either by a corporation (i.e., a business<br />

entity having a separate legal personality from the natural persons that manage its<br />

activities), or by individuals that may be identified with a corporation or other business<br />

entity (see vicarious liability and corporate liability). Note that some forms of corporate<br />

corruption may not actually be criminal if they are not specifically illegal under a given<br />

system of laws. For example, some jurisdictions allow insider trading.<br />

Labor Racketeering<br />

Labor racketeering has developed since the 1930s, affecting national and international<br />

construction, mining, energy production and transportation sectors immensely. Activity<br />

has focused on the importation of cheap or unfree labor, involvement with union and<br />

public officials (political corruption), and counterfeiting.<br />

Political Corruption<br />

Political corruption is the use of legislated powers by government officials for illegitimate<br />

private gain. Misuse of government power for other purposes, such as repression of<br />

political opponents and general police brutality, is not considered political corruption.<br />

Page 35 of 372


Neither are illegal acts by private persons or corporations not directly involved with the<br />

government. An illegal act by an officeholder constitutes political corruption only if the<br />

act is directly related to their official duties. Forms of corruption vary, but include bribery,<br />

extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption<br />

may facilitate criminal enterprise such as drug trafficking, money laundering, and human<br />

trafficking, it is not restricted to these activities. <strong>The</strong> activities that constitute illegal<br />

corruption differ depending on the country or jurisdiction. For instance, certain political<br />

funding practices that are legal in one place may be illegal in another. <strong>In</strong> some cases,<br />

government officials have broad or poorly defined powers, which make it difficult to<br />

distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to<br />

involve over 1 trillion US dollars annually. A state of unrestrained political corruption is<br />

known as a kleptocracy, literally meaning "rule by thieves".<br />

Drug Trafficking<br />

Mexican drug cartels and their areas of influence<br />

Heroin: Source countries / production: three major<br />

regions known as the Golden Triangle (Burma, Laos,<br />

Thailand), Golden Crescent (Afghanistan) and<br />

Central and South America. <strong>The</strong>re are suggestions<br />

that due to the continuing decline in opium production<br />

in South East Asia, traffickers may begin to look to<br />

Afghanistan as a source of heroin."<br />

Sex Trafficking<br />

Human Trafficking<br />

Human trafficking for the purpose of sexual exploitation is a major cause of<br />

contemporary sexual slavery and is primarily for prostituting women and children into<br />

sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.<br />

<strong>The</strong> terms "forced prostitution" or "enforced prostitution" appear in international and<br />

humanitarian conventions but have been insufficiently understood and inconsistently<br />

applied. "Forced prostitution" generally refers to conditions of control over a person who<br />

is coerced by another to engage in sexual activity. Official numbers of individuals in<br />

sexual slavery worldwide vary.<br />

<strong>In</strong> 2001 <strong>In</strong>ternational Organization for Migration estimated 400,000, the Federal Bureau<br />

of <strong>In</strong>vestigation estimated 700,000 and UNICEF estimated 1.75 million. <strong>The</strong> most<br />

common destinations for victims of human trafficking are Thailand, Japan, Israel,<br />

Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a<br />

report by UNODC.<br />

Page 36 of 372


Illegal Immigration and People Smuggling<br />

People smuggling is defined as "the facilitation, transportation, attempted<br />

transportation or illegal entry of a person or persons across an international border, in<br />

violation of one or more countries laws, either clandestinely or through deception, such<br />

as the use of fraudulent documents".<br />

<strong>The</strong> term is understood as and often used interchangeably with migrant smuggling,<br />

which is defined by the United Nations Convention Against Transnational <strong>Organized</strong><br />

<strong>Crime</strong> as "...the procurement, in order to obtain, directly or indirectly, a financial or other<br />

material benefit, of the illegal entry of a person into a state party of which the person is<br />

not a national".<br />

This practice has increased over the past few decades and today now accounts for a<br />

significant portion of illegal immigration in countries around the world.<br />

People smuggling generally takes place with the consent of the person or persons being<br />

smuggled, and common reasons for individuals seeking to be smuggled include<br />

employment and economic opportunity, personal and/or familial betterment, and escape<br />

from persecution or conflict.<br />

Page 37 of 372


Contemporary Slavery and Forced Labor<br />

<strong>The</strong> number of slaves today remains as high as 12 million to 27 million. This is probably<br />

the smallest proportion of slaves to the rest of the world's population in history. Most are<br />

debt slaves, largely in South Asia, who are under debt bondage incurred by lenders,<br />

sometimes even for generations. It is the fastest growing criminal industry and is<br />

predicted to eventually outgrow drug trafficking.<br />

Pre-Nineteenth Century<br />

Historical Origins<br />

Today, crime is sometimes thought of as an urban phenomenon, but for most of human<br />

history it was the rural interfaces that encountered the majority of crimes (bearing in<br />

mind the fact that for most of human history, rural areas were the vast majority of<br />

inhabited places). For the most part, within a village, members kept crime at very low<br />

rates; however, outsiders such as pirates, highwaymen, and bandits attacked trade<br />

routes and roads, at times severely disrupting commerce, raising costs, insurance rates<br />

and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry<br />

were to the preindustrial world what organized crime is to modern society."<br />

If we take a global rather than strictly domestic view, it becomes evident even crime of<br />

the organized kind has a long if not necessarily noble heritage. <strong>The</strong> word 'thug' dates to<br />

early 13th-century <strong>In</strong>dia, when Thugs, or gangs of criminals, roamed from town to town,<br />

looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia<br />

and Africa, and extant criminal organizations in Italy and Japan trace their histories back<br />

several centuries...<br />

As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or<br />

Mongols are not normally thought of as organized crime groups, yet they share many<br />

features associated with thriving criminal organizations. <strong>The</strong>y were for the most part<br />

non-ideological, predominantly ethnically based, used violence and intimidation, and<br />

adhered to their own codes of law." Terrorism is linked to organized crime, but has<br />

political aims rather than solely financial ones, so there is overlap but separation<br />

between terrorism and organized crime.<br />

Nineteenth Century<br />

During the Victorian era, criminals and gangs started to form organizations which would<br />

be collectively become London's criminal underworld. Criminal societies in the<br />

underworld started to develop their own ranks and groups which were sometimes called<br />

families, and were often made up of lower-classes and operated on pick-pocketry,<br />

prostitution, forgery and counterfeiting, commercial burglary and even moneylaundering<br />

schemes. Unique also were the use of slangs and argots used by Victorian<br />

criminal societies to distinguish each other. One of the most infamous crime bosses in<br />

the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the<br />

Page 38 of 372


criminal world" or "the Napoleon of <strong>Crime</strong>" and became the inspiration behind the<br />

popular character of Professor Moriarty.<br />

<strong>Organized</strong> crime in the United States first came to prominence in the Old West and<br />

historians such as Brian J. Robb and Erin H. Turner traced the first organized crime<br />

syndicates to the Coschise Cowboy Gang and the Wild Bunch. <strong>The</strong> Cochise Cowboys,<br />

though loosely organized, were unique for their criminal operations in the Mexican<br />

border, in which they would steal and sell cattle as well smuggled contraband goods in<br />

between the countries.<br />

Twentieth Century<br />

Donald Cressey’s Cosa Nostra model studied Mafia families exclusively and this limits<br />

his broader findings. Structures are formal and rational with allocated tasks, limits on<br />

entrance, and influence the rules established for organizational maintenance and<br />

sustainability. <strong>In</strong> this context there is a difference between organized and professional<br />

crime; there is well-defined hierarchy of roles for leaders and members, underlying rules<br />

and specific goals that determine their behavior, and these are formed as a social<br />

system, one that was rationally designed to maximize profits and to provide forbidden<br />

Page 39 of 372


goods. Albini saw organized criminal behavior as consisting of networks of patrons and<br />

clients, rather than rational hierarchies or secret societies.<br />

<strong>The</strong> networks are characterized by a loose system of power relations. Each participant<br />

is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and<br />

they exchange information with their clients in order to obtain their support. Clients<br />

include members of gangs, local and national politicians, government officials and<br />

people engaged in legitimate business. People in the network may not directly be part of<br />

the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni<br />

and Ianni studied Italian-American crime syndicates in <strong>New</strong> York and other cities.<br />

Kinship is seen as the basis of organized crime rather than the structures Cressey had<br />

identified; this includes fictive godparental and affinitive ties as well as those based on<br />

blood relations, and it is the impersonal actions, not the status or affiliations of their<br />

members, that define the group. Rules of conduct and behavioral aspects of power and<br />

networks and roles include the following:<br />

<br />

<br />

<br />

<br />

<br />

<br />

family operates as a social unit, with social and business functions merged;<br />

leadership positions down to middle management are kinship based;<br />

the higher the position, the closer the kinship relationship;<br />

group assigns leadership positions to a central group of family members,<br />

including fictive godparental relationship reinforcement;<br />

the leadership group are assigned to legal or illegal enterprises, but not both;<br />

and,<br />

transfer of money, from legal and illegal business, and back to illegal business is<br />

by individuals, not companies.<br />

Strong family ties are derived from the traditions of southern Italy, where family rather<br />

than the church or state is the basis of social order and morality.<br />

<strong>The</strong> "Disorganized <strong>Crime</strong>" and Choice <strong>The</strong>ses<br />

One of the most important trends to emerge in criminological thinking about OC in<br />

recent years is the suggestion that it is not, in a formal sense, "organized" at all.<br />

Evidence includes lack of centralized control, absence of formal lines of communication,<br />

fragmented organizational structure. It is distinctively disorganized. For example,<br />

Seattle's crime network in the 1970s and 80s consisted of groups of businessmen,<br />

politicians and of law enforcement officers. <strong>The</strong>y all had links to a national network via<br />

Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone<br />

else exercised centralized control over them.<br />

While some crime involved well-known criminal hierarchies in the city, criminal activity<br />

was not subject to central management by these hierarchies nor by other controlling<br />

groups, nor were activities limited to a finite number of objectives. <strong>The</strong> networks of<br />

criminals involved with the crimes did not exhibit organizational cohesion. Too much<br />

emphasis had been placed on the Mafia as controlling OC. <strong>The</strong> Mafia were certainly<br />

Page 40 of 372


powerful but they "were part of a heterogeneous underworld, a network characterized<br />

by complex webs of relationships." OC groups were violent and aimed at making money<br />

but because of the lack of structure and fragmentation of objectives, they were<br />

"disorganized".<br />

Further studies showed neither bureaucracy nor kinship groups are the primary<br />

structure of organized crime, rather they were in partnerships or a series of joint<br />

business ventures. Despite these conclusions, all researchers observed a degree of<br />

managerial activities among the groups they studied. All observed networks and a<br />

degree of persistence, and there may be utility in focusing on the identification of<br />

organizing roles of people and events rather than the group's structure. <strong>The</strong>re may be<br />

three main approaches to understand the organizations in terms of their roles as social<br />

systems:<br />

<br />

<br />

<br />

Organizations as Rational Systems: Highly formalized structures in terms of<br />

bureaucracy’s and hierarchy, with formal systems of rules regarding authority<br />

and highly specific goals;<br />

Organizations as Natural Systems: Participants may regard the organization<br />

as an end in itself, not merely a means to some other end. Promoting group<br />

values to maintain solidarity is high on the agenda. <strong>The</strong>y do not rely on profit<br />

maximization. <strong>The</strong>ir perversity and violence in respect of relationships is often<br />

remarkable, but they are characterized by their focus on the connections<br />

between their members, their associates and their victims; and,<br />

Organizations as Open Systems: High levels of interdependence between<br />

themselves and the environment in which they operate. <strong>The</strong>re is no one way in<br />

which they are organized or how they operate. <strong>The</strong>y are adaptable and change<br />

to meet the demands of their changing environments and circumstances.<br />

<strong>Organized</strong> crime groups may be a combination of all three.<br />

<strong>In</strong>ternational Governance Approach<br />

<strong>In</strong>ternational consensus on defining organized crime has become important since the<br />

1970s due its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is<br />

Page 41 of 372


"...the large scale and complex criminal activity carried on by groups of persons,<br />

however loosely or tightly organized for the enrichment of those participating at the<br />

expense of the community and its members. It is frequently accomplished through<br />

ruthless disregard of any law, including offenses against the person and frequently in<br />

connection with political corruption." (UN) "A criminal organization shall mean a lasting,<br />

structured association of two or more persons, acting in concert with a view to<br />

committing crimes or other offenses which are punishable by deprivation of liberty or a<br />

detention order of a maximum of at least four years or a more serious penalty, whether<br />

such crimes or offenses are an end in themselves or a means of obtaining material<br />

benefits and, if necessary, of improperly influencing the operation of public authorities."<br />

(UE) Not all groups exhibit the same characteristics of structure. However, violence and<br />

corruption and the pursuit of multiple enterprises and continuity serve to form the<br />

essence of OC activity.<br />

<strong>The</strong>re are eleven characteristics from the European Commission and Europol pertinent<br />

to a working definition of organized crime. Six of those must be satisfied and the four in<br />

italics are mandatory. Summarized, they are:<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

more than two people;<br />

their own appointed tasks;<br />

activity over a prolonged or indefinite period of time;<br />

the use discipline or control;<br />

perpetration of serious criminal offenses;<br />

operations on an international or transnational level;<br />

the use violence or other intimidation;<br />

the use of commercial or businesslike structures;<br />

engagement in money laundering;<br />

exertion of influence on politics, media, public administration, judicial authorities<br />

or the economy; and,<br />

motivated by the pursuit of profit and/or power,<br />

- with the Convention against Transnational <strong>Organized</strong> <strong>Crime</strong> (the<br />

Palermo Convention) having a similar definition:<br />

<br />

<br />

<br />

organized criminal: structured group, three or more people, one or more serious<br />

crimes, in order to obtain financial or other material benefit;<br />

serious crime: offense punishable by at least four years in prison; and,<br />

structured group: Not randomly formed but doesn’t need formal structure,<br />

Others stress the importance of power, profit and perpetuity, defining organized criminal<br />

behavior as:<br />

<br />

<br />

<br />

<br />

nonideological: i.e., profit driven;<br />

hierarchical: few elites and many operatives;<br />

limited or exclusive membership: maintain secrecy and loyalty of members;<br />

perpetuating itself: Recruitment process and policy;<br />

Page 42 of 372


willing to use illegal violence and bribery;<br />

specialized division of labor: to achieve organization goal;<br />

monopolistic: Market control to maximize profits; and,<br />

has explicit rules and regulations: Codes of honor.<br />

Definitions need to bring together its legal and social elements. OC has widespread<br />

social, political and economic effects. It uses violence and corruption to achieve its<br />

ends: "OC when group primarily focused on illegal profits systematically commit crimes<br />

that adversely affect society and are capable of successfully shielding their activities, in<br />

particular by being willing to use physical violence or eliminate individuals by way of<br />

corruption."<br />

It is a mistake to use the term "OC" as though it denotes a clear and well-defined<br />

phenomenon. <strong>The</strong> evidence regarding OC "shows a less well-organized, very diversified<br />

landscape of organizing criminals…the economic activities of these organizing criminals<br />

can be better described from the viewpoint of 'crime enterprises' than from a<br />

conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the<br />

‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption<br />

to achieve its goals, and its extra-jurisdictional character….OC may appear in many<br />

forms at different times and in different places. Due to the variety of definitions, there is<br />

“evident danger” in asking “what is OC?” and expecting a simple answer.<br />

<strong>The</strong> Locus of Power and <strong>Organized</strong> <strong>Crime</strong><br />

Some espouse that all organized crime operates at an international level, though there<br />

is currently no international court capable of trying offenses resulting from such activities<br />

Page 43 of 372


(the <strong>In</strong>ternational Criminal Court’s remit extends only to dealing with people accused of<br />

offenses against humanity, e.g., genocide). If a network operates primarily from one<br />

jurisdiction and carries out its illicit operations there and in some other jurisdictions it is<br />

‘international,' though it may be appropriate to use the term ‘transnational’ only to label<br />

the activities of a major crime group that is centered in no one jurisdiction but operating<br />

in many. <strong>The</strong> understanding of organized crime has therefore progressed to combined<br />

internationalization and an understanding of social conflict into one of power, control,<br />

efficiency risk and utility, all within the context of organizational theory. <strong>The</strong><br />

accumulation of social, economic and political power have sustained themselves as a<br />

core concerns of all criminal organizations:<br />

<br />

<br />

<br />

social: criminal groups seek to develop social control in relation to particular<br />

communities;<br />

economic: seek to exert influence by means of corruption and by coercion of<br />

legitimate and illegitimate praxis; and,<br />

political: criminal groups use corruption and violence to attain power and status.<br />

Contemporary organized crime may be very different from traditional Mafia style,<br />

particularly in terms of the distribution and centralization of power, authority structures<br />

and the concept of 'control' over one's territory and organization. <strong>The</strong>re is a tendency<br />

away from centralization of power and reliance upon family ties towards a fragmentation<br />

of structures and informality of relationships in crime groups. <strong>Organized</strong> crime most<br />

typically flourishes when a central government and civil society is disorganized, weak,<br />

absent or untrusted.<br />

This may occur in a society facing periods of political, economic or social turmoil or<br />

transition, such as a change of government or a period of rapid economic development,<br />

particularly if the society lacks strong and established institutions and the rule of law.<br />

<strong>The</strong> dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that<br />

saw the downfall of the Communist Bloc created a breeding ground for criminal<br />

organizations.<br />

<strong>The</strong> newest growth sectors for organized crime are identity theft and online extortion.<br />

<strong>The</strong>se activities are troubling because they discourage consumers from using the<br />

<strong>In</strong>ternet for e-commerce. E-commerce was supposed to level the playing ground<br />

between small and large businesses, but the growth of online organized crime is leading<br />

to the opposite effect; large businesses are able to afford more bandwidth (to resist<br />

denial-of-service attacks) and superior security. Furthermore, organized crime using the<br />

<strong>In</strong>ternet is much harder to trace down for the police (even though they increasingly<br />

deploy cybercops) since most police forces and law enforcement agencies operate<br />

within a local or national jurisdiction while the <strong>In</strong>ternet makes it easier for criminal<br />

organizations to operate across such boundaries without detection.<br />

<strong>In</strong> the past criminal organizations have naturally limited themselves by their need to<br />

expand, putting them in competition with each other. This competition, often leading to<br />

violence, uses valuable resources such as manpower (either killed or sent to prison),<br />

Page 44 of 372


equipment and finances. <strong>In</strong> the United States, James "Whitey" Bulger, the Irish Mob<br />

boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of<br />

<strong>In</strong>vestigation (FBI). He used this position to eliminate competition and consolidate<br />

power within the city of Boston which led to the imprisonment of several senior<br />

organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime<br />

family. <strong>In</strong>fighting sometimes occurs within an organization, such as the Castellamarese<br />

war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.<br />

Today criminal organizations are increasingly working together, realizing that it is better<br />

to work in cooperation rather than in competition with each other (once again,<br />

consolidating power). This has led to the rise of global criminal organizations such as<br />

Mara Salvatrucha, 18th Street gang, and Barrio Azteca. <strong>The</strong> American Mafia, in addition<br />

to having links with organized crime groups in Italy such as the Camorra, the<br />

'Ndrangheta, Sacra Corona Unita, and Sicilian Mafia, has at various times done<br />

business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza,<br />

<strong>In</strong>dian Mafia, the Russian Mafia, Thief in law, and Post-Soviet <strong>Organized</strong> crime groups,<br />

the Chinese Triads, Chinese Tongs, and Asian street gangs, Motorcycle Gangs, and<br />

numerous White, Black, and Hispanic prison and street gangs. <strong>The</strong> United Nations<br />

Office on Drugs and <strong>Crime</strong> estimated that organized crime groups held $322 billion in<br />

assets in 2005.<br />

This rise in cooperation between criminal organizations has meant that law enforcement<br />

agencies are increasingly having to work together. <strong>The</strong> FBI operates an organized<br />

crime section from its headquarters in Washington, D.C. and is known to work with<br />

other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB), and the<br />

Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms,<br />

Page 45 of 372


and Explosives, Drug Enforcement Administration, United States Marshals Service,<br />

Immigration and Customs Enforcement, United States Secret Service, US Diplomatic<br />

Security Service, United States Postal <strong>In</strong>spection Service, U.S. Customs and Border<br />

Protection, United States Border Patrol, and the United States Coast Guard), state (e.g.,<br />

Massachusetts State Police Special <strong>In</strong>vestigation Unit, <strong>New</strong> Jersey State Police<br />

organized crime unit, Pennsylvania State Police organized crime unit, and the <strong>New</strong> York<br />

State Police Bureau of Criminal <strong>In</strong>vestigation) and city (e.g., <strong>New</strong> York City Police<br />

Department <strong>Organized</strong> <strong>Crime</strong> Unit, Philadelphia Police Department <strong>Organized</strong> crime<br />

unit, Chicago Police <strong>Organized</strong> <strong>Crime</strong> Unit, and the Los Angeles Police Department<br />

Special Operations Division) law enforcement agencies.<br />

Rational Choice<br />

<strong>The</strong>oretical Background<br />

Criminal Psychology<br />

This theory treats all individuals as rational operators, committing criminal acts after<br />

consideration of all associated risks (detection and punishment) compared with the<br />

rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’<br />

emotional state. <strong>The</strong> role of criminal organizations in lowering the perceptions of risk<br />

and increasing the likelihood of personal benefit is prioritized by this approach, with the<br />

organizations structure, purpose, and activity being indicative of the rational choices<br />

made by criminals and their organizers.<br />

Deterrence<br />

This theory sees criminal behavior as reflective of an individual, internal calculation by<br />

the criminal that the benefits associated with offending (whether financial or otherwise)<br />

outweigh the perceived risks. <strong>The</strong> perceived strength, importance or infallibility of the<br />

criminal organization is directly proportional to the types of crime committed, their<br />

intensity and arguably the level of community response. <strong>The</strong> benefits of participating in<br />

organized crime (higher financial rewards, greater socioeconomic control and influence,<br />

protection of the family or significant others, perceived freedoms from 'oppressive' laws<br />

or norms) contribute greatly to the psychology behind highly organized group offending.<br />

Social Learning<br />

Criminals learn through associations with one another. <strong>The</strong> success of organized crime<br />

groups is therefore dependent upon the strength of their communication and the<br />

enforcement of their value systems, the recruitment and training processes employed to<br />

sustain, build or fill gaps in criminal operations. An understanding of this theory sees<br />

close associations between criminals, imitation of superiors, and understanding of value<br />

systems, processes and authority as the main drivers behind organized crime.<br />

<strong>In</strong>terpersonal relationships define the motivations the individual develops, with the effect<br />

of family or peer criminal activity being a strong predictor of inter-generational offending.<br />

Page 46 of 372


This theory also developed to include the strengths and weaknesses of reinforcement,<br />

which in the context of continuing criminal enterprises may be used to help understand<br />

propensities for certain crimes or victims, level of integration into the mainstream culture<br />

and likelihood of recidivism / success in rehabilitation.<br />

Enterprise<br />

Under this theory, organized crime exists because legitimate markets leave many<br />

customers and potential customers unsatisfied. High demand for a particular good or<br />

service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high<br />

profits lead to a conducive environment for entrepreneurial criminal groups to enter the<br />

market and profit by supplying those goods and services. For success, there must be:<br />

<br />

<br />

an identified market; and,<br />

a certain rate of consumption (demand) to maintain profit and outweigh perceived<br />

risks.<br />

Under these conditions competition is discouraged, ensuring criminal monopolies<br />

sustain profits. Legal substitution of goods or services may (by increasing competition)<br />

force the dynamic of organized criminal operations to adjust, as will deterrence<br />

measures (reducing demand), and the restriction of resources (controlling the ability to<br />

supply or produce to supply).<br />

Page 47 of 372


Differential Association<br />

Sutherland goes further to say that deviancy is contingent on conflicting groups within<br />

society, and that such groups struggle over the means to define what is criminal or<br />

deviant within society. Criminal organizations therefore gravitate around illegal avenues<br />

of production, profit-making, protectionism or social control and attempt (by increasing<br />

their operations or membership) to make these acceptable. This also explains the<br />

propensity of criminal organizations to develop protection rackets, to coerce through the<br />

use of violence, aggression and threatening behavior (at times termed 'terrorism').<br />

Preoccupation with methods of accumulating profit highlight the lack of legitimate<br />

means to achieve economic or social advantage, as does the organization of whitecollar<br />

crime or political corruption (though it is debatable whether these are based on<br />

wealth, power or both). <strong>The</strong> ability to effect social norms and practices through political<br />

and economic influence (and the enforcement or normalization of criminogenic needs)<br />

may be defined by differential association theory.<br />

Social Disorganization<br />

Critical Criminology and Sociology<br />

Social disorganization theory is intended to be applied to neighborhood level street<br />

crime, thus the context of gang activity, loosely formed criminal associations or<br />

networks, socioeconomic demographic impacts, legitimate access to public resources,<br />

employment or education, and mobility give it relevance to organized crime. Where the<br />

upper- and lower-classes live in close proximity this can result in feelings of anger,<br />

hostility, social injustice and frustration. Criminals experience poverty; and witness<br />

affluence they are deprived of and which is virtually impossible for them to attain<br />

through conventional means. <strong>The</strong> concept of neighborhood is central to this theory, as it<br />

defines the social learning, locus of control, cultural influences and access to social<br />

opportunity experienced by criminals and the groups they form. Fear of or lack of trust in<br />

mainstream authority may also be a key contributor to social disorganization; organized<br />

crime groups replicate such figures and thus ensure control over the counter-culture.<br />

This theory has tended to view violent or anti-social behavior by gangs as reflective of<br />

their social disorganization rather than as a product or tool of their organization.<br />

Anomie<br />

Sociologist Robert K. Merton believed deviance depended on society’s definition of<br />

success, and the desires of individuals to achieve success through socially defined<br />

avenues. Criminality becomes attractive when expectations of being able to fulfill goals<br />

(therefore achieving success) by legitimate means cannot be fulfilled. Criminal<br />

organizations capitalize on states of normlessness by imposing criminogenic needs and<br />

illicit avenues to achieve them. This has been used as the basis for numerous metatheories<br />

of organized crime through its integration of social learning, cultural deviance,<br />

and criminogenic motivations. If crime is seen as a function of anomie, organized<br />

Page 48 of 372


ehavior produces stability, increases protection or security, and may be directly<br />

proportional to market forces as expressed by entrepreneurship- or risk-based<br />

approaches. It is the inadequate supply of legitimate opportunities that constrains the<br />

ability for the individual to pursue valued societal goals and reduces the likelihood that<br />

using legitimate opportunities will enable them to satisfy such goals (due to their<br />

position in society).<br />

Cultural Deviance<br />

Criminals violate the law because they belong to a unique subculture - the counterculture<br />

- their values and norms conflicting with those of the working-, middle- or upperclasses<br />

upon which criminal laws are based. This subculture shares an alternative<br />

lifestyle, language and culture, and is generally typified by being tough, taking care of<br />

their own affairs and rejecting government authority. Role models include drug dealers,<br />

thieves and pimps, as they have achieved success and wealth not otherwise available<br />

through socially-provided opportunities. It is through modeling organized crime as a<br />

counter-cultural avenue to success that such organizations are sustained.<br />

Alien Conspiracy/Queer Ladder of Mobility<br />

<strong>The</strong> alien conspiracy theory and queer ladder of mobility theories state that ethnicity and<br />

'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and<br />

their influences are thought to dictate the prevalence of organized crime in society. <strong>The</strong><br />

alien theory posits that the contemporary structures of organized crime gained<br />

prominence during the 1860s in Sicily and that elements of the Sicilian population are<br />

responsible for the foundation of most European and North American organized crime,<br />

made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of<br />

mobility' hypothesized that 'ethnic succession' (the attainment of power and control by<br />

one more marginalized ethnic group over other less marginalized groups) occurs by<br />

Page 49 of 372


promoting the perpetration of criminal activities within a disenfranchised or oppressed<br />

demographic. Whilst early organized crime was dominated by the Irish Mob (early<br />

1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia,<br />

the Aryan Brotherhood (1960s onwards), Colombian Medellin cartel and Cali cartel<br />

(mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s<br />

onwards), Mexican Los Zetas (late 1990s to onwards), the Russian Mafia (1988<br />

onwards), terrorism-related organized crime Al-Qaeda (1988 onwards), the Taliban<br />

(1994 onwards), and Islamic State of Iraq and the Levant (ISIL) (2010s to onwards).<br />

Many argue this misinterprets and overstates the role of ethnicity in organized crime. A<br />

contradiction of this theory is that syndicates had developed long before large-scale<br />

Sicilian immigration in 1860s, with these immigrants merely joining a widespread<br />

phenomenon of crime and corruption.<br />

Legislative Frameworks and Policing Measures<br />

<strong>In</strong>ternational<br />

Convention against Transnational <strong>Organized</strong> <strong>Crime</strong> (the 'Palermo Convention') -<br />

the international treaty against organized crime; includes the Protocol to Prevent,<br />

Suppress and Punish Trafficking in Persons, especially Women and Children and<br />

the Protocol against the Smuggling of Migrants by Land, Sea and Air<br />

Canada<br />

<strong>In</strong>dia<br />

Criminal Code, RSC 1985, c C-46, ss 467.1 to 467.2.<br />

<br />

Maharashtra Control of Organised <strong>Crime</strong> Act<br />

Republic of Ireland<br />

<br />

Criminal Assets Bureau<br />

Italy<br />

<br />

Article 41-bis prison regime<br />

United Kingdom<br />

Serious <strong>Organized</strong> <strong>Crime</strong> and Police Act 2005<br />

United States<br />

Federal Anti-Racketeering Act (the 'Hobbs Act') 1946<br />

Federal Wire Act 1961<br />

Page 50 of 372


Bank Secrecy Act 1970<br />

<strong>Organized</strong> <strong>Crime</strong> Control Act 1970<br />

Title 21 of the United States Code 1970<br />

Continuing Criminal Enterprise (contemporary)<br />

Racketeer <strong>In</strong>fluenced and Corrupt Organizations Act (the 'RICO Act') 1970<br />

Money Laundering Control Act 1986<br />

United States Patriot Act 2001<br />

Fraud Enforcement and Recovery Act of 2009<br />

By nation<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

List of criminal enterprises, gangs and syndicates<br />

<strong>Organized</strong> crime in Afghanistan<br />

<strong>Organized</strong> crime in Albania<br />

<strong>Organized</strong> crime in Australia<br />

<strong>Organized</strong> crime in Brazil<br />

<strong>Organized</strong> crime in Bulgaria<br />

Category: <strong>Organized</strong> crime in Canada<br />

<strong>Organized</strong> crime in China<br />

<strong>Organized</strong> crime in France<br />

<strong>Organized</strong> crime in Greece<br />

<strong>Organized</strong> crime in <strong>In</strong>dia<br />

<strong>Organized</strong> crime in Ireland<br />

<strong>Organized</strong> crime in Italy<br />

<strong>Organized</strong> crime in Japan<br />

<strong>Organized</strong> crime in Kenya<br />

<strong>Organized</strong> crime in Kyrgyzstan<br />

<strong>Organized</strong> crime in Lebanon<br />

<strong>Organized</strong> crime in the Netherlands<br />

<strong>Organized</strong> crime in Nigeria<br />

<strong>Organized</strong> crime in Pakistan<br />

<strong>Organized</strong> crime in Russia<br />

<strong>Organized</strong> crime in South Korea<br />

<strong>Organized</strong> crime in Sweden<br />

<strong>Organized</strong> crime in Turkey<br />

<strong>Organized</strong> crime in Ukraine<br />

<strong>Organized</strong> crime in the United Kingdom<br />

Category: <strong>Organized</strong> crime in the United States<br />

<strong>Organized</strong> crime in Vietnam<br />

________<br />

Page 51 of 372


White Collar <strong>Crime</strong><br />

White-Collar <strong>Crime</strong> (or corporate crime, more correctly) refers to financially motivated,<br />

nonviolent crime committed by businesses and government professionals. It was first<br />

defined by sociologist Edwin Sutherland in 1939 as "a crime committed by a person of<br />

respectability and high social status in the course of their occupation". Typical whitecollar<br />

crimes could include wage theft, fraud, bribery, Ponzi schemes, insider<br />

trading, labor racketeering, embezzlement, cybercrime, copyright infringement, money<br />

laundering, identity theft, and forgery. Lawyers can specialize in white-collar crime.<br />

Definitional Issues<br />

Modern criminology generally rejects a limitation of the term by reference, rather it<br />

classifies the type of crime and the topic:<br />

<br />

<br />

<br />

By the type of offense, e.g., property crime, economic crime, and other corporate<br />

crimes like environmental and health and safety law violations. Some crime is<br />

only possible because of the identity of the offender, e.g., transnational money<br />

laundering requires the participation of senior officers employed in banks. But<br />

the FBI has adopted the narrow approach, defining white-collar crime as "those<br />

illegal acts which are characterized by deceit, concealment, or violation of trust<br />

and which are not dependent upon the application or threat of physical force or<br />

violence" (1989, 3). While the true extent and cost of white-collar crime are<br />

unknown, the FBI and the Association of Certified Fraud Examiners estimate the<br />

annual cost to the United States to fall between $300 and $660 billion.<br />

By the type of offender, e.g., by social class or high socioeconomic status, the<br />

occupation of positions of trust or profession, or academic qualification,<br />

researching the motivations for criminal MAFIA behavior, e.g., greed or fear of<br />

loss of face if economic difficulties become obvious. Shover and Wright point to<br />

the essential neutrality of a crime as enacted in a statute. It almost inevitably<br />

describes conduct in the abstract, not by reference to the character of the<br />

persons performing it. Thus, the only way that one crime differs from another is in<br />

the backgrounds and characteristics of its perpetrators.<br />

By organizational culture rather than the offender or offense which overlaps<br />

with organized crime. Appelbaum and Chambliss offer a twofold definition:<br />

<br />

<br />

Occupational crime which occurs when crimes are committed to promote<br />

personal interests, say, by altering records and overcharging, or by the<br />

cheating of clients by professionals.<br />

Organizational or corporate crime which occurs when corporate<br />

executives commit criminal acts to benefit their company by overcharging<br />

or price fixing, false advertising, etc.<br />

Page 52 of 372


Relationship to Other Types of <strong>Crime</strong><br />

Blue-Collar <strong>Crime</strong><br />

<strong>The</strong> types of crime committed are a function of what is available to the potential<br />

offender. Thus, those employed in relatively unskilled environments have fewer<br />

opportunities to exploit than those who work in situations where large financial<br />

transactions occur. Blue-collar crime tends to be more obvious and thus attracts more<br />

active police attention such as vandalism or shoplifting. <strong>In</strong> contrast, white-collar<br />

employees can incorporate legitimate and criminal behavior, thus making themselves<br />

less obvious when committing the crime. <strong>The</strong>refore, blue-collar crime will more often<br />

use physical force, whereas in the corporate world, the identification of a victim is less<br />

obvious and the issue of reporting is complicated by a culture of commercial<br />

confidentiality to protect shareholder value. It is estimated that a great deal of whitecollar<br />

crime is undetected or, if detected, it is not reported.<br />

Corporate<br />

<strong>Crime</strong><br />

Corporate<br />

crime deals<br />

with the<br />

company as<br />

a whole. <strong>The</strong><br />

crime<br />

benefits the<br />

investors or<br />

the individuals who are in high positions in the company or corporation. White-collar<br />

crime and corporate crime are similar because they take place within the business<br />

world. <strong>The</strong> difference is that white-collar crime benefits the individual(s) involved, and<br />

corporate crime benefits the company or the corporation.<br />

One well-known insider trading case in the United States is the ImClone stock trading<br />

case. <strong>In</strong> December 2001, top-level executives sold their shares in ImClone Systems, a<br />

pharmaceutical company that manufactured an anti-cancer drug.<br />

<strong>The</strong> U.S. Securities and Exchange Commission (SEC) investigated numerous top-level<br />

executives, as well as Martha Stewart, a friend of ImClone's former chief executive who<br />

had also sold her shares at the same time. <strong>The</strong> SEC reached a settlement in 2005.<br />

State-Corporate <strong>Crime</strong><br />

<strong>The</strong> negotiation of agreements between a state and a corporation will be at a relatively<br />

senior level on both sides, this is almost exclusively a white-collar "situation" which<br />

offers the opportunity for crime. Although law enforcement claims to have prioritized<br />

white-collar crime, evidence shows that it continues to be a low priority.<br />

Page 53 of 372


When senior levels of a corporation engage in criminal activity using the company this is<br />

sometimes called control fraud.<br />

<strong>Organized</strong> Transnational <strong>Crime</strong><br />

<strong>Organized</strong> transnational crime is organized criminal activity that takes place across<br />

national jurisdictions, and with advances in transportation and information technology,<br />

law enforcement officials and policymakers have needed to respond to this form of<br />

crime on a global scale. Some examples include human trafficking, money<br />

laundering, drug smuggling, illegal arms dealing, terrorism, and cybercrime. Although it<br />

is impossible to precisely gauge transnational crime, the <strong>Millennium</strong> Project, an<br />

international think tank, assembled statistics on several aspects of transnational crime<br />

in 2009:<br />

<br />

<br />

<br />

World illicit trade of almost $780 billion<br />

Counterfeiting and piracy of $300 billion to $1 trillion<br />

Global drug trade of $321 billion<br />

Occupational <strong>Crime</strong><br />

<strong>In</strong>dividuals may commit crime during employment or unemployment. <strong>The</strong> two most<br />

common forms are theft and fraud. <strong>The</strong>ft can be of varying degrees, from a pencil to<br />

furnishings to a car. <strong>In</strong>sider trading, the trading of stock by someone with access to<br />

publicly unavailable information, is a type of fraud.<br />

<strong>Crime</strong>s Related To National <strong>In</strong>terests<br />

<strong>In</strong> the modern world, there are a lot of nations which divide the crimes into some laws.<br />

"<strong>Crime</strong>s Related to <strong>In</strong>ducement of Foreign Aggression" is the crime of communicating<br />

with aliens secretly to cause foreign aggression or menace.<br />

"<strong>Crime</strong>s Related to Foreign Aggression" is the treason of cooperating with foreign<br />

aggression positively regardless of the national inside and outside. "<strong>Crime</strong>s Related to<br />

<strong>In</strong>surrection" is the internal treason. Depending on a country, conspiracy is added to<br />

these. One example is Jho Low, a mega thief and traitor who stole billions in USA<br />

currency from a Malaysian government fund and is now on a run as a fugitive.<br />

Demographics<br />

According to a 2016 study,<br />

A considerable percentage of white-collar offenders are gainfully employed middle-aged<br />

Caucasian men who usually commit their first whitecollar offense sometime between their late<br />

thirties through their mid-forties and appear to have middle-class backgrounds. Most have some<br />

higher education, are married, and have moderate to strong ties to community, family, and<br />

religious organizations. White collar offenders usually have a criminal history, including infractions<br />

Page 54 of 372


that span the spectrum of illegality, but many do not overindulge in vice. Recent research<br />

examining the five-factor personality trait model determined that white-collar offenders tend to be<br />

more neurotic and less agreeable and conscientious than their non-criminal counterparts.<br />

Punishment<br />

<strong>In</strong> the United States, sentences for white-collar crimes may include a combination<br />

of imprisonment, fines, restitution, community service, disgorgement, probation, or other<br />

alternative punishment. <strong>The</strong>se punishments grew harsher after the Jeffrey<br />

Skilling and Enronscandal, when the Sarbanes–Oxley Act of 2002 was passed by<br />

the United States Congress and signed into law by President George W. Bush, defining<br />

new crimes and<br />

increasing the<br />

penalties for crimes<br />

such as mail and wire<br />

fraud. <strong>In</strong> other<br />

countries, such<br />

as China, white-collar<br />

criminals can be given<br />

the death penalty, yet<br />

some countries have a<br />

maximum of 10–25<br />

years imprisonment.<br />

Certain countries<br />

like Canada consider<br />

the relationship<br />

between the parties to<br />

be a significant feature<br />

on sentence when<br />

there is a breach of<br />

trust component<br />

involved. Questions<br />

about sentencing<br />

disparity in white-collar crime continue to be debated.<br />

Although, white-collar crime poses a serious threat in today's society, it becomes<br />

extremely difficult to identify. <strong>The</strong> FBI, concerned with identifying this type of offense,<br />

collects annual statistical information on only three categories: fraud,<br />

counterfeiting/forgery, and embezzlement. All other types of white-collar crime are listed<br />

in an, "miscellaneous" category.<br />

<strong>In</strong> the United States, the longest sentences for white-collar crimes have been for the<br />

following: Sholam Weiss (845 years for racketeering, wire fraud and money laundering<br />

in connection with the collapse of National Heritage Life <strong>In</strong>surance Company); Norman<br />

Schmidt and Charles Lewis (330 years and 30 years, respectively, for "high-yield<br />

investment" scheme); Bernard Madoff (150 years for $65 billion fraud scheme);<br />

Page 55 of 372


Frederick Brandau (55 years for $117 million Ponzi scheme); Eduardo Masferrer (30<br />

years for accounting fraud); Chalana McFarland (30 years for mortgage fraud scheme);<br />

Lance Poulsen (30 years for $2.9 billion fraud).<br />

Page 56 of 372


II. Arms Trafficking<br />

Arms Trafficking, also known as gunrunning, is the trafficking of contraband weapons<br />

and ammunition. What constitutes legal trade in firearms varies widely, depending on<br />

local and national laws.<br />

<strong>The</strong> 1999 Report of the UN Panel of Governmental Experts on Small Arms provides a<br />

more refined and precise definition, which has become internationally accepted. This<br />

Page 57 of 372


distinguishes between small arms (revolvers and self-loading pistols, rifles and<br />

carbines, submachine guns, assault rifles, and light machine guns), which are weapons<br />

designed for personal use, and light weapons (heavy machine guns, hand-held underbarrel<br />

and mounted grenade launchers, portable anti-aircraft guns, portable anti-tanks<br />

guns, recoilless rifles, portable launchers of anti-aircraft missile systems, and mortars of<br />

calibres less than 100 mm), which are designed for use by several persons serving as a<br />

unit. Ammunition and explosives also form an integral part of small arms and light<br />

weapons used in conflict.<br />

Areas<br />

Impact<br />

Although arms trafficking is widespread in regions of political turmoil, it is not limited to<br />

such areas, and for example, in South Asia, an estimated 63 million guns have been<br />

trafficked into <strong>In</strong>dia and Pakistan.<br />

<strong>The</strong> suppression of gunrunning is one of the areas of increasing interest in the context<br />

of international law. Examples of past and current gunrunning include:<br />

<br />

<br />

<br />

Iran–Contra affair<br />

Larne gun-running<br />

Provisional Irish Republican Army arms importation<br />

<strong>In</strong> the United States, the term "Iron Pipeline" is sometimes used to describe <strong>In</strong>terstate<br />

Highway 95 and its connector highways as a corridor for arms trafficking into <strong>New</strong> York<br />

City.<br />

Africa<br />

Liberia and Sierra Leone Conflict<br />

<strong>The</strong> civil war in Sierra Leone lasted from 1991-2002, and left 75,000 people dead. Arms<br />

Trafficking played a significant role in this conflict. Both small and large arms were<br />

shipped to all sides in both Sierra Leone, and Liberia from outside actors. Small arms<br />

being any handheld gun (pistol, assault rifle, sub machine gun, shotgun,) and other<br />

items such as grenades, claymores, knives, machetes, etc. Large arms indicates large<br />

amounts of explosives, missiles, light machine guns, mortars, anti tank missiles, tanks,<br />

planes, etc. During this time a civil war was occurring in nearby Liberia. <strong>The</strong> Liberian<br />

Civil War took place from 1989 through 1997. <strong>The</strong> war was between the existing<br />

government and the National Patriotic Front. Leader of the National Patriotic front of<br />

Liberia, Charles Taylor, helped to create the Revolutionary United Front (RUF) in Sierra<br />

Leone. Taylor was the recipient of thousands of illegally trafficked arms from easter<br />

Europe (mostly the Ukraine). Taylor then sold some of these weapons to the RUF in<br />

exchange for diamonds. President of Burkina Faso, Blaise Compaore, “directly<br />

facilitated Liberia’s arms-for-diamonds trade” with Liberia and Sierra Leone. Compaore<br />

Page 58 of 372


would give guns to Taylor, who would then sell them to the RUF in exchange for<br />

diamonds. <strong>The</strong>se blood diamonds would then be sold back to Compaore for more<br />

guns. <strong>The</strong> cyclical exchange allowed Compaore the ability to deny directly sending arms<br />

to Sierra Leone.<br />

<strong>The</strong> Liberian government received arms through an elaborate from company in<br />

Guinea. <strong>The</strong> arms were intended to be shipped (legally) from Uganda to Slovakia,<br />

however, the arms were diverted to Guinea as a par of “an elaborate bait and switch.”<br />

Additionally the British government “encouraged Sandline <strong>In</strong>ternational, a private<br />

security firm and non state entity, to supply arms and ammunitions to the loyal forces of<br />

the exiled government of President Kabbah.” Sandline proceeded 35 tons of arms from<br />

Bulgaria, to Kabbah’s forces.<br />

Why Traffickers Choose Africa<br />

Kimberly Thachuk and Karen<br />

Saunders argue that arms<br />

trafficking is no different from any<br />

other illegal business in their<br />

work Under the Radar: Airborne<br />

Arms Trafficking Operations in<br />

Africa. Traffickers first need a<br />

headquarters, or somewhere to<br />

base their operations. A<br />

headquarters needs several<br />

aspects to make it an ideal place<br />

to traffic weapons. First, the<br />

headquarters should have<br />

appropriate infrastructure. For a<br />

weapons trafficking this would<br />

include a landing strip for both<br />

importation and exportation.<br />

Additionally, warehouses are<br />

needed to “store product<br />

awaiting delivery." Once the<br />

product has arrived and been<br />

stored it needs to be delivered to<br />

the customer, thus, the<br />

headquarters should be in<br />

somewhat of a central location<br />

near each customer. This is not<br />

the primary reason many<br />

traffickers choose Africa certainly<br />

has multitudes of unoccupied land that can be used by traffickers, as is asserted by<br />

Thachuk and Saunders.<br />

Page 59 of 372


Physical space is important but the rules and regulations of said space are also<br />

relevant. Traffickers look for places with corrupt, supply side, officials that can either be<br />

bribed, or blackmailed. This allows the trafficker to “circumvent the regulatory and<br />

oversight systems” put in place by the government. Furthermore, a “lax financial<br />

system” is key so the large amounts of money moved by the trafficker are not seen as<br />

suspicious.<br />

Thachuk and Saunders finish their argument, a stable, and highly centralized<br />

government, is important. <strong>The</strong>y then point out that 10 different African countries have<br />

leaders that have been in power for more than 20 years, which they argue meets the<br />

criteria a highly centralized and stable government.<br />

Market Value<br />

<strong>The</strong> total value of the global arms market is estimated around $60 billion a year, with<br />

around $8 billion attributed to pistols, rifles, machine guns, and bullets. <strong>The</strong> total illegal<br />

arms trade is harder to estimate, but the illicit small arms market has been estimated at<br />

10–20% of the total global arms trade.<br />

Notable Arms Dealers<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Ali Fayad<br />

Monzer al-Kassar<br />

Pierre Beaumarchais<br />

Viktor Bout<br />

Samuel Cummings<br />

Arcadi Gaydamak<br />

Adnan Khashoggi<br />

Leonid Minin<br />

Sarkis Soghanalian<br />

Dale Stoffel<br />

Gerhard Mertins<br />

John Nardi<br />

Basil Zaharoff<br />

Efraim Diveroli<br />

<strong>In</strong> Popular Culture<br />

Film<br />

<br />

Lord of War (2005), a fictional crime war film in which Nicolas Cage plays an<br />

illegal arms dealer similar to the post-Soviet arms dealer Viktor Bout; the film was<br />

endorsed by Amnesty <strong>In</strong>ternational for highlighting the arms trafficking by the<br />

international arms industry<br />

Page 60 of 372


Making a Killing: <strong>In</strong>side the <strong>In</strong>ternational Arms Trade (2006), a 15-minute<br />

documentary included in the two-Disc Special Edition DVD of Lord of War (2005).<br />

Numerous other documentaries about arms trafficking are linked on this film's<br />

YouTube page.<br />

Iron Man (2008), a superhero film in which based on the Marvel Comics<br />

character of the same name, centering inventor Tony Stark (Robert Downey Jr.)<br />

discovers his company has been arms trafficking weapons of his own designs to<br />

criminals worldwide, and seeks to stop his corrupt executives and other<br />

employees by becoming the technologically advanced superhero Iron Man.<br />

<br />

<br />

War Dogs (2016), a black<br />

comedy-drama biographical<br />

film based on the true story<br />

of two young men, David<br />

Packouz and Efraim Diveroli,<br />

who won a $300 million<br />

contract from the Pentagon<br />

to arm America's allies in<br />

Afghanistan who later<br />

became involved in arms<br />

trafficking.<br />

Shot Caller (2017), a crime<br />

thriller in which recently<br />

paroled felon Jacob "Money"<br />

Harlon, is forced by his gang<br />

shot caller to orchestrate a<br />

major arms deal with an<br />

allied Sureno gang.<br />

<br />

<strong>The</strong> Chosen (1981), in one scene, Reuven, an Orthodox Jew in 1940's <strong>New</strong><br />

York, and some classmates are seen smuggling into the docks at <strong>New</strong> York<br />

Harbor and placing crates full of rifles labeled "Farm Equipment" on a ship bound<br />

for Haifa for the Israeli guerrilla fighters in the Arab-Israeli War. This scene also<br />

occurs in the book on which the movie is based.<br />

Television<br />

<br />

<br />

Sons of Anarchy, a FX-TV series about a fictional outlaw motorcycle club whose<br />

main source of income is trafficking arms to a variety of criminal enterprises<br />

domestically and internationally.<br />

Death in Paradise Series 3, Episode 5, features Simon Shepherd as Jacob<br />

Doran, Saint Marie's Minister for Commerce, who is later found out by Humphrey<br />

Goodman to be a gunrunner.<br />

Page 61 of 372


Jormungand, an anime television series based on the manga series by Keitarō<br />

Takahashi, produced by White Fox, which addresses the issue of arms trafficking<br />

in the Middle East and throughout the European continent.<br />

<strong>The</strong> Night Manager, a BBC miniseries where a former British soldier who is<br />

currently a night manager in hotels infiltrates the inner circle of an arms dealer.<br />

Video Games<br />

<br />

<br />

Grand <strong>The</strong>ft Auto V's multiplayer platform, GTA Online, has a downloadable<br />

content pack revolving around manufacturing and distributing illegal arms<br />

through smuggling operations and missions included in "Gunrunning".<br />

Mafia III, one of Lincoln Clay's underbosses, Haitian crime lord Cassandra, runs<br />

gun rackets.<br />

Page 62 of 372


III. Bribery<br />

Bribery is the act of giving or receiving something of value in exchange for some kind of<br />

influence or action in return, that the recipient would otherwise not offer. Bribery is<br />

defined by Black's Law Dictionary as the offering, giving, receiving, or soliciting of any<br />

item of value to influence the actions of an official or other person in charge of a public<br />

or legal duty. Essentially, bribery is offering to do something for someone for the<br />

expressed purpose of receiving something in exchange. Gifts of money or other items of<br />

value which are otherwise available to everyone on an equivalent basis, and not for<br />

dishonest purposes, is not bribery. Offering a discount or a refund to all purchasers is a<br />

legal rebate and is not bribery. For example, it is legal for an employee of a Public<br />

Utilities Commission involved in electric rate regulation to accept a rebate on electric<br />

service that reduces their cost for electricity, when the rebate is available to other<br />

residential electric customers. Giving the rebate to influence them to look favorably on<br />

the electric utility's rate increase applications, however, would be considered bribery.<br />

A bribe is the gift bestowed to influence the recipient's conduct. It may be money,<br />

goods, rights in action, property, preferment, privilege, emolument, objects of value,<br />

advantage, or merely a promise to induce or influence the action, vote, or influence of a<br />

person in an official or public capacity.<br />

Page 63 of 372


Forms<br />

Many types of payments or favors can constitute bribes: tip, gift, sop, perk, skim, favor,<br />

discount, waived fee/ticket, free food, free ad, free trip, free tickets, sweetheart deal,<br />

kickback/payback, funding, inflated sale of an object or property, lucrative contract,<br />

donation, campaign contribution, fundraiser, sponsorship/backing, higher paying job,<br />

stock options, secret commission, or promotion (rise of position/rank).<br />

One must be careful of differing social and cultural norms when examining bribery.<br />

Expectations of when a monetary transaction is appropriate can differ from place to<br />

place. Political campaign contributions in the form of cash, for example, are considered<br />

criminal acts of bribery in some countries, while in the United States, provided they<br />

adhere to election law, are legal. Tipping, for example, is considered bribery in some<br />

societies, while in others the two concepts may not be interchangeable.<br />

<strong>In</strong> some Spanish-speaking countries, bribes are referred to as "mordida" (literally,<br />

"bite"). <strong>In</strong> Arab countries, bribes may be called baksheesh (a tip, gift, or gratuity) or<br />

"shay" (literally, "tea"). French-speaking countries often use the expressions "dessousde-table"<br />

("under-the-table" commissions), "pot-de-vin" (literally, "wine-pot"), or<br />

"commission occulte" ("secret commission" or "kickback"). While the last two<br />

expressions contain inherently a negative connotation, the expression "dessous-detable"<br />

can be often understood as a commonly accepted business practice. <strong>In</strong> German,<br />

the common term is Schmiergeld ("smoothing money").<br />

<strong>The</strong> offence may be divided into two great classes: the one, where a person invested<br />

with power is induced by payment to use it unjustly; the other, where power is obtained<br />

by purchasing the suffrages of those who can impart it. Likewise, the briber might hold a<br />

powerful role and control the transaction; or in other cases, a bribe may be effectively<br />

extracted from the person paying it, although this is better known as extortion.<br />

<strong>The</strong> forms that bribery take are numerous. For example, a motorist might bribe a police<br />

officer not to issue a ticket for speeding, a citizen seeking paperwork or utility line<br />

connections might bribe a functionary for faster service.<br />

Bribery may also take the form of a secret commission, a profit made by an agent, in the<br />

course of his employment, without the knowledge of his principal. Euphemisms abound<br />

for this (commission, sweetener, kick-back etc.) Bribers and recipients of bribery are<br />

likewise numerous although bribers have one common denominator and that is the<br />

financial ability to bribe.<br />

According to BBC news U.K, "bribery around the world is estimated at about $1 trillion<br />

(£494bn)".<br />

As indicated on the pages devoted to political corruption, efforts have been made in<br />

recent years by the international community to encourage countries to dissociate and<br />

incriminate as separate offences, active and passive bribery. From a legal point of view,<br />

Page 64 of 372


active bribery can be defined for instance as the promising, offering or giving by any<br />

person, directly or indirectly, of any undue advantage [to any public official], for himself<br />

or herself or for anyone else, for him or her to act or refrain from acting in the exercise<br />

of his or her functions. (article 2 of the Criminal Law Convention on Corruption (ETS<br />

173) of the Council of Europe). Passive bribery can be defined as the request or receipt<br />

[by any public official], directly or indirectly, of any undue advantage, for himself or<br />

herself or for anyone else, or the acceptance of an offer or a promise of such an<br />

advantage, to act or refrain from acting in the exercise of his or her functions (article 3 of<br />

the Criminal Law Convention on Corruption (ETS 173)).<br />

<strong>The</strong> reason for this dissociation is to make<br />

the early steps (offering, promising,<br />

requesting an advantage) of a corrupt deal<br />

already an offence and, thus, to give a clear<br />

signal (from a criminal policy point of view)<br />

that bribery is not acceptable. Besides, such<br />

a dissociation makes the prosecution of<br />

bribery offences easier since it can be very<br />

difficult to prove that two parties (the bribegiver<br />

and the bribe-taker) have formally<br />

agreed upon a corrupt deal. Besides, there<br />

is often no such formal deal but only a<br />

mutual understanding, for instance when it is<br />

common knowledge in a municipality that to<br />

obtain a building permit one has to pay a<br />

"fee" to the decision maker to obtain a<br />

favorable decision.<br />

Government<br />

Article II, Section 4 of the United States<br />

Constitution<br />

A grey area may exist when payments to smooth transactions are made. United States<br />

law is particularly strict in limiting the ability of businesses to pay for the awarding of<br />

contracts by foreign governments; however, the Foreign Corrupt Practices Act contains<br />

an exception for "grease payments"; very basically, this allows payments to officials in<br />

order to obtain the performance of ministerial acts which they are legally required to do,<br />

but may delay in the absence of such payment. <strong>In</strong> some countries, this practice is the<br />

norm, often resulting from a developing nation not having the tax structure to pay civil<br />

servants an adequate salary. Nevertheless, most economists regard bribery as a bad<br />

thing because it encourages rent seeking behaviour. A state where bribery has become<br />

a way of life is a kleptocracy.<br />

Page 65 of 372


Recent evidence suggests that the act of bribery can have political consequences- with<br />

citizens being asked for bribes becoming less likely to identify with their country, region<br />

and/or tribal unit.<br />

Tax Treatment<br />

<strong>The</strong> tax status of bribes is an issue for governments since the bribery of government<br />

officials impedes the democratic process and may interfere with good government. <strong>In</strong><br />

some countries, such bribes are considered tax-deductible payments. However, in<br />

1996, in an effort to discourage bribery, the OECD Council recommended that member<br />

countries cease to allow the tax-deductibility of bribes to foreign officials. This was<br />

followed by the signing of the Anti-Bribery Convention [7] . Since that time, the majority of<br />

the OECD countries which are signatories of the convention have revised their tax<br />

policies according to this recommendation and some have extended the measures to<br />

bribes paid to any official, sending the message that bribery will no longer be tolerated<br />

in the operations of the government.<br />

As any monetary benefit received from an illegal activity such as bribery is generally<br />

considered part of one's taxable income, however, as its criminal, some governments<br />

may refuse to accept it as income as it may mean they are a party to the activity.<br />

Medicine<br />

Pharmaceutical corporations may seek to entice doctors to favor prescribing their drugs<br />

over others of comparable effectiveness. If the medicine is prescribed heavily, they may<br />

seek to reward the individual through gifts. <strong>The</strong> American Medical Association has<br />

published ethical guidelines for gifts from industry which include the tenet that<br />

physicians should not accept gifts if they are given in relation to the physician's<br />

prescribing practices. Doubtful cases include grants for traveling to medical conventions<br />

that double as tourist trips.<br />

Dentists often receive samples of home dental care products such as toothpaste, which<br />

are of negligible value; somewhat ironically, dentists in a television commercial will often<br />

state that they get these samples but pay to use the sponsor's product.<br />

<strong>In</strong> countries offering state-subsidized or nationally funded healthcare where medical<br />

professionals are underpaid, patients may use bribery to solicit the standard expected<br />

level of medical care. For example, in many formerly Communist countries from what<br />

used to be the Eastern Bloc it may be customary to offer expensive gifts to doctors and<br />

nurses for the delivery of service at any level of medical care in the non-private health<br />

sector.<br />

Politics<br />

Politicians receive campaign contributions and other payoffs from powerful corporations,<br />

organizations or individuals in return for making choices in the interests of those parties,<br />

Page 66 of 372


or in anticipation of favorable policy, also referred to as lobbying. This is not illegal in the<br />

United States and forms a major part of campaign finance, though it is sometimes<br />

referred to as the money loop. However, in many European countries, a politician<br />

accepting money from a corporation whose activities fall under the sector they currently<br />

(or are campaigning to be elected to) regulate would be considered a criminal offence,<br />

for instance the "Cash-for-questions affair" and "Cash for Honors" in the United<br />

Kingdom. A grey area in these democracies is the so-called "revolving door", whereby<br />

politicians are offered highly-paid, often consultancy jobs upon their retirement from<br />

politics by the corporations they regulate while in office, in return for enacting legislation<br />

favorable to the corporation whilst in office – a conflict of interest. Convictions for this<br />

form of bribery are easier to obtain with hard evidence, that is a specific amount of<br />

money linked to a specific action by the recipient of the bribe. Such evidence is<br />

frequently obtained using undercover agents, since evidence of a quid pro quo relation<br />

can often be difficult to prove. See also influence peddling and political corruption.<br />

Recent evidence suggests that demands for bribes can adversely impact citizen level of<br />

trust and engagement with the political process.<br />

Business<br />

Employees, managers, or salespeople of a business may offer money or gifts to a<br />

potential client in exchange for business.<br />

Page 67 of 372


For example, in 2006, German prosecutors conducted a wide-ranging investigation of<br />

Siemens AG to determine if Siemens employees paid bribes in exchange for business.<br />

<strong>In</strong> some cases where the system of law is not well-implemented, bribes may be a way<br />

for companies to continue their businesses. <strong>In</strong> the case, for example, custom officials<br />

may harass a certain firm or production plant, officially stating they are checking for<br />

irregularities, halting production or stalling other normal activities of a firm. <strong>The</strong><br />

disruption may cause losses to the firm that exceed the amount of money to pay off the<br />

official. Bribing the officials is a common way to deal with this issue in countries where<br />

there exists no firm system of reporting these semi-illegal activities. A third party, known<br />

as a White Glove, may be involved to act as a clean middleman.<br />

Specialist consultancies have been set up to help multinational companies and small<br />

and medium enterprises with a commitment to anti-corruption to trade more ethically<br />

and benefit from compliance with the law.<br />

Contracts based on or involving the payment or transfer of bribes ("corruption money",<br />

"secret commissions", "pots-de-vin", "kickbacks") are void.<br />

<strong>In</strong> 2012, <strong>The</strong> Economist noted:<br />

Bribery would be less of a problem if it wasn't also a solid investment. A new paper by<br />

Raghavendra Rau of Cambridge University and Yan Leung Cheung and Aris Stouraitis<br />

of the Hong Kong Baptist University examines 166 high-profile cases of bribery since<br />

1971, covering payments made in 52 countries by firms listed on 20 different stock<br />

markets. Bribery offered an average return of 10 to 11 times the value of the bung paid<br />

out to win a contract, measured by the jump in stock market value when the contract<br />

was won. America's Department of Justice found similarly high returns in cases it has<br />

prosecuted.<br />

<strong>In</strong> addition, a survey conducted by auditing firm Ernst & Young (EY) in 2012 found that<br />

15 percent of top financial executives are willing to pay bribes in order to keep or win<br />

business. Another 4 percent said they would be willing to misstate financial<br />

performance. This alarming indifference represents a huge risk to their business, given<br />

their responsibility.<br />

Sport Corruption<br />

Referees and scoring judges may be offered money, gifts, or other compensation to<br />

guarantee a specific outcome in an athletic or other sports competition. A well-known<br />

example of this manner of bribery in the sport would be the 2002 Olympic Winter<br />

Games figure skating scandal, where the French judge in the pairs competition voted for<br />

the Russian skaters in order to secure an advantage for the French skaters in the ice<br />

dancing competition.<br />

Page 68 of 372


Additionally, bribes may be offered by cities in order to secure athletic franchises, or<br />

even competitions, as happened with the 2002 Winter Olympics. It is common practice<br />

for cities to "bid" against each other with stadiums, tax benefits, and licensing deals.<br />

Legislation<br />

Prevention<br />

<strong>The</strong> U.S. introduced the Foreign Corrupt Practices Act in 1977 to address bribery of<br />

foreign officials. <strong>The</strong> Foreign Corrupt Practices Act, or FCPA, was introduced to prevent<br />

the influencing of foreign officials by companies through rewards or payments. This<br />

legislation dominated international anti-corruption enforcement until around 2010 when<br />

other countries began introducing broader and more robust legislation, notably the<br />

United Kingdom Bribery Act 2010. <strong>The</strong> <strong>In</strong>ternational Organization for Standardization<br />

introduced an international anti-bribery management system standard in 2016. <strong>In</strong> recent<br />

years, cooperation in enforcement action between countries has increased.<br />

Under 18 U.S. Code § 201 – Bribery of public officials and witnesses, the law strictly<br />

prohibits any type of promising, giving, or offering of value to a public official. A public<br />

official is further defined as anyone who holds public or elected office. Another<br />

stipulation of the law in place condemns the same kind of offering, giving, or coercing a<br />

Page 69 of 372


witness in a legal case to changing their story. <strong>The</strong> minimum penalty for either of these<br />

offenses is 10 years, and a potential fine.<br />

Businesses<br />

Programs of prevention need to be properly designed and meet with international<br />

standards of best practice. To ensure respect for a program, whether it be on the part of<br />

employees or business partners, external verification is necessary. <strong>In</strong>ternational best<br />

practices such as the Council for Further Combating Bribery of Foreign Public Officials<br />

in <strong>In</strong>ternational Business Transactions, Annex 2; the ISO 26000 norm (section 6.6.3) or<br />

TI Business Principles for Countering Bribery are used in external verification processes<br />

to measure and ensure that a program of bribery prevention works and is consistent<br />

with international standards. Another reason for businesses to undergo external<br />

verification of their bribery prevention programs is that it means evidence can be<br />

provided to assert that all that was possible was done to prevent corruption. Companies<br />

are unable to guarantee corruption has never occurred; what they can do is provide<br />

evidence that they did their best to prevent it.<br />

<strong>The</strong>re is no federal statute under the U.S Law that prohibits or regulates any type of<br />

private or commercial bribery. <strong>The</strong>re is a way for prosecutors to try people for bribery by<br />

using existing laws. Section 1346 of Title 18 can be used by prosecutors, to try people<br />

for ‘a scheme or artifice to deprive another of the intangible right to honest services,’<br />

under the mail and wire fraud statutes. Prosecutors have always successfully<br />

prosecuted private company employees for breaching a fiduciary duty and taking bribes,<br />

under Honest services fraud.<br />

<strong>The</strong>re are also cases of successful prosecution of bribery in the case of international<br />

business. <strong>The</strong> DOJ has used the Travel Act, 18 USC Section 1952 to prosecute bribery.<br />

Under the Travel Act, it is against the law, domestically and internationally, to utilize‘the<br />

mail or any facility in interstate or foreign commerce’ with intent to ‘promote, manage,<br />

establish, carry on, or facilitate the promotion, management, establishment or carrying<br />

on, of any unlawful activity’.<br />

Notable <strong>In</strong>stances<br />

<br />

<br />

<br />

Spiro Agnew, American Vice President who resigned from office in the aftermath<br />

of discovery that he took bribes while serving as Governor of Maryland.<br />

Duke Cunningham, United States Navy veteran and former Republican member<br />

of the United States House of Representatives from California's 50th<br />

Congressional District resigned after pleading guilty to accepting at least<br />

$2.4 million in bribes and under-reporting his income for 2004.<br />

Gerald Garson, former <strong>New</strong> York Supreme Court Justice, convicted of accepting<br />

bribes to manipulate outcomes of divorce proceedings.<br />

Page 70 of 372


Andrew J. Hinshaw, Republican, former congressman from California's 40th<br />

district, convicted of accepting bribes.<br />

John Jenrette, Democrat, former congressman from South Carolina's 6th district,<br />

convicted of accepting a bribe in the FBI's Abscam operation.<br />

Donald "Buz" Lukens, Republican, former congressman from Ohio's 8th district,<br />

charged with delinquency of a minor and convicted of bribery and conspiracy.<br />

Martin Thomas Manton, former U.S. federal judge convicted of accepting bribes.<br />

Rick Renzi, Republican, former congressman from Arizona's 1st district, found<br />

guilty of 17 counts including wire fraud, conspiracy, extortion, racketeering, and<br />

money laundering.<br />

Dianne Wilkerson, Democrat, former Massachusetts state senator pleaded guilty<br />

to eight counts of attempted extortion.<br />

Lee Myung-Bak, former South Korean president was found guilty of accepting<br />

nearly $6 million bribes from Samsung in exchange for a presidential pardon for<br />

Samsung Chairman Lee Kun-hee.<br />

Pakistan cricket spot-fixing controversy, Mohammad Asif, Mohammad Amir and<br />

Salman Butt, Pakistani cricketers found guilty of accepting bribes to bowl no-balls<br />

against England at certain times.<br />

Tangentopoli (Italian for "city of bribes") was a huge bribery scandal in early<br />

1990s Italy, which brought down the whole system of political parties, when it<br />

was uncovered by the Mani pulite investigations. At one point roughly half of<br />

members of parliament were under investigation.<br />

Ralph Lauren, clothing retailer, was found guilty of making illegal payments and<br />

giving gifts to foreign officials in an attempt to circumvent custom' inspections and<br />

paperwork.<br />

Page 71 of 372


Page 72 of 372


IV. Cybercrime<br />

Cybercrime, or computer-oriented crime, is the crime that involves a computer and a<br />

network. <strong>The</strong> computer may have been used in the commission of a crime, or it may be<br />

the target. Cybercrimes can be defined as: "Offences that are committed against<br />

individuals or groups of individuals with a criminal motive to intentionally harm the<br />

reputation of the victim or cause physical or mental harm, or loss, to the victim directly<br />

or indirectly, using modern telecommunication networks such as <strong>In</strong>ternet (networks<br />

including chat rooms, emails, notice boards and groups) and mobile phones<br />

(Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security and<br />

financial health. Issues surrounding these types of crimes have become high-profile,<br />

particularly those surrounding hacking, copyright infringement, unwarranted masssurveillance,<br />

sextortion, child pornography, and child grooming. <strong>The</strong>re are also<br />

problems of privacy when confidential information is intercepted or disclosed, lawfully or<br />

otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the<br />

perspective of gender and defined 'cybercrime against women' as "<strong>Crime</strong>s targeted<br />

against women with a motive to intentionally harm the victim psychologically and<br />

physically, using modern telecommunication networks such as internet and mobile<br />

phones". <strong>In</strong>ternationally, both governmental and non-state actors engage in<br />

cybercrimes, including espionage, financial theft, and other cross-border crimes.<br />

Cybercrimes crossing international borders and involving the actions of at least one<br />

nation state is sometimes referred to as cyberwarfare.<br />

A report (sponsored by McAfee), published in 2014, estimated that the annual damage<br />

to the global economy was $445 billion. Approximately $1.5 billion was lost in 2012 to<br />

online credit and debit card fraud in the US. <strong>In</strong> 2018, a study by Center for Strategic and<br />

Page 73 of 372


<strong>In</strong>ternational Studies (CSIS), in partnership with McAfee, concludes that close to $600<br />

billion, nearly one percent of global GDP, is lost to cybercrime each year.<br />

Classifications<br />

Computer crime encompasses a broad range of activities.<br />

Financial Fraud <strong>Crime</strong>s<br />

Computer fraud is any dishonest misrepresentation of fact intended to let another to do<br />

or refrain from doing something which causes loss. <strong>In</strong> this context, the fraud will result in<br />

obtaining a benefit by:<br />

<br />

<br />

<br />

Altering in an unauthorized way. This requires little technical expertise and is<br />

common form of theft by employees altering the data before entry or entering<br />

false data, or by entering unauthorized instructions or using unauthorized<br />

processes;<br />

Altering, destroying, suppressing, or stealing output, usually to conceal<br />

unauthorized transactions. This is difficult to detect;<br />

Altering or deleting stored data;<br />

Other forms of fraud may be facilitated using computer systems, including bank fraud,<br />

carding, identity theft, extortion, and theft of classified information.<br />

Cyber-terrorism<br />

Government officials and information technology security specialists have documented<br />

a significant increase in <strong>In</strong>ternet problems and server scans since early 2001. But there<br />

is a growing concern among government agencies such as the Federal Bureau of<br />

<strong>In</strong>vestigations (FBI) and the Central <strong>In</strong>telligence Agency (CIA) that such intrusions are<br />

part of an organized effort by cyberterrorists, foreign intelligence services, or other<br />

groups to map potential security holes in critical systems.<br />

A cyberterrorist is someone who intimidates or coerces a government or an organization<br />

to advance his or her political or social objectives by launching a computer-based attack<br />

against computers, networks, or the information stored on them.<br />

Cyberterrorism in general can be defined as an act of terrorism committed through the<br />

use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda<br />

piece in the <strong>In</strong>ternet that there will be bomb attacks during the holidays can be<br />

considered cyberterrorism. <strong>The</strong>re are also hacking activities directed towards<br />

individuals, families, organized by groups within networks, tending to cause fear among<br />

people, demonstrate power, collecting information relevant for ruining peoples' lives,<br />

robberies, blackmailing etc.<br />

Page 74 of 372


Cyber-Extortion<br />

Cyber-extortion occurs when a website, e-mail server, or computer system is subjected<br />

to or threatened with repeated denial of service or other attacks by malicious hackers.<br />

<strong>The</strong>se hackers demand money in return for promising to stop the attacks and to offer<br />

"protection". According to the Federal Bureau of <strong>In</strong>vestigation, cybercrime extortionists<br />

are increasingly attacking corporate websites and networks, crippling their ability to<br />

operate and demanding payments to restore their service. More than 20 cases are<br />

reported each month to the FBI and many go unreported in order to keep the victim's<br />

name out of the public domain. Perpetrators typically use a distributed denial-of-service<br />

attack. However, other cyber-extortion techniques exist such as doxing extortion and<br />

bug poaching.<br />

An example of cyber-extortion was the attack on Sony Pictures of 2014.<br />

Cyberwarfare<br />

<strong>The</strong> U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a<br />

national-level concern through several recent events of geostrategic significance.<br />

Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by<br />

Russian hackers. "<strong>In</strong> August 2008, Russia again allegedly conducted cyberattacks, this<br />

time in a coordinated and synchronized kinetic and non-kinetic campaign against the<br />

Page 75 of 372


country of Georgia. <strong>The</strong> December 2015 Ukraine power grid cyberattack has also been<br />

attributed to Russia and is considered the first successful cyberattack on a power grid.<br />

Fearing that such attacks may become the norm in future warfare among nation-states,<br />

the concept of cyberspace operations impacts and will be adapted by warfighting<br />

military commanders in the future.<br />

Computer As a Target<br />

<strong>The</strong>se crimes are committed by a selected group of criminals. Unlike crimes using the<br />

computer as a tool, these crimes require the technical knowledge of the perpetrators. As<br />

such, as technology evolves, so too does the nature of the crime. <strong>The</strong>se crimes are<br />

relatively new, having been in existence for only as long as computers have—which<br />

explains how unprepared society and the world in general is towards combating these<br />

crimes. <strong>The</strong>re are numerous crimes of this nature committed daily on the internet.<br />

<strong>Crime</strong>s that primarily target computer networks or devices include:<br />

<br />

<br />

<br />

Computer viruses<br />

Denial-of-service attacks<br />

Malware (malicious code)<br />

Computer as A Tool<br />

When the individual is the main target of cybercrime, the computer can be considered<br />

as the tool rather than the target. <strong>The</strong>se crimes generally involve less technical<br />

expertise. Human weaknesses are generally exploited. <strong>The</strong> damage dealt is largely<br />

psychological and intangible, making legal action against the variants more difficult.<br />

<strong>The</strong>se are the crimes which have existed for centuries in the offline world. Scams, theft,<br />

and the likes have existed even before the development in high-tech equipment. <strong>The</strong><br />

same criminal has simply been given a tool which increases their potential pool of<br />

victims and makes them all the harder to trace and apprehend.<br />

<strong>Crime</strong>s that use computer networks or devices to advance other ends include:<br />

<br />

<br />

<br />

<br />

<br />

Fraud and identity theft (although this increasingly uses malware, hacking or<br />

phishing, making it an example of both "computer as target" and "computer as<br />

tool" crime)<br />

<strong>In</strong>formation warfare<br />

Phishing scams<br />

Spam<br />

Propagation of illegal obscene or offensive content, including harassment and<br />

threats<br />

<strong>The</strong> unsolicited sending of bulk email for commercial purposes (spam) is unlawful in<br />

some jurisdictions.<br />

Page 76 of 372


Phishing is mostly propagated via email. Phishing emails may contain links to other<br />

websites that are affected by malware. Or, they may contain links to fake online banking<br />

or other websites used to steal private account information.<br />

Obscene or Offensive Content<br />

<strong>The</strong> content of websites and other electronic communications may be distasteful,<br />

obscene or offensive for a variety of reasons. <strong>In</strong> some instances these communications<br />

may be illegal.<br />

<strong>The</strong> extent to which these communications are unlawful varies greatly between<br />

countries, and even within nations. It is a sensitive area in which the courts can become<br />

involved in arbitrating between groups with strong beliefs.<br />

One area of <strong>In</strong>ternet pornography that has been the target of the strongest efforts at<br />

curtailment is child pornography, which is illegal in most jurisdictions in the world.<br />

Online Harassment<br />

Whereas content may be offensive in a non-specific way, harassment directs<br />

obscenities and derogatory comments at specific individuals focusing for example on<br />

gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms,<br />

through newsgroups, and by sending hate e-mail to interested parties. Harassment on<br />

the internet also includes revenge porn.<br />

<strong>The</strong>re are instances where committing a crime using a computer can lead to an<br />

enhanced sentence. For example, in the case of United States v. Neil Scott Kramer,<br />

Kramer was served an enhanced sentence according to the U.S. Sentencing Guidelines<br />

Page 77 of 372


Manual §2G1.3(b)(3) for his use of a cell phone to "persuade, induce, entice, coerce, or<br />

facilitate the travel of, the minor to engage in prohibited sexual conduct." Kramer argued<br />

that this claim was insufficient because his charge included persuading through a<br />

computer device and his cellular phone technically is not a computer. Although Kramer<br />

tried to argue this point, U.S. Sentencing Guidelines Manual states that the term<br />

computer "means an electronic, magnetic, optical, electrochemically, or other highspeed<br />

data processing device performing logical, arithmetic, or storage functions, and<br />

includes any data storage facility or communications facility directly related to or<br />

operating in conjunction with such device."<br />

Connecticut was the U.S. state to pass a statute making it a criminal offense to harass<br />

someone by computer. Michigan, Arizona, and Virginia and South Carolina have also<br />

passed laws banning harassment by electronic means.<br />

Harassment as defined in the U.S. computer statutes is typically distinct from<br />

cyberbullying, in that the former usually relates to a person's "use a computer or<br />

computer network to communicate obscene, vulgar, profane, lewd, lascivious, or<br />

indecent language, or make any suggestion or proposal of an obscene nature, or<br />

threaten any illegal or immoral act," while the latter need not involve anything of a<br />

sexual nature.<br />

Although freedom of speech is protected by law in most democratic societies (in the US<br />

this is done by the First Amendment), it does not include all types of speech. <strong>In</strong> fact<br />

spoken or written "true threat" speech/text is criminalized because of "intent to harm or<br />

intimidate", that also applies for online or any type of network related threats in written<br />

text or speech. <strong>The</strong> US Supreme Court definition of "true threat" is "statements where<br />

the speaker means to communicate a serious expression of an intent to commit an act<br />

of unlawful violence to a particular individual or group".<br />

Drug Trafficking<br />

Darknet markets are used to buy and sell recreational drugs online. Some drug<br />

traffickers use encrypted messaging tools to communicate with drug mules. <strong>The</strong> dark<br />

web site Silk Road was a major online marketplace for drugs before it was shut down by<br />

law enforcement (then reopened under new management, and then shut down by law<br />

enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged.<br />

However, it was just an older marketplace named Diabolus Market, that used the name<br />

for more exposure from the brand's previous success.<br />

Documented Cases<br />

<br />

One of the highest profiled banking computer crime occurred during a course of<br />

three years beginning in 1970. <strong>The</strong> chief teller at the Park Avenue branch of <strong>New</strong><br />

York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of<br />

accounts.<br />

Page 78 of 372


A hacking group called MOD (Masters of Deception), allegedly stole passwords<br />

and technical data from Pacific Bell, Nynex, and other telephone companies as<br />

well as several big credit agencies and two major universities. <strong>The</strong> damage<br />

caused was extensive, one company, Southwestern Bell suffered losses of<br />

$370,000 alone.<br />

<strong>In</strong> 1983, a 19-year-old UCLA student used his PC to break into a Defense<br />

Department <strong>In</strong>ternational Communications system.<br />

Between 1995 and 1998 the <strong>New</strong>scorp satellite pay to view encrypted SKY-TV<br />

service was hacked several times during an ongoing technological arms race<br />

between a pan-European hacking group and <strong>New</strong>scorp. <strong>The</strong> original motivation<br />

of the hackers was to watch Star Trek reruns in Germany; which was something<br />

which <strong>New</strong>scorp did not have the copyright to allow.<br />

<br />

<br />

<br />

On 26 March 1999, the Melissa worm infected a document on a victim's<br />

computer, then automatically sent that document and a copy of the virus spread<br />

via e-mail to other people.<br />

<strong>In</strong> February 2000, an individual going by the alias of MafiaBoy began a series<br />

denial-of-service attacks against high-profile websites, including Yahoo!, Dell,<br />

<strong>In</strong>c., E*TRADE, eBay, and CNN. About 50 computers at Stanford University, and<br />

also computers at the University of California at Santa Barbara, were amongst<br />

the zombie computers sending pings in DDoS attacks. On 3 August 2000,<br />

Canadian federal prosecutors charged MafiaBoy with 54 counts of illegal access<br />

to computers, plus a total of ten counts of mischief to data for his attacks.<br />

<strong>The</strong> Stuxnet worm corrupted SCADA microprocessors, particularly of the types<br />

used in Siemens centrifuge controllers.<br />

<strong>The</strong> Russian Business Network (RBN) was registered as an internet site in 2006.<br />

<strong>In</strong>itially, much of its activity was legitimate. But apparently, the founders soon<br />

discovered that it was more profitable to host illegitimate activities and started<br />

Page 79 of 372


hiring its services to criminals. <strong>The</strong> RBN has been described by VeriSign as "the<br />

baddest of the bad". It offers web hosting services and internet access to all<br />

kinds of criminal and objectionable activities, with individual activities earning up<br />

to $150 million in one year. It specialized in and in some cases monopolized<br />

personal identity theft for resale. It is the originator of MPack and an alleged<br />

operator of the now defunct Storm botnet.<br />

<br />

<br />

On 2 March 2010, Spanish investigators arrested 3 in infection of over 13 million<br />

computers around the world. <strong>The</strong> "botnet" of infected computers included PCs<br />

inside more than half of the Fortune 1000 companies and more than 40 major<br />

banks, according to investigators.<br />

<strong>In</strong> August 2010 the international investigation Operation Delego, operating under<br />

the aegis of the Department of Homeland Security, shut down the international<br />

pedophile ring Dreamboard. <strong>The</strong> website had approximately 600 members and<br />

may have distributed up to 123 terabytes of child pornography (roughly<br />

equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of<br />

an international child pornography ring; 52 arrests were made worldwide.<br />

<strong>In</strong> January 2012 Zappos.com experienced a security breach after as many as 24<br />

million customers' credit card numbers, personal information, billing and shipping<br />

addresses had been compromised.<br />

<br />

<br />

<br />

<br />

<br />

<strong>In</strong> June 2012 Linked<strong>In</strong> and eHarmony were attacked, compromising 65 million<br />

password hashes. 30,000 passwords were cracked and 1.5 million EHarmony<br />

passwords were posted online.<br />

December 2012 Wells Fargo website experienced a denial of service attack.<br />

Potentially compromising 70 million customers and 8.5 million active viewers.<br />

Other banks thought to be compromised: Bank of America, J. P. Morgan U.S.<br />

Bank, and PNC Financial Services.<br />

April 23, 2013 saw the Associated Press' Twitter account's hacked - the hacker<br />

posted a hoax tweet about fictitious attacks in the White House that they claimed<br />

left President Obama injured. This hoax tweet resulted in a brief plunge of 130<br />

points from the Dow Jones <strong>In</strong>dustrial Average, removal of $136 billion from S&P<br />

500 index, and the temporary suspension of AP's Twitter account. <strong>The</strong> Dow<br />

Jones later restored its session gains.<br />

<strong>In</strong> May 2017, 74 countries logged a ransomware cybercrime, called "WannaCry"<br />

Illicit access to camera sensors, microphone sensors, phonebook contacts, all<br />

internet-enabled apps, and metadata of mobile telephones running Android and<br />

IOS were reportedly made accessible by Israeli spyware, found to be being in<br />

operation in at least 46 nation-states around the world. Journalists, Royalty and<br />

government officials were amongst the targets. Previous accusations of cases of<br />

Page 80 of 372


Israeli-weapons companies meddling in international telephony and smartphones<br />

have been eclipsed in the 2018 reported case.<br />

Diffusion of Cybercrime<br />

Combating Computer <strong>Crime</strong><br />

<strong>The</strong> broad diffusion of cybercriminal activities is an issue in computer crimes detection<br />

and prosecution. According to Jean-Loup Richet (Research Fellow at ESSEC ISIS),<br />

technical expertise and accessibility no longer act as barriers to entry into cybercrime.<br />

<strong>In</strong>deed, hacking is much less complex than it was a few years ago, as hacking<br />

communities have greatly diffused their knowledge through the <strong>In</strong>ternet. Blogs and<br />

communities have hugely contributed to information sharing: beginners could benefit<br />

from older hackers' knowledge and advice. Furthermore, hacking is cheaper than ever:<br />

before the cloud computing era, in order to spam or scam one needed a dedicated<br />

server, skills in server management, network configuration, and maintenance,<br />

knowledge of <strong>In</strong>ternet service provider standards, etc. By comparison, a mail softwareas-a-service<br />

is a scalable, inexpensive, bulk, and transactional e-mail-sending service<br />

for marketing purposes and could be easily set up for spam. Jean-Loup Richet explains<br />

that cloud computing could be helpful for a cybercriminal as a way to leverage his attack<br />

– brute-forcing a password, improve the reach of a botnet, or facilitating a spamming<br />

campaign.<br />

<strong>In</strong>vestigation<br />

A computer can be a source of evidence (see digital forensics). Even where a computer<br />

is not directly used for criminal purposes, it may contain records of value to criminal<br />

investigators in the form of a logfile. <strong>In</strong> most countries <strong>In</strong>ternet Service Providers are<br />

required, by law, to keep their logfiles for a predetermined amount of time. For example;<br />

Page 81 of 372


a European wide Data Retention Directive (applicable to all EU member states) states<br />

that all e-mail traffic should be retained for a minimum of 12 months.<br />

Methodology of Cybercrime <strong>In</strong>vestigation<br />

<strong>The</strong>re are many ways for cybercrime to take place, and investigations tend to start with<br />

an IP Address trace, however that is not necessarily a factual basis upon which<br />

detectives can solve a case. Different types of high-tech crime may also include<br />

elements of low-tech crime, and vice versa, making cybercrime investigators an<br />

indispensable part of modern law-enforcement. Methodology of cybercrime detective<br />

work is dynamic and is constantly improving, whether in closed police units, or in<br />

international cooperation framework.<br />

Legislation<br />

Due to easily exploitable laws, cybercriminals use developing countries in order to<br />

evade detection and prosecution from law enforcement. <strong>In</strong> developing countries, such<br />

as the Philippines, laws against cybercrime are weak or sometimes nonexistent.<br />

<strong>The</strong>se weak laws allow cybercriminals to strike from international borders and remain<br />

undetected. Even when identified, these criminals avoid being punished or extradited to<br />

a country, such as the United States, that has developed laws that allow for<br />

prosecution. While this proves difficult in some cases, agencies, such as the FBI, have<br />

used deception and subterfuge to catch criminals. For example, two Russian hackers<br />

had been evading the FBI for some time.<br />

<strong>The</strong> FBI set up a fake computing company based in Seattle, Washington. <strong>The</strong>y<br />

proceeded to lure the two Russian men into the United States by offering them work<br />

with this company. Upon completion of the interview, the suspects were arrested<br />

outside of the building. Clever tricks like this are sometimes a necessary part of<br />

catching cybercriminals when weak legislation makes it impossible otherwise.<br />

President Barack Obama released in an executive order in April 2015 to combat<br />

cybercrime. <strong>The</strong> executive order allows the United States to freeze assets of convicted<br />

cybercriminals and block their economic activity within the United States. This is some<br />

of the first solid legislation that combats cybercrime in this way.<br />

<strong>The</strong> European Union adopted directive 2013/40/EU. All offences of the directive, and<br />

other definitions and procedural institutions are also in the Council of Europe's<br />

Convention on Cybercrime..<br />

It is not only the USA and the European Union who are introducing new measures<br />

against cybercrime. ON 31 May 2017 China announced that its new cybersecurity law<br />

takes effect on this date.<br />

Page 82 of 372


Penalties<br />

Penalties for computer-related crimes in <strong>New</strong> York State can range from a fine and a<br />

short period of jail time for a Class A misdemeanor such as unauthorized use of a<br />

computer up to computer tampering in the first degree which is a Class C felony and<br />

can carry 3 to 15 years in prison.<br />

However, some hackers have been hired as information security experts by private<br />

companies due to their inside knowledge of computer crime, a phenomenon which<br />

theoretically could create perverse incentives. A possible counter to this is for courts to<br />

ban convicted hackers from using the <strong>In</strong>ternet or computers, even after they have been<br />

released from prison – though as computers and the <strong>In</strong>ternet become more and more<br />

central to everyday life, this type of punishment may be viewed as more and more harsh<br />

and draconian. However, nuanced approaches have been developed that manage<br />

cyber offenders' behavior without resorting to total computer or <strong>In</strong>ternet bans. <strong>The</strong>se<br />

approaches involve restricting individuals to specific devices which are subject to<br />

computer monitoring or computer searches by probation or parole officers.<br />

Awareness<br />

As technology advances and more people rely on the internet to store sensitive<br />

information such as banking or credit card information, criminals increasingly attempt to<br />

steal that information. Cybercrime is becoming more of a threat to people across the<br />

world. Raising awareness about how information is being protected and the tactics<br />

criminals use to steal that information continues to grow in importance. According to the<br />

FBI's <strong>In</strong>ternet <strong>Crime</strong> Complaint Center in 2014, there were 269,422 complaints filed.<br />

With all the claims combined there was a reported total loss of $800,492,073. But<br />

cybercrime does yet seem to be on the average person's radar. <strong>The</strong>re are 1.5 million<br />

Page 83 of 372


cyber-attacks annually, that means that there are over 4,000 attacks a day, 170 attacks<br />

every hour, or nearly three attacks every minute, with studies showing us that only 16%<br />

of victims had asked the people who were carrying out the attacks to stop. Anybody<br />

who uses the internet for any reason can be a victim, which is why it is important to be<br />

aware of how one is being protected while online.<br />

<strong>In</strong>telligence<br />

As cybercrime has proliferated, a professional ecosystem has evolved to support<br />

individuals and groups seeking to profit from cybercriminal activities. <strong>The</strong> ecosystem<br />

has become quite specialized, including malware developers, botnet operators,<br />

professional cybercrime groups, groups specializing in the sale of stolen content, and so<br />

forth. A few of the leading cybersecurity companies have the skills, resources and<br />

visibility to follow the activities of these individuals and group. A wide variety of<br />

information is available from these sources which can be used for defensive purposes,<br />

including technical indicators such as hashes of infected files or malicious IPs/URLs, as<br />

well as strategic information profiling the goals, techniques and campaigns of the<br />

profiled groups. Some of it is freely published, but consistent, on-going access typically<br />

requires subscribing to an adversary intelligence subscription service. At the level of an<br />

individual threat actor, threat intelligence is often referred to that actor's "TTP", or<br />

"tactics, techniques, and procedures," as the infrastructure, tools, and other technical<br />

indicators are often trivial for attackers to change. Corporate sectors are considering<br />

crucial role of artificial intelligence cyber security.<br />

Agencies<br />

ASEAN<br />

Australian High Tech <strong>Crime</strong> Centre<br />

Cyber <strong>Crime</strong> <strong>In</strong>vestigation Cell, a wing of Mumbai Police, <strong>In</strong>dia<br />

Cyber <strong>Crime</strong> Unit (Hellenic Police), formed in Greece in 1995<br />

National White Collar <strong>Crime</strong> Center, in the United States<br />

National Cyber <strong>Crime</strong> Unit, in the United Kingdom<br />

Page 84 of 372


V. Drug Trafficking<br />

<strong>The</strong> Illegal Drug Trade or Drug Trafficking is a global black market dedicated to the<br />

cultivation, manufacture, distribution and sale of drugs that are subject to drug<br />

prohibition laws. Most jurisdictions prohibit trade, except under license, of many types of<br />

drugs through the use of drug prohibition laws.<br />

<strong>The</strong> United Nations Office on Drugs and <strong>Crime</strong>'s World Drug Report 2005 estimates the<br />

size of the global illicit drug market at US$321.6 billion in 2003 alone. With a world GDP<br />

of US$36 trillion in the same year, the illegal drug trade may be estimated as nearly 1%<br />

of total global trade. Consumption of illegal drugs is widespread globally and remains<br />

very difficult for local authorities to thwart its popularity.<br />

Page 85 of 372


History<br />

Chinese authorities issued edicts against opium smoking in 1729, 1796 and 1800. <strong>The</strong><br />

West prohibited addictive drugs throughout the late 19th and early 20th centuries.<br />

<strong>In</strong> the early 19th century, an illegal drug trade in China emerged. As a result, by 1838<br />

the number of Chinese opium-addicts had grown to between four and twelve million.<br />

<strong>The</strong> Chinese government responded by enforcing a ban on the import of opium; this led<br />

to the First Opium War (1839-1842) between the United Kingdom and Qing-dynasty<br />

China. <strong>The</strong> United Kingdom won and forced China to allow British merchants to sell<br />

<strong>In</strong>dian-grown opium. Trading in opium was lucrative, and smoking opium had become<br />

common in the 19th century, so British merchants increased trade with the Chinese.<br />

<strong>The</strong> Second Opium War broke out in 1856, with the British joined this time by the<br />

French. After the two Opium Wars, the British Crown, via the treaties of Nanking (1842),<br />

and Tianjin (1858), obligated the Chinese government to pay large sums of money for<br />

opium they had seized and destroyed, which were referred to as "reparations".<br />

<strong>In</strong> 1868, as a result of the increased use of opium, the UK restricted the sale of opium in<br />

Britain by implementing the 1868 Pharmacy Act. <strong>In</strong> the United States, control of opium<br />

remained under the control of individual US states until the introduction of the Harrison<br />

Act in 1914, after 12 international powers signed the <strong>In</strong>ternational Opium Convention in<br />

1912.<br />

Between 1920 and 1933 the Eighteenth Amendment to the United States Constitution<br />

banned alcohol in the United States. Prohibition proved almost impossible to enforce<br />

and resulted in the rise of organized crime, including the modern American Mafia, which<br />

identified enormous business opportunities in the manufacturing, smuggling and sale of<br />

illicit liquor.<br />

<strong>The</strong> beginning of the 21st century saw drug use increase in North America and Europe,<br />

with a particularly increased demand for marijuana and cocaine. As a result,<br />

international organized crime syndicates such as the Sinaloa Cartel and 'Ndrangheta<br />

have increased cooperation among each other in order to facilitate trans-Atlantic drugtrafficking.<br />

Use of another illicit drug, hashish, has also increased in Europe.<br />

Drug trafficking is widely regarded by lawmakers as a serious offense around the world.<br />

Penalties often depend on the type of drug (and its classification in the country into<br />

which it is being trafficked), the quantity trafficked, where the drugs are sold and how<br />

they are distributed. If the drugs are sold to underage people, then the penalties for<br />

trafficking may be harsher than in other circumstances.<br />

Drug smuggling carries severe penalties in many countries. Sentencing may include<br />

lengthy periods of incarceration, flogging and even the death penalty (in Singapore,<br />

Malaysia, <strong>In</strong>donesia and elsewhere). <strong>In</strong> December 2005, Van Tuong Nguyen, a 25-<br />

year-old Australian drug smuggler, was hanged in Singapore after being convicted in<br />

March 2004. <strong>In</strong> 2010, two people were sentenced to death in Malaysia for trafficking 1<br />

Page 86 of 372


kilogram (2.2 lb) of cannabis into the country. Execution is mostly used as a deterrent,<br />

and many have called upon much more effective measures to be taken by countries to<br />

tackle drug trafficking; for example, targeting specific criminal organisations (which are<br />

often also active in the smuggling of other goods (i.e. wildlife) and even people <strong>In</strong> some<br />

cases, even links between politicians and the criminal organisations have been proven<br />

to exist.<br />

Effects of <strong>The</strong> Illegal Drug Trade on Societies<br />

<strong>The</strong> countries of drug production and transit are some of the most affected by the drug<br />

trade, though countries receiving the illegally imported substances are also adversely<br />

affected. For example, Ecuador has absorbed up to 300,000 refugees from Colombia<br />

who are running from guerrillas, paramilitaries and drug lords. While some applied for<br />

asylum, others are still illegal immigrants. <strong>The</strong> drugs that pass from Colombia through<br />

Ecuador to other parts of South America create economic and social problems.<br />

Honduras, through which an estimated 79% of cocaine passes on its way to the United<br />

States, has the highest murder rate in the world. According to the <strong>In</strong>ternational Crisis<br />

Group, the most violent regions in Central America, particularly along the Guatemala–<br />

Honduras border, are highly correlated with an abundance of drug trafficking activity.<br />

Page 87 of 372


Violent <strong>Crime</strong><br />

<strong>In</strong> many countries worldwide, the illegal drug trade is thought to be directly linked to<br />

violent crimes such as murder. This is especially true in all developing countries, such<br />

as Honduras, but is also an issue for many developed countries worldwide. <strong>In</strong> the late<br />

1990s in the United States the Federal Bureau of <strong>In</strong>vestigation estimated that 5% of<br />

murders were drug-related. <strong>In</strong> Colombia, Drug violence can be caused by factors such<br />

as, the economy, poor governments, and no authority within the law enforcement.<br />

After a crackdown by US and Mexican authorities in the first decade of the 21st century<br />

as part of tightened border security in the wake of the September 11 attacks, border<br />

violence inside Mexico surged. <strong>The</strong> Mexican government estimates that 90% of the<br />

killings are drug-related.<br />

A report by the UK government's Drug Strategy Unit that was leaked to the press, stated<br />

that due to the expensive price of highly addictive drugs heroin and cocaine, drug use<br />

was responsible for the great majority of crime, including 85% of shoplifting, 70-80% of<br />

burglaries and 54% of robberies. It concluded that "[t]he cost of crime committed to<br />

support illegal cocaine and heroin habits amounts to £16 billion a year in the UK"<br />

South America<br />

Drug Trafficking Routes<br />

Venezuela has been a path to the United States and Europe for illegal drugs originating<br />

in Colombia, through Central America, Mexico and Caribbean countries such as Haiti,<br />

the Dominican Republic, and Puerto Rico.<br />

According to the United Nations, there was an increase of cocaine trafficking through<br />

Venezuela since 2002. <strong>In</strong> 2005 Venezuela severed ties with the United States Drug<br />

Enforcement Administration (DEA), accusing its representatives of spying. Following the<br />

departure of the DEA from Venezuela and the expansion of DEA's partnership with<br />

Colombia in 2005, Venezuela became more attractive to drug traffickers. Between 2008<br />

and 2012, Venezuela's cocaine seizure ranking among other countries declined, going<br />

from being ranked fourth in the world for cocaine seizures in 2008 to sixth in the world in<br />

2012.<br />

On 18 November 2016, following what was known as the Narcosobrinos incident,<br />

Venezuelan President Nicolás Maduro's two nephews were found guilty of trying to ship<br />

drugs into the United States so they could "obtain a large amount of cash to help their<br />

family stay in power".<br />

West Africa<br />

Cocaine produced in Colombia and Bolivia increasingly has been shipped via West<br />

Africa (especially in Cape Verde, Mali, Benin, Togo, Nigeria, Cameroon, Guinea-Bissau<br />

Page 88 of 372


and Ghana). <strong>The</strong> money is often laundered in countries such as Nigeria, Ghana and<br />

Senegal.<br />

According to the Africa Economic <strong>In</strong>stitute, the value of illicit drug smuggling in Guinea-<br />

Bissau is almost twice the value of the country's GDP. Police officers are often bribed. A<br />

police officer's normal monthly wage of $93 is less than 2% of the value of 1 kilogram<br />

(2.2 lb) of cocaine (€7000 or $8750). <strong>The</strong> money can also be laundered using real<br />

estate. A house is built using illegal funds, and when the house is sold, legal money is<br />

earned. When drugs are sent over land, through the Sahara, the drug traders have<br />

been forced to cooperate with terrorist organizations, such as Al Qaida in Islamic<br />

Maghreb.<br />

Eastern and Southern Africa<br />

Heroin is increasingly trafficked from Afghanistan to Europe and America through<br />

eastern and southern African countries. This path is known as the “southern route” or<br />

“smack track.” Repercussions of this trade include burgeoning heroin use and political<br />

corruption among intermediary African nations.<br />

Asia<br />

Drugs in Asia traditionally traveled the southern routes - the main caravan axes of<br />

Southeast Asia and Southern China - and include the former opium-producing countries<br />

of Thailand, Iran, and Pakistan. After the 1990s, particularly after the Cold War ended,<br />

Page 89 of 372


orders were opened and trading and customs agreements were signed so that the<br />

routes expanded to include China, Central Asia, and Russia. <strong>The</strong>re is, therefore, a<br />

diversified drug trafficking routes available today, particularly in the heroin trade and<br />

these thrive due to the continuous development of new markets. A large amount of<br />

drugs are smuggled into Europe from Asia. <strong>The</strong> main sources of these drugs are<br />

Afghanistan, along with countries that constituted the so-called Golden Crescent. From<br />

these producers, drugs are smuggled into the West and Central Asia to its destinations<br />

in Europe and the United States. Iran is now the route for smugglers, having been<br />

previously a primary trading route, due to its large-scale and costly war against drug<br />

trafficking. <strong>The</strong> Border Police Chief of Iran said that his country "is a strong barrier<br />

against the trafficking of illegal drugs to Caucasus, especially the Republic of<br />

Azerbaijan." <strong>The</strong> drugs produced by the Golden Triangle of Myanmar, Laos, and<br />

Thailand, on the other hand, pass through the southern routes to feed the Australian,<br />

U.S., and Asian markets.<br />

Online<br />

Drugs are increasingly traded online on the dark web on darknet markets.<br />

Profits<br />

Statistics about profits from the drug trade are largely unknown due to its illicit nature. <strong>In</strong><br />

its 1997 World Drugs Report the United Nations Office on Drugs and <strong>Crime</strong> estimated<br />

the value of the market at $4 trillion, ranking drugs alongside arms and oil among the<br />

world's largest traded goods. An online report published by the UK Home Office in 2007<br />

estimated the illicit drug market in the UK at £4–6.6 billion a year<br />

<strong>In</strong> December 2009 United Nations Office on Drugs and <strong>Crime</strong> Executive Director<br />

Antonio Maria Costa claimed illegal drug money saved the banking industry from<br />

collapse. He claimed he had seen evidence that the proceeds of organized crime were<br />

"the only liquid investment capital" available to some banks on the brink of collapse<br />

during 2008. He said that a majority of the $352 billion (£216bn) of drug profits was<br />

absorbed into the economic system as a result:<br />

"<strong>In</strong> many instances, the money from drugs was the only liquid investment capital. <strong>In</strong> the<br />

second half of 2008, liquidity was the banking system's main problem and hence liquid<br />

capital became an important factor...<strong>In</strong>ter-bank loans were funded by money that<br />

originated from the drugs trade and other illegal activities...there were signs that some<br />

banks were rescued that way".<br />

Costa declined to identify countries or banks that may have received any drug money,<br />

saying that would be inappropriate because his office is supposed to address the<br />

problem, not apportion blame.<br />

Though street-level drug sales are widely viewed as lucrative, a study by Sudhir<br />

Venkatesh suggested that many low-level employees receive low wages. <strong>In</strong> a study he<br />

Page 90 of 372


made in the 1990s working closely with members of the Black Gangster Disciple Nation<br />

in Chicago, he found that one gang (essentially a franchise) consisted of a leader (a<br />

college graduate named J.T.), three senior officers, and 25 to 75 street level salesmen<br />

('foot soldiers') depending on season. Selling crack cocaine, they took in approximately<br />

$32,000 per month over a six-year period. This was spent as follows: $5,000 to the<br />

board of twenty directors of the Black Gangster Disciple Nation, who oversaw 100 such<br />

gangs for approximately $500,000 in monthly income. Another $5,000 monthly was paid<br />

for cocaine, and $4,000 for other non-wage expenses. J.T. took $8,500 monthly for his<br />

own salary. <strong>The</strong> remaining $9,500 monthly went to pay the employees a $7 per hour<br />

wage for officers and a $3.30 per hour wage for foot soldiers. Contrary to a popular<br />

image of drug sales as a lucrative profession, many of the employees were living with<br />

their mothers by necessity. Despite this, the gang had four times as many unpaid<br />

members who dreamed of becoming foot soldiers.<br />

Free Trade Link<br />

<strong>The</strong>re are several arguments on whether or not free trade has a correlation to an<br />

increased activity in the illicit drug trade. Currently, the structure and operation of the<br />

illicit drug industry is described mainly in terms of an international division of labor. Free<br />

trade can open new markets to domestic producers who would otherwise resort to<br />

exporting illicit drugs. Additionally, extensive free trade among states increases crossborder<br />

drug enforcement and coordination between law enforcement agencies in<br />

different countries. However, free trade also increases the sheer volume of legal crossborder<br />

trade and provides cover for drug smuggling—by providing ample opportunity to<br />

conceal illicit cargo in legal trade. While international free trade continues to expand the<br />

volume of legal trade, the ability to detect and interdict drug trafficking is severely<br />

diminished. Towards the late 1990s, the top ten seaports in the world processed 33.6<br />

million containers. Free trade has fostered integration of financial markets and has<br />

provided drug traffickers with more opportunities to launder money and invest in other<br />

activities. This strengthens the drug industry while weakening the efforts of law<br />

enforcement to monitor the flow of drug money into the legitimate economy.<br />

Page 91 of 372


Cooperation among cartels expands their scope to distant markets and strengthens<br />

their abilities to evade detection by local law enforcement. Additionally, criminal<br />

organizations work together to coordinate money-laundering activities by having<br />

separate organizations handle specific stages of laundering process. One organization<br />

structures the process of how financial transactions will be laundered, while another<br />

criminal group provides the “dirty” money to be cleaned. By fostering expansion of trade<br />

and global transportation networks, free trade encourages cooperation and formation of<br />

alliances among criminal organizations across different countries. <strong>The</strong> drug trade in<br />

Latin America emerged in the early 1930s. It saw significant growth in the Andean<br />

countries, including Peru, Bolivia, Chile, Ecuador, Colombia and Venezuela. <strong>The</strong><br />

underground market in the early half of the 20th century mainly had ties to Europe. After<br />

World War II, the Andean countries saw an expansion of trade, specifically with cocaine.<br />

Background<br />

Drug Trafficking by Country<br />

United States<br />

<strong>The</strong> effects of the illegal drug trade in the United States can be seen in a range of<br />

political, economic and social aspects. <strong>In</strong>creasing drug related violence can be tied to<br />

the racial tension that arose during the late 20th century along with the political<br />

upheaval prevalent throughout the 1960s and 70s. <strong>The</strong> second half of the 20th century<br />

was a period when increased wealth, and increased discretionary spending, increased<br />

the demand for illicit drugs in certain areas of the United States. Large-scale drug<br />

trafficking is one of the few capital crimes, and may result in a death sentence<br />

prescribed at the federal level.<br />

Political Impact<br />

A large generation, the baby boomers, came of age in the 1960s. <strong>The</strong>ir social tendency<br />

to confront the law on specific issues, including illegal drugs, overwhelmed the<br />

understaffed judicial system. <strong>The</strong> federal government attempted to enforce the law, but<br />

with meager effect.<br />

Marijuana was a popular drug seen through the Latin American trade route in the<br />

1960s. Cocaine became a major drug product in the later decades. Much of the cocaine<br />

is smuggled from Colombia and Mexico via Jamaica. This led to several administrations<br />

combating the popularity of these drugs. Due to the influence of this development on the<br />

U.S. economy, the Reagan administration began "certifying" countries for their attempts<br />

at controlling drug trafficking. This allowed the United States to intervene in activities<br />

related to illegal drug transport in Latin America. Continuing into the 1980s, the United<br />

States instated stricter policy pertaining to drug transit through sea. As a result, there<br />

was an influx in drug-trafficking across the Mexico–U.S. border. This increased the drug<br />

cartel activity in Mexico. By the early 1990s, so much as 50% of the cocaine available in<br />

the United States market originated from Mexico, and by the 2000s, over 90% of the<br />

Page 92 of 372


cocaine in the United States was imported from Mexico. <strong>In</strong> Colombia, however, there<br />

was a fall of the major drug cartels in the mid-1990s. Visible shifts occurred in the drug<br />

market in the United States. Between the 1996 and 2000, U.S. cocaine consumption<br />

dropped by 11%.<br />

<strong>In</strong> 2008, the U.S. government initiated another program, known as the Merida <strong>In</strong>itiative,<br />

to help combat drug trafficking in Mexico. This program increased U.S. security<br />

assistance to $1.4 billion over several years, which helped supply Mexican forces with<br />

"high-end equipment from helicopters to surveillance technology". Despite U.S. aid,<br />

Mexican "narcogangs" continue to outnumber and outgun the Mexican Army, allowing<br />

for continued activities of drug cartels across the U.S.–Mexico border.<br />

Social Impacts<br />

Although narcotics are illegal in the US, they have become integrated into the nation's<br />

culture and are seen as a recreational activity by sections of the population. Illicit drugs<br />

are considered to be a commodity with strong demand, as they are typically sold at a<br />

high value. This high price is caused by a combination of factors that include the<br />

potential legal ramifications that exist for suppliers of illicit drugs and their high demand.<br />

Despite the constant effort by politicians to win the war on drugs, the US is still the<br />

world's largest importer of illegal drugs.<br />

Throughout the 20th century, narcotics other than cocaine also crossed the Mexican<br />

border, meeting the US demand for alcohol during the 1920s Prohibition, opiates in the<br />

1940s, marijuana in the 1960s, and heroin in the 1970s. Most of the U.S. imports of<br />

drugs come from Mexican drug cartels. <strong>In</strong> the United States, around 195 cities have<br />

Page 93 of 372


een infiltrated by drug trafficking that originated in Mexico. An estimated $10bn of the<br />

Mexican drug cartel's profits come from the United States, not only supplying the<br />

Mexican drug cartels with the profit necessary for survival, but also furthering America's<br />

economic dependence on drugs.<br />

Demographics<br />

With a large wave of immigrants in the 1960s and onwards, the United States saw an<br />

increased heterogeneity in its public. <strong>In</strong> the 1980s and 90s, drug related homicide was<br />

at a record high. This increase in drug violence became increasingly tied to these ethnic<br />

minorities. Though the rate of violence varied tremendously among cities in America, it<br />

was a common anxiety in communities across urban America. An example of this could<br />

be seen in Miami, a city with a host of ethnic enclaves. Between 1985 and 1995, the<br />

homicide rate in Miami was one of the highest in the nation—four times the national<br />

homicide average. This crime rate was correlated with regions with low employment and<br />

was not entirely dependent on ethnicity.<br />

<strong>The</strong> baby boomer generation also felt the effects of the drug trade in their increased<br />

drug use from the 1960s to 80s. Along with substance abuse, criminal involvement,<br />

suicide and murder were also on the rise. Due to the large amount of baby boomers,<br />

commercial marijuana use was on the rise. This increased the supply and demand for<br />

marijuana during this time period.<br />

Mexico<br />

Political <strong>In</strong>fluences<br />

Corruption in Mexico has contributed to the domination of Mexican cartels in the illicit<br />

drug trade. Since the beginning of the 20th century, Mexico's political environment<br />

allowed the growth of drug-related activity. <strong>The</strong> loose regulation over the transportation<br />

of illegal drugs and the failure to prosecute known drug traffickers and gangs increased<br />

the growth of the drug industry. Toleration of drug trafficking has undermined the<br />

authority of the Mexican government and has decreased the power of law enforcement<br />

officers in regulation over such activities. <strong>The</strong>se policies of tolerance fostered the<br />

growing power of drug cartels in the Mexican economy and have made drug traders<br />

wealthier. Many states in Mexico lack policies that establish stability in governance.<br />

<strong>The</strong>re also is a lack of local stability, as mayors cannot be re-elected. This requires<br />

electing a new mayor each term. Drug gangs have manipulated this, using vacuums in<br />

local leadership to their own advantage.<br />

<strong>In</strong> 1929, the <strong>In</strong>stitutional Revolutionary Party (PRI) was formed to resolve the chaos<br />

resulting from the Mexican Revolution. Over time, this party gained political influence<br />

and had a major impact on Mexico's social and economic policies. <strong>The</strong> party created<br />

ties with various groups as a power play in order to gain influence, and as a result<br />

created more corruption in the government. One such power play was an alliance with<br />

drug traffickers. This political corruption obscured justice, making it difficult to identify<br />

violence when it related to drugs. By the 1940s, the tie between the drug cartels and the<br />

Page 94 of 372


PRI had solidified. This arrangement created immunity for the leaders of the drug<br />

cartels and allowed drug trafficking to grow under the protection of the government<br />

officials. During the 1990s, the PRI lost some elections to the new National Action<br />

Party(PAN). Chaos again emerged as elected government in Mexico changed<br />

drastically. As the PAN party took control, drug cartel leaders took advantage of the<br />

ensuing confusion and used their existing influence to further gain power. <strong>In</strong>stead of<br />

negotiating with the central government as was done with the PRI party, drug cartels<br />

utilized new ways to distribute their supply and continued operating through force and<br />

intimidation. As Mexico became more democratized, the corruption fell from a<br />

centralized power to the local authorities. [61] Cartels began to bribe local authorities,<br />

thus eliminating the structure and rules placed by the government—giving cartels more<br />

freedom. As a response, Mexico saw an increase in violence caused by drug trafficking.<br />

<strong>The</strong> corruption cartels created resulted in distrust of government by the Mexican public.<br />

This distrust became more prominent after the collapse of the PRI party. <strong>In</strong> response,<br />

the presidents of Mexico, in the late twentieth century and early twenty-first century,<br />

implemented several different programs relating to law enforcement and regulation. <strong>In</strong><br />

1993, President Salinas created the National <strong>In</strong>stitute for the Combat of Drugs in<br />

Mexico. From 1995–1998, President Zedillo established policies regarding increased<br />

punishment of organized crime, allowing "[wire taps], protected witnesses, covert agents<br />

and seizures of goods", and increasing the quality of law enforcement at the federal<br />

level. From 2001–2005, President Vicente Fox created the Federal Agency of<br />

<strong>In</strong>vestigation. <strong>The</strong>se policies resulted in the arrests of major drug-trafficking bosses:<br />

Mexico's Economy<br />

Arrested Drug Traffickers<br />

Year Person Cartel<br />

1989 Miguel Angel Felix Gallardo Sinaloa Cartel<br />

1993 Joaquín Guzmán Loera Sinaloa Cartel<br />

1995 Héctor Luis Palma<br />

1996 Juan Garcia Abrego Gulf Cartel<br />

2002 Ismael Higuera Guerrero Tijuana Cartel<br />

Jesus Labra<br />

Tijuana Cartel<br />

Adan Amezcua<br />

Colima Cartel<br />

Benjamin Arellano Felix Tijuana Cartel<br />

2003 Osiel Cardenas Gulf Cartel<br />

Over the past few decades drug cartels have become integrated into Mexico's<br />

economy. Approximately 500 cities are directly engaged in drug trafficking and nearly<br />

450,000 people are employed by drug cartels. Additionally, the livelihood of 3.2 million<br />

people is dependent on the drug cartels. Between local and international sales, such as<br />

to Europe and the United States, drug cartels in Mexico see a $25–30bn yearly profit, a<br />

great deal of which circulates through international banks such as HSBC. Drug cartels<br />

are fundamental in local economics. A percentage of the profits seen from the trade are<br />

invested in the local community. Such profits contribute to the education and healthcare<br />

of the community. While these cartels bring violence and hazards into communities,<br />

they create jobs and provide income for its many members.<br />

Page 95 of 372


Culture of Drug Cartels<br />

Major cartels saw growth due to a prominent set culture of Mexican society that created<br />

the means for drug capital. One of the sites of origin for drug trafficking within Mexico,<br />

was the state of Michoacán. <strong>In</strong> the past, Michoacán was mainly an agricultural society.<br />

This provided an initial growth of trade. <strong>In</strong>dustrialization of rural areas of Mexico<br />

facilitated a greater distribution of drugs, expanding the drug market into different<br />

provinces. Once towns became industrialized, cartels such as the Sinaloa Cartel started<br />

to form and expand. <strong>The</strong> proliferation of drug cartel culture largely stemmed from the<br />

ranchero culture seen in Michoacán. Ranchero culture values the individual as opposed<br />

to the society as a whole. This culture fostered the drug culture of valuing the family that<br />

is formed within the cartel. This ideal allowed for greater organization within the cartels.<br />

Gangs play a major role in the activity of drug cartels. MS-13 and the 18th Street gang<br />

are notorious for their contributions and influence over drug trafficking throughout Latin<br />

America. MS-13 has controlled much of the activity in the drug trade spanning from<br />

Mexico to Panama Female involvement is present in the Mexican drug culture. Although<br />

females are not treated as equals to males, they typically hold more power than their<br />

culture allows and acquire some independence. <strong>The</strong> increase in power has attracted<br />

females from higher social classes. Financial gain has also prompted women to become<br />

involved in the illegal drug market. Many women in the lower levels of major drug cartels<br />

belong to a low economic class. Drug trafficking offers women an accessible way to<br />

earn income. Females from all social classes have become involved in the trade due to<br />

outside pressure from their social and economic environments.<br />

Political Ties<br />

Colombia<br />

It was common for smugglers in Colombia to import liquor, alcohol, cigarettes and<br />

textiles, while exporting cocaine. Personnel with knowledge of the terrain were able to<br />

supply the local market while also exporting a large amount of product. <strong>The</strong> established<br />

trade that began in the 1960s involved Peru, Bolivia, Colombia, Venezuela and Cuba.<br />

Peasant farmers produced coca paste in Peru and Bolivia, while Colombian smugglers<br />

would process the coca paste into cocaine in Colombia, and trafficked product through<br />

Cuba. This trade route established ties between Cuban and Colombian organized<br />

crime. From Cuba, cocaine would be transported to Miami, Florida; and Union City, <strong>New</strong><br />

Jersey. Quantities of the drug were then smuggled throughout the US. <strong>The</strong> international<br />

drug trade created political ties between the involved countries, encouraging the<br />

governments of the countries involved to collaborate and instate common policies to<br />

eradicate drug cartels. Cuba stopped being a center for transport of cocaine following<br />

the establishment of a communist government in 1959. As a result, Miami and Union<br />

City became the sole locations for trafficking. <strong>The</strong> relations between Cuban and<br />

Colombian organized crime remained strong until the 1970s, when Colombian cartels<br />

began to vie for power. <strong>In</strong> the 1980s and 90s, Colombia emerged as a key contributor of<br />

the drug trade industry in the Western Hemisphere. While the smuggling of drugs such<br />

Page 96 of 372


as marijuana, poppy, opium and heroin became more ubiquitous during this time period,<br />

the activity of cocaine cartels drove the development of the Latin American drug trade.<br />

<strong>The</strong> trade emerged as a multinational effort as supplies (i.e. coca plant substances)<br />

were imported from countries such as Bolivia and Peru, were refined in Colombian<br />

cocaine labs and smuggled through Colombia, and exported to countries such as the<br />

US.<br />

Colombia's Economy<br />

Colombia has had a significant role in the illegal drug trade in Latin America. While<br />

active in the drug trade since the 1930s, Colombia's role in the drug trade did not truly<br />

become dominant until the 1970s. When Mexico eradicated marijuana plantations,<br />

demand stayed the same. Colombia met much of the demand by growing more<br />

marijuana. Grown in the strategic northeast region of Colombia, marijuana soon<br />

became the leading cash crop in Colombia. This success was short-lived due to antimarijuana<br />

campaigns that were enforced by the US military throughout the Caribbean.<br />

<strong>In</strong>stead, drug traffickers in Colombia continued their focus on the exportation of cocaine.<br />

Having been an export of Colombia since the early 1950s, cocaine remained popular for<br />

a host of reasons. Colombia's location facilitated its transportation from South America<br />

into Central America, and then to its destination of North America. This continued into<br />

the 1990s, when Colombia remained the chief exporter of cocaine. <strong>The</strong> business of<br />

drug trafficking can be seen in several stages in Colombia towards the latter half of the<br />

20th century. Colombia served as the dominant force in the distribution and sale of<br />

cocaine by the 1980s. As drug producers gained more power, they became more<br />

centralized and organized into what became drug cartels. Cartels controlled the major<br />

aspects of each stage in the traffic of their product. <strong>The</strong>ir organization allowed cocaine<br />

Page 97 of 372


to be distributed in great amounts throughout the United States. By the late 1980s, intraindustry<br />

strife arose within the cartels. This stage was marked by increased violence as<br />

different cartels fought for control of export markets. Despite this strife, this power<br />

struggle led to then having multiple producers of coca leaf farms. This in turn caused an<br />

improvement in quality control and reduction of police interdiction in the distribution of<br />

cocaine. This also led to cartels attempting to repatriate their earnings which would<br />

eventually make up 5.5% of Colombia's GDP. This drive to repatriate earnings led to the<br />

pressure of legitimizing their wealth, causing an increase in violence throughout<br />

Colombia.<br />

Throughout the 1980s, estimates of illegal drug value in Colombia ranged from $2bn to<br />

$4bn. This made up about 7-10% of the $36bn estimated GNP of Colombia during this<br />

decade. <strong>In</strong> the 1990s, the estimates of the illegal drug value remained roughly within the<br />

same range (~$2.5bn). As the Colombian GNP rose throughout the 90's ($68.5bn in<br />

1994 and $96.3bn in 1997), illegal drug values began to comprise a decreasing fraction<br />

of the national economy. By the early 1990s, although Colombia led in the exportation<br />

of cocaine, it found increasing confrontations within its state. <strong>The</strong>se confrontations were<br />

primarily between cartels and government institutions. This led to a decrease in the drug<br />

trade's contribution to the GDP of Colombia; dropping from 5.5% to 2.6%. Though a<br />

contributor of wealth, the distribution of cocaine has had negative effects on the sociopolitical<br />

situation of Colombia and has weakened its economy as well.<br />

Social Impacts<br />

By the 1980s, Colombian cartels became the dominant cocaine distributors in the US.<br />

This led to the spread of increased violence throughout both Latin America and Miami.<br />

<strong>In</strong> the 1980s, two major drug cartels emerged in Colombia: the Medellin and Cali<br />

groups. Throughout the 90's however, several factors led to the decline of these major<br />

cartels and to the rise of smaller Colombian cartels. <strong>The</strong> U.S. demand for cocaine<br />

dropped while Colombian production rose, pressuring traffickers to find new drugs and<br />

markets. <strong>In</strong> this time period, there was an increase in activity of Caribbean cartels that<br />

led to the rise of an alternate route of smuggling through Mexico. This led to the<br />

increased collaboration between major Colombian and Mexican drug traffickers. Such<br />

drastic changes in the execution of drug trade in Colombia paired with the political<br />

instabilities and rise of drug wars in Medellin and Cali, gave way for the rise of the<br />

smaller Colombian drug trafficking organizations (and the rise of heroin trade). As the<br />

drug trade's influence over the economy increased, drug lords and their networks grew<br />

in their power and influence in society. <strong>The</strong> occurrences in drug-related violence<br />

increased during this time period as drug lords fought to maintain their control in the<br />

economy. Typically a drug cartel had support networks that consisted of a number of<br />

individuals. <strong>The</strong>se people individuals ranged from those directly involved in the trade<br />

(such as suppliers, chemists, transporters, smugglers, etc.) as well as those involved<br />

indirectly in the trade (such as politicians, bankers, police, etc.). As these smaller<br />

Colombian drug cartels grew in prevalence, several notable aspects of the Colombian<br />

society gave way for further development of the Colombian drug industry. For example,<br />

until the late 1980s, the long-term effects of the drug industry were not realized by much<br />

Page 98 of 372


of society. Additionally, there was a lack of regulation in prisons where captured<br />

traffickers were sent. <strong>The</strong>se prisons were under-regulated, under-funded, and understaffed,<br />

which allowed for the formation of prison gangs, for the smuggling of<br />

arms/weapons/etc., for feasible escapes, and even for captured drug lords to continue<br />

running their businesses from prison.<br />

Cannabis<br />

Trade <strong>In</strong> Specific Drugs<br />

While the recreational use of (and consequently the distribution of) cannabis is illegal in<br />

most countries throughout the world, it is available by prescription or recommendation in<br />

many places, including Canada and 10 of the 50 US states (although importation and<br />

distribution is still federally prohibited). Beginning in 2014, Uruguay became the first<br />

country to legalize cultivation, sale, and consumption of cannabis for recreational use<br />

for adult residents. <strong>In</strong> 2018, Canada became the only second country to legalize use,<br />

sale and cultivation of cannabis. <strong>The</strong> first few weeks were met with extremely high<br />

demand, most shops being out of stock after operating for only four days.<br />

Cannabis use is tolerated in some areas, most notably the Netherlands which has<br />

legalized the possession and licensed sale (but not cultivation) of the drug. Many<br />

nations have decriminalized the possession of small amounts of marijuana. Due to the<br />

Page 99 of 372


hardy nature of the cannabis plant, marijuana is grown all across the world and is today<br />

the world's most popular illegal drug with the highest level of availability. Cannabis is<br />

grown legally in many countries for industrial, non-drug use (known as hemp) as well.<br />

Cannabis-hemp may also be planted for other non-drug domestic purposes, such as<br />

seasoning that occurs in Aceh.<br />

<strong>The</strong> demand for cannabis around the world, coupled with the drug's relative ease of<br />

cultivation, makes the illicit cannabis trade one of the primary ways in which organized<br />

criminal groups finance many of their activities. <strong>In</strong> Mexico, for example, the illicit<br />

trafficking of cannabis is thought to constitute the majority of many of the cartels'<br />

earnings, and the main way in which the cartels finance many other illegal activities;<br />

including the purchase of other illegal drugs for trafficking, and for acquiring weapons<br />

that are ultimately used to commit murders (causing a burgeoning in the homicide rates<br />

of many areas of the world, but particularly Latin America).<br />

Some studies show that the increased legalization of cannabis in the United States<br />

(beginning in 2012 with Washington <strong>In</strong>itiative 502 and Colorado Amendment 64) has led<br />

Mexican cartels to smuggle less cannabis in exchange for more heroin.<br />

Alcohol<br />

Alcohol, in the context of alcoholic beverages rather than denatured alcohol, is illegal in<br />

a number of Muslim countries, such as Saudi Arabia, and this has resulted in a thriving<br />

illegal trade in alcohol. <strong>The</strong> manufacture, sale, transportation, importation and<br />

exportation of alcoholic beverage were illegal in the United States during the time<br />

known as the Prohibition in the 1920s and early 1930s.<br />

Heroin<br />

Heroin woven into a hand-made knotted carpet seized at<br />

Manchester Airport, 2012<br />

Up until around 2004 the majority of the world's heroin<br />

was produced in an area known as the Golden<br />

Triangle. However, by 2007, 93% of the opiates on the<br />

world market originated in Afghanistan. This amounted<br />

to an export value of about US$64 billion, with a<br />

quarter being earned by opium farmers and the rest<br />

going to district officials, insurgents, warlords and drug traffickers. Another significant<br />

area where poppy fields are grown for the manufacture of heroin is Mexico.<br />

According to the United States Drug Enforcement Administration, the price of heroin is<br />

typically valued 8 to 10 times that of cocaine on American streets, making it a high-profit<br />

substance for smugglers and dealers. <strong>In</strong> Europe (except the transit countries Portugal<br />

and the Netherlands), for example, a purported gram of street heroin, usually consisting<br />

of 700–800 mg of a light to dark brown powder containing 5-10% heroin base, costs<br />

Page 100 of 372


€30-70, making the effective value per gram of pure heroin €300-700. Heroin is<br />

generally a preferred product for smuggling and distribution—over unrefined opium due<br />

to the cost-effectiveness and increased efficacy of heroin.<br />

Because of the high cost per volume, heroin is easily smuggled. A US quarter-sized<br />

(2.5 cm) cylindrical vial can contain hundreds of doses. From the 1930s to the early<br />

1970s, the so-called French Connection supplied the majority of US demand. Allegedly,<br />

during the Vietnam War, drug lords such as Ike Atkinson used to smuggle hundreds of<br />

kilograms of heroin to the US in coffins of dead American soldiers (see Cadaver<br />

Connection). Since that time it has become more difficult for drugs to be imported into<br />

the US than it had been in previous decades, but that does not stop the heroin<br />

smugglers from getting their product across US borders. Purity levels vary greatly by<br />

region with Northeastern cities having the most pure heroin in the United States. On 17<br />

October 2018 police in Genoa Italy, discovered 270 kg of heroin hidden in a ship<br />

coming from the Iranian southern port of Bandar Abbas. <strong>The</strong> ship had already passed<br />

and stopped at Hamburg in Germany and Valencia in Spain.<br />

Penalties for smuggling heroin or morphine are often harsh in most countries. Some<br />

Page 101 of 372


countries will readily hand down a death sentence (e.g. Singapore) or life in prison for<br />

the illegal smuggling of heroin or morphine, which are both internationally Schedule I<br />

drugs under the Single Convention on Narcotic Drugs.<br />

Methamphetamine<br />

Methamphetamine is another popular drug among distributors. Three common street<br />

names are "crystal meth", "meth", and "ice".<br />

According to the Community Epidemiology Work Group, the number of clandestine<br />

methamphetamine laboratory incidents reported to the National Clandestine Laboratory<br />

Database decreased from 1999 to 2009. During this period, methamphetamine lab<br />

incidents increased in mid-western States (Illinois, Michigan, Missouri, and Ohio), and in<br />

Pennsylvania. <strong>In</strong> 2004, more lab incidents were reported in Missouri (2,788) and Illinois<br />

(1,058) than in California (764). <strong>In</strong> 2003, methamphetamine lab incidents reached new<br />

highs in Georgia (250), Minnesota (309), and Texas (677). <strong>The</strong>re were only seven<br />

methamphetamine lab incidents reported in Hawaii in 2004, though nearly 59 percent of<br />

substance abuse treatment admissions (excluding alcohol) were for primary<br />

methamphetamine abuse during the first six months of 2004. As of 2007, Missouri leads<br />

the United States in drug-lab seizures, with 1,268 incidents reported. Often canine units<br />

are used for detecting rolling meth labs which can be concealed on large vehicles, or<br />

transported on something as small as a motorcycle. <strong>The</strong>se labs are more difficult to<br />

detect than stationary ones, and can often be obscured among legal cargo in big trucks.<br />

Methamphetamine is sometimes used intraveneously, placing users and their partners<br />

at risk for transmission of HIV and hepatitis C. "Meth" can also be inhaled, most<br />

commonly vaporized on aluminum foil or in a glass pipe. This method is reported to give<br />

"an unnatural high" and a "brief intense rush".<br />

<strong>In</strong> South Africa methamphetamine is called "tik" or "tik-tik"."Known locally as "tik," the<br />

drug was virtually unknown as late as 2003. Now, it is the country's main drug of abuse,<br />

even when alcohol is included. " Children as young as eight are abusing the substance,<br />

smoking it in crude glass vials made from light bulbs. Since methamphetamine is easy<br />

to produce, the substance is manufactured locally in staggering quantities.<br />

<strong>The</strong> government of North Korea currently operates methamphetamine production<br />

facilities. <strong>The</strong>re, the drug is used as medicine because no alternatives are available; it<br />

also is smuggled across the Chinese border.<br />

<strong>The</strong> Australian <strong>Crime</strong> Commission's illicit drug data report for 2011–2012 stated that the<br />

average strength of crystal methamphetamine doubled in most Australian jurisdictions<br />

within a 12-month period, and the majority of domestic laboratory closures involved<br />

small "addict-based" operations.<br />

Temazepam<br />

Page 102 of 372


Temazepam, a strong hypnotic benzodiazepine, is illicitly manufactured in clandestine<br />

laboratories (called jellie labs) to supply the increasingly high demand for the drug<br />

internationally. Many clandestine temazepam labs are in Eastern Europe. <strong>The</strong> labs<br />

manufacture temazepam by chemically altering diazepam, oxazepam or lorazepam.<br />

"Jellie labs" have been identified and shut down in Russia, the Ukraine, Czech<br />

Republic, Latvia and Belarus.<br />

Surveys in many countries show that temazepam, MDMA, nimetazepam, and<br />

methamphetamine rank among the top illegal drugs most frequently abused.<br />

Page 103 of 372


Page 104 of 372


VI. Embezzlement<br />

Embezzlement is the act of withholding assets for the purpose of conversion (theft) of<br />

such assets, by one or more persons to whom the assets were entrusted, either to be<br />

held or to be used for specific purposes. Embezzlement is a type of financial fraud. For<br />

example, a lawyer might embezzle funds from the trust accounts of their clients; a<br />

financial advisor might embezzle the funds of investors; and a husband or a wife might<br />

embezzle funds from a bank account jointly held with the spouse.<br />

Embezzlement usually is a premeditated crime, performed methodically, with<br />

precautions that conceal the criminal conversion of the property, which occurs without<br />

the knowledge or consent of the affected person. Often it involves the trusted individual<br />

embezzling only a small proportion of the total of the funds or resources they receive or<br />

control, in an attempt to minimize the risk of the detection of the misallocation of the<br />

funds or resources. When successful, embezzlements may continue for many years<br />

without detection. <strong>The</strong> victims often realize that the funds, savings, assets, or other<br />

resources, are missing and that they have been duped by the embezzler, only when a<br />

relatively large proportion of the funds are needed at one time; or the funds are called<br />

upon for another use; or when a major institutional reorganization (the closing or moving<br />

of a plant or business office, or a merger/acquisition of a firm) requires the complete and<br />

independent accounting of all real and liquid assets, prior to or concurrent with the<br />

reorganization.<br />

<strong>In</strong> the United States, embezzlement is a statutory offence that, depending on the<br />

circumstances, may be a crime under state law, federal law, or both; therefore, the<br />

definition of the crime of embezzlement varies according to the given statute. Typically,<br />

Page 105 of 372


the criminal elements of embezzlement are the fraudulent conversion of the property of<br />

another person by the person who has lawful possession of the property.<br />

i. Fraudulence: <strong>The</strong> requirement that the conversion be fraudulent requires that<br />

the embezzler willfully, and without claim of right or mistake, converted the<br />

entrusted property to their own use.<br />

ii.<br />

iii.<br />

iv.<br />

Criminal conversion: Embezzlement is a crime against ownership, that is,<br />

voiding the right of the owner to control the disposition and use of the property<br />

entrusted to the embezzler. <strong>The</strong> element of criminal conversion requires<br />

substantial interference with the property rights of the owner (unlike larceny,<br />

wherein the slightest movement of the property, when accompanied by the intent<br />

to permanently deprive the owner of possession of the property is sufficient<br />

cause).<br />

Property: Embezzlement statutes do not limit the scope of the crime to<br />

conversions of personal property. Statutes generally include conversion of<br />

tangible personal property, intangible personal property, and choses in action.<br />

Real property is not typically included.<br />

of another: A person cannot embezzle his or her own property.<br />

v. Lawful possession: <strong>The</strong> critical element is that the embezzler must have been<br />

in lawful possession of the property at the time of the fraudulent conversion, and<br />

not merely have custody of the property. If the thief had lawful possession of the<br />

property, the crime is embezzlement; if the thief merely had custody, the crime at<br />

common law is larceny.<br />

Embezzlement v. Larceny<br />

Embezzlement differs from larceny in three ways. First, in embezzlement, an actual<br />

conversion must occur; second, the original taking must not be trespassory, and three,<br />

in penalties. To say that the taking was not trespassory is to say that the persons<br />

performing the embezzlement had the right to possess, use or access the assets in<br />

question, and that such persons subsequently secreted and converted the assets for an<br />

unintended or unsanctioned use. Conversion requires that the secretion interfere with<br />

the property, rather than just relocate it. As in larceny, the measure is not the gain to the<br />

embezzler, but the loss to the asset stakeholders. An example of conversion is when a<br />

person logs checks in a check register or transaction log as being used for one specific<br />

purpose and then explicitly uses the funds from the checking account for another and<br />

completely different purpose.<br />

It is important to make clear that embezzlement is not always a form of theft or an act of<br />

stealing, since those definitions specifically deal with taking something that does not<br />

belong to the perpetrators. <strong>In</strong>stead, embezzlement is, more generically, an act of<br />

deceitfully secreting assets by one or more persons that have been entrusted with such<br />

Page 106 of 372


assets. <strong>The</strong> persons entrusted with such assets may or may not have an ownership<br />

stake in such assets.<br />

<strong>In</strong> the case where it is a form of theft, distinguishing between embezzlement and<br />

larceny can be tricky. Making the distinction is particularly difficult when dealing with<br />

misappropriations of property by employees. To prove embezzlement, the state must<br />

show that the employee had possession of the goods "by virtue of his or her<br />

employment"; that is, that the employee had formally delegated authority to exercise<br />

substantial control over the goods. Typically, in determining whether the employee had<br />

sufficient control the courts will look at factors such as the job title, job description and<br />

the particular operational practices of the firm or organization. For example, the<br />

manager of a shoe department at a department store would likely have sufficient control<br />

over the store's inventory (as head of the shoe department) of shoes; that if they<br />

converted the goods to their own use they would be guilty of embezzlement. On the<br />

other hand, if the same employee were to steal cosmetics from the cosmetics<br />

Page 107 of 372


department of the store, the crime would not be embezzlement but larceny. For a case<br />

that exemplifies the difficulty of distinguishing larceny and embezzlement see State v.<br />

Weaver, 359 N.C. 246; 607 S.E.2d 599 (2005).<br />

North Carolina appellate courts have compounded this confusion by misinterpreting a<br />

statute based on an act passed by parliament in 1528. <strong>The</strong> North Carolina courts<br />

interpreted this statute as creating an offence called "larceny by employee"; an offence<br />

that was separate and distinct from common law larceny. However, as Perkins notes,<br />

the purpose of the statute was not to create a new offence but was merely to confirm<br />

that the acts described in the statute met the elements of common law larceny.<br />

<strong>The</strong> statute served the purpose of the then North Carolina colony as an indentured<br />

servant– and slave-based political economy. It ensured that an indentured servant (or<br />

anyone bound to service of labor to a master, e.g., a slave), would owe to their master<br />

their labor; and, if they left their indentured service or bound labor unlawfully, the labor<br />

they produced, either for themselves (i.e., self-employed), or for anyone else, would be<br />

the converted goods that they unlawfully took, from the rightful owner, their master.<br />

Crucially (and this can be seen as the purpose of the statute), any subsequent employer<br />

of such an indentured servant or slave, who was in fact bound to service of labor to a<br />

pre-existing master, would be chargeable with misprision-of-a-felony (if it was proved in<br />

they knew that the employee was still indentured to a master, or owned as a slave); and<br />

chargeable as an accessory-after-the-fact, in the felony, with the servant or slave; in<br />

helping them, by employing them, in the unlawfully taking that which was lawfully bound<br />

(through the master servant relationship) in exclusive right, to the master of the<br />

indentured servant or slave.<br />

Methods of embezzlement<br />

Embezzlement sometimes involves falsification of records in order to conceal the<br />

activity. Embezzlers commonly secrete relatively small amounts repeatedly, in a<br />

systematic or methodical manner, over a long period of time, although some<br />

embezzlers secrete one large sum at once. Some very successful embezzlement<br />

schemes have continued for many years before being detected due to the skill of the<br />

embezzler in concealing the nature of the transactions or their skill in gaining the trust<br />

and confidence of investors or clients, who are then reluctant to "test" the embezzler's<br />

trustworthiness by forcing a withdrawal of funds.<br />

Embezzling should not be confused with skimming, which is under-reporting income<br />

and pocketing the difference. For example, in 2005, several managers of the service<br />

provider Aramark were found to be under-reporting profits from a string of vending<br />

machine locations in the eastern United States. While the amount stolen from each<br />

machine was relatively small, the total amount taken from many machines over a length<br />

of time was very large. A smart technique employed by many small-time embezzlers<br />

can be covered by falsifying the records. (Example, by removing a small amount of<br />

money and falsifying the record the register would be technically correct, while the<br />

Page 108 of 372


manager would remove the profit and leave the float in, this method would effectively<br />

make the register short for the next user and throw the blame onto them)<br />

Another method is to create a false vendor account and supply false bills to the<br />

company being embezzled so that the checks that are cut appear completely legitimate.<br />

Yet another method is to create phantom employees, who are then paid with payroll<br />

checks.<br />

<strong>The</strong> latter two methods should be uncovered by routine audits, but often aren't if the<br />

audit is not sufficiently in-depth, because the paperwork appears to be in order. A<br />

publicly traded company must change auditors and audit companies every five years.<br />

<strong>The</strong> first method is easier to detect if all transactions are by cheque or other instrument,<br />

but if many transactions are in cash, it is much more difficult to identify. Employers have<br />

developed a number of strategies to deal with this problem. <strong>In</strong> fact, cash registers were<br />

invented just for this reason.<br />

Some of the most complex (and potentially most lucrative) forms of embezzlement<br />

involve Ponzi-like financial schemes where high returns to early investors are paid out<br />

of funds received from later investors duped into believing they are themselves<br />

receiving entry into a high-return investment scheme. <strong>The</strong> Madoff investment scandal is<br />

an example of this kind of high-level embezzlement scheme, where it is alleged that<br />

$65 billion was siphoned off from gullible investors and financial institutions.<br />

Page 109 of 372


Safeguards Against Embezzlement<br />

<strong>In</strong>ternal controls such as separation of duties are common defences against<br />

embezzlement. For example, at a movie theatre (cinema), the task of accepting money<br />

and admitting customers into the theatre is typically broken up into two jobs. One<br />

employee sells the ticket, and another employee takes the ticket and lets the customer<br />

into the theatre. Because a ticket cannot be printed without entering the sale into the<br />

computer (or, in earlier times, without using up a serial-numbered printed ticket), and<br />

the customer cannot enter the theatre without a ticket, both of these employees would<br />

have to collude in order for embezzlement to go undetected. This significantly reduces<br />

the chance of theft, because of the added difficulty in arranging such a conspiracy and<br />

the likely need to split the proceeds between the two employees, which reduces the<br />

payoff for each.<br />

Another obvious method to deter embezzlement is to regularly and unexpectedly move<br />

funds from one advisor or entrusted person to another when the funds are supposed to<br />

be available for withdrawal or use, to ensure that the full amount of the funds is<br />

available and no fraction of the savings has been embezzled by the person to whom the<br />

funds or savings have been entrusted.<br />

England and Wales<br />

Offences of embezzlement were formerly created by sections 18 and 19 of the Larceny<br />

Act 1916.<br />

<strong>The</strong> former offences of embezzlement are replaced by the new offence of theft, contrary<br />

to section 1 of the <strong>The</strong>ft Act 1968.<br />

Page 110 of 372


VII. Extortion<br />

Extortion (also called shakedown, outwrestling and exaction) is a criminal offense of<br />

obtaining money, property, or services from an individual or institution, through<br />

coercion. It is sometimes euphemistically referred to as a "protection racket" since the<br />

racketeers often phrase their demands as payment for "protection" from (real or<br />

hypothetical) threats from unspecified other parties; though often, and almost always,<br />

such "protection" is simply abstinence of harm from the same party, and such is implied<br />

in the "protection" offer. Extortion is commonly practiced by organized crime groups.<br />

<strong>The</strong> actual obtainment of money or property is not required to commit the offense.<br />

Making a threat of violence which refers to a requirement of a payment of money or<br />

property to halt future violence is sufficient to commit the offense. Exaction refers not<br />

only to extortion or the demanding and obtaining of something through force, [1] but<br />

additionally, in its formal definition, means the infliction of something such as pain and<br />

suffering or making somebody endure something unpleasant.<br />

<strong>The</strong> term extortion is often used metaphorically to<br />

refer to usury or to price-gouging, though neither<br />

is legally considered extortion. It is also often<br />

used loosely to refer to everyday situations where<br />

one person feels indebted against their will, to<br />

another, in order to receive an essential service<br />

or avoid legal consequences. Neither extortion<br />

nor blackmail requires a threat of a criminal act,<br />

such as violence, merely a threat used to elicit<br />

actions, money, or property from the object of the<br />

extortion. Such threats include the filing of reports<br />

(true or not) of criminal behavior to the police, revelation of damaging facts (such as<br />

pictures of the object of the extortion in a compromising position), etc.<br />

<strong>In</strong> law, the word extortion can refer to political corruption, such as selling one's office or<br />

influence peddling, but in general vocabulary the word usually first brings to mind<br />

blackmail or protection rackets. <strong>The</strong> logical connection between the corruption sense of<br />

the word and the other senses is that to demand bribes in one's official capacity is<br />

blackmail or racketeering in essence (that is, "you need access to this resource, the<br />

government restricts access to it through my office, and I will charge you unfairly and<br />

unlawfully for such access").<br />

United States<br />

Extortion is distinguished from robbery. <strong>In</strong> robbery, whether armed or not, the offender<br />

takes property from the victim by the immediate use of force or fear that force will be<br />

immediately used (as in the classic line, "Your money or your life"). Extortion, which is<br />

not limited to the taking of property, involves the verbal or written instillation of fear that<br />

something will happen to the victim if they do not comply with the extortionist's will.<br />

Page 111 of 372


Another key distinction is that extortion always involves a verbal or written threat,<br />

whereas robbery does not. <strong>In</strong> United States federal law, extortion can be committed with<br />

or without the use of force and with or without the use of a weapon.<br />

<strong>In</strong> blackmail, which always involves extortion, the extortionist threatens to reveal<br />

information about a victim or their family members that is potentially embarrassing,<br />

socially damaging, or incriminating unless a demand for money, property, or services is<br />

met.<br />

<strong>In</strong> the United States, extortion may also be committed as a federal crime across a<br />

computer system, phone, by mail, or in using any instrument of interstate commerce.<br />

Extortion requires that the individual sent the message willingly and knowingly as<br />

elements of the crime. <strong>The</strong> message only has to be sent (but does not have to reach the<br />

intended recipient) to commit the crime of extortion.<br />

England and Wales<br />

United Kingdom<br />

<strong>In</strong> England and Wales extorting property and money by coercion is the offence of<br />

Blackmail which covers any "unwarranted demand with menaces" including physical<br />

threats. See section 21 of the <strong>The</strong>ft Act 1968 plus sections 29 and 30 of the Larceny Act<br />

1916. A group of people may also be committing conspiracy.<br />

Scotland<br />

Extortion is a common law offence in Scotland of using threat of harm to demand<br />

money, property or some advantage from another person. It does not matter whether<br />

the demand itself is legitimate (such as for money owed) as the offence can still be<br />

committed when illegitimate threats of harm are used.<br />

Cyberextortion<br />

Cyberextortion is when an individual or group uses the internet as an offensive force.<br />

<strong>The</strong> group or individual usually sends a company a threatening email stating that they<br />

have received confidential information about their company and will exploit a security<br />

leak or launch an attack that will harm the company's network. <strong>The</strong> message sent<br />

through the email usually demands money in exchange for the prevention of the attack.<br />

Cases<br />

<strong>In</strong> March 2008, Anthony Digati was arrested on federal charges of extortion through<br />

interstate communication. Digati put $50,000 into a variable life insurance policy by <strong>New</strong><br />

York Life <strong>In</strong>surance Company and wanted a return of $198,303.88. When the firm didn't<br />

comply, he threatened to send out 6 million spam emails. He registered a domain in<br />

February 2008 that contained <strong>New</strong> York Life's name in the URL to display false public<br />

Page 112 of 372


statements about the company and increased his demand to $3 million. According to<br />

prosecutors, Digati's intent was not to inform or educate but he wanted to "damage the<br />

reputation of <strong>New</strong> York Life and cost the company millions of dollars in revenue,”. <strong>New</strong><br />

York Life contacted the Federal Bureau of <strong>In</strong>vestigation and Digati was apprehended.<br />

from Nintendo.<br />

On February 15, 2011, Spanish police<br />

apprehended a man who attempted to<br />

blackmail Nintendo over customer<br />

information he had stolen. <strong>The</strong> man stole<br />

personal information about 4,000 users and<br />

emailed Nintendo Ibérica, Nintendo's Spanish<br />

division, and accused the company of data<br />

negligence. He threatened the company that<br />

he would make the information public and<br />

complain to the Spanish Data Agency if his<br />

demands were not met. After Nintendo<br />

ignored his demands, he published some of<br />

the information on an <strong>In</strong>ternet forum.<br />

Nintendo notified authorities and the man<br />

was arrested in Málaga. No information has<br />

been revealed as to what the man demanded<br />

On February 7, 2019, Jeffrey P. Bezos, owner of Amazon and <strong>The</strong> Washington Post,<br />

accused the National Enquirer and its parent company American Media, <strong>In</strong>c., of<br />

attempting to extort him by threatening to reveal nude pictures of him unless he publicly<br />

stated that he “[has] no knowledge or basis for suggesting that AMI’s coverage was<br />

politically motivated or influenced by political forces.” This threat was in response to Mr.<br />

Bezos investigating the tabloid for publishing details about his relationship with Lauren<br />

Sanchez, which led to Mr. Bezos and his wife Mackenzie announcing their divorce on<br />

January 9 of that year. Mr. Bezos, the richest man in the world at the time, refused, and<br />

posted the threat on Medium.<br />

Similar <strong>Crime</strong>s<br />

<br />

<br />

<br />

Badger Game: <strong>The</strong> victim or "mark"—for example, such as a married person—is<br />

tricked into a compromising position to make them vulnerable to blackmail.<br />

Clip Joint: A clip joint or fleshpot is an establishment, usually a strip club or<br />

entertainment bar, typically one claiming to offer adult entertainment or bottle<br />

service, in which customers are tricked into paying money and receive poor<br />

goods or services, or none, in return. An example of this is portrayed in the<br />

comedy film Porky's<br />

Coercion: the practice of compelling a person or manipulating them to behave in<br />

an involuntary way (whether through action or inaction) by use of threats,<br />

Page 113 of 372


intimidation, trickery, or some other form of pressure or force. <strong>The</strong>se are used as<br />

leverage, to force the victim to act in the desired way.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Confidence Trick (also known as a bunko, con, flim flam, gaffle, grift, hustle,<br />

scam, scheme, swindle, bamboozle or finnese): an attempt to defraud a person<br />

or group by gaining their confidence.<br />

Cryptovirology: a software scam in which a public key cryptography system<br />

crafts fake keys which encrypt the user's data, but cannot decrypt them unless<br />

the user pays for the real key.<br />

Dognapping: <strong>The</strong> crime of taking a dog from its owner, which usually occurs in<br />

purebred dogs, the profit from which can run up to thousands of dollars.<br />

Loan Sharking: A loan shark is a person or body that offers unsecured loans at<br />

high interest rates to individuals, often backed by blackmail or threats of violence.<br />

Price Gouging: a pejorative term for a seller pricing much higher than is<br />

considered reasonable or fair. <strong>In</strong> precise, legal usage, it is the name of a felony<br />

that applies in some of the United States only during civil emergencies.<br />

Racket: A service that is fraudulently offered to solve a problem, such as for a<br />

problem that does not actually exist, will not be affected, or would not otherwise<br />

exist.<br />

Sextortion: Forcing individuals to send sexual images or perform sexual<br />

services<br />

Terrorism: most simply, policy intended to intimidate or cause terror. It is more<br />

commonly understood as an act which is intended to create fear (terror), is<br />

perpetrated for an ideological goal (as opposed to a materialistic goal or a lone<br />

attack), and deliberately target or disregard the safety of non-combatants. Some<br />

definitions also include acts of unlawful violence or unconventional warfare, but<br />

at present, the international community has been unable to formulate a<br />

universally agreed, legally binding, criminal law definition of terrorism.<br />

Tiger Kidnapping: the taking of an innocent hostage to make a loved one or<br />

associate of the victim do something, e.g. a child is taken hostage to force the<br />

shopkeeper to open the safe; the term originates from the prior observation of the<br />

victim, like a tiger does with its prey. Ransoms are often used alongside these.<br />

Page 114 of 372


VIII. Fencing Stolen Goods<br />

A fence, also known as a receiver, mover, or moving man, is an individual who<br />

knowingly buys stolen goods in order to later resell them for profit. <strong>The</strong> fence acts as a<br />

middleman between thieves and the eventual buyers of stolen goods who may not be<br />

aware that the goods are stolen. As a verb, the word describes the behavior of the thief<br />

in the transaction: <strong>The</strong> burglar fenced the stolen radio. This sense of the term came<br />

from thieves' slang, first attested c. 1700, from the notion of such transactions providing<br />

a defense against being caught. <strong>The</strong> term remains in common use in all major dialects<br />

of modern English, all of which spell it with a "c" even though the source word in some<br />

dialects (particularly American English) is now spelled defense.<br />

<strong>The</strong> fence is able<br />

to make a profit<br />

with stolen<br />

merchandise<br />

because he/she is<br />

able to secretly<br />

pay thieves a very<br />

low price for "hot"<br />

goods that cannot<br />

be easily sold on<br />

the open markets.<br />

<strong>The</strong> thieves who<br />

patronize the<br />

fence are willing<br />

to accept a low<br />

profit margin in<br />

order to reduce<br />

their risks by<br />

instantly "washing their hands" of the black market loot and disassociating themselves<br />

from the criminal act that procured it. After the sale, the fence recoups their investment<br />

by disguising the stolen nature of the goods (via methods such as repackaging and<br />

altering/effacing serial numbers) and reselling the goods as near to the white market<br />

price as possible without drawing suspicion. This process often relies on a legal<br />

business (such as a pawnshop, flea market or street vendor) in order to "launder" the<br />

stolen goods by intermixing them with legally-purchased items of the same type.<br />

Fencing is illegal in all countries, but legally proving a violation of anti-fencing laws can<br />

be difficult.<br />

Approach<br />

<strong>The</strong> fence is able to make a profit with stolen merchandise because he is able to pay<br />

thieves a very low price for stolen goods. Thieves agree to this because their<br />

alternatives may present a greater risk of the thief being caught. As well, selling stolen<br />

Page 115 of 372


goods takes a great deal of time and effort (transaction costs), as the thief would have<br />

to try to contact a number of potential buyers and show them the merchandise. Some<br />

habitual thieves are so well known to police that if the thief were to attempt to sell any<br />

used goods, this would quickly draw the attention of law enforcement.<br />

<strong>The</strong> fence then disguises the stolen nature of the goods, if possible, so that he or she<br />

can sell them closer to the market price. Depending on the stolen item, the fence may<br />

attempt to remove, deface, or replace serial numbers on the stolen item before reselling<br />

it. <strong>In</strong> some cases, fences will transport the stolen items to a different city to sell them,<br />

because this lessens the likelihood that the items will be recognized. For some types of<br />

stolen goods, fences disassemble the good and sell the individual parts, because the<br />

sale of parts is less risky. For example, a stolen car or bicycle may be disassembled so<br />

that the parts can be sold individually. Another tactic used by some fences is to retain<br />

stolen items for some time before selling them, which lessens the likelihood that the<br />

burglary victims or police will be actively looking for the items in auctions and<br />

pawnshops.<br />

Fencing is often conducted through legal businesses. Some fences maintain a<br />

legitimate-seeming "front" through which they can sell stolen merchandise. Depending<br />

on the type of stolen merchandise a fence deals in, "front" businesses might be discount<br />

stores, used goods stores, a coin and gem store, auction house, flea market, or auto<br />

salvage yards. <strong>The</strong> degree of illicit activity in each "front" business may differ from fence<br />

to fence. While one fence's salvage yard may consist mainly of stolen auto parts,<br />

another fence's used goods store might consist mainly of legitimately purchased used<br />

goods, with the stolen merchandise acting as a minor, but profitable, sideline.<br />

<strong>The</strong> prices fences pay thieves typically depend both on norms and on legitimate market<br />

rates for the items in question. Vulnerable sellers, such as drug addicts or casual<br />

thieves, may receive less than 20% of an item's value. Higher prices, sometimes as<br />

high as 50% of an item's value in a legal market, can be commanded by a professional<br />

thief, especially one who concentrates on valuable items. At the same time, fences will<br />

often take advantage of thieves by deceiving them about the value of an individual item<br />

and the relevant market conditions. For example, a fence may falsely tell a petty thief<br />

that the market for the type of good which the thief is selling is flooded with this type of<br />

merchandise, to justify paying out a lower price.<br />

Research on fences shows that they view themselves as entrepreneurs, relying on<br />

networking with and patronage by prominent criminals to become successful in their<br />

word-of-mouth-based "wheeling and dealing". <strong>The</strong>y occupy the middle ground between<br />

the criminal world (thieves, burglars and shoplifters) and the legitimate world (e.g.,<br />

everyday people who purchase used goods). Some active fences go farther in their<br />

business, maintaining longstanding contacts and even teaching thieves how to practice<br />

their craft, whether by identifying specific products or by teaching them tools of the<br />

trade.<br />

Page 116 of 372


<strong>The</strong>re are a number of different types of fences. One way of categorizing fences is by<br />

the type of good in which they trade, such as jewels, power tools, or electronics.<br />

Another way of categorizing fences is by their level of involvement in buying and selling<br />

stolen goods; for some, fencing is an occasional "sideline" activity, while it is an<br />

economic mainstay for others.<br />

At the lowest level, a hustler or drug dealer may occasionally accept stolen goods. At<br />

the highest level would be a fence whose main criminal income comes from buying and<br />

selling stolen items. At the broadest level, two tiers of fences can be distinguished. <strong>The</strong><br />

lower level of fences are those who directly buy stolen goods from thieves and burglars.<br />

At a higher level are the "master fences", who do not deal with street-level thieves, but<br />

only with other fences.<br />

<strong>The</strong> degree to which the purchasers of the stolen goods know or suspect that the items<br />

are stolen varies. If a purchaser buys a high-quality item for a low price, in cash, from a<br />

stranger at a bar or from the back of a van, there is a higher likelihood that the items<br />

may be stolen.<br />

On the other hand, if a purchaser buys the same high-quality item for the standard retail<br />

price from a used goods store, and obtains a proper receipt, the purchaser may<br />

reasonably believe that the item is not stolen (even if, in fact, it is a stolen item).<br />

History of Receiving<br />

<strong>The</strong> fence, or receiver, is an old kind of criminal, historically attested in many countries<br />

and with deep and complex dynamics within society.<br />

Page 117 of 372


Early Modern England<br />

Receiving was a widespread crime in Modern England and an increasingly crucial<br />

concern for the English government of that period. It involved many other kinds of<br />

activities and crimes, and it saw its peak in the early 18th century with the notorious<br />

Jonathan Wild. Receiving is intrinsically connected to theft, as receivers, by definition,<br />

buy previously stolen goods in order to make profit out of them later. When organized<br />

theft grew increasingly important in London thanks to largely supportive receivers, the<br />

establishment started to fight it off with new laws, often aimed at receivers: receiving<br />

was acknowledged as the very core of property crime.<br />

Receiving was not considered as a felony (crime) in common law until 1691, when<br />

fences became potential targets of charges as accessories to theft. This meant that in<br />

order to judge a suspected receiver, it was necessary to condemn the related thief first.<br />

Later laws further focused on receivers, especially the 1718 Transportation Act, which,<br />

together with other measures, made fences main felons and not simply accessories to<br />

other felonies. Nonetheless, it was not easy to prove that a dealer knowingly accepted<br />

stolen goods, especially without the related theft event being fully cleared out.<br />

Proceedings stored in the Old Bailey Online archive where the offence category is<br />

receiving are 5664. Of these, 1973 have a verdict category of guilty.<br />

<strong>The</strong> 1718 Transportation Act also made a felony of returning goods for a fee, revealing<br />

that by then, receiving had already been widely taken to the next stage: returning goods<br />

to their owner, for a fee, instead of selling them in the second-hand market. Thieves<br />

could act as go-betweens themselves, but go-betweens could raise some suspicions,<br />

while relying on receivers added a safety layer against effective prosecution. A victim of<br />

theft was often willing to pay in order to get his goods back, in order to spare himself<br />

further troubles and/or if the items taken had the potential to reveal unflattering details<br />

about his personal affairs. <strong>In</strong> addition to that, for many centuries, prosecution in England<br />

was entirely at the expense (of personal money, time and effort) of the prosecutor.<br />

<strong>The</strong>refore, also considering the difficulty of actually proving receiving in courts, common<br />

people, especially shopkeepers, often preferred compounding, feeling that prosecuting<br />

was not worth it. This gave a considerable advantage to receivers.<br />

<strong>In</strong> order to effectively act as go-betweens for compounding, or brokers, fences needed<br />

to personally know thieves or have ways to easily interact and bargain with them for a<br />

common benefit about compounding: nobody was in a better position to do so than<br />

thief-takers. Thief-takers grew increasingly notorious in England as a reward was<br />

introduced by the Crown for each successfully condemned criminal. Some of them,<br />

such as Anthony Dunn, publicly referred to as "pretended Thiefe-taker" in a 1707<br />

document, used their social power as thief-takers as an advantage for receiving. Thieftakers<br />

were usually so involved with thieves and gangs of thieves that they could easily<br />

condemn them for the reward, or use this power to intimidate and command thieves to<br />

do their biddings: in exchange of clemency or protection from capture or condemnation,<br />

they could have thieves to steal under their command. <strong>In</strong>deed, thief-takers could act as<br />

direct instigators, supporting their thieves with intelligence or offering them shelter at<br />

Page 118 of 372


need (when convenient), and then act as receivers with the stolen goods. Through<br />

parallel occupations, receivers could feed their own business.<br />

Confirmation of how thief-taking and receiving were tightly connected could be seen in<br />

the career of Charles Hitchen, who was known as a thief-taker. He bought off the<br />

position of Under City Marshal through his wife's money in order to have one of the best<br />

positions amongst the thief-takers of the City. However, a vast part of his income<br />

actually came from the receiving activity related to the network of connections with<br />

London's underworld. Hitchen controlled this network through his official (that is to say,<br />

legal) position as a thief-taker.<br />

<strong>The</strong> synergy between receiving, theft and corruption, as well as official activities such as<br />

thief-taking or pawnbroking was a huge dynamic bond where each element enhanced<br />

the others in a vicious circle.<br />

<strong>The</strong> master of this powerful synergy of London underworld was Jonathan Wild, who<br />

rapidly replaced his previous master, Charles Hitchen, in 1713, and rapidly gained<br />

control of London's crime and the title of "thief-taker general". His power was due to his<br />

ruthless thief-taking and intimidation activities as well as a complex web of intelligence<br />

also built around the diffusion of newspapers. However, overly bold receiving was his<br />

undoing, as it grew so large and complex a matter to prompt the English government to<br />

promote further laws against receiving and related activities, such as the Transportation<br />

Act in 1718, also known as "Jonathan Wild Act", and its extension in 1720, which made<br />

returning goods for a fee a felony of the same importance and punishment as the crime<br />

(theft) related to the goods returned (which meant a capital offence in most cases, with<br />

raised potential reward for definitive evidence, from £40 to £140). Eventually, the<br />

Page 119 of 372


government decided to directly take action against Wild through lawyers, succeeding in<br />

condemning and executing him in 1725.<br />

Women and Receiving<br />

<strong>The</strong>re is no registered case of female fences of the same fame of Wild or Hitchen.<br />

However, women had active roles in both receiving and theft. Elizabeth Hitchen,<br />

Hitchen's wife, gave her inheritance money to her husband in order to buy the Under<br />

City Marshal office for his plans. Moreover, women could also be active fences. For<br />

example, Elizabeth Fisher managed her own receiving business in her husband's<br />

alehouse. Proceedings stored in the Old Bailey Online archive where the offence<br />

category is receiving are 5664. Of these, 1858 have a defendant gender category of<br />

female.<br />

Early Modern English Literature<br />

Receiving grew increasingly important in Early Modern society, and combined with the<br />

increasing interest of society on reading, it became the source for many writers, such as<br />

Daniel Defoe, with Moll Flanders and John Gay, with <strong>The</strong> Beggar's Opera. <strong>The</strong>se works<br />

reflect how receiving was conceived and portrayed by authors.<br />

Moll Flanders<br />

Moll Flanders is a novel intended to narrate the whole life of its protagonist, referred to<br />

as Moll Flanders, but a relevant part of it is about her becoming a master thief. Moll's<br />

activity as a thief largely relied on the protection and support of her governess, who<br />

acted also as a receiver for the goods stolen by her affiliates. She is the one who buys<br />

Moll's stolen goods the first time, as Moll narrates "I was now at a loss for a market for<br />

my goods,[...] At last I resolved to go to my old governess." <strong>The</strong>refore, the governess<br />

character sealed Moll's fate as a thief, and eventually taught her the basics of thievery<br />

redirecting Moll to work with other senior thieves. With these events, Defoe shows how<br />

crucial as well as subtle receiving was in building the whole of crime activity in London.<br />

<strong>The</strong> Governess is officially a pawnbroker, and she uses this legal business to recycle<br />

stolen goods into the secondary market. Sometimes, such as in the case of a silver<br />

inscribed mug stolen by Moll, she smelts metals, in order to avoid getting caught while<br />

re-selling. Along with receiving activity, she actively protects and support many criminals<br />

and thieves in order to secure a steady income to her activity.<br />

<strong>The</strong> same governess goes on in protecting and offering refuge to her affiliates whenever<br />

possible, or recruiting thieves into small groups, always via middlemen, in order to<br />

protect their thieves' identities in case some of them were caught and willing to confess.<br />

She is also a main intelligence source and often a direct instigator to theft such as in a<br />

case of fire in a well-off house in the neighborhood (more vulnerable to theft because of<br />

the sudden emergency), and finally becomes a broker for goods stolen by Moll to a<br />

drunken gentleman. <strong>In</strong> that case, the amount gained is allegedly greater than what she<br />

would have gained by standard re-selling in the secondary market.<br />

Page 120 of 372


<strong>The</strong> Governess embodies female social cunning in London's underworld, from Defoe's<br />

point of view. She is a typical receiver of her time, and whereas many male receivers<br />

used thief-taking as an official business, she relies on pawnbroking.<br />

Legal Aspects<br />

Fencing is illegal almost everywhere, usually under a similar rationale as in the United<br />

States, where receipt of stolen property is a crime in every state, as well as a federal<br />

crime if the property crossed a state line. Occasionally federal agents will temporarily<br />

set up a false fence sting operation. Fencing is a common source of income for<br />

organized crime. <strong>In</strong> England and Wales, as in many U.S. states, the crime requires<br />

three elements: stolen property, the receiver's act of receiving or hiding it, and his<br />

knowledge of its stolen status.<br />

Pawnbrokers have often been associated with fencing, though in many jurisdictions,<br />

government identification must be shown in order to pawn an item and police regularly<br />

check pawnshops for stolen goods and repossess any stolen items.<br />

While pawnbrokers do not like this characterization of their business, police efforts have<br />

indicated that some pawnbrokers are involved in fencing.<br />

Page 121 of 372


E-fencing<br />

E-fencing is the sale of items on the <strong>In</strong>ternet that have been obtained illegally. It is an<br />

activity that criminals often mix with sales to pawnbrokers. <strong>The</strong> auction website eBay,<br />

being easy to reach for the average thief, is a popular location for e-fencing; customers<br />

reported more than eight thousand crimes from the website in 2008, many of which<br />

involved the sale of stolen property. Classified websites like Craigslist, AutoTrader.com,<br />

Pennysaver online, etc. are some of the <strong>In</strong>ternet sources used for fencing goods online<br />

and circumventing the middleman fencer, in addition to a number of illegal darknet<br />

markets.<br />

E-fenced items may be shoplifted or otherwise stolen, alternatively they may be<br />

purchased using stolen credit cards or similar banking information. <strong>The</strong> latter practice is<br />

often intertwined with carding, which is the trafficking of thousands or even millions of<br />

stolen credit card numbers. <strong>The</strong> sale of stolen credit cards, which usually takes place on<br />

the darknet markets, is generally considered to be a form of e-fencing in its own right,<br />

and often plays a role in supplying the data used to purchase physical goods that may<br />

be either e-fenced themselves or fenced through more traditional means.<br />

<strong>Crime</strong> rings steal and/or use stolen financial information to pay for in-demand items<br />

from retailers and then sell them online, relying on the <strong>In</strong>ternet's ability to reach buyers<br />

around the world and its anonymity; some theft rings even take pre-orders, confident<br />

that they can steal and/or fraudulently pay for whatever is currently in demand. <strong>In</strong> the<br />

United States, major retailers such as Wal-Mart and Target have advocated for federal<br />

legislation to combat <strong>In</strong>ternet fencing. Proposals for such legislation have often<br />

proposed requiring major sales websites (e.g. eBay and Amazon.com) to retain some<br />

items' serial numbers and to release information to retailers about major sellers whom<br />

the retailers believe to be relying on stolen property. Such proposals have been<br />

opposed by the online retailers who would be required to maintain these records and<br />

take these actions.<br />

An eBay spokesman has stated, "Perhaps the dumbest place to try to fence stolen<br />

materials is on eBay," and news agencies have reported incidents of the police<br />

purchasing stolen property directly from thieves, leading to their capture. By early 2007,<br />

e-fencing had become a $37 billion business.<br />

Page 122 of 372


IX. Fraud<br />

<strong>In</strong> law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a<br />

victim of a legal right. Fraud itself can be a civil wrong (i.e., a fraud victim may sue the<br />

fraud perpetrator to avoid the fraud or recover monetary compensation), a criminal<br />

wrong (i.e., a fraud perpetrator may be prosecuted and imprisoned by governmental<br />

authorities), or it may cause no loss of money, property or legal right but still be an<br />

element of another civil or criminal wrong. <strong>The</strong> purpose of fraud may be monetary gain<br />

or other benefits, such as obtaining a passport or travel document, driver's license or<br />

qualifying for a mortgage by way of false statements.<br />

A hoax is a distinct concept that involves deliberate deception without the intention of<br />

gain or of materially damaging or depriving a victim.<br />

As a Civil Wrong<br />

<strong>In</strong> common law jurisdictions, as a civil wrong, fraud is a tort. While the precise<br />

definitions and requirements of proof vary among jurisdictions, the requisite elements of<br />

fraud as a tort generally are the intentional misrepresentation or concealment of an<br />

important fact upon which the victim is meant to rely, and in fact does rely, to the harm<br />

of the victim. Proving fraud in a court of law is often said to be difficult. That difficulty is<br />

found, for instance, in that each and every one of the elements of fraud must be proven,<br />

that the elements include proving the states of mind of the perpetrator and the victim,<br />

and that some jurisdictions require the victim to prove fraud by clear and convincing<br />

evidence.<br />

Page 123 of 372


<strong>The</strong> remedies for fraud may include rescission (i.e., reversal) of a fraudulently obtained<br />

agreement or transaction, the recovery of a monetary award to compensate for the<br />

harm caused, punitive damages to punish or deter the misconduct, and possibly others.<br />

<strong>In</strong> cases of a fraudulently induced contract, fraud may serve as a defense in a civil<br />

action for breach of contract or specific performance of contract.<br />

Fraud may serve as a basis for a court to invoke its equitable jurisdiction.<br />

As a Criminal Offence<br />

<strong>In</strong> common law jurisdictions, as a criminal offence, fraud takes many different forms,<br />

some general (e.g., theft by false pretense) and some specific to particular categories of<br />

victims or misconduct (e.g., bank fraud, insurance fraud, forgery). <strong>The</strong> elements of fraud<br />

as a crime similarly vary. <strong>The</strong> requisite elements of perhaps the most general form of<br />

criminal fraud, theft by false pretense, are the intentional deception of a victim by false<br />

representation or pretense with the intent of persuading the victim to part with property<br />

and with the victim parting with property in reliance on the representation or pretense<br />

and with the perpetrator intending to keep the property from the victim.<br />

Canada<br />

By Region<br />

North America<br />

Section 380(1) of the Criminal Code provides the general definition for fraud in Canada:<br />

380. (1) Every one who, by deceit, falsehood or other fraudulent means, whether or not<br />

it is a false pretense within the meaning of this Act, defrauds the public or any person,<br />

whether ascertained or not, of any property, money or valuable security or any service,<br />

(a) is guilty of an indictable offence and liable to a term of imprisonment not<br />

exceeding fourteen years, where the subject-matter of the offence is a<br />

testamentary instrument or the value of the subject-matter of the offence exceeds<br />

five thousand dollars; or<br />

(b) is guilty<br />

(i) of an indictable offence and is liable to imprisonment for a term not<br />

exceeding two years, or<br />

(ii) of an offence punishable on summary conviction, where the value of<br />

the subject-matter of the offence does not exceed five thousand dollars.<br />

Page 124 of 372


<strong>In</strong> addition to the penalties outlined above, the court can also issue a prohibition order<br />

under s. 380.2 (preventing a person from "seeking, obtaining or continuing any<br />

employment, or becoming or being a volunteer in any capacity, that involves having<br />

authority over the real property, money or valuable security of another person"). It can<br />

also make a restitution order under s. 380.3.<br />

<strong>The</strong> Canadian courts have held that the offence consists of two distinct elements:<br />

<br />

<br />

A prohibited act of deceit, falsehood or other fraudulent means. <strong>In</strong> the absence of<br />

deceit or falsehood, the courts will look objectively for a "dishonest act"; and<br />

<strong>The</strong> deprivation must be caused by the prohibited act, and deprivation must<br />

relate to property, money, valuable security, or any service.<br />

<strong>The</strong> Supreme Court of Canada has held that deprivation is satisfied on proof of<br />

detriment, prejudice or risk of prejudice; it is not essential that there be actual loss.<br />

Deprivation of confidential information, in the nature of a trade secret or copyrighted<br />

material that has commercial value, has also been held to fall within the scope of the<br />

offence.<br />

Criminal Fraud<br />

United States<br />

<strong>The</strong> proof requirements for criminal fraud charges in the United States are essentially<br />

the same as the requirements for other crimes: guilt must be proved beyond a<br />

reasonable doubt. Throughout the United States fraud charges can be misdemeanors<br />

or felonies depending on the amount of loss involved. High value frauds can also<br />

include additional penalties. For example, in California losses of $500,000 or more will<br />

result in an extra two, three, or five years in prison in addition to the regular penalty for<br />

the fraud.<br />

<strong>The</strong> U.S. government's 2006 fraud review concluded that fraud is a significantly underreported<br />

crime, and while various agencies and organizations were attempting to tackle<br />

the issue, greater co-operation was needed to achieve a real impact in the public sector.<br />

Page 125 of 372


<strong>The</strong> scale of the problem pointed to the need for a small but high-powered body to bring<br />

together the numerous counter-fraud initiatives that existed.<br />

According to Bloomberg, auto loan application fraud rates in the United States has been<br />

steadily rising over the past few years. This type of fraud expected to double from about<br />

$2–3 billion in 2015 to $4–6 billion in 2017.<br />

Civil Fraud<br />

Although elements may vary by jurisdiction and the specific allegations made by a<br />

plaintiff who files a lawsuit that alleged fraud, typical elements of a fraud case in the<br />

United States are that:<br />

1. Somebody misrepresents a material fact in order to obtain action or forbearance<br />

by another person;<br />

2. <strong>The</strong> other person relies upon the misrepresentation; and<br />

3. <strong>The</strong> other person suffers injury as a result of the act or forbearance taken in<br />

reliance upon the misrepresentation.<br />

To establish a civil claim of fraud, most jurisdictions in the United States require that<br />

each element of a fraud claim be pleaded with particularity and be proved by a<br />

preponderance of the evidence, meaning that it is more likely than not that the fraud<br />

occurred.<br />

Some jurisdictions impose a higher evidentiary standard, such as Washington State's<br />

requirement that the elements of fraud be proved with clear, cogent, and convincing<br />

evidence (very probable evidence), or Pennsylvania's requirement that common law<br />

fraud be proved by clear and convincing evidence.<br />

<strong>The</strong> measure of damages in fraud cases is normally computed using one of two rules:<br />

1. <strong>The</strong> "benefit of bargain" rule, which allows for recovery of damages in the amount<br />

of the difference between the value of the property had it been as represented<br />

and its actual value;<br />

2. Out-of-pocket loss, which allows for the recovery of damages in the amount of<br />

the difference between the value of what was given and the value of what was<br />

received.<br />

Special damages may be allowed if shown to have been proximately caused by<br />

defendant's fraud and the damage amounts are proved with specificity.<br />

Many jurisdictions permit a plaintiff in a fraud case to seek punitive or exemplary<br />

damages.<br />

Page 126 of 372


Pacific Asia<br />

China<br />

Zhang Yingyu's story collection <strong>The</strong> Book of Swindles (available here; ca. 1617) testifies<br />

to rampant commercial fraud, especially involving itinerant businessmen, in late Ming<br />

China. <strong>The</strong> journal Science reported in 2017 that fraud is rife in Chinese academia,<br />

resulting in numerous article retractions and harm to China's international prestige. <strong>The</strong><br />

Economist, CNN, and other media outlets regularly report on incidents of fraud or bad<br />

faith in Chinese business and trade practices. Forbes cites cybercrime as a persistent<br />

and growing threat to Chinese consumers.<br />

United Kingdom<br />

Europe<br />

<strong>In</strong> 2016 the estimated value lost through fraud in the UK was £193 billion a year.<br />

<strong>In</strong> January 2018 the Financial Times reported that the value of UK fraud hit a 15-year<br />

high of £2.11bn in 2017 according to a study. <strong>The</strong> article said that the accountancy firm<br />

BDO examined reported fraud cases worth more than £50,000 and found that the total<br />

Page 127 of 372


number rose to 577 in 2017, compared with 212 in 2003. <strong>The</strong> study found that the<br />

average amount stolen in each incident rose to £3.66m, up from £1.5m in 2003.<br />

As at November 2017 Fraud is the most common criminal offence in the UK according<br />

to a study by Crowe Clark Whitehill, Experian and the Centre for Counter Fraud Studies.<br />

<strong>The</strong> study suggests the UK loses over £190 billion per year to fraud. £190 billion is more<br />

than 9% of the UK’s projected GDP for 2017 ($2,496 (£2,080) billion according to<br />

Statistics Times). <strong>The</strong> estimate for fraud in the UK figure is more than the entire GDP of<br />

countries such as Romania, Qatar and Hungary.<br />

According to another review by the UK anti-fraud charity Fraud Advisory Panel (FAP),<br />

business fraud accounted for £144bn, while fraud against individuals was estimated at<br />

£9.7bn. <strong>The</strong> FAP has been particularly critical of the support available from the police to<br />

victims of fraud in the UK outside of London. Although victims of fraud are generally<br />

referred to the UK's national fraud and cyber crime reporting centre, Action Fraud, the<br />

FAP found that there was "little chance" that these crime reports would be followed up<br />

with any kind of substantive law enforcement action by UK authorities, according to the<br />

report.<br />

<strong>In</strong> July 2016 it was reported that fraudulent activity levels in the UK increased in the 10<br />

years to 2016 from £52 billion to £193bn. This figure would be a conservative estimate,<br />

since as the former commissioner of the City of London Police, Adrian Leppard, has<br />

said, only 1 in 12 such crimes are actually reported. Donald Toon, director of the NCA's<br />

economic crime command, stated in July 2016: "<strong>The</strong> annual losses to the UK from fraud<br />

are estimated to be more than £190bn". Figures released in October 2015 from the<br />

<strong>Crime</strong> Survey of England and Wales found that there had been 5.1 million incidents of<br />

fraud in England and Wales in the previous year, affecting an estimated one in 12 adults<br />

and making it the most common form of crime.<br />

Also in July 2016, the Office for National Statistics (ONS) stated "Almost six million<br />

fraud and cyber crimes were committed last year in England and Wales and estimated<br />

there were two million computer misuse offences and 3.8 million fraud offences in the<br />

12 months to the end of March 2016." Fraud affects one in ten people in the UK.<br />

According to the ONS most frauds relate to bank account fraud. <strong>The</strong>se figures are<br />

separate from the headline estimate that another 6.3 million crimes (distinct from frauds)<br />

were perpetrated in the UK against adults in the year to March 2016.<br />

Fraud was not included in a "<strong>Crime</strong> Harm <strong>In</strong>dex" published by the Office for National<br />

Statistics in 2016. Michael Levi, professor of criminology at Cardiff University, remarked<br />

in August 2016 that it was ‘deeply regrettable’ fraud is being left out of the first index<br />

despite being the most common crime reported to police in the UK. Levi said ‘If you’ve<br />

got some categories that are excluded, they are automatically left out of the police’s<br />

priorities.’. <strong>The</strong> Chief of the National Audit Office (NAO), Sir Anyas Morse has also said<br />

“For too long, as a low-value but high-volume crime, online fraud has been overlooked<br />

by government, law enforcement and industry. It is now the most commonly<br />

experienced crime in England and Wales and demands an urgent response.”<br />

Page 128 of 372


England, Wales, and Northern Ireland<br />

Since 2007, fraud in England and Wales and Northern Ireland has been covered by the<br />

Fraud Act 2006. <strong>The</strong> Act was given Royal Assent on 8 November 2006, and came into<br />

effect on 15 January 2007.<br />

<strong>The</strong> Act gives a statutory definition of the criminal offence of fraud, defining it in three<br />

classes—fraud by false representation, fraud by failing to disclose information, and<br />

fraud by abuse of position. It provides that a person found guilty of fraud is liable to a<br />

fine or imprisonment for up to twelve months on summary conviction (six months in<br />

Northern Ireland), or a fine or<br />

imprisonment for up to ten years<br />

on conviction on indictment.<br />

This Act largely replaces the<br />

laws relating to obtaining<br />

property by deception, obtaining<br />

a pecuniary advantage and<br />

other offences that were created<br />

under the <strong>The</strong>ft Act 1978.<br />

Serious Fraud Office<br />

Scotland<br />

<strong>In</strong> Scots law, fraud is covered<br />

under the common law and a<br />

number of statutory offences.<br />

<strong>The</strong> main fraud offences are<br />

common law fraud, uttering,<br />

embezzlement and statutory<br />

frauds. <strong>The</strong> Fraud Act 2006<br />

does not apply in Scotland.<br />

<strong>The</strong> Serious Fraud Office (United Kingdom) is an arm of the Government of the United<br />

Kingdom, accountable to the Attorney-General.<br />

National Fraud Authority<br />

<strong>The</strong> National Fraud Authority (NFA) was, until 2014, a government agency co-ordinating<br />

the counter-fraud response in the UK.<br />

Cifas<br />

Cifas is a British fraud prevention service, a not-for-profit membership organization for<br />

all sectors that enables organizations to share and access fraud data using their<br />

Page 129 of 372


databases. Cifas is dedicated to the prevention of fraud, including internal fraud by staff,<br />

and the identification of financial and related crime.<br />

Cost<br />

<strong>The</strong> typical organization loses five percent of its annual revenue to fraud, with a median<br />

loss of $160,000. Frauds committed by owners and executives were more than nine<br />

times as costly as employee fraud. <strong>The</strong> industries most commonly affected are banking,<br />

manufacturing, and government.<br />

Types of Fraudulent Acts<br />

<strong>The</strong> falsification of documents, forgery or counterfeiting are types of fraud. <strong>The</strong> theft of<br />

one's personal information, like Social Security number, or identity is type of fraud.<br />

Fraud can be committed through many media, including mail, wire, phone, and the<br />

<strong>In</strong>ternet (computer crime and <strong>In</strong>ternet fraud). <strong>In</strong>ternational dimensions of the web and<br />

ease with which users can hide their location, the difficulty of checking identity and<br />

legitimacy online, and the simplicity with which hackers can divert browsers to dishonest<br />

sites and steal credit card details have all contributed to the very rapid growth of <strong>In</strong>ternet<br />

fraud. <strong>In</strong> some countries, tax fraud is also prosecuted under false billing or tax forgery.<br />

<strong>The</strong>re have also been fraudulent "discoveries", e.g., in science, to gain prestige rather<br />

than immediate monetary gain.<br />

Anti-Fraud Movements<br />

Beyond laws that aim at prevention of fraud, there are also governmental and nongovernmental<br />

organizations that aim to fight fraud. Between 1911 and 1933, 47 states<br />

adopted the so-called Blue Sky Laws status. <strong>The</strong>se laws were enacted and enforced at<br />

the state level and regulated the offering and sale of securities to protect the public from<br />

fraud. Though the specific provisions of these laws varied among states, they all<br />

required the registration of all securities offerings and sales, as well as of every U.S.<br />

stockbroker and brokerage firm. However, these Blue Sky laws were generally found to<br />

be ineffective. To increase public trust in the capital markets the President of the United<br />

States, Franklin D. Roosevelt, established the U.S. Securities and Exchange<br />

Commission (SEC). <strong>The</strong> main reason for the creation of the SEC was to regulate the<br />

stock market and prevent corporate abuses relating to the offering and sale of securities<br />

and corporate reporting. <strong>The</strong> SEC was given the power to license and regulate stock<br />

exchanges, the companies whose securities traded on them, and the brokers and<br />

dealers who conducted the trading.<br />

Detection<br />

For detection of fraudulent activities on the large scale, massive use of (online) data<br />

analysis is required, in particular predictive analytics or forensic analytics. Forensic<br />

analytics is the use of electronic data to reconstruct or detect financial fraud. <strong>The</strong> steps<br />

in the process are data collection, data preparation, data analysis, and the preparation<br />

of a report and possibly a presentation of the results. Using computer-based analytic<br />

Page 130 of 372


methods Nigrini's wider goal is the detection of fraud, errors, anomalies, inefficiencies,<br />

and biases which refer to people gravitating to certain dollar amounts to get past<br />

internal control thresholds.<br />

<strong>The</strong> analytic tests usually start with high-level data overview tests to spot highly<br />

significant irregularities. <strong>In</strong> a recent purchasing card application these tests identified a<br />

purchasing card transaction for 3,000,000 Costa Rica Colons. This was neither a fraud<br />

nor an error, but it was a highly unusual amount for a purchasing card transaction.<br />

<strong>The</strong>se high-level tests include tests related to Benford's Law and possibly also those<br />

statistics known as descriptive statistics. <strong>The</strong>se high-tests are always followed by more<br />

focused tests to look for small samples of highly irregular transactions. <strong>The</strong> familiar<br />

methods of correlation and time-series analysis can also be used to detect fraud and<br />

other irregularities. Forensic analytics also includes the use of a fraud risk-scoring<br />

model to identify high risk forensic units (customers, employees, locations, insurance<br />

claims and so on). Forensic analytics also includes suggested tests to identify financial<br />

statement irregularities, but the general rule is that analytic methods alone are not too<br />

successful at detecting financial statement fraud.<br />

Related<br />

Apart from fraud, there are several related categories of intentional deceptions that may<br />

or may not include the elements of personal gain or damage to another individual:<br />

<br />

<br />

Obstruction of justice<br />

18 U.S.C. § 704 which criminalizes false representation of having been awarded<br />

any decoration or medal authorized by Congress for the Armed Forces of the<br />

United States<br />

Page 131 of 372


Page 132 of 372


X. Identity <strong>The</strong>ft<br />

Identity theft is the deliberate use of someone else's identity, usually as a method to<br />

gain a financial advantage or obtain credit and other benefits in the other person's<br />

name, and perhaps to the other person's disadvantage or loss. <strong>The</strong> person whose<br />

identity has been assumed may suffer adverse consequences, especially if they are<br />

held responsible for the perpetrator's actions. Identity theft occurs when someone uses<br />

another's personally identifying information, like their name, identifying number, or credit<br />

card number, without their permission, to commit fraud or other crimes. <strong>The</strong> term<br />

identity theft was coined in 1964. Since that time, the definition of identity theft has been<br />

statutorily prescribed throughout both the U.K. and the United States as the theft of<br />

personally identifying information, generally including a person’s name, date of birth,<br />

social security number, driver’s license number, bank account or credit card numbers,<br />

PIN numbers, electronic signatures, fingerprints, passwords, or any other information<br />

that can be used to access a person’s financial resources.<br />

Determining the link between data breaches and identity theft is challenging, primarily<br />

because identity theft victims often do not know how their personal information was<br />

obtained, and identity theft is not always detectable by the individual victims, according<br />

to a report done for the FTC. Identity fraud is often but not necessarily the consequence<br />

Page 133 of 372


of identity theft. Someone can steal or misappropriate personal information without then<br />

committing identity theft using the information about every person, such as when a<br />

major data breach occurs. A US Government Accountability Office study determined<br />

that "most breaches have not resulted in detected incidents of identity theft". <strong>The</strong> report<br />

also warned that "the full extent is unknown". A later unpublished study by Carnegie<br />

Mellon University noted that "Most often, the causes of identity theft is not known", but<br />

reported that someone else concluded that "the probability of becoming a victim to<br />

identity theft as a result of a data breach is ... around only 2%". More recently, an<br />

association of consumer data companies noted that one of the largest data breaches<br />

ever, accounting for over four million records, resulted in only about 1,800 instances of<br />

identity theft, according to the company whose systems were breached.<br />

An October 2010 article entitled "Cyber <strong>Crime</strong> Made Easy" explained the level to which<br />

hackers are using malicious software. As Gunter Ollmann, Chief Technology Officer of<br />

security at Microsoft, said, "<strong>In</strong>terested in credit card theft? <strong>The</strong>re's an app for that." This<br />

statement summed up the ease with which these hackers are accessing all kinds of<br />

information online. <strong>The</strong> new program for infecting users' computers was called Zeus;<br />

and the program is so hacker-friendly that even an inexperienced hacker can operate it.<br />

Although the hacking program is easy to use, that fact does not diminish the devastating<br />

effects that Zeus (or other software like Zeus) can do to a computer and the user. For<br />

example, the article stated that programs like Zeus can steal credit card information,<br />

important documents, and even documents necessary for homeland security. If the<br />

hacker were to gain this information, it would mean identity theft or even a possible<br />

terrorist attack. <strong>The</strong> ITAC says that about 15 million Americans are having their identity<br />

stolen, in 2012.<br />

Types<br />

Sources such as the non-profit Identity <strong>The</strong>ft Resource Center sub-divide identity theft<br />

into five categories:<br />

<br />

<br />

<br />

<br />

<br />

Criminal identity theft (posing as another person when apprehended for a crime)<br />

Financial identity theft (using another's identity to obtain credit, goods and<br />

services)<br />

Identity cloning (using another's information to assume his or her identity in daily<br />

life)<br />

Medical identity theft (using another's identity to obtain medical care or drugs)<br />

Child identity theft.<br />

Identity theft may be used to facilitate or fund other crimes including illegal immigration,<br />

terrorism, phishing and espionage. <strong>The</strong>re are cases of identity cloning to attack<br />

payment systems, including online credit card processing and medical insurance. [12]<br />

Page 134 of 372


Identity Cloning and Concealment<br />

<strong>In</strong> this situation the identity thief impersonates someone else in order to conceal their<br />

own true identity. Examples are illegal immigrants hiding their illegal status, people<br />

hiding from creditors or other individuals, and those who simply want to become<br />

"anonymous" for personal reasons. Another example is posers, a label given to people<br />

who use someone else's photos and information on social networking sites. Posers<br />

mostly create believable stories involving friends of the real person they are imitating.<br />

Unlike identity theft used to obtain credit which usually comes to light when the debts<br />

mount, concealment may continue indefinitely without being detected, particularly if the<br />

identity thief is able to obtain false credentials in order to pass various authentication<br />

tests in everyday life.<br />

Criminal Identity <strong>The</strong>ft<br />

When a criminal fraudulently identifies themselves to police as another individual at the<br />

point of arrest, it is sometimes referred to as "Criminal Identity <strong>The</strong>ft." <strong>In</strong> some cases,<br />

criminals have previously obtained state-issued identity documents using credentials<br />

stolen from others, or have simply presented a fake ID. Provided the subterfuge works,<br />

charges may be placed under the victim's name, letting the criminal off the hook.<br />

Victims might only learn of such incidents by chance, for example by receiving a court<br />

summons, discovering their drivers licenses are suspended when stopped for minor<br />

traffic violations, or through background checks performed for employment purposes.<br />

It can be difficult for the victim of a criminal identity theft to clear their record. <strong>The</strong> steps<br />

required to clear the victim's incorrect criminal record depend in which jurisdiction the<br />

crime occurred and whether the true identity of the criminal can be determined. <strong>The</strong><br />

victim might need to locate the original arresting officers and prove their own identity by<br />

some reliable means such as fingerprinting or DNA testing, and may need to go to a<br />

Page 135 of 372


court hearing to be cleared of the charges. Obtaining an expungement of court records<br />

may also be required. Authorities might permanently maintain the victim's name as an<br />

alias for the criminal's true identity in their criminal records databases. One problem that<br />

victims of criminal identity theft may encounter is that various data aggregators might<br />

still have the incorrect criminal records in their databases even after court and police<br />

records are corrected. Thus it is possible that a future background check will return the<br />

incorrect criminal records. This is just one example of the kinds of impact that may<br />

continue to affect the victims of identity theft for some months or even years after the<br />

crime, aside from the psychological trauma that being 'cloned' typically engenders.<br />

Synthetic Identity <strong>The</strong>ft<br />

A variation of identity theft which has recently become more common is synthetic<br />

identity theft, in which identities are completely or partially fabricated. <strong>The</strong> most common<br />

technique involves combining a real social security number with a name and birthdate<br />

other than the ones associated with the number. Synthetic identity theft is more difficult<br />

to track as it doesn't show on either person's credit report directly but may appear as an<br />

entirely new file in the credit bureau or as a subfile on one of the victim's credit reports.<br />

Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters<br />

credit. <strong>In</strong>dividual victims can be affected if their names become confused with the<br />

synthetic identities, or if negative information in their subfiles impacts their credit ratings.<br />

Medical Identity <strong>The</strong>ft<br />

Privacy researcher Pam Dixon, the founder of the World Privacy Forum, coined the term<br />

medical identity theft and released the first major report about this issue in 2006. <strong>In</strong> the<br />

report, she defined the crime for the first time and made the plight of victims public. <strong>The</strong><br />

report's definition of the crime is that medical identity theft occurs when someone seeks<br />

medical care under the identity of another person. <strong>In</strong>surance theft is also very common,<br />

if a thief has your insurance information and or your insurance card, they can seek<br />

medical attention posing as yourself. <strong>In</strong> addition to risks of financial harm common to all<br />

forms of identity theft, the thief's medical history may be added to the victim's medical<br />

records. <strong>In</strong>accurate information in the victim's records is difficult to correct and may<br />

affect future insurability or cause doctors relying on the misinformation to deliver<br />

inappropriate care. After the publication of the report, which contained a<br />

recommendation that consumers receive notifications of medical data breach incidents,<br />

California passed a law requiring this, and then finally HIPAA was expanded to also<br />

require medical breach notification when breaches affect 500 or more people. Data<br />

collected and stored by hospitals and other organizations such as medical aid schemes<br />

is up to 10 times more valuable to cybercriminals than credit card information.<br />

Child Identity <strong>The</strong>ft<br />

Child identity theft occurs when a minor's identity is used by another person for the<br />

impostor's personal gain. <strong>The</strong> impostor can be a family member, a friend, or even a<br />

stranger who targets children. <strong>The</strong> Social Security numbers of children are valued<br />

Page 136 of 372


ecause they do not have any information associated with them. Thieves can establish<br />

lines of credit, obtain driver's licenses, or even buy a house using a child's identity. This<br />

fraud can go undetected for years, as most children do not discover the problem until<br />

years later. Child identity theft is fairly common, and studies have shown that the<br />

problem is growing. <strong>The</strong> largest study on child identity theft, as reported by Richard<br />

Power of the Carnegie Mellon Cylab with data supplied by AllClear ID, found that of<br />

40,000 children, 10.2% were victims of identity theft.<br />

<strong>The</strong> Federal Trade<br />

Commission (FTC)<br />

estimates that about nine<br />

million people will be<br />

victims of identity theft in<br />

the United States per<br />

year. It was also<br />

estimated that in 2008<br />

630,000 people under the<br />

age of 19 were victims of<br />

theft. This then gave<br />

them a debt of about<br />

$12,799 which was not<br />

theirs.<br />

Not only are children in<br />

general big targets of<br />

identity theft but children<br />

who are in foster care are<br />

even bigger targets. This is because they are most likely moved around quite frequently<br />

and their SSN is being shared with multiple people and agencies. Foster children are<br />

even more victims of identity theft within their own family and other relatives. Young<br />

people in foster care who are victims of this crime are usually left alone to struggle and<br />

figure out how to fix their newly formed bad credit.<br />

Financial Identity <strong>The</strong>ft<br />

<strong>The</strong> most common type is financial identity theft, where someone wants to gain<br />

economical benefits in someone else's name. This includes getting credits, loans, goods<br />

and services, claiming to be someone else.<br />

Tax Identity <strong>The</strong>ft<br />

One of the major identity theft categories is Tax Identity <strong>The</strong>ft. Tax Identity theft occurs<br />

when someone gains another persons information and uses that to receive a tax refund.<br />

<strong>The</strong> thief in this case can also try to get a job and then their employer will report the<br />

income of the real taxpayer, this then results in the taxpayer getting in trouble with the<br />

IRS.<br />

Page 137 of 372


<strong>The</strong> 14039 Form to the IRSis a form that will help one fight against a theft like tax theft.<br />

This form will put the IRS on alert and someone who believed they have been a victim<br />

of tax related theft will be given a Identity Protection Personal Identification Number (IP<br />

PIN), which is a 6 digit code used in replace of a SSN for filing tax returns.<br />

Techniques for Obtaining and Exploiting Personal <strong>In</strong>formation for Identity <strong>The</strong>ft<br />

Identity thieves typically obtain and exploit personally identifiable information about<br />

individuals, or various credentials they use to authenticate themselves, in order to<br />

impersonate them. Examples include:<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Rummaging through rubbish for personal information (dumpster diving)<br />

Retrieving personal data from redundant IT equipment and storage media<br />

including PCs, servers, PDAs, mobile phones, USB memory sticks and hard<br />

drives that have been disposed of carelessly at public dump sites, given away or<br />

sold on without having been properly sanitized<br />

Using public records about individual citizens, published in official registers such<br />

as electoral rolls [23]<br />

Stealing bank or credit cards, identification cards, passports, authentication<br />

tokens ... typically by pickpocketing, housebreaking or mail theft<br />

Common-knowledge questioning schemes that offer account verification and<br />

compromise: "What's your mother's maiden name?", "what was your first car<br />

model?", or "What was your first pet's name?", etc.<br />

Skimming information from bank or credit cards using compromised or hand-held<br />

card readers, and creating clone cards<br />

Using 'contactless' credit card readers to acquire data wirelessly from RFIDenabled<br />

passports<br />

Shoulder-Surfing, involves an individual who discreetly watches or hears others<br />

providing valuable personal information. This is particularly done in crowded<br />

places because it is relatively easy to observe someone as they fill out forms,<br />

enter PIN numbers on ATMs or even type passwords on smartphones.<br />

Stealing personal information from computers using breaches in browser security<br />

or malware such as Trojan horse keystroke logging programs or other forms of<br />

spyware<br />

Hacking computer networks, systems and databases to obtain personal data,<br />

often in large quantities<br />

Page 138 of 372


Exploiting breaches that result in the publication or more limited disclosure of<br />

personal information such as names, addresses, Social Security number or credit<br />

card numbers<br />

Advertising bogus job offers in order to accumulate resumes and applications<br />

typically disclosing applicants' names, home and email addresses, telephone<br />

numbers and sometimes their banking details<br />

Exploiting insider access and abusing the rights of privileged IT users to access<br />

personal data on their employers' systems<br />

<br />

<strong>In</strong>filtrating organizations that store<br />

and process large amounts or<br />

particularly valuable personal<br />

information<br />

Impersonating trusted organizations<br />

in emails, SMS text messages,<br />

phone calls or other forms of<br />

communication in order to dupe<br />

victims into disclosing their personal<br />

information or login credentials,<br />

typically on a fake corporate website or data collection form (phishing)<br />

<br />

<br />

<br />

<br />

<br />

<br />

Brute-force attacking weak passwords and using inspired guesswork to<br />

compromise weak password reset questions<br />

Obtaining castings of fingers for falsifying fingerprint identification.<br />

Browsing social networking websites for personal details published by users,<br />

often using this information to appear more credible in subsequent social<br />

engineering activities<br />

Diverting victims' email or post in order to obtain personal information and<br />

credentials such as credit cards, billing and bank/credit card statements, or to<br />

delay the discovery of new accounts and credit agreements opened by the<br />

identity thieves in the victims' names<br />

Using false pretenses to trick individuals, customer service representatives and<br />

help desk workers into disclosing personal information and login details or<br />

changing user passwords/access rights (pretexting)<br />

Stealing cheques (checks) to acquire banking information, including account<br />

numbers and bank codes<br />

Page 139 of 372


Guessing Social Security numbers by using information found on <strong>In</strong>ternet social<br />

networks such as Facebook and MySpace [25]<br />

Low security/privacy protection on photos that are easily clickable and<br />

downloaded on social networking sites.<br />

Befriending strangers on social networks and taking advantage of their trust until<br />

private information is given.<br />

<strong>In</strong>dicators That You May Be a Victim of Identity <strong>The</strong>ft<br />

<strong>The</strong> majority of identity theft victims do not realize that they are a victim until it has<br />

negatively impacted their lives. Many people do not find out that their identities have<br />

been stolen until they are contacted by financial institutions or discover suspicious<br />

activities on their bank accounts. According to an article by Herb Weisbaum, everyone<br />

in the US should assume that their personal information has been compromised at one<br />

point. It is therefore of great importance to watch out for warning signs that your identity<br />

has been compromised. <strong>The</strong> following are eleven indicators that someone else might be<br />

using your identity.<br />

1. Credit or debit card charges for goods or services you are not aware of, including<br />

unauthorized withdrawals from your account<br />

2. Receiving calls from credit or debit card fraud control department warning of<br />

possible suspicious activity on your credit card account<br />

3. Receiving credit cards that you did not apply for<br />

4. Receiving information that a credit scoring investigation was done. <strong>The</strong>y are<br />

often done when a loan or phone subscription was applied for.<br />

5. Checks bouncing for lack of enough money in your account to cover the amount.<br />

This might be as a result of unauthorized withdrawals from your account<br />

6. Identity theft criminals may commit crimes with your personal information. You<br />

may not realize this until you see the police on your door arresting you for crimes<br />

that you did not commit<br />

7. Sudden changes to your credit score may indicate that someone else is using<br />

your credit cards<br />

8. Bills for services like gas, water, electricity not arriving in time. This can be an<br />

indication that your mail was stolen or redirected<br />

9. Being not approved for loans because your credit report indicates that you are<br />

not credit worthy<br />

Page 140 of 372


10. Receiving notification from your post office informing you that your mails are<br />

being forwarded to another unknown address<br />

11. Your yearly tax returns indicating that you have earned more than you have<br />

actually earned. This might indicate that someone is using your national<br />

identification number e.g. SSN to report their earnings to the tax authorities<br />

<strong>In</strong>dividual Identity Protection<br />

<strong>The</strong> acquisition of personal identifiers is made possible through serious breaches of<br />

privacy. For consumers, this is usually a result of them naively providing their personal<br />

information or login credentials to the identity thieves as a result of being duped but<br />

identity-related documents such as credit cards, bank statements, utility bills,<br />

checkbooks etc. may also be physically stolen from vehicles, homes, offices, and not<br />

the least letterboxes, or directly from victims by pickpockets and bag snatchers.<br />

Guardianship of personal identifiers by consumers is the most common intervention<br />

strategy recommended by the US Federal Trade Commission, Canadian Phone Busters<br />

and most sites that address identity theft. Such organizations offer recommendations on<br />

how individuals can prevent their information falling into the wrong hands.<br />

Page 141 of 372


Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form<br />

of information security control known as risk avoidance). This implies that organizations,<br />

IT systems and procedures should not demand excessive amounts of personal<br />

information or credentials for identification and authentication. Requiring, storing and<br />

processing personal identifiers (such as Social Security number, national identification<br />

number, driver's license number, credit card number, etc.) increases the risks of identity<br />

theft unless this valuable personal information is adequately secured at all times.<br />

Committing personal identifiers to memory is a sound practice that can reduce the risks<br />

of a would-be identity thief from obtaining these records. To help in remembering<br />

numbers such as social security numbers and credit card numbers, it is helpful to<br />

consider using mnemonic techniques or memory aids such as the mnemonic Major<br />

System.<br />

Identity thieves sometimes impersonate dead people, using personal information<br />

obtained from death notices, gravestones and other sources to exploit delays between<br />

the death and the closure of the person's accounts, the inattentiveness of grieving<br />

families and weaknesses in the processes for credit-checking. Such crimes may<br />

continue for some time until the deceased's families or the authorities notice and react<br />

to anomalies.<br />

<strong>In</strong> recent years, commercial identity theft protection/insurance services have become<br />

available in many countries. <strong>The</strong>se services purport to help protect the individual from<br />

identity theft or help detect that identity theft has occurred in exchange for a monthly or<br />

annual membership fee or premium. <strong>The</strong> services typically work either by setting fraud<br />

alerts on the individual's credit files with the three major credit bureaus or by setting up<br />

credit report monitoring with the credit bureaux. While identity theft protection/insurance<br />

services have been heavily marketed, their value has been called into question.<br />

Identity <strong>The</strong>ft and Potential Outcomes<br />

This picture is relevant to the article in which it provides images to represent the<br />

process of giving personal information to a higher power. It also represents the<br />

techniques used by the people receiving the information.<br />

Identity theft is one of the leading problems in the United States that sometimes results<br />

in unfortunate circumstances. <strong>In</strong> a 2018 study, it was reported that 60 million Americans<br />

identities were wrongfully acquired. <strong>The</strong> number of people this has happened to has<br />

revealed there is a wrongful epidemic in our country with how easily our identity is not<br />

truly protected among every account that we have, even our birth certificates. With this<br />

continuing problem, some new bills have been implemented which are thoroughly<br />

described in Identity <strong>The</strong>ft, to provide more security for people such as electronic<br />

signatures and social security verification for more authentication to further prove it is<br />

the true person. <strong>The</strong>re are several types of identity theft that are used to gather<br />

information, one of the most common types occurs when consumers make online<br />

purchases. A study was conducted with 190 people to determine the relationship<br />

between the constructs of fear of financial losses and reputational damages. <strong>The</strong><br />

Page 142 of 372


conclusions of this study revealed that identity theft was a positive correlation with<br />

reputable damages. <strong>The</strong> relationship between perceived risk and online purchase<br />

intention were negative. <strong>The</strong> significance of this study reveals that online companies are<br />

more aware of the potential harm that can be done to their consumers, therefore they<br />

are searching for ways to reduce the perceived risk of consumers and not lose out on<br />

business. Although the idea of identity theft can be frightening to some, the aftermath of<br />

how people move forward is a pretty intense process. Some may face a year or<br />

consecutive years to prove to the legal system that they are the true person. With this<br />

potential long process can lead to emotional strain and financial losses; most theft that<br />

is done was by the victim's family members, some may not be able to obtain new credit<br />

cards or open new bank accounts and sometimes even loans. This is severely<br />

important to provide information about the significance of identity theft and the lasting<br />

impacts it could hold on the victim's life.<br />

Identity Protection by Organizations<br />

<strong>In</strong> their May 1998 testimony before the United States Senate, the Federal Trade<br />

Commission (FTC) discussed the sale of Social Security numbers and other personal<br />

identifiers by credit-raters and data miners. <strong>The</strong> FTC agreed to the industry's selfregulating<br />

principles restricting access to information on credit reports. According to the<br />

industry, the restrictions vary according to the category of customer. Credit reporting<br />

agencies gather and disclose personal and credit information to a wide business client<br />

base.<br />

Poor stewardship of personal data by organizations, resulting in unauthorized access to<br />

sensitive data, can expose individuals to the risk of identity theft. <strong>The</strong> Privacy Rights<br />

Clearinghouse have documented over 900 individual data breaches by US companies<br />

and government agencies since January 2005, which together have involved over 200<br />

Page 143 of 372


million total records containing sensitive personal information, many containing social<br />

security numbers. Poor corporate diligence standards which can result in data breaches<br />

include:<br />

<br />

<br />

<br />

<br />

<br />

<br />

Failure to shred confidential information before throwing it into dumpsters<br />

Failure to ensure adequate network security<br />

Credit card numbers stolen by call center agents and people with access to call<br />

recordings<br />

<strong>The</strong> theft of laptop computers or portable media being carried off-site containing<br />

vast amounts of personal information. <strong>The</strong> use of strong encryption on these<br />

devices can reduce the chance of data being misused should a criminal obtain<br />

them.<br />

<strong>The</strong> brokerage of personal information to other businesses without ensuring that<br />

the purchaser maintains adequate security controls<br />

Failure of governments, when registering sole proprietorships, partnerships, and<br />

corporations, to determine if the officers listed in the articles of incorporation are<br />

who they say they are. This potentially allows criminals access to personal<br />

information through credit rating and data mining services.<br />

<strong>The</strong> failure of corporate or government organizations to protect consumer privacy, client<br />

confidentiality and political privacy has been criticized for facilitating the acquisition of<br />

personal identifiers by criminals.<br />

Using various types of biometric information, such as fingerprints, for identification and<br />

authentication has been cited as a way to thwart identity thieves, however there are<br />

technological limitations and privacy concerns associated with these methods as well.<br />

Market<br />

<strong>The</strong>re is an active market for buying and selling stolen personal information, which<br />

occurs mostly in darknet markets but also in other black markets. People increase the<br />

value of the stolen data by aggregating it with publicly available data, and sell it again<br />

for a profit, increasing the damage that can be done to the people whose data was<br />

stolen.<br />

<strong>In</strong>ternational<br />

Legal Responses<br />

<strong>In</strong> March 2014, after it was learned two passengers with stolen passports were on board<br />

Malaysia Airlines Flight 370 which went missing on March 8, 2014, it came to light that<br />

Page 144 of 372


<strong>In</strong>terpol maintains a database of 40 million lost and stolen travel documents from 157<br />

countries which it makes available to governments and the public, including airlines and<br />

hotels. <strong>The</strong> Stolen and Lost Travel Documents (SLTD) database however is little used.<br />

Big <strong>New</strong>s Network which is based in the UAE, observed that <strong>In</strong>terpol Secretary General<br />

Ronald K. Noble told a forum in Abu Dhabi the previous month this was the case. "<strong>The</strong><br />

bad news is that, despite being incredibly cost effective and deployable to virtually<br />

anywhere in the world, only a handful of countries are systematically using SLTD to<br />

screen travelers. <strong>The</strong> result is a major gap in our global security apparatus that is left<br />

vulnerable to exploitation by criminals and terrorists," Noble is quoted as saying.<br />

Australia<br />

<strong>In</strong> Australia, each state has enacted laws that deal with different aspects of identity or<br />

fraud issues. Some states have now amended relevant criminal laws to reflect crimes of<br />

identity theft, such as the Criminal Law Consolidation Act 1935 (SA), <strong>Crime</strong>s<br />

Amendment (Fraud, Identity and Forgery Offences) Act 2009 and also in Queensland<br />

under the Criminal Code 1899 (QLD). Other states and territories are in states of<br />

development in respect of regulatory frameworks relating to identity theft such as<br />

Western Australia in respect of Criminal Code Amendment (Identity <strong>Crime</strong>) Bill 2009.<br />

At the Commonwealth level, under the Criminal Code Amendment (<strong>The</strong>ft, Fraud,<br />

Bribery & Related Offences) Act 2000 which amended certain provisions within the<br />

Criminal Code Act 1995,<br />

Between 2014 and 2015, in Australia there were 133,921 fraud and deception offences,<br />

an increase of 6% from previous year. <strong>The</strong> total cost reported by the Attorney General<br />

Department was:<br />

Total Costs<br />

Fraud Category Cost Per <strong>In</strong>cident Total Direct Cost<br />

Commonwealth fraud $2,111 $353,866,740<br />

Personal fraud $400 $656,550,506<br />

Police recorded fraud $4,412 per unrecorded incident<br />

$27,981 per recorded incident<br />

$3,260,141,049<br />

<strong>The</strong>re are also high indirect costs associated as a direct result of an incident. For<br />

example, the total indirect costs for police recorded fraud is $5,774,081.<br />

135.1 General Dishonesty<br />

(3) A person is guilty of an offence if a) the person does anything with the<br />

intention of dishonestly causing a loss to another person; and b) the other person<br />

is a Commonwealth entity. Penalty: Imprisonment for 5 years.<br />

Likewise, each state has enacted their own privacy laws to prevent misuse of personal<br />

information and data. <strong>The</strong> Commonwealth Privacy Act is applicable only to<br />

Page 145 of 372


Commonwealth and territory agencies, and to certain private sector bodies (where for<br />

example they deal with sensitive records, such as medical records, or they have more<br />

than $3 million turnover PA).<br />

Canada<br />

Under section 402.2 of the Criminal Code,<br />

Everyone commits an offence who knowingly obtains or possesses another<br />

person's identity information in circumstances giving rise to a reasonable<br />

inference that the information is intended to be used to commit an indictable<br />

offence that includes fraud, deceit or falsehood as an element of the offence.<br />

is guilty of an indictable offence and liable to imprisonment for a term of<br />

not more than five years; or is guilty of an offence punishable on summary<br />

conviction.<br />

Under section 403 of the Criminal Code,<br />

(1) Everyone commits an offence who fraudulently personates another person, living or<br />

dead,<br />

(a) with intent to gain advantage for themselves or another person; (b) with intent<br />

to obtain any property or an interest in any property; (c) with intent to cause<br />

disadvantage to the person being personated or another person; or (d) with intent<br />

to avoid arrest or prosecution or to obstruct, pervert or defeat the course of<br />

justice. is guilty of an indictable offence and liable to imprisonment for a term of<br />

not more than 10 years; or guilty of an offence punishable on summary<br />

conviction.<br />

<strong>In</strong> Canada, Privacy Act (federal legislation) covers only federal government, agencies<br />

and crown corporations. Each province and territory has its own privacy law and privacy<br />

commissioners to limit the storage and use of personal data. For the private sector, the<br />

purpose of the Personal <strong>In</strong>formation Protection and Electronic Documents Act ( 2000, c.<br />

5 ) (known as PIPEDA) is to establish rules to govern the collection, use and disclosure<br />

of personal information; except for the provinces of Quebec, Ontario, Alberta and British<br />

Columbia where provincial laws have been deemed substantially similar.<br />

France<br />

<strong>In</strong> France, a person convicted of identity theft can be sentenced up to five years in<br />

prison and fined up to €75,000.<br />

Hong Kong<br />

Under HK Laws. Chap 210 <strong>The</strong>ft Ordinance, sec. 16A Fraud<br />

Page 146 of 372


(1) If any person by any deceit (whether or not the deceit is the sole or main<br />

inducement) and with intent to defraud induces another person to commit an<br />

act or make an omission, which results either-<br />

(a) in benefit to any person other than the second-mentioned person; or<br />

(b) in prejudice or a substantial risk of prejudice to any person other than<br />

the first-mentioned person, the first-mentioned person commits the<br />

offense of fraud and is liable on conviction upon indictment to<br />

imprisonment for 14 years.<br />

Under the Personal Data (Privacy) Ordinance, it established the post of Privacy<br />

Commissioner for Personal Data and mandate how much personal information one can<br />

collect, retain and destruction. This legislation also provides citizens the right to request<br />

information held by businesses and government to the extent provided by this law.<br />

<strong>In</strong>dia<br />

Under the <strong>In</strong>formation Technology Act 2000 Chapter IX Sec 66C<br />

SECTION 66C<br />

PUNISHMENT FOR IDENTITY THEFT Whoever, fraudulently or dishonestly makes use<br />

of the electronic signature, password or any other unique identification feature of any<br />

other person, shall be punished with imprisonment of either description for a term which<br />

Page 147 of 372


may extend to three years and shall also be liable to fine which may extend to rupees<br />

one lakh.<br />

Philippines<br />

Social networking sites are one of the most famous spreaders of posers in the online<br />

community, giving the users freedom to place any information they want without any<br />

verification that the account is being used by the real person.<br />

Philippines, which ranks eighth in the numbers of users of Facebook and other social<br />

networking sites such as Twitter, Multiply and Tumblr, has been known as source of<br />

various identity theft problems. Identities of those people who carelessly put personal<br />

information on their profiles can easily be stolen just by simple browsing. <strong>The</strong>re are<br />

people who meet online, get to know each other through the free Facebook chat and<br />

exchange of messages that then leads to sharing of private information. Others get<br />

romantically involved with their online friends that they tend to give too much information<br />

such as their social security number, bank account and even personal basic information<br />

such as home address and company address.<br />

This phenomenon lead to the creation of Senate Bill 52: Cybercrime Prevention Act of<br />

2010. Section 2 of this bill states that it recognizes the importance of communication<br />

and multimedia for the development, exploitation and dissemination of information but<br />

violators will be punished by the law through imprisonment or a fine upwards of<br />

Php200,000, but not exceeding 1 million, or depending on the damage caused, or both<br />

(Section 7).<br />

Sweden<br />

Sweden has had relatively few problems with identity theft. This is because only<br />

Swedish identity documents have been accepted for identity verification. Stolen<br />

documents are traceable by banks and some other institutions. <strong>The</strong> banks have the<br />

duty to check the identity of people withdrawing money or getting loans. If a bank gives<br />

money to someone using an identity document reported as stolen, the bank must take<br />

the loss. Since 2008, any EU passport is valid in Sweden for identity check, and<br />

Swedish passports are valid all over the EU. This makes it harder to detect stolen<br />

documents, but still banks in Sweden must ensure that stolen documents are not<br />

accepted.<br />

Other types of identity theft have become more common in Sweden. One common<br />

example is ordering a credit card to someone who has an unlocked letterbox and is not<br />

home in the daytime. <strong>The</strong> thief steals the letter with the credit card and then the letter<br />

with the code which typically arrives a few days later. Usage of a stolen credit card is<br />

hard in Sweden, since an identity document or a PIN code it is normally demanded. If<br />

the shop does not demand that, it must take the loss from stolen credit cards. <strong>The</strong><br />

method of observing someone using the credit card PIN code, stealing the card or<br />

skimming it, and then using the card, has become more common.<br />

Page 148 of 372


Legally, Sweden is an open society. <strong>The</strong> Principle of Public Access says that all<br />

information kept by public authorities must be available for anyone except in certain<br />

cases. Specifically, anyone's address, income, taxes etc. are available to anyone. This<br />

makes fraud easier (the address is restricted only for people who needs to hide).<br />

<strong>The</strong>re was until 2016 no legal<br />

ban specifically against using<br />

someone's identity, only on<br />

the indirect damage caused.<br />

To impersonate someone<br />

else for financial gain is a<br />

kind of fraud, which is<br />

described in the Criminal<br />

Code<br />

(Swedish:<br />

brottsbalken).<br />

To<br />

impersonate someone else to<br />

discredit someone by breaking into social media accounts and provoke, is libel, but that<br />

is hard to sentence someone for. A new law was introduced late 2016 which partially<br />

banned unpermitted identity usage.<br />

United Kingdom<br />

<strong>In</strong> the United Kingdom personal data is protected by the Data Protection Act 1998. <strong>The</strong><br />

Act covers all personal data which an organization may hold, including names, birthday<br />

and anniversary dates, addresses, telephone numbers, etc.<br />

Under English law (which extends to Wales but not to Northern Ireland or Scotland), the<br />

deception offences under the <strong>The</strong>ft Act 1968 increasingly contend with identity theft<br />

situations. <strong>In</strong> R v Seward (2005) EWCA Crim 1941 the defendant was acting as the<br />

"front man" in the use of stolen credit cards and other documents to obtain goods. He<br />

obtained goods to the value of £10,000 for others who are unlikely ever to be identified.<br />

<strong>The</strong> Court of Appeal considered a sentencing policy for deception offenses involving<br />

"identity theft" and concluded that a prison sentence was required. Henriques J. said at<br />

para 14:"Identity fraud is a particularly pernicious and prevalent form of dishonesty<br />

calling for, in our judgment, deterrent sentences."<br />

Statistics released by CIFAS - <strong>The</strong> UK's Fraud Prevention Service show that there were<br />

89,000 victims of identity theft in the UK 2010. This compared with 2009 where there<br />

were 85,000 victims. Men in their 30s and 40s are the most common UK victims and<br />

identity fraud now accounts for nearly half of all frauds recorded.<br />

United States<br />

<strong>The</strong> increase in crimes of identity theft led to the drafting of the Identity <strong>The</strong>ft and<br />

Assumption Deterrence Act. <strong>In</strong> 1998, <strong>The</strong> Federal Trade Commission appeared before<br />

Page 149 of 372


the United States Senate. <strong>The</strong> FTC discussed crimes which exploit consumer credit to<br />

commit loan fraud, mortgage fraud, lines-of-credit fraud, credit card fraud, commodities<br />

and services frauds. <strong>The</strong> Identity <strong>The</strong>ft Deterrence Act (2003)[ITADA] amended U.S.<br />

Code Title 18, § 1028 ("Fraud related to activity in connection with identification<br />

documents, authentication features, and information"). <strong>The</strong> statute now makes the<br />

possession of any "means of identification" to "knowingly transfer, possess, or use<br />

without lawful authority" a federal crime, alongside unlawful possession of identification<br />

documents. However, for federal jurisdiction to prosecute, the crime must include an<br />

"identification document" that either: (a) is purportedly issued by the United States, (b) is<br />

used or intended to defraud the United States, (c) is sent through the mail, or (d) is used<br />

in a manner that affects interstate or foreign commerce. See 18 U.S.C. § 1028(c).<br />

Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending<br />

on the underlying crime per 18 U.S.C. § 1028(b). <strong>In</strong> addition, punishments for the<br />

unlawful use of a "means of identification" were strengthened in § 1028A ("Aggravated<br />

Identity <strong>The</strong>ft"), allowing for a consecutive sentence under specific enumerated felony<br />

violations as defined in § 1028A(c)(1) through (11).<br />

<strong>The</strong> Act also provides the Federal Trade Commission with authority to track the number<br />

of incidents and the dollar value of losses. <strong>The</strong>ir figures relate mainly to consumer<br />

financial crimes and not the broader range of all identification-based crimes.<br />

If charges are brought by state or local law enforcement agencies, different penalties<br />

apply depending on the state.<br />

Six Federal agencies conducted a joint task force to increase the ability to detect<br />

identity theft. <strong>The</strong>ir joint recommendation on "red flag" guidelines is a set of<br />

requirements on financial institutions and other entities which furnish credit data to<br />

credit reporting services to develop written plans for detecting identity theft. <strong>The</strong> FTC<br />

has determined that most medical practices are considered creditors and are subject to<br />

requirements to develop a plan to prevent and respond to patient identity theft. <strong>The</strong>se<br />

plans must be adopted by each organization's Board of Directors and monitored by<br />

senior executives.<br />

Identity theft complaints as a percentage of all fraud complaints decreased from 2004-<br />

2006. <strong>The</strong> Federal Trade Commission reported that fraud complaints in general were<br />

growing faster than ID theft complaints. <strong>The</strong> findings were similar in two other FTC<br />

studies done in 2003 and 2005. <strong>In</strong> 2003, 4.6 percent of the US population said they<br />

were a victim of ID theft. <strong>In</strong> 2005, that number had dropped to 3.7 percent of the<br />

population. <strong>The</strong> Commission's 2003 estimate was that identity theft accounted for some<br />

$52.6 billion of losses in the preceding year alone and affected more than 9.91 million<br />

Americans; the figure comprises $47.6 billion lost by businesses and $5 billion lost by<br />

consumers.<br />

According to the U.S. Bureau of Justice Statistics, in 2010, 7% of US households<br />

experienced identity theft - up from 5.5% in 2005 when the figures were first assembled,<br />

but broadly flat since 2007. <strong>In</strong> 2012, approximately 16.6 million persons, or 7% of all<br />

Page 150 of 372


U.S. residents age 16 or older, reported being victims of one or more incidents of<br />

identity theft.<br />

At least two states, California and Wisconsin have created an Office of Privacy<br />

Protection to assist their citizens in avoiding and recovering from identity theft.<br />

<strong>In</strong> 2009, <strong>In</strong>diana created an Identity <strong>The</strong>ft Unit within their Office of Attorney General to<br />

educate and assist consumers in avoiding and recovering from identity theft as well as<br />

assist law enforcement in investigating and prosecuting identity theft crimes.<br />

<strong>In</strong> Massachusetts in 2009-2010, Governor Deval Patrick made a commitment to<br />

balance consumer protection with the needs of small business owners. His Office of<br />

Consumer Affairs and Business Regulation announced certain adjustments to<br />

Massachusetts' identity theft regulations that maintain protections and also allows<br />

flexibility in compliance. <strong>The</strong>se updated regulations went into effect on March 1, 2010.<br />

<strong>The</strong> regulations are clear that their approach to data security is a risk-based approach<br />

important to small businesses and might not handle a lot of personal information about<br />

customers.<br />

<strong>The</strong> IRS has created the IRS Identity Protection Specialized Unit to help taxpayers' who<br />

are victims of federal tax-related identity theft. Generally, the identity thief will use a<br />

Page 151 of 372


stolen SSN to file a forged tax return and attempt to get a fraudulent refund early in the<br />

filing season. A taxpayer will need to fill out Form 14039, Identity <strong>The</strong>ft Affidavit.<br />

As for the future of medical care and Medicaid, people are mostly concerned about<br />

cloud computing. <strong>The</strong> addition of using cloud information within United States medicare<br />

system would institute easily accessible health information for individuals, but that also<br />

makes it easier for identity theft. Currently, new technology is being produced to help<br />

encrypt and protect files, which will create a smooth transition to cloud technology in the<br />

healthcare system.<br />

Notification<br />

Many states followed California's lead and enacted mandatory data breach notification<br />

laws. As a result, companies that report a data breach typically report it to all their<br />

customers.<br />

Spread and Impact<br />

Surveys in the USA from 2003 to 2006 showed a decrease in the total number of<br />

victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to<br />

$15.6 billion in 2006. <strong>The</strong> average fraud per person decreased from $4,789 in 2003 to<br />

$1,882 in 2006. A Microsoft report shows that this drop is due to statistical problems<br />

with the methodology, that such survey-based estimates are "hopelessly flawed" and<br />

exaggerate the true losses by orders of magnitude.<br />

<strong>The</strong> 2003 survey from the Identity <strong>The</strong>ft Resource Center found that:<br />

<br />

<br />

Only 15% of victims find out about the theft through proactive action taken by a<br />

business<br />

<strong>The</strong> average time spent by victims resolving the problem is about 330 hours<br />

73% of respondents indicated the crime involved the thief acquiring a credit card<br />

<strong>In</strong> a widely publicized account, Michelle Brown, a victim of identity fraud, testified before<br />

a U.S. Senate Committee Hearing on Identity <strong>The</strong>ft. Ms. Brown testified that: "over a<br />

year and a half from January 1998 through July 1999, one individual impersonated me<br />

to procure over $50,000 in goods and services. Not only did she damage my credit, but<br />

she escalated her crimes to a level that I never truly expected: she engaged in drug<br />

trafficking. <strong>The</strong> crime resulted in my erroneous arrest record, a warrant out for my<br />

arrest, and eventually, a prison record when she was booked under my name as an<br />

inmate in the Chicago Federal Prison."<br />

<strong>In</strong> Australia, identity theft was estimated to be worth between A$1billion and A$4 billion<br />

per annum in 2001.<br />

Page 152 of 372


<strong>In</strong> the United Kingdom, the Home Office reported that identity fraud costs the UK<br />

economy £1.2 billion annually (experts believe that the real figure could be much higher)<br />

although privacy groups object to the validity of these numbers, arguing that they are<br />

being used by the government to push for introduction of national ID cards. Confusion<br />

over exactly what constitutes identity theft has led to claims that statistics may be<br />

exaggerated. An extensively reported study from Microsoft Research in 2011 finds that<br />

estimates of identity theft losses contain enormous exaggerations, writing that surveys<br />

"are so compromised and biased that no faith whatever can be placed in their findings."<br />

Page 153 of 372


Page 154 of 372


XI. Kidnapping<br />

<strong>In</strong> criminal law, kidnapping is the unlawful carrying away (asportation) and confinement<br />

of a person against his or her will. Thus, it is a composite crime. It can also be defined<br />

as false imprisonment by means of abduction, both of which are separate crimes that<br />

when committed simultaneously upon the same person merge as the single crime of<br />

kidnapping. <strong>The</strong> asportation/abduction element is typically but not necessarily<br />

conducted by means of force or fear. That is, the perpetrator may use a weapon to force<br />

the victim into a vehicle, but it is still kidnapping if the victim is enticed to enter the<br />

vehicle willingly, e.g., in the belief it is a taxicab.<br />

Kidnapping may be done to demand for ransom in exchange for releasing the victim, or<br />

for other illegal purposes. Kidnapping can be accompanied by bodily injury which<br />

elevates the crime to aggravated kidnapping.<br />

Kidnapping of a child is also known as child abduction, and these are sometimes<br />

separate legal categories.<br />

Motivations<br />

Kidnapping of children is usually by one parent against the wishes of a parent or<br />

guardian. Kidnapping of adults is often for ransom or to force someone to withdraw<br />

money from an ATM, but may also be for the purpose of sexual assault.<br />

<strong>In</strong> the past, and presently in some parts of the world (such as southern Sudan),<br />

kidnapping is a common means used to obtain slaves and money through ransom. <strong>In</strong><br />

less recent times, kidnapping in the form of shanghaiing (or "pressganging") men was<br />

used to supply merchant ships in the 19th century with sailors, whom the law<br />

considered unfree labor.<br />

Page 155 of 372


Criminal gangs are estimated to make up to $500 million a year in ransom payments<br />

from kidnapping.<br />

Kidnapping has been identified as one source by which terrorist organizations have<br />

been known to obtain funding. <strong>The</strong> Perri, Lichtenwald and MacKenzie article identified<br />

"tiger" kidnapping as a specific method used by either the Real Irish Republican Army or<br />

Continuity Irish Republican Army, in which a kidnapped family member is used to force<br />

someone to steal from their employer.<br />

<br />

<br />

<br />

Bride kidnapping is a term often applied loosely, to include any bride "abducted"<br />

against the will of her parents, even if she is willing to marry the "abductor". It still<br />

is traditional amongst certain nomadic peoples of Central Asia. It has seen a<br />

resurgence in Kyrgyzstan since the fall of the Soviet Union and the subsequent<br />

erosion of women's rights.<br />

Express kidnapping is a method of abduction used in some countries, mainly<br />

from Latin America, where a small ransom, that a company or family can easily<br />

pay, is demanded.<br />

Tiger kidnapping is taking a hostage to make a loved one or associate of the<br />

victim do something: e.g. a child is taken hostage to force the shopkeeper to<br />

open the safe. <strong>The</strong> term originates from the usually long preceding observation,<br />

like a tiger does on the prowl.<br />

By Jurisdiction<br />

Canada<br />

Kidnapping that does not result in a homicide is a hybrid offence that comes with a<br />

maximum possible penalty of life imprisonment (18 months if tried summarily). A murder<br />

that results from kidnapping is classified as 1st-degree, with a sentence of life<br />

imprisonment that results from conviction (the mandatory penalty for murder under<br />

Canadian law).<br />

Netherlands<br />

Article 282 prohibits hostaging (and 'kidnapping' is a kind of 'hostaging'). Part 1 of Article<br />

282 allows sentencing kidnappers to maximum imprisonment of 8 years or a fine of the<br />

fifth category. Part 2 allows maximum imprisonment of 9 years or a fine of the fifth<br />

category if there are serious injuries.<br />

Part 3 allows maximum imprisonment of 12 years or a fine of the fifth category if the<br />

victim has been killed. Part 4 allows sentencing people that collaborate with kidnapping<br />

(such as proposing or make available a location where the victim hostaged). Part 1, 2<br />

and 3 will apply also to them.<br />

Page 156 of 372


United Kingdom<br />

Kidnapping is an offence under the common law of England and Wales. Lord Brandon<br />

said in 1984 R v D:<br />

First, the nature of the offence is an attack on, and infringement of, the personal liberty<br />

of an individual. Secondly, the offence contains four ingredients as follows: (1) the<br />

taking or carrying away of one person by another; (2) by force or fraud; (3) without the<br />

consent of the person so taken or carried away; and (4) without lawful excuse.<br />

<strong>In</strong> all cases of kidnapping of children, where it is alleged that a child has been<br />

kidnapped, it is the absence of the consent of that child which is material. This is the<br />

case regardless of the age of the child. A very small child will not have the<br />

understanding or intelligence to consent. This means that absence of consent will be a<br />

necessary inference from the age of the child. It is a question of fact for the jury whether<br />

an older child has sufficient understanding and intelligence to consent. Lord Brandon<br />

said: "I should not expect a jury to find at all frequently that a child under fourteen had<br />

sufficient understanding and intelligence to give its consent." If the child (being capable<br />

of doing so) did consent to being taken or carried away, the fact that the person having<br />

custody or care and control of that child did not consent to that child being taken or<br />

carried away is immaterial. If, on the other hand, the child did not consent, the consent<br />

Page 157 of 372


of the person having custody or care and control of the child may support a defense of<br />

lawful excuse. It is known as Gillick competence.<br />

Regarding Restriction on prosecution, no prosecution may be instituted, except by or<br />

with the consent of the Director of Public Prosecutions, for an offence of kidnapping if it<br />

was committed against a child under the age of sixteen and by a person connected with<br />

the child, within the meaning of section 1 of the Child Abduction Act 1984. Kidnapping is<br />

an indictable-only offence. Kidnapping is punishable with imprisonment or fine at the<br />

discretion of the court. <strong>The</strong>re is no limit on the fine or the term of imprisonment that may<br />

be imposed provided the sentence is not inordinate.<br />

A parent should only be prosecuted for kidnapping their own child "in exceptional cases,<br />

where the conduct of the parent concerned is so bad that an ordinary right-thinking<br />

person would immediately and without hesitation regard it as criminal in nature".<br />

United States<br />

Law in the United States follows from English common law. Following the highly<br />

publicized 1932 Lindbergh kidnapping, Congress passed the Federal Kidnapping Act,<br />

which authorized the FBI to investigate kidnapping at a time when the Bureau was<br />

expanding in size and authority. <strong>The</strong> fact that a kidnapped victim may have been taken<br />

across state lines brings the crime within the ambit of federal criminal law.<br />

Most states recognize different types of kidnapping and punish accordingly. E.g. <strong>New</strong><br />

York bases its definition of first-degree kidnapping on the duration and purpose. <strong>The</strong>re<br />

are several deterrents to kidnapping in the United States of America. Among these are:<br />

1. <strong>The</strong> extreme logistical challenges involved in successfully exchanging the money<br />

for the return of the victim without being apprehended or surveiled.<br />

2. Harsh punishment. Convicted kidnappers face lengthy prison terms. If a victim is<br />

brought across state lines, federal charges can be laid as well.<br />

3. Good cooperation and information sharing between law enforcement agencies,<br />

and tools for spreading information to the public (such as the AMBER Alert<br />

system).<br />

One notorious failed example of kidnap for ransom was the 1976 Chowchilla bus<br />

kidnapping, in which 26 children were abducted with the intention of bringing in a $5-<br />

million ransom. <strong>The</strong> children and driver escaped from an underground van without the<br />

aid of law enforcement. According to the Department of Justice, kidnapping makes up<br />

2% of all reported violent crimes against juveniles.<br />

From the 1990s on, a gang operating in <strong>New</strong> York City and <strong>New</strong> Jersey was involved in<br />

the kidnapping and torture of Jewish husbands for the purpose of forcing them to grant<br />

Page 158 of 372


eligious divorces to their wives. <strong>The</strong>y were finally apprehended on October 9, 2013, in<br />

connection with the 2013 <strong>New</strong> York divorce torture plot.<br />

According to a 2003 Domestic Violence Report in Colorado, out of a survey of 189<br />

incidents, most people (usually white females) are taken from their homes or residence<br />

by a present or former spouse or significant other. <strong>The</strong>y are usually taken by force, not<br />

by weapon, and usually the victims are not injured when they are freed.<br />

<strong>In</strong> 2009, Phoenix, Arizona reported over 300 cases of kidnapping, although subsequent<br />

investigation found that the Phoenix police falsified data "Phoenix Kidnappings:<br />

Uncovering the Truth". Archived from the original on 2013-04-13.. If true, this would<br />

have been the highest rate of any US city and second in the world only to Mexico City.<br />

A rise in kidnappings in the southwestern United States in general has been attributed<br />

to misclassification by local police, lack of a unified standard, desire for Federal grants,<br />

or the Mexican Drug War.<br />

<strong>In</strong> 2010 the United States was ranked sixth in the world (by absolute numbers, not per<br />

capita) for kidnapping for ransom, according to the available statistics (after Colombia,<br />

Italy, Lebanon, Peru, and the Philippines).<br />

<strong>In</strong> 2009, the Los Angeles Times named Phoenix, Arizona, as America's kidnapping<br />

capital, reporting that every year hundreds of ransom kidnappings occur there, virtually<br />

all within the underworld associated with human and drug smuggling from Mexico, and<br />

often done as a way of collecting unpaid debts. However, a later audit by the U.S.<br />

Department of Justice <strong>In</strong>spector General found only 59 federally reportable kidnappings<br />

in 2008, compared to the over 300 claimed on grant applications.<br />

During the year 1999 in the United States, 203,900 children were reported as the<br />

victims of family abductions and 58,200 of non-family abductions. However, only 115<br />

Page 159 of 372


were the result of "stereotypical" kidnaps (by someone unknown or of slight<br />

acquaintance to the child, held permanently or for ransom).<br />

Statistics<br />

Global Kidnapping Hotspots<br />

1999 2006 2014<br />

1 Colombia Mexico Mexico<br />

2 Mexico Iraq <strong>In</strong>dia<br />

3 Brazil <strong>In</strong>dia Pakistan<br />

4 Philippines South Africa Iraq<br />

5 Venezuela Brazil Nigeria<br />

6 Ecuador Pakistan Libya<br />

7 Russia and CIS Ecuador Afghanistan<br />

8 Nigeria Venezuela Bangladesh<br />

9 <strong>In</strong>dia Colombia Sudan<br />

10 South Africa Bangladesh Lebanon<br />

Countries with <strong>The</strong> Highest Rates<br />

Kidnapping for ransom is a common occurrence in various parts of the world today, and<br />

certain cities and countries are often described as the "Kidnapping Capital of the<br />

World". As of 2007, that title belongs to Iraq with possibly 1,500 foreigners kidnapped. <strong>In</strong><br />

2004, it was Mexico, and in 2001, it was Colombia. Statistics are harder to come by.<br />

Reports suggest a world total of 12,500-25,500/year with 3,600/year in Colombia and<br />

3,000/year in Mexico around the year 2000. However, by 2016, the number of<br />

kidnappings in Colombia had declined to 205 and it continues to decline. Mexican<br />

numbers are hard to confirm because of fears of police involvement in kidnapping.<br />

"Kidnapping seems to flourish particularly in fragile states and conflict countries, as<br />

politically motivated militias, organized crime and the drugs mafia fill the vacuum left by<br />

government".<br />

Pirates<br />

Kidnapping on the high seas in connection with piracy has been increasing. It was<br />

reported that 661 crewmembers were taken hostage and 12 kidnapped in the first 9<br />

months of 2009.<br />

Page 160 of 372


XII. Loan Sharking<br />

A loan shark is a person who offers loans at extremely high interest rates, has strict<br />

terms of collection upon failure, and operates outside off the street (outside of local<br />

authority). <strong>The</strong> term usually refers to illegal activity, but may also refer to predatory<br />

lending with extremely high interest rates such as payday or title loans.<br />

An unintended consequence of poverty alleviation initiatives can be that loan sharks<br />

borrow from formal microfinance lenders and lend on to poor borrowers. Loan sharks<br />

sometimes enforce repayment by blackmail or threats of violence. Historically, many<br />

moneylenders skirted between legal and criminal activity. <strong>In</strong> the recent western world,<br />

loan sharks have been a feature of the criminal underworld.<br />

19th-Century Salary Lenders<br />

United States<br />

<strong>In</strong> the late 19th-century US, the low legal interest rates made small loans unprofitable,<br />

and small-time lending was viewed as irresponsible by society. Banks and other major<br />

Page 161 of 372


financial institutions thus stayed away from small-time lending. <strong>The</strong>re were, however,<br />

plenty of small lenders offering loans at profitable but illegally high interest rates. <strong>The</strong>y<br />

presented themselves as legitimate and operated openly out of offices. <strong>The</strong>y only<br />

sought customers who had a steady and respectable job, a regular income and a<br />

reputation to protect. This made them less likely to leave the area before they paid their<br />

debt and more likely to have a legitimate reason for borrowing money. Gamblers,<br />

criminals, and other disreputable, unreliable types were avoided. <strong>The</strong>y made the<br />

borrower fill out and sign seemingly legitimate contracts. Though these contracts were<br />

not legally enforceable, they at least were proof of the loan, which the lender could use<br />

to blackmail a defaulter.<br />

To force a defaulter into paying, the lender might threaten legal action. This was a bluff,<br />

since the loan was illegal. <strong>The</strong> lender preyed on the borrower's ignorance of the law.<br />

Alternatively, the lender resorted to public shaming, exploiting the social stigma of being<br />

in debt to a loan shark. <strong>The</strong>y were able to complain to the defaulter's employer, because<br />

many employers would fire employees who were mired in debt, because of the risk of<br />

them stealing from the employer to repay debts. <strong>The</strong>y were able to send agents to stand<br />

outside the defaulter's home, loudly denouncing him, perhaps vandalizing his home with<br />

graffiti or notices. Whether out of gullibility or embarrassment, the borrower usually<br />

succumbed and paid.<br />

Many customers were employees of large firms, such as railways or public works.<br />

Larger organizations were more likely to fire employees for being in debt, as their rules<br />

were more impersonal, which made blackmail easier. It was easier for lenders to learn<br />

which large organizations did this as opposed to collecting information on the multitude<br />

of smaller firms. Larger firms had more job security and the greater possibility of<br />

promotion, so employees sacrificed more to ensure they were not fired. <strong>The</strong> loan shark<br />

could also bribe a large firm's paymaster to provide information on its many employees.<br />

Regular salaries and paydays made negotiating repayment plans simpler.<br />

<strong>The</strong> size of the loan and the repayment plan were often tailored to suit the borrower's<br />

means. <strong>The</strong> smaller the loan, the higher the interest rate was, as the costs of tracking<br />

and pursuing a defaulter (the overhead) were the same whatever the size of the loan.<br />

<strong>The</strong> attitudes of lenders to defaulters also varied: some were lenient and reasonable,<br />

readily granting extensions and slow to harass, while others unscrupulously tried to milk<br />

all they could from the borrower (e.g. imposing late fees).<br />

Because salary lending was a disreputable trade, the owners of these firms often hid<br />

from public view, hiring managers to run their offices indirectly. To further avoid<br />

attracting attention, when expanding his trade to other cities, an owner would often<br />

found new firms with different names rather than expanding his existing firm into a very<br />

noticeable leviathan.<br />

<strong>The</strong> penalties for being an illegal lender were mild. Illegal lending was a misdemeanor,<br />

and the penalty was forfeiture of the interest and perhaps the principal as well. But<br />

Page 162 of 372


these were only ever imposed if the borrower sued, which he typically could not afford<br />

to do.<br />

Opposition to salary lenders was spearheaded by social elites, such as businessmen<br />

and charity organizations. Businessmen were encouraged not to fire employees who<br />

were indebted to loan sharks, as they unwittingly supported the industry by providing<br />

lenders with a means of blackmailing their customers ("pay up or we'll tell your boss and<br />

you'll be fired"). Charities provided legal support to troubled borrowers. This fight<br />

culminated in the drafting of the Uniform Small Loan Law, which brought into existence<br />

a new class of licensed lender. <strong>The</strong> law was enacted, first in several states in 1917, and<br />

was adopted by all but a handful of states by the middle of the 20th century. <strong>The</strong> model<br />

statute mandated consumer protections and capped the interest rate on loans of $300<br />

or less at 3.5% a month (42% a year), a profitable level for small loans. Lenders had to<br />

give the customer copies of all signed documents.<br />

Additional charges such as late fees were banned. <strong>The</strong> lender could no longer receive<br />

power of attorney or confession of judgment over a customer. <strong>The</strong>se licensing laws<br />

made it impossible for usurious lenders to pass themselves off as legal. Small loans<br />

also started becoming more socially acceptable, and banks and other larger institutions<br />

started offering them as well.<br />

Page 163 of 372


20th-Century Gangsters<br />

<strong>In</strong> the 1920s and 1930s, American prosecutors began to notice the emergence of a new<br />

breed of illegal lender that used violence to enforce debts. <strong>The</strong> new small lender laws<br />

had made it almost impossible to intimidate customers with a veneer of legality, and<br />

many customers were less vulnerable to shaming because they were either selfemployed<br />

or already disreputable. Thus, violence was an important tool, though not<br />

their only one. <strong>The</strong>se loan sharks operated more informally than salary lenders, which<br />

meant more discretion for the lender and less paperwork and bureaucracy for the<br />

customer. <strong>The</strong>y were also willing to serve high-risk borrowers that legal lenders wouldn't<br />

touch.<br />

Threats of violence were rarely followed through, however. One possible reason is that<br />

injuring a borrower could have meant he couldn't work and thus could never pay off his<br />

debt. Many regular borrowers realized the threats were mostly bluffs and that they could<br />

get away with delinquent payments. A more certain consequence was that the<br />

delinquent borrower would be cut off from future loans, which was serious for those who<br />

regularly relied on loan sharks.<br />

One important market for violent loan sharks was illegal gambling operators, who<br />

couldn't expose themselves to the law to collect debts legally. <strong>The</strong>y cooperated with<br />

loan sharks to supply credit and collect payments from their punters. Thieves and other<br />

criminals, whose fortunes were frequently in flux, were also served, and these<br />

connections also allowed the loan sharks to operate as fences. Another type of high-risk<br />

customer was the small businessman in dire financial straits who couldn't qualify for a<br />

legal loan.<br />

Violent loansharking was typically run by criminal syndicates, such as the Mafia. Many<br />

of these were former bootleggers who needed a new line of work after the end of<br />

Prohibition. Towards the 1960s, loan sharks grew ever more coordinated, and could<br />

pool information on borrowers to better size up risks and ensure a borrower did not try<br />

to pay off one loan by borrowing from another loan shark. <strong>The</strong> fearsome reputation of<br />

the Mafia or similar large gang made the loan shark's threat of violence more credible.<br />

Mafia Links<br />

Origins <strong>In</strong> "Salary Buying", 1920-Criminalization<br />

Although the reform law was intended to starve the loan sharks into extinction, this<br />

species of predatory lender thrived and evolved. After high-rate salary lending was<br />

outlawed, some bootleg vendors recast the product as "salary buying". <strong>The</strong>y claimed<br />

they were not making loans but were purchasing future wages at a discount. This form<br />

of loansharking proliferated through the 1920s and into the 1930s until a new draft of<br />

the Uniform Small Loan Law closed the loophole through which the salary buyers had<br />

slipped. Salary-buying loan sharks continued to operate in some southern states after<br />

Page 164 of 372


World War II because the usury rate was set so low that licensed personal finance<br />

companies could not do business there.<br />

Post-Criminalization<br />

<strong>Organized</strong> crime began to enter the cash advance business in the 1930s, after high-rate<br />

lending was criminalized by the Uniform Small Loan Law. <strong>The</strong> first reports of mob<br />

loansharking surfaced in <strong>New</strong> York City in 1935, and for 15 years, underworld money<br />

lending was apparently restricted to that city. <strong>The</strong>re is no record of syndicate "juice"<br />

operations in Chicago, for instance, until the 1950s.<br />

<strong>In</strong> the beginning, underworld<br />

loansharking was a small<br />

loan business, catering to the<br />

same populations served by<br />

the salary lenders and<br />

buyers.<br />

Those who turned to the<br />

bootleg lenders could not get<br />

credit at the licensed<br />

companies because their<br />

incomes were too low or they<br />

were deemed poor risks. <strong>The</strong><br />

firms operating within the<br />

usury cap turned away<br />

roughly half of all applicants<br />

and tended to make larger<br />

loans to married men with<br />

steady jobs and decent<br />

incomes.<br />

Those who could not get a<br />

legal loan at 36% or 42% a year could secure a cash advance from a mobster at the<br />

going rate of 10% or 20% a week for small loans. Since the mob loans were not usually<br />

secured with legal instruments, debtors pledged their bodies as collateral.<br />

<strong>In</strong> its early phase, a large fraction of mob loansharking consisted of payday lending.<br />

Many of the customers were office clerks and factory hands. <strong>The</strong> loan fund for these<br />

operations came from the proceeds of the numbers racket and was distributed by the<br />

top bosses to the lower echelon loan sharks at the rate of 1% or 2% a week.<br />

<strong>The</strong> 1952 B-flick Loan Shark, starring George Raft, offers a glimpse of mob payday<br />

lending. <strong>The</strong> waterfront in Brooklyn was another site of extensive underworld payday<br />

advance operations around mid-century.<br />

Page 165 of 372


1960s Heyday–Present<br />

Over time, mob loan sharks moved away from such labor intensive rackets. By the<br />

1960s, the preferred clientele was small and medium-sized businesses. Business<br />

customers had the advantage of possessing assets that could be seized in case of<br />

default, or used to engage in fraud or to launder money. Gamblers were another<br />

lucrative market, as were other criminals who needed financing for their operations. By<br />

the 1970s, mob salary lending operations seemed to have withered away in the United<br />

States.<br />

At its height in the 1960s, underworld loansharking was estimated to be the second<br />

most lucrative franchise of organized crime in the United States after illegal gambling.<br />

<strong>New</strong>spapers in the 1960s were filled with sensational stories of debtors beaten,<br />

harassed, and sometimes murdered by mob loan sharks.<br />

Yet careful studies of the business have raised doubts about the frequency with which<br />

violence was employed in practice. Relations between creditor and debtor could be<br />

amicable, even when the "vig" or "juice" was exorbitant, because each needed the<br />

other. FBI agents in one city interviewed 115 customers of a mob loan business but<br />

turned up only one debtor who had been threatened. None had been beaten.<br />

Non-Mafia Sharks<br />

<strong>Organized</strong> crime has never had a monopoly on black market lending. Plenty of vestpocket<br />

lenders operated outside the jurisdiction of organized crime, charging usurious<br />

rates of interest for cash advances. <strong>The</strong>se informal networks of credit rarely came to the<br />

attention of the authorities but flourished in populations not served by licensed lenders.<br />

Even today, after the rise of corporate payday lending in the United States, unlicensed<br />

loan sharks continue to operate in immigrant enclaves and low-income neighborhoods.<br />

<strong>The</strong>y lend money to people who work in the informal sector or who are deemed to be<br />

too risky even by the check-cashing creditors. Some beat delinquents while others seize<br />

assets instead. <strong>The</strong>ir rates run from 10% to 20% a week, just like the mob loan sharks<br />

of days gone by.<br />

UK Loan Sharks<br />

<strong>The</strong> research by the government and other agencies estimates that 165,000 to 200,000<br />

people are indebted to loan sharks in the United Kingdom. Illicit loan sharking is treated<br />

as a high-level crime (felony) by law enforcement, due to its links to organized crime<br />

and the serious violence involved. Payday loans with high interest rates are legal in<br />

many cases, and have been described as "legal loan sharking" (in that the creditor is<br />

legally registered, pays taxes and contributions, and can reclaim remittance if taking the<br />

case to adjudication; likewise there is no threat of harm to the debtor).<br />

Page 166 of 372


Loan Sharks <strong>In</strong> Ireland<br />

<strong>The</strong> Central Bank of Ireland were criticized for doing nothing to protect those on low<br />

incomes, the vulnerable or have low levels of financial literacy from loan sharks when it<br />

emerged that up to 100,000 of the 360,000 loans given by moneylenders broke the law.<br />

Non-Standard Lenders <strong>In</strong> <strong>The</strong><br />

United States<br />

<strong>In</strong> the United States, there are lenders<br />

licensed to serve borrowers who<br />

cannot qualify for standard loans from<br />

mainstream sources. <strong>The</strong>se smaller,<br />

non-standard lenders often operate in<br />

cash, whereas mainstream lenders<br />

increasingly operate only<br />

electronically and will not serve<br />

borrowers who do not have bank<br />

accounts. Terms such as sub-prime<br />

lending, "non-standard consumer<br />

credit", and payday loans are often<br />

used in connection with this type of consumer finance. <strong>The</strong> availability of these services<br />

has made illegal, exploitative loan sharks rarer, but these legal lenders have also been<br />

accused of behaving in an exploitative manner. For example, payday loan operations<br />

have come under fire for charging inflated "service charges" for their services of cashing<br />

a "payday advance", effectively a short-term (no more than one or two weeks) loan for<br />

which charges may run 3–5% of the principal amount. By claiming to be charging for the<br />

"service" of cashing a paycheck, instead of merely charging interest for a short-term<br />

loan, laws that strictly regulate moneylending costs can be effectively bypassed.<br />

Payday Lending<br />

Licensed payday advance businesses, which lend money at high rates of interest on the<br />

security of a postdated check, are often described as loan sharks by their critics due to<br />

high interest rates that trap debtors, stopping short of illegal lending and violent<br />

collection practices. Today's payday loan is a close cousin of the early 20th century<br />

salary loan, the product to which the "shark" epithet was originally applied, but they are<br />

now legalized in some states.<br />

A 2001 comparison of short-term lending rates charged by the Chicago Outfit organized<br />

crime syndicate and payday lenders in California revealed that, depending on when a<br />

payday loan was paid back by a borrower (generally 1–14 days), the interest rate<br />

charged for a payday loan could be considerably higher than the interest rate of a<br />

similar loan made by the organized crime syndicate.<br />

Yamikinyu in Japan<br />

Page 167 of 372


<strong>The</strong> regulation of moneylenders is typically much looser than that of banks. <strong>In</strong> Japan,<br />

the Moneylending Control Law requires only registration in each prefecture. <strong>In</strong> Japan,<br />

as the decades-long depression lingers, banks are reluctant to spare money and<br />

regulation becomes tighter, illegal moneylending has become a social issue. Illegal<br />

moneylenders typically charge an interest of 30 or 50% in 10 days (in Japanese, these<br />

are called "to-san" ('to' meaning ten and 'san' meaning three, or 10-3) or "to-go" ('to'<br />

meaning ten and 'go' meaning five, or 10-5), which is about 1.442 million % or<br />

267.5 million % per annum. This is against the law that sets the maximum interest rate<br />

at 20%. <strong>The</strong>y usually do business with those who cannot get more money from banks,<br />

legitimate consumer loans, or credit cards.<br />

Ah Long in Malaysia and Singapore<br />

Ah Long (derived from the Cantonese phrase ' 大 耳 窿 ' ("big ear hole")) is a colloquial<br />

term for illegal loan sharks in Malaysia and Singapore. <strong>The</strong>y lend money to people who<br />

are unable to obtain loans from banks or other legal sources, mostly targeting habitual<br />

gamblers. Often, they discreetly advertise by sticking notices, mostly on lamp posts and<br />

utility boxes around a neighborhood, thus vandalizing public property, as authorities<br />

must remove such advertisements. <strong>The</strong>y charge high interest rates (generally about<br />

40% per month/fortnight) according to Anti-<strong>Crime</strong>, Drug and Social Development<br />

Voluntary Organization and frequently threaten violence (and administer it) towards<br />

those who fail to pay on time.<br />

Ah Long Tactics<br />

When a person fails to pay on time, the Ah Long will set fire, spray paint, splash, or<br />

write threats in paint or markers on the walls of the property of that person as a threat of<br />

violence and to scare, and perhaps shame, the borrower into repaying the loan. A<br />

common use of painting includes the characters "O$P$" meaning "owe money, pay<br />

money", as well as the debtors' unit number. According to local police authorities, there<br />

have been cases where borrowers and their family members were beaten or had their<br />

property damaged or destroyed, and some victims have committed suicide.<br />

Page 168 of 372


XIII. Money Laundering<br />

Money Laundering is the process of concealing the origins of money obtained illegally<br />

by passing it through a complex sequence of banking transfers or commercial<br />

transactions.<br />

One problem of criminal activities is accounting for the proceeds without raising the<br />

suspicion of law enforcement agencies. Considerable time and effort may be put into<br />

strategies which enable the safe use of those proceeds without raising unwanted<br />

suspicion. Implementing such strategies is generally called money laundering. After<br />

money has been laundered it can be used for legitimate purposes. Law enforcement<br />

agencies of many jurisdictions have set up sophisticated systems in an effort to detect<br />

suspicious transactions or activities, and many have set up international cooperative<br />

arrangements to assist each other in these endeavors.<br />

<strong>In</strong> a number of legal and regulatory systems, the term "money laundering" has become<br />

conflated with other forms of financial and business crime, and is sometimes used more<br />

generally to include misuse of the financial system (involving things such as securities,<br />

digital currencies, credit cards, and traditional currency), including terrorism financing<br />

Page 169 of 372


and evasion of international sanctions. Most anti-money laundering laws openly conflate<br />

money laundering (which is concerned with source of funds) with terrorism financing<br />

(which is concerned with destination of funds) when regulating the financial system.<br />

Some countries treat obfuscation of sources of money as also constituting money<br />

laundering, whether it is intentional or by merely using financial systems or services that<br />

do not identify or track sources or destinations. Other countries define money<br />

laundering in such a way as to include money from activity that would have been a<br />

crime in that country, even if the activity was legal where the actual conduct occurred.<br />

History<br />

Laws against money laundering were created to use against organized crime during the<br />

period of Prohibition in the United States during the 1930s. <strong>Organized</strong> crime received a<br />

major boost from Prohibition and a large source of new funds that were obtained from<br />

illegal sales of alcohol. <strong>The</strong> successful prosecution of Al Capone on tax evasion brought<br />

in a new emphasis by the state and law enforcement agencies to track and confiscate<br />

money, but existing laws against tax evasion could not be used once gangsters started<br />

paying their taxes.<br />

<strong>In</strong> the 1980s, the war on drugs led governments again to turn to money-laundering rules<br />

in an attempt to seize proceeds of drug crimes in order to catch the organizers and<br />

individuals running drug empires. It also had the benefit from a law enforcement point of<br />

view of turning rules of evidence upside down. Law enforcers normally have to prove an<br />

individual is guilty to get a conviction. But with money laundering laws, money can be<br />

confiscated and it is up to the individual to prove that the source of funds is legitimate if<br />

they want the funds back. This makes it much easier for law enforcement agencies and<br />

provides for much lower burdens of proof.<br />

<strong>The</strong> September 11 attacks in 2001, which led to the Patriot Act in the U.S. and similar<br />

legislation worldwide, led to a new emphasis on money laundering laws to combat<br />

terrorism financing. [5] <strong>The</strong> Group of Seven (G7) nations used the Financial Action Task<br />

Force on Money Laundering to put pressure on governments around the world to<br />

increase surveillance and monitoring of financial transactions and share this information<br />

between countries. Starting in 2002, governments around the world upgraded money<br />

laundering laws and surveillance and monitoring systems of financial transactions. Antimoney<br />

laundering regulations have become a much larger burden for financial<br />

institutions and enforcement has stepped up significantly. During 2011–2015 a number<br />

of major banks faced ever-increasing fines for breaches of money laundering<br />

regulations. This included HSBC, which was fined $1.9 billion in December 2012, and<br />

BNP Paribas, which was fined $8.9 billion in July 2014 by the U.S. government. Many<br />

countries introduced or strengthened border controls on the amount of cash that can be<br />

carried and introduced central transaction reporting systems where all financial<br />

institutions have to report all financial transactions electronically. For example, in 2006,<br />

Australia set up the AUSTRAC system and required the reporting of all financial<br />

transactions.<br />

Page 170 of 372


Definition<br />

Placing "dirty" money in a service company, where it is layered<br />

with legitimate income and then integrated into the flow of money,<br />

is a common form of money laundering.<br />

<strong>The</strong> conversion or transfer of property, the concealment<br />

or disguising of the nature of the proceeds, the<br />

acquisition, possession or use of property, knowing that<br />

these are derived from criminal activity and participate<br />

or assist the movement of funds to make the proceeds<br />

appear legitimate is money laundering.<br />

Money obtained from certain crimes, such as extortion, insider trading, drug trafficking,<br />

and illegal gambling is "dirty" and needs to be "cleaned" to appear to have been derived<br />

from legal activities, so that banks and other financial institutions will deal with it without<br />

suspicion. Money can be laundered by many methods which vary in complexity and<br />

sophistication.<br />

Money laundering involves three steps: <strong>The</strong> first involves introducing cash into the<br />

financial system by some means ("placement"); the second involves carrying out<br />

complex financial transactions to camouflage the illegal source of the cash ("layering");<br />

and finally, acquiring wealth generated from the transactions of the illicit funds<br />

("integration"). Some of these steps may be omitted, depending upon the<br />

circumstances. For example, non-cash proceeds that are already in the financial system<br />

would not need to be placed.<br />

According to the United States Treasury Department:<br />

Money laundering is the process of making illegally-gained proceeds (i.e., "dirty<br />

money") appear legal (i.e., "clean"). Typically, it involves three steps: placement,<br />

layering, and integration. First, the illegitimate funds are furtively introduced into the<br />

legitimate financial system. <strong>The</strong>n, the money is moved around to create confusion,<br />

sometimes by wiring or transferring through numerous accounts. Finally, it is integrated<br />

into the financial system through additional transactions until the "dirty money" appears<br />

"clean".<br />

Methods<br />

Money laundering can take several forms, although most methods can be categorized<br />

into one of a few types. <strong>The</strong>se include "bank methods, smurfing [also known as<br />

structuring], currency exchanges, and double-invoicing".<br />

<br />

Structuring: Often known as smurfing, this is a method of placement whereby<br />

cash is broken into smaller deposits of money, used to defeat suspicion of money<br />

laundering and to avoid anti-money laundering reporting requirements. A subcomponent<br />

of this is to use smaller amounts of cash to purchase bearer<br />

Page 171 of 372


instruments, such as money orders, and then ultimately deposit those, again in<br />

small amounts.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Bulk cash smuggling: This involves physically smuggling cash to another<br />

jurisdiction and depositing it in a financial institution, such as an offshore bank,<br />

with greater bank secrecy or less rigorous money laundering enforcement.<br />

Cash-intensive businesses: <strong>In</strong> this method, a business typically expected to<br />

receive a large proportion of its revenue as cash uses its accounts to deposit<br />

criminally derived cash. Such enterprises often operate openly and in doing so<br />

generate cash revenue from incidental legitimate business in addition to the illicit<br />

cash – in such cases the business will usually claim all cash received as<br />

legitimate earnings. Service businesses are best suited to this method, as such<br />

enterprises have little or no variable costs and/or a large ratio between revenue<br />

and variable costs, which makes it difficult to detect discrepancies between<br />

revenues and costs. Examples are parking structures, strip clubs, tanning salons,<br />

car washes, arcades, bars, restaurants, and casinos.<br />

Trade-based laundering: This involves under- or over-valuing invoices to disguise<br />

the movement of money. For example, the art market has been accused of being<br />

an ideal vehicle for money laundering due to several unique aspects of art such<br />

as the subjective value of artworks as well as the secrecy of auction houses<br />

about the identity of the buyer and seller.<br />

Shell companies and trusts: Trusts and shell companies disguise the true owners<br />

of money. Trusts and corporate vehicles, depending on the jurisdiction, need not<br />

disclose their true owner. Sometimes referred to by the slang term rathole,<br />

though that term usually refers to a person acting as the fictitious owner rather<br />

than the business entity.<br />

Round-tripping: Here, money is deposited in a controlled foreign corporation<br />

offshore, preferably in a tax haven where minimal records are kept, and then<br />

shipped back as a foreign direct investment, exempt from taxation. A variant on<br />

this is to transfer money to a law firm or similar organization as funds on account<br />

of fees, then to cancel the retainer and, when the money is remitted, represent<br />

the sums received from the lawyers as a legacy under a will or proceeds of<br />

litigation.<br />

Bank capture: <strong>In</strong> this case, money launderers or criminals buy a controlling<br />

interest in a bank, preferably in a jurisdiction with weak money laundering<br />

controls, and then move money through the bank without scrutiny.<br />

Casinos: <strong>In</strong> this method, an individual walks into a casino and buys chips with<br />

illicit cash. <strong>The</strong> individual will then play for a relatively short time. When the<br />

person cashes in the chips, they will expect to take payment in a check, or at<br />

least get a receipt so they can claim the proceeds as gambling winnings.<br />

Page 172 of 372


Other gambling: Money is spent on gambling, preferably on high odds games.<br />

One way to minimize risk with this method is to bet on every possible outcome of<br />

some event that has many possible outcomes, so no outcome(s) have short<br />

odds, and the bettor will lose only the vigorish and will have one or more winning<br />

bets that can be shown as the source of money. <strong>The</strong> losing bets will remain<br />

hidden.<br />

Black salaries: A company may have unregistered employees without written<br />

contracts and pay them cash salaries. Dirty money might be used to pay them.<br />

Tax amnesties: For example, those that legalize unreported assets and cash in<br />

tax havens.<br />

Transaction Laundering: When a merchant unknowingly processes illicit credit<br />

card transactions for another business. It is a growing problem and recognized<br />

as distinct from traditional money laundering in using the payments ecosystem to<br />

hide that the transaction even occurred (e.g. the use of fake front websites). Also<br />

known as "undisclosed aggregation" or "factoring".<br />

Page 173 of 372


By Region<br />

Latin America<br />

<strong>In</strong> Latin America, money laundering is mainly linked to drug trafficking activities and to<br />

having connections with criminal activity, such as crimes that have to do with arms<br />

trafficking, human trafficking, extortion, blackmail, smuggling, and acts of corruption of<br />

people linked to governments, such as bribery, which are more common in Latin<br />

American countries. <strong>The</strong>re is a relationship between corruption and money laundering in<br />

developing countries. <strong>The</strong> economic power of Latin America increases rapidly and<br />

without support, these fortunes being of illicit origin have the appearance of legally<br />

acquired profits. With regard to money laundering, the ultimate goal of the process is to<br />

integrate illicit capital into the general economy and transform it into licit goods and<br />

services.<br />

<strong>The</strong> money laundering practice uses various channels to legalize everything achieved<br />

through illegal practices. As such, it has different techniques depending on the country<br />

where this illegal operation is going to be carried out:<br />

<br />

<br />

<br />

<br />

<strong>In</strong> Colombia, the laundering of billions of dollars, which come from drug<br />

trafficking, is carried out through imports of contraband from the parallel<br />

exchange market.<br />

<strong>In</strong> Central America in countries such as Guatemala and Honduras, money<br />

laundering continues to increase in the absence of adequate legislation and<br />

regulations in these countries. Money laundering activities in Costa Rica have<br />

experienced substantial growth, especially using large-scale currency smuggling<br />

and investments of drug cartels in real estate, within the tourism sector.<br />

Furthermore, the Colon Free Zone, in Panama, continues to be the area of<br />

operations for money laundering where cash is exchanged for products of<br />

different nature that are then put up for sale at prices below those of production<br />

for a return fast of the capital.<br />

<strong>In</strong> Mexico, the preferred techniques continue to be the smuggling of currency<br />

abroad, in addition to electronic transfers, bank drafts with Mexican banks and<br />

operations in the parallel exchange market.<br />

Money Laundering in the Caribbean countries continues to be a serious problem<br />

that seems to be very dangerous. Specifically, in Antigua, the Dominican<br />

Republic, Jamaica, Saint Vincent and the Grenadines. Citizens of the Dominican<br />

Republic who have been involved in money laundering in the United States, use<br />

companies that are dedicated to transferring funds sent to the Dominican<br />

Republic in amounts of less than $10,000 under the use of false names.<br />

Moreover, in Jamaica, multimillion-dollar asset laundering cases were discovered<br />

through telephone betting operations abroad. Thousands of suspicious<br />

transactions have been detected in French overseas territories. Free trade zones<br />

Page 174 of 372


such as Aruba, meanwhile, remain the preferred areas for money laundering.<br />

<strong>The</strong> offshore banking centers, the secret bank accounts and the tourist<br />

complexes are the channels through which the launderers whiten the proceeds of<br />

the illicit money.<br />

Casinos continue to attract organizations that deal with money laundering. Aruba and<br />

the Netherlands Antilles, the Cayman Islands, Colombia, Mexico, Panama and<br />

Venezuela are considered high priority countries in the region, due to the strategies<br />

used by the washers.<br />

Economic Impact <strong>In</strong> <strong>The</strong> Region<br />

<strong>The</strong> practice of money laundering, among other economic and financial crimes have<br />

been better in infiltrating into the economic and political structures of most developing<br />

countries therefore resulting to political instability and economic digression.<br />

Money laundering is still a great concern for the financial services industry. About 50%<br />

of the money laundering incidents in Latin America were reported by organizations in<br />

the financial sector. According to PwC's 2014 global economic crime survey in Latin<br />

Page 175 of 372


America only 2.8% of respondents in Latin America claimed suffering Anti-<br />

Trust/Competition Law incidents, compared to 5.2% of respondents globally.<br />

It has been shown that money laundering has an impact on the financial behavior and<br />

macroeconomic performance of the industrialized countries. <strong>In</strong> these countries the<br />

macroeconomic consequences of money laundering are transmitted through several<br />

channels. Thus, money laundering complicates the formulation of economic policies. It<br />

is assumed that the proceeds of criminal activities are laundered by means of the notes<br />

and coins in circulation of the monetary substitutes.<br />

<strong>The</strong> laundering causes disproportionate changes in the relative prices of assets which<br />

implies that resources are allocated inefficiently; and, therefore may have negative<br />

implications for economic growth, apparently money laundering is associated with a<br />

lower economic growth.<br />

<strong>The</strong> Office of National Drug Control Policy of the United States estimates that only in<br />

that country, sales of narcotic drugs represent about 57,000 millions of dollars annually<br />

and most of these transactions are made in cash.<br />

Jurisprudence<br />

Money laundering has been increasing. A key factor behind the growing money<br />

laundering is ineffective enforcement of money laundering laws locally. Perhaps<br />

because of the lack of importance that has been given to the subject, since the 21st<br />

century started, there was not jurisprudence regarding the laundering of money or<br />

assets, or the conversion or transfer of goods. Which is even worse, the laws of the<br />

Latin American countries have really not dealt with their study in a profound way, as it is<br />

an issue that concerns the whole world and is the subject of seminars, conferences and<br />

academic analysis in different regions of the planet. Now a new figure that is being<br />

called the Economic Criminal Law is being implemented, which should be implemented<br />

in modern societies, which has been inflicted enormous damage to the point of affecting<br />

the general economy of the states. Even though, developing countries have responded<br />

and continue to respond, through legislative measures, to the problem of money<br />

laundering, at national level, however, money launderers, have taken advantage of the<br />

lax regulatory environment, vulnerable financial systems along with the continued civil<br />

and political unrest of most the developing countries.<br />

Magnitude<br />

Many regulatory and governmental authorities issue estimates each year for the amount<br />

of money laundered, either worldwide or within their national economy. <strong>In</strong> 1996, a<br />

spokesperson for the IMF estimated that 2–5% of the worldwide global economy<br />

involved laundered money. <strong>The</strong> Financial Action Task Force on Money Laundering<br />

(FATF), an intergovernmental body set up to combat money laundering, stated, "Due to<br />

the illegal nature of the transactions, precise statistics are not available and it is<br />

therefore impossible to produce a definitive estimate of the amount of money that is<br />

Page 176 of 372


globally laundered every year. <strong>The</strong> FATF therefore does not publish any figures in this<br />

regard." Academic commentators have likewise been unable to estimate the volume of<br />

money with any degree of assurance. Various estimates of the scale of global money<br />

laundering are sometimes repeated often enough to make some people regard them as<br />

factual—but no researcher has overcome the inherent difficulty of measuring an actively<br />

concealed practice.<br />

Regardless of the difficulty in measurement, the amount of money laundered each year<br />

is in the billions of US dollars and poses a significant policy concern for governments.<br />

As a result, governments and international bodies have undertaken efforts to deter,<br />

prevent, and apprehend money launderers. Financial institutions have likewise<br />

undertaken efforts to prevent and detect transactions involving dirty money, both as a<br />

result of government requirements and to avoid the reputational risk involved. Issues<br />

relating to money laundering have existed as long as there have been large scale<br />

criminal enterprises. Modern anti-money laundering laws have developed along with the<br />

modern War on Drugs. <strong>In</strong> more recent times anti-money laundering legislation is seen<br />

as adjunct to the financial crime of terrorist financing in that both crimes usually involve<br />

the transmission of funds through the financial system (although money laundering<br />

relates to where the money has come from, and terrorist financing relating to where the<br />

money is going to).<br />

Page 177 of 372


Transaction laundering is a massive and growing problem. Finextra estimated that<br />

transaction laundering accounted for over $200 billion in the US in 2017 alone, with over<br />

$6 billion of these sales involving illicit goods or services, sold by nearly 335,000<br />

unregistered merchants.<br />

Electronic Money<br />

<strong>In</strong> theory, electronic money should provide as easy a method of transferring value<br />

without revealing identity as untracked banknotes, especially wire transfers involving<br />

anonymity-protecting numbered bank accounts. <strong>In</strong> practice, however, the recordkeeping<br />

capabilities of <strong>In</strong>ternet service providers and other network resource<br />

maintainers tend to frustrate that intention. While some cryptocurrencies under recent<br />

development have aimed to provide for more possibilities of transaction anonymity for<br />

various reasons, the degree to which they succeed—and, in consequence, the degree<br />

to which they offer benefits for money laundering efforts—is controversial. Solutions<br />

such as ZCash and Monero are examples of cryptocurrencies that provide unlinkable<br />

anonymity via proofs and/or obfuscation of information (ring signatures). Such<br />

currencies could find use in online illicit services.<br />

<strong>In</strong> 2013, Jean-Loup Richet, a research fellow at ESSEC ISIS, surveyed new techniques<br />

that cybercriminals were using in a report written for the United Nations Office on Drugs<br />

and <strong>Crime</strong>. [33] A common approach was to use a digital currency exchanger service<br />

which converted dollars into a digital currency called Liberty Reserve, and could be sent<br />

and received anonymously. <strong>The</strong> receiver could convert the Liberty Reserve currency<br />

back into cash for a small fee. <strong>In</strong> May 2013, the US authorities shut down Liberty<br />

Reserve charging its founder and various others with money laundering.<br />

Another increasingly common way of laundering money is to use online gaming. <strong>In</strong> a<br />

growing number of online games, such as Second Life and World of Warcraft, it is<br />

possible to convert money into virtual goods, services, or virtual cash that can later be<br />

converted back into money.<br />

Reverse Money Laundering<br />

Reverse money laundering is a process that disguises a legitimate source of funds that<br />

are to be used for illegal purposes. It is usually perpetrated for the purpose of financing<br />

terrorism but can be also used by criminal organizations that have invested in legal<br />

businesses and would like to withdraw legitimate funds from official circulation.<br />

Unaccounted cash received via disguising financial transactions is not included in<br />

official financial reporting and could be used to evade taxes, hand in bribes and pay<br />

"under-the-table" salaries. For example, in an affidavit filed on 24 March 2014 in United<br />

States District Court, Northern California, San Francisco Division, FBI special agent<br />

Emmanuel V. Pascau alleged that several people associated with the Chee Kung Tong<br />

organization, and California State Senator Leland Yee, engaged in reverse money<br />

laundering activities.<br />

Page 178 of 372


<strong>The</strong> problem of such fraudulent encashment practices (obnalichka in Russian) has<br />

become acute in Russia and other countries of the former Soviet Union. <strong>The</strong> Eurasian<br />

Group on Combating Money Laundering and Financing of Terrorism (EAG) reported<br />

that the Russian Federation, Ukraine, Turkey, Serbia, Kyrgyzstan, Uzbekistan, Armenia<br />

and Kazakhstan have encountered a substantial shrinkage of tax base and shifting<br />

money supply balance in favor of cash. <strong>The</strong>se processes have complicated planning<br />

and management of the economy and contributed to the growth of the shadow<br />

economy.<br />

Combating<br />

Anti-money laundering (AML) is a term mainly used in the financial and legal industries<br />

to describe the legal controls that require financial institutions and other regulated<br />

entities to prevent, detect, and report money laundering activities. Anti-money<br />

laundering guidelines came into prominence globally as a result of the formation of the<br />

Financial Action Task Force (FATF) and the promulgation of an international framework<br />

of anti-money laundering standards. <strong>The</strong>se standards began to have more relevance in<br />

2000 and 2001, after FATF began a process to publicly identify countries that were<br />

deficient in their anti-money laundering laws and international cooperation, a process<br />

colloquially known as "name and shame".<br />

An effective AML program requires a jurisdiction to criminalize money laundering, giving<br />

the relevant regulators and police the powers and tools to investigate; be able to share<br />

information with other countries as appropriate; and require financial institutions to<br />

identify their customers, establish risk-based controls, keep records, and report<br />

suspicious activities.<br />

Page 179 of 372


Strict background checks are necessary to combat as many money launderers escape<br />

by investing through complex ownership and company structures. Banks can do that but<br />

a proper surveillance is required but on the Government side to reduce this.<br />

Criminalization<br />

<strong>The</strong> elements of the crime of money laundering are set forth in the United Nations<br />

Convention Against Illicit Traffic in Narcotic Drugs and Psychotropic Substances and<br />

Convention against Transnational <strong>Organized</strong> <strong>Crime</strong>. It is defined as knowingly engaging<br />

in a financial transaction with the proceeds of a crime for the purpose of concealing or<br />

disguising the illicit origin of the property from governments.<br />

<strong>The</strong> Role of Financial <strong>In</strong>stitutions<br />

While banks operating in the same country generally have to follow the same antimoney<br />

laundering laws and regulations, financial institutions all structure their antimoney<br />

laundering efforts slightly differently. Today, most financial institutions globally,<br />

and many non-financial institutions, are required to identify and report transactions of a<br />

suspicious nature to the financial intelligence unit in the respective country. For<br />

example, a bank must verify a customer's identity and, if necessary, monitor<br />

transactions for suspicious activity. This is often termed as "know your customer". This<br />

means knowing the identity of the customer and understanding the kinds of transactions<br />

in which the customer is likely to engage. By knowing one's customers, financial<br />

institutions can often identify unusual or suspicious behavior, termed anomalies, which<br />

may be an indication of money laundering.<br />

Bank employees, such as tellers and customer account representatives, are trained in<br />

anti-money laundering and are instructed to report activities that they deem suspicious.<br />

Additionally, anti-money laundering software filters customer data, classifies it according<br />

to level of suspicion, and inspects it for anomalies. Such anomalies include any sudden<br />

and substantial increase in funds, a large withdrawal, or moving money to a bank<br />

secrecy jurisdiction. Smaller transactions that meet certain criteria may also be flagged<br />

as suspicious. For example, structuring can lead to flagged transactions. <strong>The</strong> software<br />

also flags names on government "blacklists" and transactions that involve countries<br />

hostile to the host nation. Once the software has mined data and flagged suspect<br />

transactions, it alerts bank management, who must then determine whether to file a<br />

report with the government.<br />

Value of Enforcement Costs and Associated Privacy Concerns<br />

<strong>The</strong> financial services industry has become more vocal about the rising costs of antimoney<br />

laundering regulation and the limited benefits that they claim it brings. One<br />

commentator wrote that "[w]ithout facts, [anti-money laundering] legislation has been<br />

driven on rhetoric, driving by ill-guided activism responding to the need to be "seen to<br />

be doing something" rather than by an objective understanding of its effects on<br />

predicate crime. <strong>The</strong> social panic approach is justified by the language used—we talk of<br />

Page 180 of 372


the battle against terrorism or the war on drugs". <strong>The</strong> Economist magazine has become<br />

increasingly vocal in its criticism of such regulation, particularly with reference to<br />

countering terrorist financing, referring to it as a "costly failure", although it concedes<br />

that other efforts (like reducing identity and credit card fraud) may still be effective at<br />

combating money laundering.<br />

<strong>The</strong>re is no precise measurement of the costs of regulation balanced against the harms<br />

associated with money laundering, and given the evaluation problems involved in<br />

assessing such an issue, it is unlikely that the effectiveness of terror finance and money<br />

laundering laws could be determined with any degree of accuracy. <strong>The</strong> Economist<br />

estimated the annual costs of anti-money laundering efforts in Europe and North<br />

America at US$5 billion in 2003, an increase from US$700 million in 2000. Governmentlinked<br />

economists have noted the significant negative effects of money laundering on<br />

economic development, including undermining domestic capital formation, depressing<br />

growth, and diverting capital away from development. Because of the intrinsic<br />

uncertainties of the amount of money laundered, changes in the amount of money<br />

laundered, and the cost of anti-money laundering systems, it is almost impossible to tell<br />

which anti-money laundering systems work and which are more or less cost effective.<br />

Besides economic costs to implement anti-money-laundering laws, improper attention to<br />

data protection practices may entail disproportionate costs to individual privacy rights. <strong>In</strong><br />

June 2011, the data-protection advisory committee to the European Union issued a<br />

Page 181 of 372


eport on data protection issues related to the prevention of money laundering and<br />

terrorist financing, which identified numerous transgressions against the established<br />

legal framework on privacy and data protection. <strong>The</strong> report made recommendations on<br />

how to address money laundering and terrorist financing in ways that safeguard<br />

personal privacy rights and data protection laws. <strong>In</strong> the United States, groups such as<br />

the American Civil Liberties Union have expressed concern that money laundering rules<br />

require banks to report on their own customers, essentially conscripting private<br />

businesses "into agents of the surveillance state".<br />

Many countries are obligated by various international instruments and standards, such<br />

as the 1988 United Nations Convention Against Illicit Traffic in Narcotic Drugs and<br />

Psychotropic Substances, the 2000 Convention against Transnational <strong>Organized</strong> <strong>Crime</strong>,<br />

the 2003 United Nations Convention against Corruption, and the recommendations of<br />

the 1989 Financial Action Task Force on Money Laundering (FATF) to enact and<br />

enforce money laundering laws in an effort to stop narcotics trafficking, international<br />

organized crime, and corruption. Mexico, which has faced a significant increase in<br />

violent crime, established anti-money laundering controls in 2013 to curb the underlying<br />

crime issue.<br />

Global Organizations<br />

Formed in 1989 by the G7 countries, the Financial Action Task Force on Money<br />

Laundering (FATF) is an intergovernmental body whose purpose is to develop and<br />

promote an international response to combat money laundering. <strong>The</strong> FATF Secretariat<br />

is housed at the headquarters of the OECD in Paris. <strong>In</strong> October 2001, FATF expanded<br />

its mission to include combating the financing of terrorism. FATF is a policy-making<br />

body that brings together legal, financial, and law enforcement experts to achieve<br />

national legislation and regulatory AML and CFT reforms. As of 2014 its membership<br />

consists of 36 countries and territories and two regional organizations. FATF works in<br />

collaboration with a number of international bodies and organizations. <strong>The</strong>se entities<br />

have observer status with FATF, which does not entitle them to vote, but permits them<br />

full participation in plenary sessions and working groups.<br />

FATF has developed 40 recommendations on money laundering and 9 special<br />

recommendations regarding terrorist financing. FATF assesses each member country<br />

against these recommendations in published reports. Countries seen as not being<br />

sufficiently compliant with such recommendations are subjected to financial sanctions.<br />

FATF's three primary functions with regard to money laundering are:<br />

1. Monitoring members’ progress in implementing anti-money laundering measures,<br />

2. Reviewing and reporting on laundering trends, techniques, and<br />

countermeasures, and<br />

Page 182 of 372


3. Promoting the adoption and implementation of FATF anti-money laundering<br />

standards globally.<br />

<strong>The</strong> FATF currently comprises 34 member jurisdictions and 2 regional organizations,<br />

representing most major financial centers in all parts of the globe.<br />

<strong>The</strong> United Nations Office on Drugs and <strong>Crime</strong> maintains the <strong>In</strong>ternational Money<br />

Laundering <strong>In</strong>formation Network, a website that provides information and software for<br />

anti-money laundering data collection and analysis. <strong>The</strong> World Bank has a website that<br />

provides policy advice and best practices to governments and the private sector on antimoney<br />

laundering issues. <strong>The</strong> Basel AML <strong>In</strong>dex is an independent annual ranking that<br />

assesses the risk of money laundering and terrorist financing around the world.<br />

Anti-Money-Laundering Measures by Region<br />

Many jurisdictions adopt a list of specific predicate crimes for money laundering<br />

prosecutions, while others criminalize the proceeds of any serious crimes.<br />

Afghanistan<br />

<strong>The</strong> Financial Transactions and Reports Analysis Center of Afghanistan (FinTRACA)<br />

was established as a Financial <strong>In</strong>telligence Unit (FIU) under the Anti Money Laundering<br />

Page 183 of 372


and Proceeds of <strong>Crime</strong> Law passed by decree late in 2004. <strong>The</strong> main purpose of this<br />

law is to protect the integrity of the Afghan financial system and to gain compliance with<br />

international treaties and conventions. <strong>The</strong> Financial <strong>In</strong>telligence Unit is a semiindependent<br />

body that is administratively housed within the Central Bank of Afghanistan<br />

(Da Afghanistan Bank). <strong>The</strong> main objective of FinTRACA is to deny the use of the<br />

Afghan financial system to those who obtained funds as the result of illegal activity, and<br />

to those who would use it to support terrorist activities.<br />

To meet its objectives, the FinTRACA collects and analyzes information from a variety<br />

of sources. <strong>The</strong>se sources include entities with legal obligations to submit reports to the<br />

FinTRACA when a suspicious activity is detected, as well as reports of cash<br />

transactions above a threshold amount specified by regulation. Also, FinTRACA has<br />

access to all related Afghan government information and databases. When the analysis<br />

of this information supports the supposition of illegal use of the financial system, the<br />

FinTRACA works closely with law enforcement to investigate and prosecute the illegal<br />

activity. FinTRACA also cooperates internationally in support of its own analyses and<br />

investigations and to support the analyses and investigations of foreign counterparts, to<br />

the extent allowed by law. Other functions include training of those entities with legal<br />

obligations to report information, development of laws and regulations to support<br />

national-level AML objectives, and international and regional cooperation in the<br />

development of AML typologies and countermeasures.<br />

Australia<br />

Australia has adopted a number of strategies to combat money laundering, which mirror<br />

those of a majority of western countries. <strong>The</strong> Australian Transaction Reports and<br />

Analysis Centre (AUSTRAC) is Australia's financial intelligence unit to combat money<br />

laundering and terrorism financing, which requires financial institutions and other 'cash<br />

dealers' in Australia to report to it suspicious cash or other transactions and other<br />

specific information. <strong>The</strong> Attorney-General's Department maintains a list of outlawed<br />

terror organizations. It is an offense to materially support or be supported by such<br />

organizations. It is an offence to open a bank account in Australia in a false name, and<br />

rigorous procedures must be followed when new bank accounts are opened.<br />

<strong>The</strong> Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) (AML/CTF<br />

Act) is the principal legislative instrument, although there are also offence provisions<br />

contained in Division 400 of the Criminal Code Act 1995 (Cth). Upon its introduction, it<br />

was intended that the AML/CTF Act would be further amended by a second tranche of<br />

reforms extending to designated non-financial businesses and professions (DNFBPs)<br />

including, inter alia, lawyers, accountants, jewellers and real estate agents; however,<br />

those further reforms have yet to be progressed.<br />

<strong>The</strong> Proceeds of <strong>Crime</strong> Act 1987 (Cth) imposes criminal penalties on a person who<br />

engages in money laundering, and allows for confiscation of property. <strong>The</strong> principal<br />

objects of the Act are set out in s.3(1):<br />

Page 184 of 372


to deprive persons of the proceeds of, and benefits derived from the commission<br />

of offences,<br />

to provide for the forfeiture of property used in or in connection with the<br />

commission of such offences, and<br />

to enable law enforcement authorities to effectively trace such proceeds, benefits<br />

and property.<br />

Bangladesh<br />

<strong>The</strong> first anti-money laundering legislation in Bangladesh was the Money Laundering<br />

Prevention Act, 2002. It was replaced by the Money Laundering Prevention Ordinance<br />

2008. Subsequently, the ordinance was repealed by the Money Laundering Prevention<br />

Act, 2009. <strong>In</strong> 2012, government again replace it with the Money Laundering Prevention<br />

Act, 2012<br />

<strong>In</strong> terms of section 2, "Money Laundering means – (i) knowingly moving, converting, or<br />

transferring proceeds of crime or property involved in an offence for the following<br />

purposes:- (1) concealing or disguising the illicit nature, source, location, ownership or<br />

control of the proceeds of crime; or (2) assisting any person involved in the commission<br />

of the predicate offence to evade the legal consequences of such offence; (ii) smuggling<br />

Page 185 of 372


money or property earned through legal or illegal means to a foreign country; (iii)<br />

knowingly transferring or remitting the proceeds of crime to a foreign country or<br />

remitting or bringing them into Bangladesh from a foreign country with the intention of<br />

hiding or disguising its illegal source; or (iv) concluding or attempting to conclude<br />

financial transactions in such a manner so as to reporting requirement under this Act<br />

may be avoided; (v) converting or moving or transferring property with the intention to<br />

instigate or assist for committing a predicate offence; (vi) acquiring, possessing or using<br />

any property, knowing that such property is the proceeds of a predicate offence; (vii)<br />

performing such activities so as to the illegal source of the proceeds of crime may be<br />

concealed or disguised; (viii) participating in, associating with, conspiring, attempting,<br />

abetting, instigate or counsel to commit any offences mentioned above."<br />

To prevent these Illegal uses of money, the Bangladesh government has introduced the<br />

Money Laundering Prevention Act. <strong>The</strong> Act was last amended in the year 2009 and all<br />

the financial institutes are following this act.<br />

Till today there are 26 circulars issued by Bangladesh Bank under this act. To prevent<br />

money laundering, a banker must do the following:<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

While opening a new account, the account opening form should be duly filled up<br />

by all the information of the customer.<br />

<strong>The</strong> KYC must be properly filled.<br />

<strong>The</strong> Transaction Profile (TP) is mandatory for a client to understand his/her<br />

transactions. If needed, the TP must be updated at the client's consent.<br />

All other necessary papers should be properly collected along with the National<br />

ID card.<br />

If any suspicious transaction is noticed, the Branch Anti Money Laundering<br />

Compliance Officer (BAMLCO) must be notified and accordingly the Suspicious<br />

Transaction Report (STR) must be filled out.<br />

<strong>The</strong> cash department should be aware of the transactions. It must be noted if<br />

suddenly a big amount of money is deposited in any account. Proper documents<br />

are required if any client does this type of transaction.<br />

Structuring, over/ under invoicing is another way to do money laundering. <strong>The</strong><br />

foreign exchange department should look into this matter cautiously.<br />

If any account has a transaction over 1 million taka in a single day, it must be<br />

reported in a cash transaction report (CTR).<br />

All bank officials must go through all the 26 circulars and use them.<br />

Page 186 of 372


Canada<br />

<strong>In</strong> 1991, the Proceeds of <strong>Crime</strong> (Money Laundering) Act was brought into force in<br />

Canada to give legal effect to the former FATF Forty Recommendations by establishing<br />

record keeping and client identification requirements in the financial sector to facilitate<br />

the investigation and prosecution of money laundering offences under the Criminal<br />

Code and the Controlled Drugs and Substances Act.<br />

<strong>In</strong> 2000, the Proceeds of <strong>Crime</strong> (Money Laundering) Act was amended to expand the<br />

scope of its application and to establish a financial intelligence unit with national control<br />

over money laundering, namely FINTRAC.<br />

<strong>In</strong> December 2001, the scope of the Proceeds of <strong>Crime</strong> (Money Laundering) Act was<br />

again expanded by amendments enacted under the Anti-Terrorism Act with the<br />

objective of deterring terrorist activity by cutting off sources and channels of funding<br />

used by terrorists in response to 9/11. <strong>The</strong> Proceeds of <strong>Crime</strong> (Money Laundering) Act<br />

was renamed the Proceeds of <strong>Crime</strong> (Money Laundering) and Terrorist Financing Act.<br />

<strong>In</strong> December 2006, the Proceeds of <strong>Crime</strong> (Money Laundering) and Terrorist Financing<br />

Act was further amended, in part, in response to pressure from the FATF for Canada to<br />

Page 187 of 372


tighten its money laundering and financing of terrorism legislation. <strong>The</strong> amendments<br />

expanded the client identification, record-keeping and reporting requirements for certain<br />

organizations and included new obligations to report attempted suspicious transactions<br />

and outgoing and incoming international electronic fund transfers, undertake risk<br />

assessments and implement written compliance procedures in respect of those risks.<br />

<strong>The</strong> amendments also enabled greater money laundering and terrorist financing<br />

intelligence-sharing among enforcement agencies.<br />

<strong>In</strong> Canada, casinos, money service businesses, notaries, accountants, banks, securities<br />

brokers, life insurance agencies, real estate salespeople and dealers in precious metals<br />

and stones are subject to the reporting and record keeping obligations under the<br />

Proceeds of <strong>Crime</strong> (Money Laundering) and Terrorist Financing Act. However in recent<br />

years, casinos and realtors have been embroiled in scandal for aiding and abetting<br />

money launderers, especially in Vancouver. Some have speculated that approximately<br />

$1 Billion is laundered in Vancouver per year.<br />

European Union<br />

<strong>The</strong> fourth iteration of the EU's anti-money laundering directive (AMLD IV) was<br />

published on 5 June 2015, after clearing its last legislative stop at the European<br />

Parliament. This directive brought the EU's money laundering laws more in line with the<br />

US's, which is advantageous for financial institutions operating in both jurisdictions. <strong>The</strong><br />

Fifth Money Laundering Directive (5MLD) comes into force on 10 January 2020,<br />

addressing a number of weaknesses in the European Union's AML/CFT regime that<br />

came to light after the enactment of the Fourth Money Laundering Directive AMLD IV).<br />

Lack of harmonization in AML requirements between the US and EU has complicated<br />

the compliance efforts of global institutions that are looking to standardize the Know<br />

Your Customer (KYC) component of their AML programs across key jurisdictions.<br />

AMLD IV promises to better align the AML regimes by adopting a more risk-based<br />

approach compared to its predecessor, AMLD III.<br />

Certain components of the directive, however, go beyond current requirements in both<br />

the EU and US, imposing new implementation challenges on banks. For instance, more<br />

public officials are brought within the scope of the directive, and EU member states are<br />

required to establish new registries of "beneficial owners" (i.e., those who ultimately own<br />

or control each company) which will impact banks. AMLD IV became effective 25 June<br />

2015.<br />

On 24 January 2019, the European Commission sent official warnings to ten member<br />

states as part of a crackdown on lax application of money laundering regulations. <strong>The</strong><br />

Commission sent Germany a letter of formal notice, the first step of the EU legal<br />

procedure against states. Belgium, Finland, France, Lithuania and Portugal were sent<br />

reasoned opinions, the second step of the procedure which could lead to fines. A<br />

second round of reasoned opinions was sent to Bulgaria, Cyprus, Poland, and Slovakia.<br />

<strong>The</strong> ten countries have two months to respond or face court action. <strong>The</strong> Commission<br />

Page 188 of 372


had set a 26 June 2017 deadline for EU countries to apply new rules against money<br />

laundering and terrorist financing.<br />

On 13 February 2019, the Commission added Saudi Arabia, Panama, Nigeria and other<br />

jurisdictions to a blacklist of nations that pose a threat because of lax controls on<br />

terrorism financing and money laundering. This is a more expansive list than that of<br />

FATF.<br />

<strong>In</strong>dia<br />

<strong>In</strong> 2002, the Parliament of <strong>In</strong>dia passed an act called the Prevention of Money<br />

Laundering Act, 2002. <strong>The</strong> main objectives of this act are to prevent money-laundering<br />

as well as to provide for confiscation of property either derived from or involved in,<br />

money-laundering.<br />

Section 12 (1) describes the obligations that banks, other financial institutions, and<br />

intermediaries have to:<br />

(a) Maintain records that detail the nature and value of transactions, whether<br />

such transactions comprise a single transaction or a series of connected<br />

transactions, and where these transactions take place within a month.<br />

(b) Furnish information on transactions referred to in clause (a) to the Director<br />

within the time prescribed, including records of the identity of all its clients.<br />

Section 12 (2) prescribes that the records referred to in sub-section (1) as<br />

mentioned above, must be maintained for ten years after the transactions<br />

finished. It is handled by the <strong>In</strong>dian <strong>In</strong>come Tax Department.<br />

<strong>The</strong> provisions of the Act are frequently reviewed and various amendments have been<br />

passed from time to time.<br />

Most money laundering activities in <strong>In</strong>dia are through political parties, corporate<br />

companies and the shares market. <strong>The</strong>se are investigated by the Enforcement<br />

Directorate and <strong>In</strong>dian <strong>In</strong>come Tax Department. According to Government of <strong>In</strong>dia, out<br />

Page 189 of 372


of the total tax arrears of ₹2,480 billion (US$35 billion) about ₹1,300 billion<br />

(US$18 billion) pertain to money laundering and securities scam cases.<br />

Bank accountants must record all transactions over Rs. 1 million and maintain such<br />

records for 10 years.<br />

Banks must also make cash transaction reports (CTRs) and suspicious transaction<br />

reports over Rs. 1 million within 7 days of initial suspicion. <strong>The</strong>y must submit their<br />

reports to the Enforcement Directorate and <strong>In</strong>come Tax Department.<br />

Singapore<br />

Singapore’s legal framework for combating money laundering is contained in a<br />

patchwork of legal instruments, the main elements of which are:<br />

<br />

<br />

<br />

<strong>The</strong> Corruption, Drug Trafficking and Other Serious <strong>Crime</strong>s (Confiscation of<br />

Benefits) Act (CDSA). This statute criminalizes money laundering and imposes<br />

the requirement for persons to file suspicious transaction reports (STRs) and<br />

make a disclosure whenever physical currency or goods exceeding S$20,000 are<br />

carried into or out of Singapore.<br />

<strong>The</strong> Mutual Assistance in Criminal Matters Act (MACMA). This statute sets out<br />

the framework for mutual legal assistance in criminal matters.<br />

Legal instruments issued by regulatory agencies (such as the Monetary Authority<br />

of Singapore (MAS), in relation to financial institutions (FIs)) imposing<br />

requirements to conduct customer due diligence (CDD).<br />

<strong>The</strong> term ‘money laundering’ is not used as such within the CDSA. Part VI of the CDSA<br />

criminalizes the laundering of proceeds generated by criminal conduct and drug tracking<br />

via the following offences:<br />

<br />

<br />

<br />

<br />

<strong>The</strong> assistance of another person in retaining, controlling or using the benefits of<br />

drug dealing or criminal conduct under an arrangement (whether by<br />

concealment, removal from jurisdiction, transfer to nominees or otherwise)<br />

[section 43(1)/44(1)].<br />

<strong>The</strong> concealment, conversion, transfer or removal from the jurisdiction, or the<br />

acquisition, possession or use of benefits of drug dealing or criminal conduct<br />

[section 46(1)/47(1)].<br />

<strong>The</strong> concealment, conversion, transfer or removal from the jurisdiction of another<br />

person's benefits of drug dealing or criminal conduct [section 46(2)/47(2)].<br />

<strong>The</strong> acquirement, possession or use of another person's benefits of drug dealing<br />

or criminal conduct [section 46(3)/47(3)].<br />

Page 190 of 372


Thailand<br />

United Kingdom<br />

Money laundering and terrorist funding legislation in the UK is governed by five Acts of<br />

primary legislation:-<br />

Terrorism Act 2000<br />

Anti-terrorism, <strong>Crime</strong> and Security Act 2001<br />

Proceeds of <strong>Crime</strong> Act 2002<br />

Serious <strong>Organized</strong> <strong>Crime</strong> and Police Act 2005<br />

Sanctions and Anti-Money Laundering Act 2018<br />

Money Laundering Regulations are designed to protect the UK financial system, as well<br />

as preventing and detecting crime. If a business is covered by these regulations then<br />

controls are put in place to prevent it being used for money laundering.<br />

<strong>The</strong> Proceeds of <strong>Crime</strong> Act 2002 contains the primary UK anti-money laundering<br />

legislation, including provisions requiring businesses within the "regulated sector"<br />

(banking, investment, money transmission, certain professions, etc.) to report to the<br />

authorities suspicions of money laundering by customers or others.<br />

Money laundering is broadly defined in the UK. <strong>In</strong> effect any handling or involvement<br />

with any proceeds of any crime (or monies or assets representing the proceeds of<br />

crime) can be a money laundering offence. An offender's possession of the proceeds of<br />

his own crime falls within the UK definition of money laundering. <strong>The</strong> definition also<br />

covers activities within the traditional definition of money laundering, as a process that<br />

conceals or disguises the proceeds of crime to make them appear legitimate.<br />

Page 191 of 372


Unlike certain other jurisdictions (notably the US and much of Europe), UK money<br />

laundering offences are not limited to the proceeds of serious crimes, nor are there any<br />

monetary limits. Financial transactions need no money laundering design or purpose for<br />

UK laws to consider them a money laundering offence. A money laundering offence<br />

under UK legislation need not even involve money, since the money laundering<br />

legislation covers assets of any description. <strong>In</strong> consequence, any person who commits<br />

an acquisitive crime (i.e., one that produces some benefit in the form of money or an<br />

asset of any description) in the UK inevitably also commits a money laundering offence<br />

under UK legislation.<br />

This applies also to a person who, by criminal conduct, evades a liability (such as a<br />

taxation liability)—which lawyers call "obtaining a pecuniary advantage"—as he is<br />

deemed thereby to obtain a sum of money equal in value to the liability evaded.<br />

<strong>The</strong> principal money laundering offences carry a maximum penalty of 14 years'<br />

imprisonment.<br />

Secondary regulation is provided by the Money Laundering Regulations 2003, which<br />

was replaced by the Money Laundering Regulations 2007. <strong>The</strong>y are directly based on<br />

the EU directives 91/308/EEC, 2001/97/EC and 2005/60/EC.<br />

One consequence of the Act is that solicitors, accountants, tax advisers, and insolvency<br />

practitioners who suspect (as a consequence of information received in the course of<br />

their work) that their clients (or others) have engaged in tax evasion or other criminal<br />

conduct that produced a benefit, now must report their suspicions to the authorities<br />

(since these entail suspicions of money laundering). <strong>In</strong> most circumstances it would be<br />

an offence, "tipping-off", for the reporter to inform the subject of his report that a report<br />

has been made. <strong>The</strong>se provisions do not however require disclosure to the authorities<br />

of information received by certain professionals in privileged circumstances or where<br />

the information is subject to legal professional privilege. Others that are subject to these<br />

regulations include financial institutions, credit institutions, estate agents (which includes<br />

chartered surveyors), trust and company service providers, high value dealers (who<br />

accept cash equivalent to €15,000 or more for goods sold), and casinos.<br />

Professional guidance (which is submitted to and approved by the UK Treasury) is<br />

provided by industry groups including the Joint Money Laundering Steering Group, the<br />

Law Society. and the Consultative Committee of Accountancy Bodies (CCAB).<br />

However, there is no obligation on banking institutions to routinely report monetary<br />

deposits or transfers above a specified value. <strong>In</strong>stead reports must be made of all<br />

suspicious deposits or transfers, irrespective of their value.<br />

<strong>The</strong> reporting obligations include reporting suspicious gains from conduct in other<br />

countries that would be criminal if it took place in the UK. Exceptions were later added<br />

for certain activities legal where they took place, such as bullfighting in Spain.<br />

Page 192 of 372


More than 200,000 reports of suspected money laundering are submitted annually to<br />

authorities in the UK (there were 240,582 reports in the year ended 30 September 2010.<br />

This was an increase from the 228,834 reports submitted in the previous year). Most of<br />

these reports are submitted by banks and similar financial institutions (there were<br />

186,897 reports from the banking sector in the year ended 30 September 2010).<br />

Although 5,108 different organizations submitted suspicious activity reports to the<br />

authorities in the year ended 30 September 2010, just four organizations submitted<br />

approximately half of all reports, and the top 20 reporting organizations accounted for<br />

three-quarters of all reports.<br />

<strong>The</strong> offence of failing to report a suspicion of money laundering by another person<br />

carries a maximum penalty of 5 years' imprisonment.<br />

On 1 May 2018, the UK House of Commons, without opposition, passed the Sanctions<br />

and Anti-Money Laundering Bill, which will set out the UK government's intended<br />

approach to exceptions and licenses when the nation becomes responsible for<br />

implementing its own sanctions and will also require notorious overseas British territory<br />

tax havens such as the Cayman Islands and the British Virgin Islands to establish public<br />

registers of the beneficial ownership of firms in their jurisdictions by the end of 2020.<br />

<strong>The</strong> legislation was passed by the House of Lords on 21 May and received Royal Asset<br />

on 23 May. However, the Act's public register provision is facing legal challenges from<br />

local governments in the Cayman Islands and British Virgin Islands, who argue that it<br />

violates their Constitutional sovereignty.<br />

Page 193 of 372


Bureaux de Change<br />

All UK Bureaux de change are registered with Her Majesty's Revenue and Customs,<br />

which issues a trading license for each location. Bureaux de change and money<br />

transmitters, such as Western Union outlets, in the UK fall within the "regulated sector"<br />

and are required to comply with the Money Laundering Regulations 2007. Checks can<br />

be carried out by HMRC on all Money Service Businesses.<br />

South Africa<br />

<strong>In</strong> South Africa, the Financial <strong>In</strong>telligence Centre Act (2001) and subsequent<br />

amendments have added responsibilities to the FSB to combat money laundering.<br />

United States<br />

<strong>The</strong> approach in the United States to stopping money laundering is usually broken into<br />

two areas: preventive (regulatory) measures and criminal measures.<br />

Preventive<br />

<strong>In</strong> an attempt to prevent dirty money from entering the U.S. financial system in the first<br />

place, the United States Congress passed a series of laws, starting in 1970, collectively<br />

known as the Bank Secrecy Act (BSA). <strong>The</strong>se laws, contained in sections 5311 through<br />

5332 of Title 31 of the United States Code, require financial institutions, which under the<br />

current definition include a broad array of entities, including banks, credit card<br />

companies, life insurers, money service businesses and broker-dealers in securities, to<br />

report certain transactions to the United States Department of the Treasury. Cash<br />

transactions in excess of a certain amount must be reported on a currency transaction<br />

report (CTR), identifying the individual making the transaction as well as the source of<br />

the cash. <strong>The</strong> law originally required all transactions of US$5,000 or more to be<br />

reported, but due to excessively high levels of reporting the threshold was raised to<br />

US$10,000. <strong>The</strong> U.S. is one of the few countries in the world to require reporting of all<br />

cash transactions over a certain limit, although certain businesses can be exempt from<br />

the requirement. Additionally, financial institutions must report transaction on a<br />

Suspicious Activity Report (SAR) that they deem "suspicious", defined as a knowing or<br />

suspecting that the funds come from illegal activity or disguise funds from illegal activity,<br />

that it is structured to evade BSA requirements or appears to serve no known business<br />

or apparent lawful purpose; or that the institution is being used to facilitate criminal<br />

activity. Attempts by customers to circumvent the BSA, generally by structuring cash<br />

deposits to amounts lower than US$10,000 by breaking them up and depositing them<br />

on different days or at different locations also violates the law.<br />

<strong>The</strong> financial database created by these reports is administered by the U.S.'s Financial<br />

<strong>In</strong>telligence Unit (FIU), called the Financial <strong>Crime</strong>s Enforcement Network (FinCEN),<br />

located in Vienna, Virginia. <strong>The</strong> reports are made available to U.S. criminal<br />

Page 194 of 372


investigators, as well as other FIU's around the globe, and FinCEN conducts computer<br />

assisted analyses of these reports to determine trends and refer investigations.<br />

<strong>The</strong> BSA requires financial institutions to engage in customer due diligence, or KYC,<br />

which is sometimes known in the parlance as know your customer. This includes<br />

obtaining satisfactory identification to give assurance that the account is in the<br />

customer's true name, and having an understanding of the expected nature and source<br />

of the money that flows through the customer's accounts. Other classes of customers,<br />

such as those with private banking accounts and those of foreign government officials,<br />

are subjected to enhanced due diligence because the law deems that those types of<br />

accounts are a higher risk for money laundering. All accounts are subject to ongoing<br />

monitoring, in which internal bank software scrutinizes transactions and flags for manual<br />

inspection those that fall outside certain parameters. If a manual inspection reveals that<br />

the transaction is suspicious, the institution should file a Suspicious Activity Report.<br />

<strong>The</strong> regulators of the industries involved are responsible to ensure that the financial<br />

institutions comply with the BSA. For example, the Federal Reserve and the Office of<br />

the Comptroller of the Currency regularly inspect banks, and may impose civil fines or<br />

refer matters for criminal prosecution for non-compliance. A number of banks have been<br />

fined and prosecuted for failure to comply with the BSA. Most famously, Riggs Bank, in<br />

Page 195 of 372


Washington D.C., was prosecuted and functionally driven out of business as a result of<br />

its failure to apply proper money laundering controls, particularly as it related to foreign<br />

political figures.<br />

<strong>In</strong> addition to the BSA, the U.S. imposes controls on the movement of currency across<br />

its borders, requiring individuals to report the transportation of cash in excess of<br />

US$10,000 on a form called Report of <strong>In</strong>ternational Transportation of Currency or<br />

Monetary <strong>In</strong>struments (known as a CMIR). Likewise, businesses, such as automobile<br />

dealerships, that receive cash in excess of US$10,000 must file a Form 8300 with the<br />

<strong>In</strong>ternal Revenue Service, identifying the source of the cash.<br />

On 1 September 2010, the Financial <strong>Crime</strong>s Enforcement Network issued an advisory<br />

on "informal value transfer systems" referencing United States v. Banki.<br />

<strong>In</strong> the United States, there are perceived consequences of anti-money laundering (AML)<br />

regulations. <strong>The</strong>se unintended consequences include FinCEN's publishing of a list of<br />

"risky businesses," which many believe unfairly targeted money service businesses.<br />

<strong>The</strong> publishing of this list and the subsequent fall-out, banks indiscriminately de-risking<br />

MSBs, is referred to as Operation Choke Point. <strong>The</strong> Financial <strong>Crime</strong>s Enforcement<br />

Network issued a Geographic Targeting Order to combat against illegal money<br />

laundering in the United States. This means that title insurance companies in the U.S.<br />

are required to identify the natural persons behind companies that pay all cash in<br />

residential real estate purchases over a particular amount in certain U.S. cities.<br />

Criminal Sanctions<br />

Money laundering has been criminalized in the United States since the Money<br />

Laundering Control Act of 1986. <strong>The</strong> law, contained at section 1956 of Title 18 of the<br />

United States Code, prohibits individuals from engaging in a financial transaction with<br />

proceeds that were generated from certain specific crimes, known as "specified unlawful<br />

activities" (SUAs). <strong>The</strong> law requires that an individual specifically intend in making the<br />

transaction to conceal the source, ownership or control of the funds. <strong>The</strong>re is no<br />

minimum threshold of money, and no requirement that the transaction succeeded in<br />

actually disguising the money. A "financial transaction" has been broadly defined, and<br />

need not involve a financial institution, or even a business. Merely passing money from<br />

one person to another, with the intent to disguise the source, ownership, location or<br />

control of the money, has been deemed a financial transaction under the law. <strong>The</strong><br />

possession of money without either a financial transaction or an intent to conceal is not<br />

a crime in the United States. Besides money laundering, the law contained in section<br />

1957 of Title 18 of the United States Code, prohibits spending more than US$10,000<br />

derived from an SUA, regardless of whether the individual wishes to disguise it. It<br />

carries a lesser penalty than money laundering, and unlike the money laundering<br />

statute, requires that the money pass through a financial institution.<br />

According to the records compiled by the United States Sentencing Commission, in<br />

2009, the United States Department of Justice typically convicted a little over 81,000<br />

Page 196 of 372


people; of this, approximately 800 are convicted of money laundering as the primary or<br />

most serious charge. <strong>The</strong> Anti-Drug Abuse Act of 1988 expanded the definition of<br />

financial institution to include businesses such as car dealers and real estate closing<br />

personnel and required them to file reports on large currency transaction. It required<br />

verification of identity of those who purchase monetary instruments over $3,000. <strong>The</strong><br />

Annunzio-Wylie Anti-Money Laundering Act of 1992 strengthened sanctions for BSA<br />

violations, required so called "Suspicious Activity Reports" and eliminated previously<br />

used "Criminal Referral Forms", required verification and recordkeeping for wire<br />

transfers and established the Bank Secrecy Act Advisory Group (BSAAG). <strong>The</strong> Money<br />

Laundering Suppression Act from 1994 required banking agencies to review and<br />

enhance training, develop anti-money laundering examination procedures, review and<br />

enhance procedures for referring cases to law enforcement agencies, streamlined the<br />

Currency transaction report exemption process, required each Money services business<br />

(MSB) to be registered by an owner or controlling person, required every MSB to<br />

maintain a list of businesses authorized to act as agents in connection with the financial<br />

services offered by the MSB, made operating an unregistered MSB a federal crime, and<br />

recommended that states adopt uniform laws applicable to MSBs. <strong>The</strong> Money<br />

Laundering and Financial <strong>Crime</strong>s Strategy Act of 1998 required banking agencies to<br />

develop anti-money laundering training for examiners, required the Department of the<br />

Treasury and other agencies to develop a "National Money Laundering Strategy",<br />

created the "High <strong>In</strong>tensity Money Laundering and Related Financial <strong>Crime</strong> Area"<br />

(HIFCA) Task Forces to concentrate law enforcement efforts at the federal, state and<br />

local levels in zones where money laundering is prevalent. HIFCA zones may be<br />

defined geographically or can be created to address money laundering in an industry<br />

sector, a financial institution, or group of financial institutions.<br />

Page 197 of 372


<strong>The</strong> <strong>In</strong>telligence Reform & Terrorism Prevention Act of 2004 amended the Bank<br />

Secrecy Act to require the Secretary of the Treasury to prescribe regulations requiring<br />

certain financial institutions to report cross-border electronic transmittals of funds, if the<br />

Secretary determines that reporting is "reasonably necessary" in "anti-money laundering<br />

/combatting financing of terrorists (Anti-Money Laundering/Combating the Financing of<br />

Terrorism AML/CFT)."<br />

Notable Cases<br />

1998 investigation, United States Senate, Contribution Laundering/Third-Party<br />

Transfers. <strong>In</strong>cludes investigation of Gandhi Memorial <strong>In</strong>ternational Foundation.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Bank of Credit and Commerce <strong>In</strong>ternational: Unknown amount, estimated in<br />

billions, of criminal proceeds, including drug trafficking money, laundered during<br />

the mid-1980s.<br />

BTA Bank: $6 billion of bank funds embezzled or fraudulently loaned to shell<br />

companies and offshore holdings by the banks former chairman and CEO<br />

Mukhtar Ablyazov.<br />

Bank of <strong>New</strong> York: US$7 billion of Russian capital flight laundered through<br />

accounts controlled by bank executives, late 1990s.<br />

Charter House Bank: Charter House Bank in Kenya was placed under statutory<br />

management in 2006 by the Central Bank of Kenya after it was discovered the<br />

bank was being used for money laundering activities by multiple accounts<br />

containing missing customer information. More than $1.5 billion had been<br />

laundered before the scam was uncovered.<br />

Danske Bank + Swedbank: $30 billion - $230 billion US dollars laundered<br />

through its Estonian branch. This was revealed on 19 September 2018.<br />

<strong>In</strong>vestigations by Denmark, Estonia, the U.K. and the U.S. were joined by France<br />

in February 2019. On 19 February 2019, Danske Bank announced that it would<br />

cease operating in Russia and the Baltic States. This statement came shortly<br />

after Estonia's banking regulator Finantsinspektsioon announced that they would<br />

close the Estonian branch of Danske Bank. <strong>The</strong> investigation has grown to<br />

include Swedbank, which may have laundered $4.3 billion. More at Danske Bank<br />

money laundering scandal.<br />

Ferdinand Marcos: Unknown amount, estimated at US$10 billion of government<br />

assets laundered through banks and financial institutions in the United States,<br />

Liechtenstein, Austria, Panama, Netherlands Antilles, Cayman Islands, Vanuatu,<br />

Hong Kong, Singapore, Monaco, the Bahamas, the Vatican and Switzerland.<br />

HSBC, in December 2012, paid a record $1.9 Billion fines for money-laundering<br />

hundreds of millions of dollars for drug traffickers, terrorists and sanctioned<br />

Page 198 of 372


governments such as Iran. <strong>The</strong> money-laundering occurred throughout the<br />

2000s.<br />

<br />

<br />

<strong>In</strong>stitute for the Works of Religion: Italian authorities investigated suspected<br />

money laundering transactions amounting to US$218 million made by the IOR to<br />

several Italian banks.<br />

Liberty Reserve, in May 2013, was seized by United States federal authorities for<br />

laundering $6 billion.<br />

<br />

<br />

<br />

Nauru: US$70 billion of Russian capital flight laundered through unregulated<br />

Nauru offshore shell banks, late 1990s<br />

Sani Abacha: US$2–5 billion of government assets laundered through banks in<br />

the UK, Luxembourg, Jersey (Channel Islands), and Switzerland, by the<br />

president of Nigeria.<br />

Standard Chartered: paid $330 million in fines for money-laundering hundreds of<br />

billions of dollars for Iran. <strong>The</strong> money-laundering took place in the 2000s and<br />

occurred for "nearly a decade to hide 60,000 transactions worth $250 billion".<br />

Page 199 of 372


Standard Bank: Standard Bank South Africa London Branch – <strong>The</strong> Financial<br />

Conduct Authority (FCA) has fined Standard Bank PLC (Standard Bank)<br />

£7,640,400 for failings relating to its anti-money laundering (AML) policies and<br />

procedures over corporate and private bank customers connected to politically<br />

exposed persons (PEPs).<br />

BNP Paribas, in June 2014, pleaded guilty to falsifying business records and<br />

conspiracy, having violated U.S. sanctions against Cuba, Iran, and Sudan. It<br />

agreed to pay an $8.9 billion fine, the largest ever for violating U.S. sanctions.<br />

BSI Bank, in May 2017, was shut down by the Monetary Authority of Singapore<br />

for serious breaches of anti-money laundering requirements, poor management<br />

oversight of the bank's operations, and gross misconduct of some of the bank's<br />

staff.<br />

Jose Franklin Jurado-Rodriguez, a Harvard College and Columbia University<br />

Graduate School of Arts and Sciences Economics Department alumnus, was<br />

convicted in Luxembourg in June 1990 "in what was one of the largest drug<br />

money laundering cases ever brought in Europe" and the US in 1996 of money<br />

laundering for the Cali Cartel kingpin Jose Santacruz Londono. Jurado-<br />

Rodriguez specialized in "smurfing".<br />

Fortnite. <strong>In</strong> 2018 Cybersecurity firm Sixgill posed as customers and discovered<br />

that stolen credit card details may have used to purchase Fortnite's in-game<br />

currency (V-Bucks) then in-game purchases, to be sold for "clean"<br />

money. [155][156][157] Epic Games, the makers of Fortnite, responded by urging<br />

customers to secure their accounts.<br />

Digital Money and Money Laundering<br />

To prevent the usage of decentralized digital money such as Bitcoin for the profit of<br />

crime and corruption, Australia is planning to strengthen the nation's anti-money<br />

laundering laws. <strong>The</strong> characteristics of Bitcoin—it is completely deterministic, protocol<br />

based and cannot be censored—make it possible to circumvent national laws using<br />

services like Tor to obfuscate transaction origins. Bitcoin relies completely on<br />

cryptography, not on a central entity running under a KYC framework. <strong>The</strong>re are several<br />

cases in which criminals have cashed out a significant amount of Bitcoin after<br />

ransomware attacks, drug dealings, cyber fraud and gunrunning.<br />

Additional cases, such as <strong>The</strong> DAO being drained of Ether, cannot be classified as<br />

money laundering under any legal definition, as decentralized virtual environments are<br />

legally stateless and cannot be intervened with by a governing body. <strong>The</strong> DAO incident<br />

initiated debate regarding the definition of money laundering in a stateless environment,<br />

leading to the formation of Ethereum Classic.<br />

Page 200 of 372


XIV. Murder<br />

Murder is the unlawful killing of another human without justification or valid excuse,<br />

especially the unlawful killing of another human being with malice aforethought. [1][2][3]<br />

This state of mind may, depending upon the jurisdiction, distinguish murder from other<br />

forms of unlawful homicide, such as manslaughter. Manslaughter is a killing committed<br />

in the absence of malice, brought about by reasonable provocation, or diminished<br />

capacity. <strong>In</strong>voluntary manslaughter, where it is recognized, is a killing that lacks all but<br />

the most attenuated guilty intent, recklessness.<br />

Most societies consider murder to be an extremely serious crime, and thus believe that<br />

the person charged should receive harsh punishments for the purposes of retribution,<br />

deterrence, rehabilitation, or incapacitation.<br />

<strong>In</strong> most countries, a person convicted of murder generally faces a long-term prison<br />

sentence, possibly a life sentence; and in a few, the death penalty may be imposed.<br />

Etymology<br />

<strong>The</strong> modern English word "murder" descends from the Proto-<strong>In</strong>do-European "mrtró"<br />

which meant "to die". <strong>The</strong> Middle English mordre is a noun from Anglo-Saxon morðor<br />

and Old French murdre. Middle English mordre is a verb from Anglo-Saxon myrdrian<br />

and the Middle English noun.<br />

Page 201 of 372


Definition<br />

<strong>The</strong> eighteenth-century English jurist William Blackstone (citing Edward Coke), in his<br />

Commentaries on the Laws of England set out the common law definition of murder,<br />

which by this definition occurs when a person, of sound memory and discretion,<br />

unlawfully kills any reasonable creature in being and under the king's peace, with malice<br />

aforethought, either express or implied.<br />

<strong>The</strong> elements of common law murder are:<br />

1. Unlawful<br />

2. Killing<br />

3. Through Criminal Act or Omission<br />

4. of a Human<br />

5. by another Human<br />

6. with Malice Aforethought.<br />

<strong>The</strong> Unlawful – This distinguishes murder from killings that are done within the boundaries of law,<br />

such as capital punishment, justified self-defense, or the killing of enemy combatants by lawful<br />

combatants as well as causing collateral damage to non-combatants during a war.<br />

Killing – At common law life ended with cardiopulmonary arrest – the total and irreversible cessation<br />

of blood circulation and respiration. With advances in medical technology courts have adopted<br />

irreversible cessation of all brain function as marking the end of life.<br />

Сriminal Act or Omission – Killing can be committed by an act or an omission.<br />

of a Human – This element presents the issue of when life begins. At common law, a fetus was not a<br />

human being. Life began when the fetus passed through the vagina and took its first breath.<br />

by another Human – <strong>In</strong> early common law, suicide was considered murder. <strong>The</strong> requirement that the<br />

person killed be someone other than the perpetrator excluded suicide from the definition of murder.<br />

with Malice Aforethought – Originally malice aforethought carried its everyday meaning – a<br />

deliberate and premeditated (prior intent) killing of another motivated by ill will. Murder necessarily<br />

required that an appreciable time pass between the formation and execution of the intent to kill. <strong>The</strong><br />

courts broadened the scope of murder by eliminating the requirement of actual premeditation and<br />

deliberation as well as true malice. All that was required for malice aforethought to exist is that the<br />

perpetrator act with one of the four states of mind that constitutes "malice".<br />

<strong>The</strong> four states of mind recognized as constituting "malice" are:<br />

i. <strong>In</strong>tent to kill,<br />

ii. <strong>In</strong>tent to inflict grievous bodily harm short of death,<br />

iii. Reckless indifference to an unjustifiably high risk to human life (sometimes<br />

described as an "abandoned and malignant heart"), or<br />

iv. <strong>In</strong>tent to commit a dangerous felony (the "felony murder" doctrine).<br />

Under state of mind (i), intent to kill, the deadly weapon rule applies. Thus, if the<br />

defendant intentionally uses a deadly weapon or instrument against the victim, such use<br />

Page 202 of 372


authorizes a permissive inference of intent to kill. <strong>In</strong> other words, "intent follows the<br />

bullet". Examples of deadly weapons and instruments include but are not limited to<br />

guns, knives, deadly toxins or chemicals or gases and even vehicles when intentionally<br />

used to harm one or more victims.<br />

Under state of mind (iii), an "abandoned and malignant heart", the killing must result<br />

from the defendant's conduct involving a reckless indifference to human life and a<br />

conscious disregard of an unreasonable risk of death or serious bodily injury. <strong>In</strong><br />

Australian jurisdictions, the unreasonable risk must amount to a foreseen probability of<br />

death (or grievous bodily harm in most states), as opposed to possibility.<br />

Under state of mind (iv), the felony-murder doctrine, the felony committed must be an<br />

inherently dangerous felony, such as burglary, arson, rape, robbery or kidnapping.<br />

Importantly, the underlying felony cannot be a lesser included offense such as assault,<br />

otherwise all criminal homicides would be murder as all are felonies.<br />

As with most legal terms, the precise definition of murder varies between jurisdictions<br />

and is usually codified in some form of legislation. Even when the legal distinction<br />

between murder and manslaughter is clear, it is not unknown for a jury to find a murder<br />

defendant guilty of the lesser offence.<br />

<strong>The</strong> jury might sympathize with the defendant (e.g. in a crime of passion, or in the case<br />

of a bullied victim who kills their tormentor), and the jury may wish to protect the<br />

defendant from a sentence of life imprisonment or execution.<br />

Page 203 of 372


Degrees of Murder<br />

"Murder in the second degree" redirects here. For the 2016 album, see Murder in the<br />

Second Degree.<br />

Many jurisdictions divide murder by degrees. <strong>The</strong> distinction between first- and seconddegree<br />

murder exists, for example, in Canadian murder law and U.S. murder law.<br />

<strong>The</strong> most common division is between first- and second-degree murder. Generally,<br />

second-degree murder is common law murder, and first-degree is an aggravated form.<br />

<strong>The</strong> aggravating factors of first-degree murder depend on the jurisdiction, but may<br />

include a specific intent to kill, premeditation, or deliberation. <strong>In</strong> some, murder<br />

committed by acts such as strangulation, poisoning, or lying in wait are also treated as<br />

first-degree murder. A few states in the U.S. further distinguish third-degree murder, but<br />

they differ significantly in which kinds of murders they classify as second-degree versus<br />

third-degree. For example, Minnesota defines third-degree murder as depraved-heart<br />

murder, whereas Florida defines third-degree murder as felony murder (except when<br />

the underlying felony is specifically listed in the definition of first-degree murder).<br />

Some jurisdictions also distinguish premeditated murder. This is the crime of wrongfully<br />

and intentionally causing the death of another human being (also known as murder)<br />

after rationally considering the timing or method of doing so, in order to either increase<br />

the likelihood of success, or to evade detection or apprehension. State laws in the<br />

United States vary as to definitions of "premeditation". <strong>In</strong> some states, premeditation<br />

may be construed as taking place mere seconds before the murder. Premeditated<br />

murder is one of the most serious forms of homicide, and is punished more severely<br />

than manslaughter or other types of murder, often with a life sentence without the<br />

possibility of parole, or in some countries, the death penalty. <strong>In</strong> the U.S, federal law (18<br />

U.S.C. § 1111(a)) criminalizes premeditated murder, felony murder and second-degree<br />

murder committed under situations where federal jurisdiction applies. <strong>In</strong> Canada, the<br />

Criminal Code classifies murder as either 1st- or 2nd-degree. <strong>The</strong> former type of murder<br />

is often called premeditated murder, although premeditation is not the only way murder<br />

can be classified as first-degree.<br />

Common Law<br />

According to Blackstone, English common law identified murder as a public wrong.<br />

According to common law, murder is considered to be malum in se, that is an act which<br />

is evil within itself. An act such as murder is wrong or evil by its very nature. And it is the<br />

very nature of the act which does not require any specific detailing or definition in the<br />

law to consider murder a crime.<br />

Some jurisdictions still take a common law view of murder. <strong>In</strong> such jurisdictions, what is<br />

considered to be murder is defined by precedent case law or previous decisions of the<br />

courts of law. However, although the common law is by nature flexible and adaptable, in<br />

the interests both of certainty and of securing convictions, most common law<br />

Page 204 of 372


jurisdictions have codified their criminal law and now have statutory definitions of<br />

murder.<br />

General<br />

Exclusions<br />

Although laws vary by country, there are circumstances of exclusion that are common in<br />

many legal systems.<br />

<br />

Killing of Enemy Combatants who have not surrendered by lawful combatants,<br />

in accordance with lawful orders in war, is also generally not considered murder;<br />

although illicit killings within a war may constitute murder or homicidal war<br />

crimes. (see the Laws of war article)<br />

<br />

<br />

Self-Defense: acting in self-defense or in defense of another person is generally<br />

accepted as legal justification for killing a person in situations that would<br />

otherwise have been murder. However, a self-defense killing might be<br />

considered manslaughter if the killer established control of the situation before<br />

the killing took place. <strong>In</strong> the case of self-defense it is called a "justifiable<br />

homicide".<br />

Unlawful killings without malice or intent are considered manslaughter.<br />

Page 205 of 372


<strong>In</strong> many common law countries, provocation is a partial defense to a charge of<br />

murder which acts by converting what would otherwise have been murder into<br />

manslaughter (this is voluntary manslaughter, which is more severe than<br />

involuntary manslaughter).<br />

Accidental killings are considered homicides. Depending on the circumstances,<br />

these may or may not be considered criminal offenses; they are often considered<br />

manslaughter.<br />

Suicide does not constitute murder in most societies. Assisting a suicide,<br />

however, may be considered murder in some circumstances.<br />

Specific to Certain Countries<br />

<br />

<br />

<br />

<br />

Capital Punishment: some countries practice the death penalty. Capital<br />

punishment may be ordered by a legitimate court of law as the result of a<br />

conviction in a criminal trial with due process for a serious crime. <strong>The</strong> 47 Member<br />

States of the Council of Europe are prohibited from using the death penalty.<br />

Euthanasia, doctor-assisted suicide: the administration of lethal drugs by a<br />

doctor to a terminally ill patient, if the intention is solely to alleviate pain, in many<br />

jurisdictions it is seen as a special case (see the doctrine of double effect and the<br />

case of Dr John Bodkin Adams).<br />

Killing to Prevent <strong>The</strong> <strong>The</strong>ft of One's Property may be legal, depending on the<br />

jurisdiction. <strong>In</strong> 2013, a jury in south Texas acquitted a man who killed a prostitute<br />

who attempted to run away with his money.<br />

Killing an <strong>In</strong>truder who is found by an owner to be in the owner's home (having<br />

entered unlawfully): legal in most US states (see Castle doctrine).<br />

Killing to Prevent Specific Forms of Aggravated Rape or Sexual Assault –<br />

killing of attacker by the potential victim or by witnesses to the scene; legal in<br />

parts of the US and in various other countries.<br />

<br />

<br />

<strong>In</strong> Pakistan, the killing of a woman or girl in specific circumstances (e.g., when<br />

she commits adultery and is killed by her husband or other family members,<br />

known as honor killing) is not considered murder.<br />

<strong>In</strong> the United States, in some states and in federal jurisdiction, a killing by a<br />

police officer is excluded from prosecution if the officer believes they are being<br />

threatened with deadly force by the victim. This may include such actions by the<br />

victim as reaching into a glove compartment or pocket for license and<br />

registration, if the officer thinks that the victim might be reaching for a gun.<br />

Page 206 of 372


Space jurisdiction is similar to that of international waters. <strong>The</strong>refore, a murder<br />

committed in outer space is subject to jurisdiction in the country that owns the<br />

space craft in which the killing transpired. <strong>In</strong> the event the murder occurred on an<br />

extraterrestrial planet (e.g. <strong>The</strong> Moon), no country can own land of any other<br />

planet so the killer is bound by the laws of the country in which they originate.<br />

This also applies to the ISS per agreement signed by all countries that have<br />

worked on the station so all astronauts are covered by extraterritorial jurisdiction.<br />

Victim<br />

All jurisdictions require that the victim be a natural person; that is, a human being who<br />

was still alive before being murdered. <strong>In</strong> other words, under the law one cannot murder<br />

a corpse, a corporation, a non-human animal, or any other non-human organism such<br />

as a plant or bacterium.<br />

California's murder statute, Penal Code Section 187, was interpreted by the Supreme<br />

Court of California in 1994 as not requiring any proof of the viability of the fetus as a<br />

prerequisite to a murder conviction. This holding has two implications. <strong>The</strong> first is a<br />

defendant in California can be convicted of murder for killing a fetus which the mother<br />

herself could have terminated without committing a crime. <strong>The</strong> second, as stated by<br />

Justice Stanley Mosk in his dissent, is that because women carrying nonviable fetuses<br />

may not be visibly pregnant, it may be possible for a defendant to be convicted of<br />

intentionally murdering a person they did not know existed.<br />

Mitigating Circumstances<br />

Some countries allow conditions that "affect the balance of the mind" to be regarded as<br />

mitigating circumstances. This means that a person may be found guilty of<br />

"manslaughter" on the basis of "diminished responsibility" rather than being found guilty<br />

of murder, if it can be proved that the killer was suffering from a condition that affected<br />

their judgment at the time. Depression, post-traumatic stress disorder and medication<br />

Page 207 of 372


side-effects are examples of conditions that may be taken into account when assessing<br />

responsibility.<br />

<strong>In</strong>sanity<br />

Mental disorder may apply to a wide range of disorders including psychosis caused by<br />

schizophrenia and dementia, and excuse the person from the need to undergo the<br />

stress of a trial as to liability. Usually, sociopathy and other personality disorders are not<br />

legally considered insanity, because of the belief they are the result of free will in many<br />

societies. <strong>In</strong> some jurisdictions, following the pre-trial hearing to determine the extent of<br />

the disorder, the defense of "not guilty by reason of insanity" may be used to get a not<br />

guilty verdict. This defense has two elements:<br />

1. That the defendant had a serious mental illness, disease, or defect.<br />

2. That the defendant's mental condition, at the time of the killing, rendered the<br />

perpetrator unable to determine right from wrong, or that what they were doing<br />

was wrong.<br />

Under <strong>New</strong> York law, for example:<br />

§ 40.15 Mental disease or defect. <strong>In</strong> any prosecution for an offense, it is an affirmative defense<br />

that when the defendant engaged in the proscribed conduct, he lacked criminal responsibility by<br />

reason of mental disease or defect. Such lack of criminal responsibility means that at the time of<br />

such conduct, as a result of mental disease or defect, he lacked substantial capacity to know or<br />

appreciate either: 1. <strong>The</strong> nature and consequences of such conduct; or 2. That such conduct was<br />

wrong.<br />

— N.Y. Penal Law, § 40.15<br />

Under the French Penal Code:<br />

Article 122-1<br />

A person is not criminally liable who, when the act was committed, was suffering<br />

from a psychological or neuropsychological disorder which destroyed his<br />

discernment or his ability to control his actions.<br />

<br />

A person who, at the time he acted, was suffering from a psychological or<br />

neuropsychological disorder which reduced his discernment or impeded his<br />

ability to control his actions, remains punishable; however, the court shall take<br />

this into account when it decides the penalty and determines its regime.<br />

Those who successfully argue a defense based on a mental disorder are usually<br />

referred to mandatory clinical treatment until they are certified safe to be released back<br />

into the community, rather than prison. A criminal defendant is often presented with the<br />

option of pleading "not guilty by reason of insanity". Thus, a finding of insanity results in<br />

a not-guilty verdict, although the defendant is placed in a state treatment facility where<br />

they could be kept for years or even decades.<br />

Page 208 of 372


Postpartum Depression<br />

Postpartum depression (also known as post-natal depression) is recognized in some<br />

countries as a mitigating factor in cases of infanticide. According to Dr. Susan<br />

Friedman, "Two dozen nations have infanticide laws that decrease the penalty for<br />

mothers who kill their children of up to one year of age. <strong>The</strong> United States does not<br />

have such a law, but mentally ill mothers may plead not guilty by reason of insanity." <strong>In</strong><br />

the law of the Republic of Ireland, infanticide was made a separate crime from murder in<br />

1949, applicable for the mother of a baby under one year old where "the balance of her<br />

mind was disturbed by reason of her not having fully recovered from the effect of giving<br />

birth to the child or by reason of the effect of lactation consequent upon the birth of the<br />

child". Since independence, death sentences for murder in such cases had always been<br />

Page 209 of 372


commuted; the new act was intended "to eliminate all the terrible ritual of the black cap<br />

and the solemn words of the judge pronouncing sentence of death in those cases ...<br />

where it is clear to the Court and to everybody, except perhaps the unfortunate<br />

accused, that the sentence will never be carried out." <strong>In</strong> Russia, murder of a newborn<br />

child by the mother has been separate crime since 1996.<br />

Unintentional<br />

For a killing to be considered murder in nine out of fifty states in the US, there normally<br />

needs to be an element of intent. A defendant may argue that they took precautions not<br />

to kill, that the death could not have been anticipated, or was unavoidable. As a general<br />

rule, manslaughter constitutes reckless killing, but manslaughter also includes criminally<br />

negligent (i.e. grossly negligent) homicide. Unintentional killing that results from an<br />

involuntary action generally cannot constitute murder. After examining the evidence, a<br />

judge or jury (depending on the jurisdiction) would determine whether the killing was<br />

intentional or unintentional.<br />

Diminished Capacity<br />

<strong>In</strong> those jurisdictions using the Uniform Penal Code, such as California, diminished<br />

capacity may be a defense. For example, Dan White used this defense to obtain a<br />

manslaughter conviction, instead of murder, in the assassination of Mayor George<br />

Moscone and Supervisor Harvey Milk. Afterward, California amended its penal code to<br />

provide "As a matter of public policy there shall be no defense of diminished capacity,<br />

diminished responsibility, or irresistible impulse in a criminal action...."<br />

Aggravating Circumstances<br />

Murder with specified aggravating circumstances is often punished more harshly.<br />

Depending on the jurisdiction, such circumstances may include:<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Premeditation<br />

Poisoning<br />

Murder of a child<br />

Murder of a police officer, judge, firefighter or witness to a crime<br />

Murder of a pregnant woman<br />

<strong>Crime</strong> committed for pay or other reward, such as contract killing<br />

Exceptional brutality or cruelty<br />

Methods which are dangerous to the public, e.g. explosion, arson, shooting in a<br />

crowd etc.<br />

Murder for a political cause<br />

Murder committed in order to conceal another crime or facilitate its commission.<br />

Hate crimes, which occur when a perpetrator targets a victim because of their<br />

perceived membership in a certain social group.<br />

Treachery (e.g. Heimtücke in German law)<br />

Page 210 of 372


<strong>In</strong> the United States and Canada, these murders are referred to as first-degree or<br />

aggravated murders. Murder, under English criminal law, always carries a mandatory<br />

life sentence, but is not classified into degrees. Penalties for murder committed under<br />

aggravating circumstances are often higher, under English law, than the 15-year<br />

minimum non-parole period that otherwise serves as a starting point for a murder<br />

committed by an adult.<br />

Felony Murder Rule<br />

A legal doctrine in some common law jurisdictions broadens the crime of murder: when<br />

an offender kills in the commission of a dangerous crime, (regardless of intent), he/she<br />

is guilty of murder. <strong>The</strong> felony murder rule is often justified by its supporters as a means<br />

of deterring dangerous felonies, but the case of Ryan Holle shows it can be used very<br />

widely.<br />

Year-And-A-Day Rule<br />

<strong>In</strong> some common law jurisdictions, a defendant accused of murder is not guilty if the<br />

victim survives for longer than one year and one day after the attack. This reflects the<br />

likelihood that if the victim dies, other factors will have contributed to the cause of death,<br />

breaking the chain of causation; and also means that the responsible person does not<br />

have a charge of murder "hanging over their head indefinitely". Subject to any statute of<br />

Page 211 of 372


limitations, the accused could still be charged with an offence reflecting the seriousness<br />

of the initial assault.<br />

With advances in modern medicine, most countries have abandoned a fixed time period<br />

and test causation on the facts of the case. This is known as "delayed death" and cases<br />

where this was applied or was attempted to be applied go back to at least 1966.<br />

<strong>In</strong> England and Wales, the "year-and-a-day rule" was abolished by the Law Reform<br />

(Year and a Day Rule) Act 1996. However, if death occurs three years or more after the<br />

original attack then prosecution can take place only with the Attorney-General's<br />

approval.<br />

<strong>In</strong> the United States, many jurisdictions have abolished the rule as well. Abolition of the<br />

rule has been accomplished by enactment of statutory criminal codes, which had the<br />

effect of displacing the common-law definitions of crimes and corresponding defenses.<br />

<strong>In</strong> 2001 the Supreme Court of the United States held that retroactive application of a<br />

state supreme court decision abolishing the year-and-a-day rule did not violate the Ex<br />

Post Facto Clause of Article I of the United States Constitution.<br />

<strong>The</strong> potential effect of fully abolishing the rule can be seen in the case of 74-year-old<br />

William Barnes, charged with the murder of a Philadelphia police officer Walter Barkley,<br />

who he'd shot nearly 41 years before. Barnes had served 16 years in prison for<br />

attempting to murder Barkley, but when the policeman died on August 19, 2007, this<br />

was alleged to be from complications of the wounds suffered from the shooting - and<br />

Barnes was charged with his murder. He was acquitted on May 24, 2010.<br />

Murder and Natural Selection<br />

Martin Daly and Margo Wilson of McMaster University have claimed that several<br />

aspects of homicides, including the genetic relations or proximity between murderers<br />

and their victims, (as in the Cinderella effect), can often be explained by the evolution<br />

theory or evolutionary psychology.<br />

Historical and Religious Attitudes<br />

<strong>In</strong> the Abrahamic religions, the first ever murder was committed by Cain against his<br />

brother Abel out of jealousy. <strong>In</strong> the past, certain types of homicide were lawful and<br />

justified. Georg Oesterdiekhoff wrote:<br />

Evans-Pritchard says about the Nuer from Sudan: "Homicide is not forbidden, and Nuer do not<br />

think it wrong to kill a man in fair fight. On the contrary, a man who slays another in combat is<br />

admired for his courage and skill." (Evans-Pritchard 1956: 195) This statement is true for most<br />

African tribes, for pre-modern Europeans, for <strong>In</strong>digenous Australians, and for Native Americans,<br />

according to ethnographic reports from all over the world. ... Homicides rise to incredible numbers<br />

among headhunter cultures such as the Papua. When a boy is born, the father has to kill a man.<br />

He needs a name for his child and can receive it only by a man, he himself has murdered. When<br />

a man wants to marry, he must kill a man. When a man dies, his family again has to kill a man.<br />

Page 212 of 372


<strong>In</strong> many such societies the redress was not via a legal system, but by blood revenge,<br />

although there might also be a form of payment that could be made instead—such as<br />

the weregild which in early Germanic society could be paid to the victim's family in lieu<br />

of their right of revenge.<br />

One of the oldest-known prohibitions against murder appears in the Sumerian Code of<br />

Ur-Nammu written sometime between 2100 and 2050 BC. <strong>The</strong> code states, "If a man<br />

commits a murder, that man must be killed."<br />

<strong>In</strong> Judeo-Christian traditions, the<br />

prohibition against murder is one of<br />

the Ten Commandments given by<br />

God to Moses in (Exodus: 20v13)<br />

and (Deuteronomy 5v17). <strong>The</strong><br />

Vulgate and subsequent early<br />

English translations of the Bible<br />

used the term secretly killeth his<br />

neighbor or smiteth his neighbor<br />

secretly rather than murder for the<br />

Latin clam percusserit proximum.<br />

Later editions such as Young's Literal Translation and the World English Bible have<br />

translated the Latin occides simply as murder rather than the alternatives of kill,<br />

assassinate, fall upon, or slay.<br />

<strong>In</strong> Islam according to the Qur'an, one of the greatest sins is to kill a human being who<br />

has committed no fault. "For that cause We decreed for the Children of Israel that<br />

whosoever killeth a human being for other than manslaughter or corruption in the earth,<br />

it shall be as if he had killed all mankind, and whoso saveth the life of one, it shall be as<br />

if he had saved the life of all mankind." "And those who cry not unto any other god along<br />

with Allah, nor take the life which Allah hath forbidden save in (course of) justice, nor<br />

commit adultery – and whoso doeth this shall pay the penalty."<br />

<strong>The</strong> term assassin derives from Hashshashin, a militant Ismaili Shi'ite sect, active from<br />

the 8th to 14th centuries. This mystic secret society killed members of the Abbasid,<br />

Fatimid, Seljuq and Crusader elite for political and religious reasons. <strong>The</strong> Thuggee cult<br />

that plagued <strong>In</strong>dia was devoted to Kali, the goddess of death and destruction. According<br />

to some estimates the Thuggees murdered 1 million people between 1740 and 1840.<br />

<strong>The</strong> Aztecs believed that without regular offerings of blood the sun god Huitzilopochtli<br />

would withdraw his support for them and destroy the world as they knew it. According to<br />

Ross Hassig, author of Aztec Warfare, "between 10,000 and 80,400 persons" were<br />

sacrificed in the 1487 re-consecration of the Great Pyramid of Tenochtitlan.<br />

Southern slave codes did make willful killing of a slave illegal in most cases. For<br />

example, the 1860 Mississippi case of Oliver v. State charged the defendant with<br />

murdering his own slave. <strong>In</strong> 1811, the wealthy white planter Arthur Hodge was hanged<br />

for murdering several of his slaves on his plantation in the British West <strong>In</strong>dies.<br />

Page 213 of 372


<strong>In</strong> Corsica, vendetta was a social code that required Corsicans to kill anyone who<br />

wronged their family honor. Between 1821 and 1852, no fewer than 4,300 murders were<br />

perpetrated in Corsica.<br />

<strong>In</strong>cidence<br />

<strong>The</strong> World Health Organization reported in October 2002 that a person is murdered<br />

every 60 seconds. An estimated 520,000 people were murdered in 2000 around the<br />

globe. Another study estimated the worldwide murder rate at 456,300 in 2010 with a<br />

35% increase since 1990. Two-fifths of them were young people between the ages of<br />

10 and 29 who were killed by other young people. Because murder is the least likely<br />

crime to go unreported, statistics of murder are seen as a bellwether of overall crime<br />

rates.<br />

Murder rates vary greatly among countries and societies around the world. <strong>In</strong> the<br />

Western world, murder rates in most countries have declined significantly during the<br />

20th century and are now between 1 and 4 cases per 100,000 people per year.<br />

Murder Rates by Country<br />

Murder rates in jurisdictions such as Japan, Singapore, Hong Kong, Iceland, Sweden,<br />

Switzerland, Italy, Spain and Germany are among the lowest in the world, around 0.3–1<br />

cases per 100,000 people per year; the rate of the United States is among the highest<br />

of developed countries, around 4.5 in 2014, with rates in larger cities sometimes over 40<br />

per 100,000. <strong>The</strong> top ten highest murder rates are in Honduras (91.6 per 100,000), El<br />

Salvador, Ivory Coast, Venezuela, Belize, Jamaica, U.S. Virgin Islands, Guatemala,<br />

Saint Kitts and Nevis and Zambia. (UNODC, 2011 – full table here).<br />

<strong>The</strong> following absolute murder counts per-country are not comparable because they are<br />

not adjusted by each country's total population. Nonetheless, they are included here for<br />

reference, with 2010 used as the base year (they may or may not include justifiable<br />

homicide, depending on the jurisdiction). <strong>The</strong>re were 52,260 murders in Brazil,<br />

consecutively elevating the record set in 2009. Over half a million people were shot to<br />

death in Brazil between 1979 and 2003. 33,335 murder cases were registered across<br />

<strong>In</strong>dia, about 19,000 murders committed in Russia, approximately 17,000 murders in<br />

Colombia (the murder rate was 38 per 100,000 people, in 2008 murders went down to<br />

15,000), approximately 16,000 murders in South Africa, approximately 15,000 murders<br />

in the United States, approximately 26,000 murders in Mexico, approximately 13,000<br />

murders in Venezuela, approximately 4,000 murders in El Salvador, approximately<br />

1,400 murders in Jamaica, approximately 550 murders in Canada and approximately<br />

470 murders in Trinidad and Tobago. Pakistan reported 12,580 murders.<br />

<strong>In</strong> the United States, 666,160 people were killed between 1960 and 1996.<br />

Approximately 90% of murders in the US are committed by males. Between 1976 and<br />

2005, 23.5% of all murder victims and 64.8% of victims murdered by intimate partners<br />

Page 214 of 372


were female. For women in the US, homicide is the leading cause of death in the<br />

workplace.<br />

<strong>In</strong> the US, murder is the leading cause of death for African American males aged 15 to<br />

34. Between 1976 and 2008, African Americans were victims of 329,825 homicides. <strong>In</strong><br />

2006, Federal Bureau of <strong>In</strong>vestigation's Supplementary Homicide Report indicated that<br />

nearly half of the 14,990 murder victims that year were Black (7421). <strong>In</strong> the year 2007,<br />

there were 3,221 black victims and 3,587 white victims of non-negligent homicides.<br />

While 2,905 of the black victims were killed by a black offender, 2,918 of the white<br />

victims were killed by white offenders. <strong>The</strong>re were 566 white victims of black offenders<br />

and 245 black victims of white offenders. <strong>The</strong> "white" category in the Uniform <strong>Crime</strong><br />

Reports (UCR) includes non-black Hispanics. <strong>In</strong> London in 2006, 75% of the victims of<br />

gun crime and 79% of the suspects were "from the African/Caribbean community".<br />

Murder demographics are affected by the improvement of trauma care, which has<br />

resulted in reduced lethality of violent assaults – thus the murder rate may not<br />

necessarily indicate the overall level of social violence.<br />

Page 215 of 372


Workplace homicide, which tripled during the 1980s, is the fastest growing category of<br />

murder in America.<br />

Development of murder rates over time in different countries is often used by both<br />

supporters and opponents of capital punishment and gun control. Using properly filtered<br />

data, it is possible to make the case for or against either of these issues. For example,<br />

one could look at murder rates in the United States from 1950 to 2000, and notice that<br />

those rates went up sharply shortly after a moratorium on death sentences was<br />

effectively imposed in the late 1960s. This fact has been used to argue that capital<br />

punishment serves as a deterrent and, as such, it is morally justified. Capital<br />

punishment opponents frequently counter that the United States has much higher<br />

murder rates than Canada and most European Union countries, although all those<br />

countries have abolished the death penalty. Overall, the global pattern is too complex,<br />

and on average, the influence of both these factors may not be significant and could be<br />

more social, economic, and cultural.<br />

Despite the immense improvements in forensics in the past few decades, the fraction of<br />

murders solved has decreased in the United States, from 90% in 1960 to 61% in 2007.<br />

Solved murder rates in major U.S. cities varied in 2007 from 36% in Boston,<br />

Massachusetts to 76% in San Jose, California. Major factors affecting the arrest rate<br />

include witness cooperation [118] and the number of people assigned to investigate the<br />

case.<br />

History of Murder Rates<br />

According to scholar Pieter Spierenburg homicide rates per 100,000 in Europe have<br />

fallen over the centuries, from 35 per 100,000 in medieval times, to 20 in 1500 AD, 5 in<br />

1700, to below two per 100,000 in 1900.<br />

<strong>In</strong> the United States, murder rates have been higher and have fluctuated. <strong>The</strong>y fell<br />

below 2 per 100,000 by 1900, rose during the first half of the century, dropped in the<br />

years following World War II, and bottomed out at 4.0 in 1957 before rising again. <strong>The</strong><br />

rate stayed in 9 to 10 range most of the period from 1972 to 1994, before falling to 5 in<br />

present times. <strong>The</strong> increase since 1957 would have been even greater if not for the<br />

significant improvements in medical techniques and emergency response times, which<br />

mean that more and more attempted homicide victims survive. According to one<br />

estimate, if the lethality levels of criminal assaults of 1964 still applied in 1993, the<br />

country would have seen the murder rate of around 26 per 100,000, almost triple the<br />

actually observed rate of 9.5 per 100,000.<br />

A similar, but less pronounced pattern has been seen in major European countries as<br />

well. <strong>The</strong> murder rate in the United Kingdom fell to 1 per 100,000 by the beginning of<br />

the 20th century and as low as 0.62 per 100,000 in 1960, and was at 1.28 per 100,000<br />

as of 2009. <strong>The</strong> murder rate in France (excluding Corsica) bottomed out after World<br />

War II at less than 0.4 per 100,000, quadrupling to 1.6 per 100,000 since then.<br />

Page 216 of 372


<strong>The</strong> specific factors driving this dynamics in murder rates are complex and not<br />

universally agreed upon. Much of the raise in the U.S. murder rate during the first half of<br />

the 20th century is generally thought to be attributed to gang violence associated with<br />

Prohibition. Since most murders are committed by young males, the near simultaneous<br />

low in the murder rates of major developed countries circa 1960 can be attributed to low<br />

birth rates during the Great Depression and World War II. Causes of further moves are<br />

more controversial. Some of the more exotic factors claimed to affect murder rates<br />

include the availability of abortion and the likelihood of chronic exposure to lead during<br />

childhood (due to the use of leaded paint in houses and tetraethyllead as a gasoline<br />

additive in internal combustion engines).<br />

Use of <strong>The</strong> Term<br />

<strong>In</strong> many countries, in news reports,<br />

journalists are typically careful not to call a<br />

killing a murder until the perpetrator is<br />

convicted of such. After arrest, journalists<br />

write that the person was "arrested on<br />

suspicion of murder". When a prosecutor<br />

files charges, the accused is referred to as<br />

an "accused murderer".<br />

Page 217 of 372


Page 218 of 372


XV. Prostitution<br />

Prostitution is the business or practice of engaging in sexual activity in exchange for<br />

payment. Prostitution is sometimes described as sexual services, commercial sex or,<br />

colloquially, hooking. It is sometimes referred to euphemistically as "the world's oldest<br />

profession" in the English-speaking world. A person who works in this field is called a<br />

prostitute, and is a type of sex worker.<br />

Prostitution occurs in a variety of forms, and its legal status varies from country to<br />

country (sometimes from region to region within a given country), ranging from being<br />

permissible but unregulated, to an enforced or unenforced crime, or a regulated<br />

profession. It is one branch of the sex industry, along with pornography, stripping, and<br />

erotic dancing. Brothels are establishments specifically dedicated to prostitution. <strong>In</strong><br />

escort prostitution, the act may take place at the client's residence or hotel room<br />

(referred to as out-call), or at the escort's residence or a hotel room rented for the<br />

occasion by the escort (in-call). Another form is street prostitution. Although the majority<br />

of prostitutes are female and have male clients, a prostitute can be, and have clients of,<br />

any gender or sexual orientation.<br />

Page 219 of 372


<strong>The</strong>re are about 42 million prostitutes in the world, living all over the world (though most<br />

of Central Asia, the Middle East and Africa lacks data, studied countries in that large<br />

region rank as top sex tourism destinations). Estimates place the annual revenue<br />

generated by prostitution worldwide to be over $100 billion.<br />

Some view prostitution as a form of exploitation of or violence against women, and<br />

children, that helps to create a supply of victims for human trafficking. Some critics of<br />

prostitution as an institution are supporters of the Swedish approach, which<br />

decriminalizes the act of selling sex, but makes the purchase of sex illegal. This<br />

approach has also been adopted by Canada, Iceland, the Republic of Ireland, Northern<br />

Ireland, Norway, and France.<br />

Etymology and terminology<br />

Prostitute is derived from the Latin prostituta. Some sources cite the verb as a<br />

composition of "pro" meaning "up front" or "forward" and "stituere", defined as "to offer<br />

up for sale". Another explanation is that prostituta is a composition of pro and statuere<br />

(to cause to stand, to station, place erect). A literal translation therefore is: "to put up<br />

front for sale" or "to place forward". <strong>The</strong> Online Etymology Dictionary states, "<strong>The</strong> notion<br />

of 'sex for hire' is not inherent in the etymology, which rather suggests one 'exposed to<br />

lust' or sex 'indiscriminately offered.'"<br />

<strong>The</strong> word prostitute was then carried down through various languages to the presentday<br />

Western society. Most sex worker activists groups reject the word prostitute and<br />

since the late 1970s have used the term sex worker instead. However, sex worker can<br />

also mean anyone who works within the sex industry or whose work is of a sexual<br />

nature and is not limited solely to prostitutes.<br />

A variety of terms are used for those who engage in prostitution, some of which<br />

distinguish between different types of prostitution or imply a value judgment about them.<br />

Common alternatives for prostitute include escort and whore; however, not all<br />

professional escorts are prostitutes.<br />

<strong>The</strong> English word whore derives from the Old English word hōra, from the Proto-<br />

Germanic *hōrōn (prostitute), which derives from the Proto-<strong>In</strong>do-European root *keh₂meaning<br />

"desire", a root which has also given us Latin cārus (dear), whence the French<br />

cher (dear, expensive) and the Latin cāritās (love, charity). Use of the word whore is<br />

widely considered pejorative, especially in its modern slang form of ho. <strong>In</strong> Germany,<br />

however, most prostitutes' organizations deliberately use the word Hure (whore) since<br />

they feel that prostitute is a bureaucratic term. Those seeking to remove the social<br />

stigma associated with prostitution often promote terminology such as sex worker,<br />

commercial sex worker (CSW) or sex trade worker. Another commonly used word for a<br />

prostitute is hooker. Although a popular etymology connects "hooker" with Joseph<br />

Hooker, a Union general in the American Civil War, the word more likely comes from the<br />

concentration of prostitutes around the shipyards and ferry terminal of the Corlear's<br />

Hook area of Manhattan in the 1820s, who came to be referred to as "hookers". A<br />

Page 220 of 372


streetwalker solicits customers on the streets or in public places, while a call girl makes<br />

appointments by phone, or in recent years, through email or the internet.<br />

Correctly or not, use of the word prostitute without specifying a sex may commonly be<br />

assumed to be female; compound terms such as male prostitution or male escort are<br />

therefore often used to identify males. Those offering services to female customers are<br />

commonly known as gigolos; those offering services to male customers are hustlers or<br />

rent boys.<br />

Procuring<br />

Organizers of prostitution may be known as pimps (if male) and madams or Mama-san<br />

(if female). More formally, one who is said to practice procuring is a procurer, or<br />

procuress.<br />

Clients<br />

Clients of prostitutes, most often men by prevalence, are sometimes known as johns or<br />

tricks in North America and punters in the British Isles. <strong>The</strong>se slang terms are used<br />

among both prostitutes and law enforcement for persons who solicit prostitutes. <strong>The</strong><br />

term john may have originated from the frequent customer practice of giving one's name<br />

Page 221 of 372


as "John", a common name in English-speaking countries, in an effort to maintain<br />

anonymity. <strong>In</strong> some places, men who drive around red-light districts for the purpose of<br />

soliciting prostitutes are also known as kerb crawlers.<br />

Female clients of prostitutes are sometimes referred to as janes or sugar mamas.<br />

Other Meanings<br />

<strong>The</strong> word "prostitution" can also be used metaphorically to mean debasing oneself or<br />

working towards an unworthy cause or "selling out". <strong>In</strong> this sense, "prostituting oneself"<br />

or "whoring oneself" the services or acts performed are typically not sexual. For<br />

instance, in the book <strong>The</strong> Catcher in the Rye, Holden Caulfield says of his brother<br />

("D.B."): "Now he's out in Hollywood, D.B., being a prostitute. If there's one thing I hate,<br />

it's the movies. Don't even mention them to me." D.B. is not literally a prostitute; Holden<br />

feels that his job writing B-movie screenplays is morally debasing.<br />

<strong>The</strong> prostitution metaphor, "traditionally used to signify political inconstancy,<br />

unreliability, fickleness, a lack of firm values and integrity, and venality, has long been a<br />

staple of Russian political rhetoric." One of the famous insults of Leon Trotsky made by<br />

Vladimir Lenin was calling him a "political prostitute". Leon Trotsky used this epithet<br />

himself, calling German Social Democracy, at that time "corrupted by Kautskianism", a<br />

"political prostitution disguised by theories".<br />

<strong>In</strong> 1938, he used the same description for the Comintern, saying that the chief aim of<br />

the Bonapartist clique of Stalin during the preceding several years "has consisted in<br />

proving to the imperialist 'democracies' its wise conservatism and love for order. For the<br />

sake of the longed alliance with imperialist democracies [Stalin] has brought the<br />

Comintern to the last stages of political prostitution."<br />

Besides targeting political figures, the term is used in relation to organizations and even<br />

small countries, which "have no choice but to sell themselves", because their voice in<br />

world affairs is insignificant. <strong>In</strong> 2007, a Russian caricature depicted the Baltic states as<br />

three "ladies of the night", "vying for the attentions of Uncle Sam, since the Russian<br />

client has run out of money".<br />

Usage of the "political prostitute" moniker is by no means unique to Russian political<br />

lexicon, such as when a Huffington Post contributor expressed the opinion that Donald<br />

Trump was "prostituting himself to feed his ego and gain power" when he ran for<br />

President of the United States.<br />

Sex work researcher and writer Gail Pheterson writes that these metaphorical usages<br />

exist because "the term "prostitute" gradually took on a Christian moralist tradition, as<br />

being synonymous with debasement of oneself or of others for the purpose of ill-gotten<br />

gains".<br />

Page 222 of 372


History<br />

Ancient Near East<br />

<strong>In</strong> the Ancient Near East along the Tigris–Euphrates river system there were many<br />

shrines and temples or "houses of heaven" dedicated to various deities documented by<br />

the Ancient Greek historian Herodotus in <strong>The</strong> Histories where sacred prostitution was a<br />

common practice. It came to an end when the emperor Constantine in the fourth century<br />

AD destroyed the goddess temples and replaced them with Christianity.<br />

As early as the 18th century BC, ancient Mesopotamia recognized the need to protect<br />

women's property rights. <strong>In</strong> the Code of Hammurabi, provisions were found that<br />

addressed inheritance rights of women, including female prostitutes.<br />

Ancient Hebrew Culture<br />

According to Zohar and the Alphabet of Ben Sira, there were four angels of sacred<br />

prostitution, who mated with archangel Samael. <strong>The</strong>y were the queens of the demons<br />

Lilith, Naamah, Agrat Bat Mahlat and Eisheth Zenunim.<br />

Page 223 of 372


Ancient Greece<br />

Both women and boys engaged in prostitution in ancient Greece. Female prostitutes<br />

could be independent and sometimes influential women. <strong>The</strong>y were required to wear<br />

distinctive dresses and had to pay taxes. Some similarities have been found between<br />

the Greek hetaera, the Japanese oiran, and also the <strong>In</strong>dian tawaif. Some prostitutes in<br />

ancient Greece, such as Lais were as famous for their company as their beauty, and<br />

some of these women charged extraordinary sums for their services.<br />

Ancient Rome<br />

Prostitution in ancient Rome was legal, public, and widespread. A registered prostitute<br />

was called a meretrix while the unregistered one fell under the broad category<br />

prostibulae. <strong>The</strong>re were some commonalities with the Greek system, but as the Empire<br />

grew, prostitutes were often foreign slaves, captured, purchased, or raised for that<br />

purpose, sometimes by large-scale "prostitute farmers" who took abandoned children.<br />

<strong>In</strong>deed, abandoned children were almost always raised as prostitutes. Enslavement into<br />

prostitution was sometimes used as a legal punishment against criminal free women.<br />

Buyers were allowed to inspect naked men and women for sale in private and there was<br />

no stigma attached to the purchase of males by a male aristocrat.<br />

Asia<br />

According to Shia Muslims, Muhammad sanctioned fixed-term marriage—muta'a in Iraq<br />

and sigheh in Iran—which has instead been used as a legitimizing cover for sex<br />

workers, in a culture where prostitution is otherwise forbidden. Sunni Muslims, who<br />

make up the majority of Muslims worldwide, believe the practice of fixed-term marriage<br />

was abrogated and ultimately forbidden by either Muhammad, or one of his successors,<br />

Umar. Sunnis regard prostitution as sinful and forbidden.<br />

<strong>In</strong> the early 17th century, there was widespread male and female prostitution throughout<br />

the cities of Kyoto, Edo, and Osaka, Japan. Oiran were courtesans in Japan during the<br />

Edo period. <strong>The</strong> oiran were considered a type of yūjo ( 遊 女 ) "woman of pleasure" or<br />

prostitute. Among the oiran, the tayū ( 太 夫 ) was considered the highest rank of<br />

courtesan available only to the wealthiest and highest ranking men. To entertain their<br />

clients, oiran practiced the arts of dance, music, poetry, and calligraphy as well as<br />

sexual services, and an educated wit was considered essential for sophisticated<br />

conversation. Many became celebrities of their times outside the pleasure districts.<br />

<strong>The</strong>ir art and fashions often set trends among wealthy women. <strong>The</strong> last recorded oiran<br />

was in 1761. Although illegal in modern Japan, the definition of prostitution does not<br />

extend to a "private agreement" reached between a woman and a man in a brothel.<br />

Yoshiwara has a large number of soaplands that began when explicit prostitution in<br />

Page 224 of 372


Japan became illegal, where women washed men's bodies. <strong>The</strong>y were originally known<br />

as toruko-buro, meaning Turkish bath.<br />

A tawaif was a courtesan who catered to the nobility of the <strong>In</strong>dian subcontinent,<br />

particularly during the era of the Mughal Empire. <strong>The</strong>se courtesans danced, sang,<br />

recited poetry and entertained their suitors at mehfils. Like the geisha tradition in Japan,<br />

their main purpose was to professionally entertain their guests, and while sex was often<br />

incidental, it was not assured contractually. High-class or the most popular tawaifs could<br />

often pick and choose between the best of their suitors. <strong>The</strong>y contributed to music,<br />

dance, theatre, film, and the Urdu literary tradition.<br />

Middle Ages<br />

Throughout the Middle Ages the<br />

definition of a prostitute has been<br />

ambiguous, with various secular<br />

and canonical organizations<br />

defining prostitution in constantly evolving terms. Even though medieval secular<br />

authorities created legislation to deal with the phenomenon of prostitution, they rarely<br />

attempted to define what a prostitute was because it was deemed unnecessary "to<br />

specify exactly who fell into that [specific] category" of a prostitute. <strong>The</strong> first known<br />

definition of prostitution was found in Marseille's thirteenth-century statutes, which<br />

included a chapter entitled De meretricibus ("regarding prostitutes"). <strong>The</strong> Marseillais<br />

designated prostitutes as "public girls" who, day and night, received two or more men in<br />

their house, and as a woman who "did business trading [their bodies], within the<br />

confine[s] of a brothel." A fourteenth-century English tract, Fasciculus Morum, states<br />

that the term prostitute (termed 'meretrix' in this document), "must be applied only to<br />

those women who give themselves to anyone and will refuse none, and that for<br />

monetary gain". <strong>In</strong> general prostitution was not typically a life-time career choice for<br />

women. Women usually alternated their career of prostitution with "petty retailing, and<br />

victualing," or only occasionally turning to prostitution in times of great financial need.<br />

Women who became prostitutes often did not have the familial ties or means to protect<br />

themselves from the lure of prostitution, and it has been recorded on several occasions<br />

that mothers would be charged with prostituting their own daughters in exchange for<br />

extra money. Medieval civilians accepted without question the fact of prostitution, it was<br />

necessary part of medieval life. Prostitutes subverted the sexual tendencies of male<br />

youth, just by existing. With the establishment of prostitution men were less likely to<br />

collectively rape honest women of marriageable and re-marriageable age. This is most<br />

clearly demonstrated in St. Augustine's claim that "the removal of the institution would<br />

bring lust into all aspects of the world." Meaning that without prostitutes to subvert male<br />

tendencies, men would go after innocent women instead, thus the prostitutes were<br />

actually doing society a favor.<br />

<strong>In</strong> urban societies there was an erroneous view that prostitution was flourishing more in<br />

rural regions rather than in cities, however it has been proven that prostitution was more<br />

rampant in cities and large towns. Although there were wandering prostitutes in rural<br />

Page 225 of 372


areas who worked according to the calendar of fairs, similar to riding a circuit, in which<br />

prostitutes stopped by various towns based on what event was going on at the time,<br />

most prostitutes remained in cities. Cities tended to draw more prostitutes due to the<br />

sheer size of the population and the institutionalization of prostitution in urban areas<br />

which made it more rampant in metropolitan regions. Furthermore, in both urban and<br />

rural areas of society, women who did not live under the rule of male authority were<br />

more likely to be suspected of prostitution than their oppressed counterparts because of<br />

the fear of women who did not fit into a stereotypical category outside of marriage or<br />

religious life. Secular law, like most other aspects of prostitution in the Middle Ages, is<br />

difficult to generalize due to the regional variations in attitudes towards prostitution. <strong>The</strong><br />

global trend of the thirteenth century was toward the development of positive policy on<br />

prostitution as laws exiling prostitutes changed towards sumptuary laws and the<br />

confinement of prostitutes to red light districts.<br />

Sumptuary laws became the regulatory norm for prostitutes and included making<br />

courtesans "wear a shoulder-knot of a particular color as a badge of their calling" to be<br />

able to easily distinguish the prostitute from a respectable woman in society. <strong>The</strong> color<br />

that designated them as prostitutes could vary from different earth tones to yellow, as<br />

was usually designated as a color of shame in the Hebrew communities. <strong>The</strong>se laws,<br />

however, proved no impediment to wealthier prostitutes because their glamorous<br />

appearances were almost indistinguishable from noble women. <strong>In</strong> the 14th century,<br />

London prostitutes were only tolerated when they wore yellow hoods.<br />

Although brothels were still present in most cities and urban centers, and could range<br />

from private bordelages run by a procuress from her home to public baths and centers<br />

established by municipal legislation, the only centers for prostitution legally allowed<br />

were the institutionalized and publicly funded brothels. However this did not prevent<br />

illegal brothels from thriving. Furthermore, brothels theoretically banned the patronage<br />

of married men and clergy also, but it was sporadically enforced and there is evidence<br />

of clergymen present in brawls that were documented in brothels. Thus the clergy were<br />

at least present in brothels at some point or another. Brothels also settled the<br />

"obsessive fear of the sharing of women" and solved the issue of "collective security."<br />

<strong>The</strong> lives of prostitutes in brothels were not cloistered like that of nuns and "only some<br />

lived permanently in the streets assigned to them." Prostitutes were only allowed to<br />

practice their trade in the brothel in which they worked. Brothels were also used to<br />

protect prostitutes and their clients through various regulations. For example, the law<br />

that "forbid brothel keepers [from] beat[ing] them." However, brothel regulations also<br />

hindered prostitutes' lives by forbidding them from having "lovers other than their<br />

customers" or from having a favored customer.<br />

Courts showed the conflicting views on the role of prostitutes in secular law as<br />

prostitutes could not inherit property, defend themselves in court, or make accusations<br />

in court. However, prostitutes were sometimes called upon as witnesses during trial.<br />

Page 226 of 372


16th–17th Centuries<br />

By the end of the 15th century attitudes seemed to have begun to harden against<br />

prostitution. An outbreak of syphilis in Naples 1494 which later swept across Europe,<br />

and which may have originated from the Columbian Exchange, and the prevalence of<br />

other sexually transmitted diseases from the earlier 13th century, may have been<br />

causes of this change in attitude. By the early 16th century the association between<br />

prostitutes, plague, and contagion emerged, causing brothels and prostitution to be<br />

outlawed by secular authority. Furthermore, outlawing brothel-keeping and prostitution<br />

was also used to "strengthen the criminal law" system of the sixteenth-century secular<br />

rulers. Canon law defined a prostitute as "a promiscuous woman, regardless of financial<br />

elements." <strong>The</strong> prostitute was considered a "whore … who [was] available for the lust of<br />

many men," and was most closely associated with promiscuity.<br />

<strong>The</strong> Church's stance on prostitution<br />

was three-fold: “acceptance of<br />

prostitution as an inevitable social<br />

fact, condemnation of those profiting<br />

from this commerce, and<br />

encouragement for the prostitute to<br />

repent." <strong>The</strong> Church was forced to<br />

recognize its inability to remove<br />

prostitution from the worldly society,<br />

and in the fourteenth century "began<br />

to tolerate prostitution as a lesser<br />

evil." However, prostitutes were to be excluded from the Church as long as they<br />

practiced.<br />

Around the twelfth century, the idea of prostitute saints took hold, with Mary Magdalene<br />

being one of the most popular saints of the era. <strong>The</strong> Church used Mary Magdalene's<br />

biblical history of being a reformed harlot to encourage prostitutes to repent and mend<br />

their ways. Simultaneously, religious houses were established with the purpose of<br />

providing asylum and encouraging the reformation of prostitution. 'Magdalene Homes'<br />

were particularly popular and peaked especially in the early fourteenth century. Over the<br />

course of the Middle Ages, popes and religious communities made various attempts to<br />

remove prostitution or reform prostitutes, with varying success.<br />

With the advent of the Protestant Reformation, numbers of Southern German towns<br />

closed their brothels in an attempt to eradicate prostitution. <strong>In</strong> some periods prostitutes<br />

had to distinguish themselves by particular signs, sometimes wearing very short hair or<br />

no hair at all, or wearing veils in societies where other women did not wear them.<br />

Ancient codes regulated in this case the crime of a prostitute that dissimulated her<br />

profession. <strong>In</strong> some cultures, prostitutes were the sole women allowed to sing in public<br />

or act in theatrical performances.<br />

Page 227 of 372


18th Century<br />

According to Dervish Ismail Agha, in the Dellâkname-i Dilküşâ, the Ottoman archives, in<br />

the Turkish baths, the masseurs were traditionally young men, who helped wash clients<br />

by soaping and scrubbing their bodies. <strong>The</strong>y also worked as sex workers. <strong>The</strong> Ottoman<br />

texts describe who they were, their prices, how many times they could bring their<br />

customers to orgasm, and the details of their sexual practices.<br />

During the British East <strong>In</strong>dia Company's rule in <strong>In</strong>dia in the late 18th and early 19th<br />

centuries, it was initially fairly common for British soldiers to engage in inter-ethnic<br />

prostitution in <strong>In</strong>dia, where they frequently visited local <strong>In</strong>dian nautch dancers. As British<br />

females began arriving in British <strong>In</strong>dia in large numbers from the early to mid-19th<br />

century, it became increasingly uncommon for British soldiers to visit <strong>In</strong>dian prostitutes,<br />

and miscegenation was despised altogether after the events of the <strong>In</strong>dian Rebellion of<br />

1857.<br />

19th Century<br />

<strong>In</strong> the 19th century, legalized prostitution became a public controversy as France and<br />

then the United Kingdom passed the Contagious Diseases Acts, legislation mandating<br />

pelvic examinations for suspected prostitutes. This legislation applied not only to the<br />

United Kingdom and France, but also to their overseas colonies. France, instead of<br />

trying to outlaw prostitution began to view prostitution as an evil necessary for society to<br />

function. France chose to regulate prostitution, introducing a Morals Brigade onto the<br />

streets of Paris. A similar situation did in fact exist in the Russian Empire; prostitutes<br />

operating out of government-sanctioned brothels were given yellow internal passports<br />

signifying their status and were subjected to weekly physical exams. A major work,<br />

Prostitution, Considered in Its Moral, Social, and Sanitary Aspects, was published by<br />

William Acton in 1857, which estimated that the County of London had 80,000<br />

prostitutes and that 1 house in 60 was serving as a brothel. Leo Tolstoy's novel<br />

Resurrection describes legal prostitution in 19th-century Russia.<br />

During this period, prostitution was also very prominent in the Barbary Coast, San<br />

Francisco as the population was mainly men, due to the influx from the Gold Rush. One<br />

of the more successful madams was Belle Cora, who inadvertently got involved in a<br />

scandal involving her husband, Charles Cora, shooting US Marshal William H.<br />

Richardson. This led to the rise of new statutes against prostitution, gambling and other<br />

activities seen as "immoral".<br />

20th century<br />

<strong>The</strong> leading theorists of Communism opposed prostitution. Communist governments<br />

often attempted to repress the practice immediately after obtaining power, although it<br />

always persisted. <strong>In</strong> contemporary Communist countries, it remains illegal but is<br />

nonetheless common. <strong>The</strong> economic decline brought about by the collapse of the<br />

Page 228 of 372


Soviet Union led to increased prostitution in many current or former Communist<br />

countries.<br />

Originally, prostitution was widely legal in the United States. Prostitution was made<br />

illegal in almost all states between 1910 and 1915 largely due to the influence of the<br />

Woman's Christian Temperance Union. On the other hand, prostitution generated much<br />

national revenue in South Korea, hence the military government encouraged prostitution<br />

for the U.S. military.<br />

<strong>In</strong> 1956, the United Kingdom introduced the Sexual Offences Act 1956. While this law<br />

did not criminalize the act of prostitution in the United Kingdom itself, it prohibited such<br />

activities as running a brothel.<br />

Soliciting was made illegal by the Street Offences Act 1959. <strong>The</strong>se laws were partly<br />

repealed, and altered, by the Sexual Offences Act 2003 and the Policing and <strong>Crime</strong> Act<br />

2009.<br />

Beginning in the late 1980s, many states in the US increased the penalties for<br />

prostitution in cases where the prostitute is knowingly HIV-positive. Penalties for felony<br />

prostitution vary, with maximum sentences of typically 10 to 15 years in prison.<br />

Sex tourism emerged in the late 20th century as a controversial aspect of Western<br />

tourism and globalization.<br />

Page 229 of 372


21st Century<br />

<strong>In</strong> the 21st century, Afghans revived a method of prostituting young boys which is<br />

referred to as "bacha bazi".<br />

Since the break up of the Soviet Union, thousands of eastern European women end up<br />

as prostitutes in China, Western Europe, Israel, and Turkey every year; some enter the<br />

profession willingly, but many are tricked, coerced, or kidnapped, and often experience<br />

captivity and violence. <strong>The</strong>re are tens of thousands of women from eastern Europe and<br />

Asia working as prostitutes in Dubai. Men from Saudi Arabia and the United Arab<br />

Emirates form a large proportion of the customers.<br />

<strong>In</strong>dia's devadasi girls are forced by their poor families to dedicate themselves to the<br />

Hindu goddess Renuka. <strong>The</strong> BBC wrote in 2007 that devadasis are "sanctified<br />

prostitutes".<br />

Historically, and currently, church prostitutes exist, and the practice may be legal or<br />

illegal, depending on the country, state or province.<br />

Islam<br />

According to Shia Muslims, Muhammad sanctioned Nikah mut‘ah (fixed-term marriage,<br />

called muta'a in Iraq and sigheh in Iran) which has instead been used as a legitimizing<br />

cover for sex workers, in a culture where prostitution is otherwise forbidden. Some<br />

Western writers have argued that mut'ah approximates prostitution. and Nikah misyar<br />

Julie Parshall writes that mut'ah is legalised prostitution which has been sanctioned by<br />

the Twelver Shia authorities. She quotes the Oxford encyclopedia of modern Islamic<br />

world to differentiate between marriage (nikah) and Mut'ah, and states that while nikah<br />

is for procreation, mut'ah is just for sexual gratification. According to Zeyno Baran, this<br />

kind of temporary marriage provides Shi'ite men with a religiously sanctioned equivalent<br />

to prostitution. According to Elena Andreeva's observation published in 2007, Russian<br />

travellers to Iran consider mut'ah to be "legalized profligacy" which is indistinguishable<br />

from prostitution. Religious supporters of mut'ah argue that temporary marriage is<br />

different from prostitution for a couple of reasons, including the necessity of iddah in<br />

case the couple have sexual intercourse. It means that if a woman marries a man in this<br />

way and has sex, she has to wait for a number of months before marrying again and<br />

therefore, a woman cannot marry more than 3 or 4 times in a year.<br />

Payments and Salaries<br />

Prostitutes' salaries and payments fluctuate according to the economic conditions of<br />

their respective countries. Prostitutes who usually have foreign clients, such as<br />

business travelers, depend on good foreign economic conditions. Payment may vary<br />

according to regulations made by pimps, brothel keepers, madams, and procurers, who<br />

usually take a slice out of a prostitute's income. Prices may further depend on demand;<br />

Page 230 of 372


popular, high-end prostitutes can earn significant amounts of money (upwards of $5,000<br />

per client), and virgins may receive even higher payments.<br />

Attitudes<br />

Laws<br />

Roughly speaking, the possible attitudes are:<br />

<br />

"Prostitution should be tolerated by society":<br />

o<br />

Decriminalization: "prostitution is labor like any other. Sex industry<br />

premises should not be subject to any special regulation or laws", the<br />

current situation in <strong>New</strong> Zealand; the laws against operating a brothel,<br />

pimping and street prostitution are struck down, but prostitution is hardly<br />

regulated at all. Proponents of this view often cite instances of government<br />

regulation under legalization that they consider intrusive, demeaning, or<br />

violent, but feel that criminalization adversely affects sex workers.<br />

Amnesty <strong>In</strong>ternational is one of the notable groups calling for the<br />

decriminalization of prostitution.<br />

o<br />

Regulation: prostitution may be considered a legitimate business;<br />

prostitution and the employment of prostitutes are legal, but regulated; the<br />

current situation in the Netherlands, Germany, most of Australia and parts<br />

of Nevada (see Prostitution in Nevada). <strong>The</strong> degree of regulation varies<br />

very much; for example, in the Netherlands, prostitutes are not required to<br />

undergo mandatory health checks (see Prostitution in the Netherlands),<br />

Page 231 of 372


while in Nevada, the regulations are very strict (see Prostitution in<br />

Nevada)<br />

<br />

"Prostitution should not be tolerated":<br />

o<br />

o<br />

o<br />

Abolitionism (prostitution itself is not prohibited, but most associated<br />

activities are illegal, in an attempt to make it more difficult to engage in<br />

prostitution, prostitution is heavily discouraged and seen as a social<br />

problem): prostitution (the exchange of sexual services for money) is legal,<br />

but the surrounding activities such as public solicitation, operating a<br />

brothel and other forms of pimping are prohibited, the current situation in<br />

Great Britain and Italy among others;<br />

Neo-Abolitionism ("prostitution is a form of violence against women, it is<br />

a violation of human rights, the clients of the prostitutes exploit the<br />

prostitutes"): prostitutes are not prosecuted, but their clients and pimps<br />

are, which is the current situation in Sweden, France, Norway and Iceland<br />

(in Norway the law is even more strict, forbidding also having sex with a<br />

prostitute abroad).<br />

Prohibitionism (both prostitutes and clients are criminalized and are seen<br />

as immoral, they are considered criminals): the prevailing attitude nearly<br />

everywhere in the United States, with a few exceptions in some rural<br />

Nevada counties (see Prostitution in Nevada)<br />

<strong>In</strong> some countries, there is controversy regarding the laws applicable to sex work. For<br />

instance, the legal stance of punishing pimping while keeping sex work legal but<br />

"underground" and risky is often denounced as hypocritical; opponents suggest either<br />

going the full abolition route and criminalize clients or making sex work a regulated<br />

business.<br />

Many countries have sex worker advocacy groups which lobby against criminalization<br />

and discrimination of prostitutes. <strong>The</strong>se groups generally oppose Nevada-style<br />

regulation and oversight, stating that prostitution should be treated like other<br />

professions. <strong>In</strong> the United States of America, one such group is COYOTE (an<br />

abbreviation for "Call Off Your Old Tired Ethics") and another is the North American<br />

Task Force on Prostitution. <strong>In</strong> Australia the lead sex worker rights organization is<br />

Scarlet Alliance. <strong>In</strong>ternational prostitutes' rights organizations include the <strong>In</strong>ternational<br />

Committee for Prostitutes' Rights and the Network of Sex Work Projects.<br />

Other groups, often with religious backgrounds, focus on offering women a way out of<br />

the world of prostitution while not taking a position on the legal question.<br />

Prostitution is a significant issue in feminist thought and activism. Many feminists are<br />

opposed to prostitution, which they see as a form of exploitation of women and male<br />

dominance over women, and as a practice which is the result of the existing patriarchal<br />

Page 232 of 372


societal order. <strong>The</strong>se feminists argue that prostitution has a very negative effect, both<br />

on the prostitutes themselves and on society as a whole, as it reinforces stereotypical<br />

views about women, who are seen as sex objects which can be used and abused by<br />

men. Other feminists hold that prostitution can be a valid choice for the women who<br />

choose to engage in it; in this view, prostitution must be differentiated from forced<br />

prostitution, and feminists should support sex worker activism against abuses by both<br />

the sex industry and the legal system.<br />

<strong>In</strong> February 2014, the members of the European Parliament voted in a non-binding<br />

resolution, (adopted by 343 votes to 139; with 105 abstentions), in favor of the 'Swedish<br />

Model' of criminalizing the buying, but not the selling of sex.<br />

Legality<br />

<strong>The</strong> position of prostitution and the law varies widely worldwide, reflecting differing<br />

opinions on victimhood and exploitation, inequality, gender roles, gender equality, ethics<br />

and morality, freedom of choice, historical social norms, and social costs and benefits.<br />

Legal themes tend to address four types of issue: victimhood (including potential<br />

victimhood), ethics and morality, freedom of choice, and general benefit or harm to<br />

society (including harm arising indirectly from matters connected to prostitution).<br />

Prostitution may be considered a form of exploitation (e.g., Sweden, Norway, Iceland,<br />

where it is illegal to buy sexual services, but not to sell them — the client commits a<br />

crime, but not the prostitute), a legitimate occupation (e.g., Netherlands, Germany,<br />

where prostitution is regulated as a profession) or a crime (e.g., many Muslim countries,<br />

where the prostitutes face severe penalties).<br />

Page 233 of 372


<strong>The</strong> legal status of prostitution varies from country to country, from being legal and<br />

considered a profession to being punishable by death. Some jurisdictions outlaw the act<br />

of prostitution (the exchange of sexual services for money); other countries do not<br />

prohibit prostitution itself, but ban the activities typically associated with it (soliciting in a<br />

public place, operating a brothel, pimping etc.), making it difficult to engage in<br />

prostitution without breaking any law; and in a few countries prostitution is legal and<br />

regulated.<br />

<strong>In</strong> 1949, the UN General Assembly adopted a convention stating that "prostitution and<br />

the accompanying evil of the traffic in persons for the purpose of prostitution are<br />

incompatible with the dignity and worth of the human person", requiring all signing<br />

parties to punish pimps and brothel owners and operators and to abolish all special<br />

treatment or registration of prostitutes. As of January 2009, the convention was ratified<br />

by 95 member nations including France, Spain, Italy, Denmark, and not ratified by<br />

another 97 member nations including Germany, the Netherlands, the United Kingdom<br />

and the United States.<br />

Advertising<br />

<strong>In</strong> countries where prostitution is legal, advertising it may be legal (as in the<br />

Netherlands) or illegal (as in <strong>In</strong>dia). Covert advertising for prostitution can take a<br />

number of forms:<br />

<br />

<br />

<br />

<br />

<br />

by cards in newsagents' windows<br />

by cards placed in public telephone enclosures: so-called tart cards<br />

by euphemistic advertisements in regular magazines and newspapers (for<br />

instance, talking of "massages" or "relaxation")<br />

in specialist contact magazines<br />

via the <strong>In</strong>ternet<br />

<strong>In</strong> the United States, massage parlors serving as a cover for prostitution may advertise<br />

"full service", a euphemism for coitus.<br />

<strong>In</strong> Las Vegas, prostitution is often promoted overtly on the Las Vegas Strip by third party<br />

workers distributing risque flyers with the pictures and phone numbers of escorts<br />

(despite the fact that prostitution is illegal in Las Vegas and Clark County, see<br />

Prostitution in Nevada).<br />

<strong>The</strong> way in which prostitutes advertise their presence varies widely. Some remain in<br />

apartments which have hints or clues outside such as posters with "model" written on<br />

them to lure potential customers inside. Others advertise by putting numbers or location<br />

in phoneboxes or in online or newspaper ads. <strong>In</strong> more sexually permissive societies,<br />

prostitutes can advertise in public view, such as through display windows. <strong>In</strong> sexually<br />

restrictive societies it may occur through word-of-mouth and other means.<br />

Page 234 of 372


Socio-Economic Issues<br />

Illegal Immigration<br />

A difficulty facing migrant prostitutes in many developed countries is the illegal<br />

residence status of some of these women. <strong>The</strong>y face potential deportation, and so do<br />

not have recourse to the law. Hence there are brothels that may not adhere to the usual<br />

legal standards intended to safeguard public health and the safety of the workers.<br />

<strong>The</strong> immigration status of the persons who sell sexual services is – particularly in<br />

Western Europe – a controversial and highly debated political issue. Currently, in most<br />

of these countries most prostitutes are immigrants, mainly from Eastern and Central<br />

Europe; in Spain and Italy 90% of prostitutes are estimated to be migrants, in Austria<br />

78%, in Switzerland 75%, in Greece 73%, in Norway 70% (according to a 2009<br />

TAMPEP report, Sex Work in Europe-A mapping of the prostitution scene in 25<br />

European countries). An article in Le Monde diplomatique in 1997 stated that 80% of<br />

prostitutes in Amsterdam were foreigners and 70% had no immigration papers.<br />

Survival Sex<br />

Survival sex is when the prostitute is driven to prostitution by a need for basic<br />

necessities such as food or shelter. This type of prostitution is common among the<br />

homeless and in refugee camps. <strong>The</strong> term is used in the sex trade and by aid workers,<br />

although some practitioners do not regard the act as exploitative.<br />

Page 235 of 372


Use of Children<br />

Regarding the prostitution of children the laws on prostitution as well as those on sex<br />

with a child apply. If prostitution in general is legal there is usually a minimum age<br />

requirement for legal prostitution that is higher than the general age of consent (see<br />

above for some examples). Although some countries do not single out patronage of<br />

child prostitution as a separate crime, the same act is punishable as sex with an<br />

underage person.<br />

<strong>In</strong> <strong>In</strong>dia, the federal police say that around 1.2 million children are believed to be<br />

involved in prostitution. A CBI statement said that studies and surveys sponsored by the<br />

ministry of women and child development estimated that about 40% of all <strong>In</strong>dia's<br />

prostitutes are children.<br />

<strong>In</strong> Bangladesh, child prostitutes are known to take the drug Oradexon, also known as<br />

dexamethasone. This over-the-counter steroid, usually used by farmers to fatten cattle,<br />

makes child prostitutes look larger and older. Charities say that 90% of prostitutes in the<br />

country's legalized brothels use the drug. According to social activists, the steroid can<br />

cause diabetes, high blood pressure and is highly addictive.<br />

Thailand's Health System Research <strong>In</strong>stitute reported that children in prostitution make<br />

up 40% of prostitutes in Thailand.<br />

Some adults travel to other countries to have access to sex with children, which is<br />

unavailable in their home country. Cambodia has become a notorious destination for<br />

sex with children. Thailand is also a destination for child sex tourism. Several western<br />

countries have recently enacted laws with extraterritorial reach, punishing citizens who<br />

engage in sex with minors in other countries. As the crime usually goes undiscovered,<br />

these laws are rarely enforced.<br />

Among the Elderly<br />

Prostitution among the elderly is a phenomenon reported in South Korea where elderly<br />

people turn to prostitution to pay their bills. This problem comes about because the<br />

state does not provide enough income for necessities. Clients in Korea tend also to be<br />

elderly.<br />

Violence<br />

Street prostitutes are at higher risk of violent crime than brothel prostitutes and bar<br />

prostitutes.<br />

<strong>In</strong> the United States, the homicide rate for female prostitutes was estimated to be 204<br />

per 100,000. <strong>The</strong>re are substantial differences in rates of victimization between street<br />

prostitutes and indoor prostitutes who work as escorts, call girls, or in brothels and<br />

massage parlors. Violence against male prostitutes is less common.<br />

Page 236 of 372


Prostitution may sometimes be associated with illegal, abusive, and dangerous<br />

activities. One view maintains that this results from prostitution being stigmatized or<br />

illegal, or both. Another, however, believes that legalizing and regulating prostitution<br />

does not improve the situation, but instead makes it worse, creating a parallel illegal<br />

prostitution industry, and failing to dissociate the legal part of the sex trade from crime.<br />

Human trafficking<br />

Sex trafficking is defined as using coercion or force to transport an unwilling person into<br />

prostitution or other sexual exploitation. <strong>The</strong> United Nations stated in 2009 that sex<br />

trafficking is the most commonly identified form of human trafficking and estimates that<br />

about 79% of human trafficking reported is for prostitution (although the study notes that<br />

this may be the result of statistical bias and that sex trafficking tends to receive the most<br />

attention and be the most visible). Sex trafficking has been described by Kul Gautum,<br />

Deputy Executive Director of UNICEF, as "the largest slave trade in history." It is also<br />

the fastest growing criminal industry, predicted to outgrow drug trafficking. While there<br />

may be a higher number of people involved in slavery today than at any time in history,<br />

the proportion of the population is probably the smallest in history.<br />

Page 237 of 372


“Annually, according to U.S. Government-sponsored research completed in 2006,<br />

approximately 800,000 people are trafficked across national borders, which does not<br />

include millions trafficked within their own countries. Approximately 80 percent of<br />

transnational victims are women and girls and up to 50 percent are minors," estimated<br />

the US Department of State in a 2008 study, in reference to the number of people<br />

estimated to be victims of all forms of human trafficking. Due in part to the illegal and<br />

underground nature of sex trafficking, the actual extent of women and children forced<br />

into prostitution is unknown. A statistical analysis of various measures of trafficking<br />

found that the legal status of prostitution did not have a significant impact on trafficking.<br />

Children are sold into the global sex trade every year. Often they are kidnapped or<br />

orphaned, and sometimes they are sold by their own families. According to the<br />

<strong>In</strong>ternational Labor Organization, the occurrence is especially common in places such<br />

as Thailand, the Philippines, Sri Lanka, Vietnam, Cambodia, Nepal and <strong>In</strong>dia.<br />

Globally, forced labor generates an estimated $31 billion, about half of it in the<br />

industrialized world and around one tenth in transitional countries, according to the<br />

<strong>In</strong>ternational Labor Organization in a report on forced labor ("A global alliance against<br />

forced labor", ILO, 11 May 2005). Trafficking in people has been facilitated by factors<br />

such as porous borders and advanced communication technologies, and has become<br />

increasingly transnational in scope and highly financially lucrative.<br />

<strong>The</strong> most common destinations for victims of human trafficking are Thailand, Japan,<br />

Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the US, according to a<br />

report by the UNODC (UN Office on Drugs and <strong>Crime</strong>).<br />

Major sources of trafficked persons include Thailand, China, Nigeria, Albania, Bulgaria,<br />

Belarus, Moldova and Ukraine.<br />

Illicit Uses<br />

Prostitution, often when it is illegal, is used in extortion and blackmail, which always<br />

involves extortion, where the extortionist threatens to reveal information about a victim<br />

or their family members that is potentially embarrassing, socially damaging, or<br />

incriminating unless a demand for money, property, or services is met.<br />

<strong>The</strong> subject of the extortion may be manipulated into or voluntarily solicit the use of<br />

prostitution which is then later used to extort money or for profit otherwise. <strong>The</strong> film <strong>The</strong><br />

Godfather Part II famously depicts the role of Senator Geary who is implicated in the<br />

use of prostitution in order to gain his compliance on political issues.<br />

Page 238 of 372


Types<br />

Street<br />

<strong>In</strong> street prostitution, the prostitute solicits customers while waiting at street corners,<br />

sometimes called "the track" by pimps and prostitutes alike. <strong>The</strong>y usually dress in<br />

skimpy, provocative clothing, regardless of the weather. Street prostitutes are often<br />

called "streetwalkers" while their customers are referred to as "tricks" or "johns."<br />

Servicing the customers is described as "turning tricks." <strong>The</strong> sex is usually performed in<br />

the customer's car, in a nearby alley, or in a rented room. Motels and hotels that<br />

accommodate prostitutes commonly rent rooms by the half or full hour.<br />

<strong>In</strong> Russia and other countries of the former USSR, prostitution takes the form of an<br />

open-air market. One prostitute stands by a roadside, and directs cars to a so-called<br />

"tochka" (usually located in alleyways or carparks), where lines of women are paraded<br />

for customers in front of their car headlights. <strong>The</strong> client selects a prostitute, whom he<br />

takes away in his car. Prevalent in the late 1990s, this type of service has been steadily<br />

declining in recent years.<br />

A "lot lizard" is a commonly encountered special case of street prostitution. Lot lizards<br />

mainly serve those in the trucking industry at truck stops and stopping centers.<br />

Prostitutes will often proposition truckers using a CB radio from a vehicle parked in the<br />

Page 239 of 372


non-commercial section of a truck stop parking lot, communicating through codes based<br />

on commercial driving slang, then join the driver in his truck.<br />

Brothels<br />

Brothels are establishments specifically dedicated to prostitution, often confined to<br />

special red-light districts in big cities. Other names for brothels include bordello,<br />

whorehouse, cathouse, knocking shop, and general houses. Prostitution also occurs in<br />

some massage parlors, and in Asian countries in some barber shops where sexual<br />

services may be offered as a secondary function of the premises.<br />

Escorts<br />

Escort services may be distinguished from prostitution or other forms of prostitution in<br />

that sexual activities are often not explicitly advertised as necessarily included in these<br />

services; rather, payment is often noted as being for an escort's time and<br />

companionship only, although there is often an implicit assumption that sexual activities<br />

are expected.<br />

<strong>In</strong> escort prostitution, the act takes place at the customer's residence or hotel room<br />

(referred to as out-call), or at the escort's residence or in a hotel room rented for the<br />

occasion by the escort (called in-call). <strong>The</strong> prostitute may be independent or working<br />

under the auspices of an escort agency. Services may be advertised over the <strong>In</strong>ternet,<br />

in regional publications, or in local telephone listings.<br />

Use of the <strong>In</strong>ternet by prostitutes and customers is common. A prostitute may use adult<br />

boards or create a website of their own with contact details, such as email addresses.<br />

Adult contact sites, chats and on-line communities are also used. This, in turn, has<br />

brought increased scrutiny from law enforcement, public officials, and activist groups<br />

toward online prostitution. <strong>In</strong> 2009, Craigslist came under fire for its role in facilitating<br />

online prostitution, and was sued by some 40 US state attorneys general, local<br />

prosecutors, and law enforcement officials.<br />

Reviews of the services of individual prostitutes can often be found at various escort<br />

review boards worldwide. <strong>The</strong>se online forums are used to trade information between<br />

potential clients, and also by prostitutes to advertise the various services available. Sex<br />

workers, in turn, often use online forums of their own to exchange information on clients,<br />

particularly to warn others about dangerous clients.<br />

Sex Tourism<br />

Sex tourism is travel for sexual intercourse with prostitutes or to engage in other sexual<br />

activity. <strong>The</strong> World Tourism Organization, a specialized agency of the United Nations<br />

defines sex tourism as "trips organized from within the tourism sector, or from outside<br />

this sector but using its structures and networks, with the primary purpose of effecting a<br />

commercial sexual relationship by the tourist with residents at the destination".<br />

Page 240 of 372


As opposed to regular sex tourism, which is often legal, a tourist who has sex with a<br />

child prostitute will usually be committing a crime in the host country, under the laws of<br />

his own country (notwithstanding him being outside of it) and against international law.<br />

Child sex tourism (CST) is defined as a travel to a foreign country for the purpose of<br />

engaging in commercially facilitated child sexual abuse. Thailand, Cambodia, <strong>In</strong>dia,<br />

Brazil, and Mexico have been identified as leading hotspots of child sexual exploitation.<br />

Virtual Sex<br />

Virtual sex, that is, sexual acts conveyed by messages rather than physically, is also the<br />

subject of commercial transactions. Commercial phone sex services have been<br />

available for decades. <strong>The</strong> advent of the <strong>In</strong>ternet has made other forms of virtual sex<br />

available for money, including computer-mediated cybersex, in which sexual services<br />

are provided in text form by way of chat rooms or instant messaging, or audiovisually<br />

through a webcam (see camgirl).<br />

Prevalence<br />

According to the paper "Estimating the prevalence and career longevity of prostitute<br />

women", the number of full-time equivalent prostitutes in a typical area in the United<br />

States (Colorado Springs, CO, during 1970–1988) is estimated at 23 per 100,000<br />

Page 241 of 372


population (0.023%), of which some 4% were under 18. <strong>The</strong> length of these prostitutes'<br />

working careers was estimated at a mean of 5 years. According to a 2012 report by<br />

Fondation Scelles there are between 40 and 42 million prostitutes in the world.<br />

<strong>In</strong> 2003, it was estimated that in Amsterdam, one woman in 35 was working as a<br />

prostitute, compared to one in 300 in London.<br />

<strong>The</strong> number of men who have used a prostitute at least once varies widely from country<br />

to country, from an estimated low of between 7% and 8.8% in the United Kingdom, to a<br />

high of between 59% and 80% in Cambodia. A study conducted by ProCon – a<br />

nonpartisan nonprofit organization – estimated the percentage of men who had paid for<br />

sex at least once in their lives, and found the highest rates in Cambodia (between 59<br />

and 80% of men had paid for sex at least once) and Thailand (an estimated 75%),<br />

followed by Italy (16.7–45%), Spain (27–39%), Japan (37%), the Netherlands (13.5–<br />

21.6%), the United States (15.0–20.0%), and China (6.4-20%). Nations with higher<br />

rates of prostitution clients, or “johns”, display much more positive attitudes towards<br />

commercial sex. <strong>In</strong> some countries, such as Cambodia and Thailand, sex with<br />

prostitutes is considered commonplace and men who do not engage in commercial sex<br />

may be considered unusual by their peers. <strong>In</strong> Thailand, it has been reported that about<br />

75% of men have visited a prostitute at least once in their lifetimes. <strong>In</strong> Cambodia, that<br />

figure is 59% to 80%.<br />

<strong>In</strong> the United States, a 2004 TNS poll reported 15% of all men admitted to having paid<br />

for sex at least once in their life. However, a paper entitled "Prostitution and the sex<br />

discrepancy in reported number of sexual partners" concluded that men's self-reporting<br />

of prostitutes as sexual partners provides a serious underestimate.<br />

<strong>In</strong> Australia, a survey conducted in the early 2000s showed that 15.6% of men aged 16–<br />

59 reported paying for sex at least once in their life, and 1.9% had done so in the past<br />

year.<br />

Reports disagree on whether prostitution levels are growing or declining in developed<br />

countries. Some studies indicate that the percentage of men engaging in commercial<br />

sex in the United States has declined significantly in recent decades: in 1964, an<br />

estimated 69–80% of men had paid for sex at least once. Some have suggested that<br />

prostitution levels have fallen in sexually liberal countries, most likely because of the<br />

increased availability of non-commercial, non-marital sex or, for example in Sweden,<br />

because of stricter legal penalties. Other reports suggest a growth in prostitution levels,<br />

for example in the US, where again, sexual liberalization is suggested as the cause. As<br />

Norma Ramos, Executive Director of the Coalition Against Trafficking in Women says<br />

"<strong>The</strong> more the commercial sex industry normalizes this behavior, the more of this<br />

behavior you get".<br />

Prostitutes have long plied their trades to the military in many cultures. For example, the<br />

British naval port of Portsmouth had a flourishing local sex industry in the 19th century,<br />

and until the early 1990s there were large red-light districts near American military<br />

Page 242 of 372


ases in the Philippines. <strong>The</strong> notorious Patpong entertainment district in Bangkok,<br />

Thailand, started as an R&R location for US troops serving in the Vietnam War in the<br />

early 1970s. Washington D.C. itself had Murder Bay which attracted the military of the<br />

Civil War. <strong>The</strong> village of Vadia, <strong>In</strong>dia is known locally as the village of prostitutes, where<br />

unmarried women are involved in prostitution. Mass weddings for children of prostitutes<br />

in the village are held to protect them from being pushed into prostitution.<br />

Medical Situation<br />

<strong>In</strong> some places, prostitution may be associated with the spread of sexually transmitted<br />

diseases (STDs). Lack of condom use among prostitutes and their clients has been<br />

cited as a factor in the spread of HIV in Asia: "One of the main reasons for the rapid<br />

spread of HIV in Asian countries is the massive transmission among sex workers and<br />

clients". As a result, prevention campaigns aimed at increasing condom use by sex<br />

workers have been attributed to play a major role in restricting the spread of HIV.<br />

One of the sources for the spread of HIV in Africa is prostitution, with one study finding<br />

that encounters with prostitutes produced 84% of new HIV infections in adult males in<br />

Accra, Ghana. <strong>The</strong> spread of HIV from urban settings to rural areas in Africa has been<br />

attributed to the mobility of farmers who visit sex workers in cities, for example in<br />

Ethiopia. Some studies of prostitution in urban settings in developing countries, such as<br />

Page 243 of 372


Kenya, have stated that prostitution acts as a reservoir of STDs within the general<br />

population.<br />

Typical responses to the problem are:<br />

<br />

<br />

<br />

banning prostitution completely<br />

introducing a system of registration for prostitutes that mandates health checks<br />

and other public health measures<br />

educating prostitutes and their clients to encourage the use of barrier<br />

contraception and greater interaction with health care<br />

Some think that the first two measures are counter-productive. Banning prostitution<br />

tends to drive it underground, making safe sex promotion, treatment and monitoring<br />

more difficult. Registering prostitutes makes the state complicit in prostitution and does<br />

not address the health risks of unregistered prostitutes. Both of the last two measures<br />

can be viewed as harm reduction policies.<br />

<strong>In</strong> countries and areas where safer sex precautions are either unavailable or not<br />

practiced for cultural reasons, prostitution is an active disease vector for all STDs,<br />

including HIV/AIDS, but the encouragement of safer sex practices, combined with<br />

regular testing for sexually transmitted diseases, has been very successful when<br />

applied consistently. As an example, Thailand's condom program has been largely<br />

responsible for the country's progress against the HIV epidemic. It has been estimated<br />

that successful implementation of safe sex practices in <strong>In</strong>dia "would drive the [HIV]<br />

epidemic to extinction" while similar measures could achieve a 50% reduction in<br />

Botswana. <strong>In</strong> 2009, UN Secretary-General Ban Ki-moon urged all countries to remove<br />

bans on prostitution and homosexual sex, because "such laws constitute major barriers<br />

to reaching key populations with HIV services". <strong>In</strong> 2012, the Global Commission on HIV<br />

and the Law, which was convened by Ban Ki-moon, and which is an independent body,<br />

established at the request of the UNAIDS, and supported by a Secretariat based at the<br />

UNDP, reached the same conclusions, also recommending decriminalization of brothels<br />

and procuring. Nevertheless, the report states that: "<strong>The</strong> content, analysis, opinions and<br />

policy recommendations contained in this publication do not necessarily reflect the<br />

views of the United Nations Development Program."<br />

Page 244 of 372


XVI. Racketeering<br />

A Racket is an organized criminal act, usually in which the criminal act is a form of<br />

business or a way to earn illegal money regularly or briefly but repeatedly. A racket is<br />

often a repeated or continuous criminal operation. Originally and often still specifically, a<br />

racket was a criminal act in which the perpetrator or perpetrators fraudulently offer a<br />

service to solve a nonexistent problem, a service that will not be put into effect, or a<br />

service that would not exist without the racket. Conducting a racket is racketeering.<br />

Particularly, the potential problem may be caused by the same party that offers to solve<br />

it, but that fact may be concealed, with the specific intent to engender continual<br />

patronage for this party.<br />

<strong>The</strong> most common example of a racket is the "protection racket", which promises to<br />

protect the target business or person from dangerous individuals in the neighborhood<br />

and then either collects the money or causes damage to the business until the owner<br />

pays. <strong>The</strong> racket exists as both the problem and its solution, and it is used as a method<br />

of extortion.<br />

However, the term "racket" has expanded in definition and may be used less strictly to<br />

refer to any illegal organized crime operation, including those that do not necessarily<br />

involve fraudulent practices. For example, "racket" may be used to refer to the "numbers<br />

Page 245 of 372


acket" or the "drug racket", neither of which generally or explicitly involve fraud or<br />

deception with regard to the intended clientele.<br />

Racketeering is most often associated with organized crime, and the term was coined<br />

by the Employers' Association of Chicago in June 1927 in a statement about the<br />

influence of organized crime in the Teamsters union.<br />

Examples<br />

Examples of crimes that may be alleged to be part of a pattern of racketeering activity<br />

include<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

A protection racket is a form of extortion whereby racketeers offer to "protect"<br />

property from damage in exchange for a fee, while also being responsible, in part<br />

or in whole, for the property damage.<br />

A fencing racket is an operation specializing in the resale of stolen goods.<br />

A numbers racket is any unauthorized lottery or illegal gambling operation.<br />

Money laundering and other creative accounting practices that are misused in<br />

ways to disguise sources of illegal funds.<br />

<strong>The</strong>ft operations, including: burglary, home invasion, robbery, identity theft, auto<br />

theft, art theft, car hijacking, truck hijacking, organized retail crime, shoplifting,<br />

and copyright infringement (including the sale of counterfeit goods)<br />

Fraud and embezzlement operations, including: credit card fraud, check fraud,<br />

health care fraud, insurance fraud, mail and wire fraud, securities fraud, bank<br />

fraud, mortgage fraud, skimming (fraud), electoral fraud, confidence tricks, and<br />

bid rigging<br />

Kidnapping<br />

Murder and murder-for-hire<br />

Bribery and police corruption<br />

<strong>Organized</strong> academic dishonesty by school administrators<br />

Loan sharking<br />

Computer crimes<br />

Drug trafficking<br />

Arms trafficking<br />

Extortion<br />

Prostitution and commercial sexual exploitation of children<br />

Human trafficking<br />

People smuggling<br />

Tax evasion and cigarette smuggling<br />

Witness tampering and intimidation<br />

Skimming (casinos)<br />

Operating chop shops<br />

Illegal gambling or bookmaking, including match fixing<br />

Criminal operation of otherwise ostensibly legal operations, such as strip clubs,<br />

casinos, and waste management firms<br />

Poaching, overfishing, illegal logging, illegal construction, and illegal mining<br />

Page 246 of 372


Dog fighting, cockfighting, and bullfighting<br />

RICO Act<br />

On October 15, 1970, the Racketeer <strong>In</strong>fluenced and Corrupt Organizations Act (18<br />

U.S.C. §§ 1961–1968), commonly referred to as the "RICO Act", became United States<br />

law. <strong>The</strong> RICO Act allowed law enforcement to charge a person or group of people with<br />

racketeering, defined as committing multiple violations of certain varieties within a tenyear<br />

period. <strong>The</strong> purpose of the RICO Act was stated as "the elimination of the<br />

infiltration of organized crime and racketeering into legitimate organizations operating in<br />

interstate commerce". S.Rep. No. 617, 91st Cong., 1st Sess. 76 (1968). However, the<br />

statute is sufficiently broad to encompass illegal activities relating to any enterprise<br />

affecting interstate or foreign commerce.<br />

Section 1961(10) of Title 18 provides that the Attorney General of the United States<br />

may designate any department or agency to conduct investigations authorized by the<br />

RICO statute and such department or agency may use the investigative provisions of<br />

the statute or the investigative power of such department or agency otherwise conferred<br />

by law. Absent a specific designation by the Attorney General, jurisdiction to conduct<br />

investigations for violations of 18 U.S.C. § 1962 lies with the agency having jurisdiction<br />

over the violations constituting the pattern of racketeering activity listed in 18 U.S.C. §<br />

1961.<br />

Page 247 of 372


<strong>In</strong> the US, civil racketeering laws are also used in federal and state courts.<br />

Page 248 of 372


XVII. Terrorism<br />

Terrorism is, in the broadest sense, the use of intentionally indiscriminate violence as a<br />

means to create terror among masses of people; or fear to achieve a religious or<br />

political aim. It is used in this regard primarily to refer to violence during peacetime or in<br />

war against non-combatants. <strong>The</strong> terms "terrorist" and "terrorism" originated during the<br />

French Revolution of the late 18th century but gained mainstream popularity in the<br />

1970s in news reports and books covering the conflicts in Northern Ireland, the Basque<br />

Country and Palestine. <strong>The</strong> increased use of suicide attacks from the 1980s onwards<br />

was typified by the September 11 attacks in <strong>New</strong> York City and Washington, D.C. in<br />

2001.<br />

<strong>The</strong>re is no commonly accepted definition of "terrorism". Terrorism is a charged term. It<br />

is often used with the connotation of something that is "morally wrong". Governments<br />

and non-state groups use the term to abuse or denounce opposing groups.<br />

Varied political organizations have been accused of using terrorism to achieve their<br />

objectives. <strong>The</strong>se organizations include right-wing and left-wing political organizations,<br />

nationalist groups, religious groups, revolutionaries and ruling governments. Legislation<br />

declaring terrorism a crime has been adopted in many states. <strong>The</strong>re is no consensus as<br />

to whether or not terrorism should be regarded as a war crime.<br />

<strong>The</strong> Global Terrorism Database, maintained by the University of Maryland, College<br />

Park, has recorded more than 61,000 incidents of non-state terrorism, resulting in at<br />

least 140,000 deaths between 2000 and 2014.<br />

Page 249 of 372


Etymology<br />

Etmologically, the word terror is derived from the Latin verb Tersere, which later<br />

becomes Terrere. <strong>The</strong> latter form appears in European languages as early as the 12th<br />

century; its first known use in French is the word terrible in 1160. By 1356 the word<br />

terreur is in use. Terreur is the origin of the Middle English term terrour, which later<br />

becomes the modern word "terror".<br />

Historical Background<br />

<strong>The</strong> term terroriste, meaning "terrorist", is first used in 1794 by the French philosopher<br />

François-Noël Babeuf, who denounces Maximilien Robespierre's Jacobin regime as a<br />

dictatorship. <strong>In</strong> the years leading up to the Reign of Terror, the Brunswick Manifesto<br />

threatened Paris with an "exemplary, never to be forgotten vengeance: the city would be<br />

subjected to military punishment and total destruction" if the royal family was harmed,<br />

but this only increased the Revolution's will to abolish the monarchy. Some writers<br />

attitudes about French Revolution grew less favorable after the French monarchy was<br />

abolished in 1792. During the Reign of Terror, which began in July 1793 and lasted<br />

thirteen months, Paris was governed by the Committee of Public safety who oversaw a<br />

regime of mass executions and public purges.<br />

Prior to the French Revolution, ancient philosophers wrote about tyrannicide, as tyranny<br />

was seen as the greatest political threat to Greco-Roman civilization. Medieval<br />

philosophers were similarly occupied with the concept of tyranny, though the analysis of<br />

some theologians like Thomas Aquinas drew a distinction between usurpers, who could<br />

be killed by anyone, and legitimate rulers who abused their power – the latter, in<br />

Aquinas' view, could only be punished by a public authority. John of Salisbury was the<br />

first medieval Christian scholar to defend tyrannicide.<br />

Most scholars today trace the origins of the modern tactic of terrorism to the Jewish<br />

Sicarii Zealots who attacked Romans and Jews in 1st century Palestine. <strong>The</strong>y follow its<br />

development from the Persian Order of Assassins through to 19th-century anarchists.<br />

<strong>The</strong> "Reign of Terror" is usually regarded as an issue of etymology. <strong>The</strong> term terrorism<br />

has generally been used to describe violence by non-state actors rather than<br />

government violence since the 19th-century Anarchist Movement.<br />

<strong>In</strong> December 1795, Edmund Burke used the word "Terrorists" in a description of the<br />

new French government called 'Directory':<br />

At length, after a terrible struggle, the [Directory] Troops prevailed over the Citizens (…)<br />

To secure them further, they have a strong corps of irregulars, ready armed. Thousands<br />

of those Hell-hounds called Terrorists, whom they had shut up in Prison on their last<br />

Revolution, as the Satellites of Tyranny, are let loose on the people. (emphasis added)<br />

<strong>The</strong> terms "terrorism" and "terrorist" gained renewed currency in the 1970s as a result of<br />

the Israeli–Palestinian conflict, the Northern Ireland conflict, the Basque conflict, and the<br />

Page 250 of 372


operations of groups such as the Red Army Faction. Leila Khaled was described as a<br />

terrorist in a 1970 number of Life magazine. A number of books on terrorism were<br />

published in the 1970s. <strong>The</strong> topic came further to the fore after the 1983 Beirut barracks<br />

bombings and again after the 2001 September 11 attacks and the 2002 Bali bombings.<br />

Modern Definitions<br />

<strong>The</strong>re are over 109 different definitions of terrorism. American political philosopher<br />

Michael Walzer in 2002 wrote: "Terrorism is the deliberate killing of innocent people, at<br />

random, to spread fear through a whole population and force the hand of its political<br />

leaders". [5] Bruce Hoffman, an American scholar, has noted that:<br />

It is not only individual agencies within the same governmental apparatus that cannot agree on a<br />

single definition of terrorism. Experts and other long-established scholars in the field are equally<br />

incapable of reaching a consensus.<br />

C.A.J. Coady has written that the question of how to define terrorism is "irresolvable"<br />

because "its natural home is in polemical, ideological and propagandist contexts".<br />

French historian Sophie Wahnich distinguishes between the revolutionary terror of the<br />

French Revolution and the terrorists of the September 11 attacks:<br />

Revolutionary terror is not terrorism. To make a moral equivalence between the<br />

Revolution's year II and September 2001 is historical and philosophical nonsense ...<br />

<strong>The</strong> violence exercised on 11 September 2001 aimed neither at equality nor liberty. Nor<br />

did the preventive war announced by the president of the United States.<br />

Page 251 of 372


Experts disagree about "whether terrorism is wrong by definition or just wrong as a<br />

matter of fact; they disagree about whether terrorism should be defined in terms of its<br />

aims, or its methods, or both, or neither; they disagree about whether or not states can<br />

perpetrate terrorism; they even disagree about the importance or otherwise of terror for<br />

a definition of terrorism."<br />

State Terrorism<br />

Alternatively, responding to developments in modern warfare, Paul James and<br />

Jonathan Friedman distinguish between state terrorism against non-combatants and<br />

state terrorism against combatants, including 'Shock and Awe' tactics:<br />

Shock and Awe" as a subcategory of "rapid dominance" is the name given to massive<br />

intervention designed to strike terror into the minds of the enemy. It is a form of stateterrorism.<br />

<strong>The</strong> concept was however developed long before the Second Gulf War by<br />

Harlan Ullman as chair of a forum of retired military personnel.<br />

United Nations<br />

<strong>In</strong> November 2004, a Secretary-General of the United Nations report described<br />

terrorism as any act "intended to cause death or serious bodily harm to civilians or noncombatants<br />

with the purpose of intimidating a population or compelling a government or<br />

an international organization to do or abstain from doing any act". <strong>The</strong> international<br />

community has been slow to formulate a universally agreed, legally binding definition of<br />

this crime. <strong>The</strong>se difficulties arise from the fact that the term "terrorism" is politically and<br />

emotionally charged. <strong>In</strong> this regard, Angus Martyn, briefing the Australian parliament,<br />

stated,<br />

<strong>The</strong> international community has never succeeded in developing an accepted<br />

comprehensive definition of terrorism. During the 1970s and 1980s, the United Nations<br />

attempts to define the term floundered mainly due to differences of opinion between<br />

various members about the use of violence in the context of conflicts over national<br />

liberation and self-determination.<br />

<strong>The</strong>se divergences have made it impossible for the United Nations to conclude a<br />

Comprehensive Convention on <strong>In</strong>ternational Terrorism that incorporates a single, allencompassing,<br />

legally binding, criminal law definition of terrorism. <strong>The</strong> international<br />

community has adopted a series of sectoral conventions that define and criminalize<br />

various types of terrorist activities.<br />

Since 1994, the United Nations General Assembly has repeatedly condemned terrorist<br />

acts using the following political description of terrorism:<br />

Criminal acts intended or calculated to provoke a state of terror in the public, a group of<br />

persons or particular persons for political purposes are in any circumstance<br />

Page 252 of 372


unjustifiable, whatever the considerations of a political, philosophical, ideological, racial,<br />

ethnic, religious or any other nature that may be invoked to justify them.<br />

U.S. Law<br />

Various legal systems and government agencies use different definitions of terrorism in<br />

their national legislation.<br />

U.S. Code Title 22 Chapter 38, Section 2656f(d) defines terrorism as: "Premeditated,<br />

politically motivated violence perpetrated against noncombatant targets by subnational<br />

groups or clandestine agents, usually intended to influence an audience".<br />

18 U.S.C. § 2331 defines "international terrorism" and "domestic terrorism" for purposes<br />

of Chapter 113B of the Code, entitled "Terrorism":<br />

"<strong>In</strong>ternational terrorism" means activities with the following three characteristics:<br />

<strong>In</strong>volve violent acts or acts dangerous to human life that violate federal or state law; Appear to be<br />

intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government<br />

by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction,<br />

assassination, or kidnapping; and occur primarily outside the territorial jurisdiction of the U.S., or<br />

transcend national boundaries in terms of the means by which they are accomplished, the<br />

persons they appear intended to intimidate or coerce, or the locale in which their perpetrators<br />

operate or seek asylum.<br />

Media Spectacle<br />

A definition proposed by Carsten Bockstette at the George C. Marshall European<br />

Center for Security Studies, underlines the psychological and tactical aspects of<br />

terrorism:<br />

Page 253 of 372


Terrorism is defined as political violence in an asymmetrical conflict that is designed to<br />

induce terror and psychic fear (sometimes indiscriminate) through the violent<br />

victimization and destruction of noncombatant targets (sometimes iconic symbols).<br />

Such acts are meant to send a message from an illicit clandestine organization. <strong>The</strong><br />

purpose of terrorism is to exploit the media in order to achieve maximum attainable<br />

publicity as an amplifying force multiplier in order to influence the targeted audience(s)<br />

in order to reach short- and midterm political goals and/or desired long-term end states.<br />

Terrorists attack national symbols, which may negatively affect a government, while<br />

increasing the prestige of the given terrorist group or its ideology.<br />

Political Violence<br />

Terrorist acts frequently have a political purpose. Some official, governmental definitions<br />

of terrorism use the criterion of the illegitimacy or unlawfulness of the act. to distinguish<br />

between actions authorized by a government (and thus "lawful") and those of other<br />

actors, including individuals and small groups. For example, carrying out a strategic<br />

bombing on an enemy city, which is designed to affect civilian support for a cause,<br />

would not be considered terrorism if it were authorized by a government. This criterion<br />

is inherently problematic and is not universally accepted, because: it denies the<br />

existence of state terrorism. An associated term is violent non-state actor.<br />

According to Ali Khan, the distinction lies ultimately in a political judgment.<br />

Pejorative Use<br />

Having the moral charge in our vocabulary of 'something morally wrong', the term<br />

'terrorism' is often used to abuse or denounce opposite parties, either governments or<br />

non-state-groups.<br />

Those labeled "terrorists" by their opponents rarely identify themselves as such, and<br />

typically use other terms or terms specific to their situation, such as separatist, freedom<br />

fighter, liberator, revolutionary, vigilante, militant, paramilitary, guerrilla, rebel, patriot, or<br />

any similar-meaning word in other languages and cultures. Jihadi, mujaheddin, and<br />

fedayeen are similar Arabic words that have entered the English lexicon. It is common<br />

for both parties in a conflict to describe each other as terrorists.<br />

On whether particular terrorist acts, such as killing non-combatants, can be justified as<br />

the lesser evil in a particular circumstance, philosophers have expressed different<br />

views: while, according to David Rodin, utilitarian philosophers can (in theory) conceive<br />

of cases in which the evil of terrorism is outweighed by the good that could not be<br />

achieved in a less morally costly way, in practice the "harmful effects of undermining the<br />

convention of non-combatant immunity is thought to outweigh the goods that may be<br />

achieved by particular acts of terrorism". Among the non-utilitarian philosophers,<br />

Michael Walzer argued that terrorism can be morally justified in only one specific case:<br />

Page 254 of 372


when "a nation or community faces the extreme threat of complete destruction and the<br />

only way it can preserve itself is by intentionally targeting non-combatants, then it is<br />

morally entitled to do so".<br />

<strong>In</strong> his book <strong>In</strong>side Terrorism Bruce Hoffman offered an explanation of why the term<br />

terrorism becomes distorted:<br />

On one point, at least, everyone agrees: terrorism is a pejorative term. It is a word with<br />

intrinsically negative connotations that is generally applied to one's enemies and opponents, or to<br />

those with whom one disagrees and would otherwise prefer to ignore. 'What is called terrorism,'<br />

Brian Jenkins has written, 'thus seems to depend on one's point of view. Use of the term implies a<br />

moral judgment; and if one party can successfully attach the label terrorist to its opponent, then it<br />

has indirectly persuaded others to adopt its moral viewpoint.' Hence the decision to call someone<br />

or label some organization terrorist becomes almost unavoidably subjective, depending largely on<br />

whether one sympathizes with or opposes the person/group/cause concerned. If one identifies<br />

with the victim of the violence, for example, then the act is terrorism. If, however, one identifies<br />

with the perpetrator, the violent act is regarded in a more sympathetic, if not positive (or, at the<br />

worst, an ambivalent) light; and it is not terrorism.<br />

<strong>The</strong> pejorative connotations of the word can be summed up in the aphorism, "One<br />

man's terrorist is another man's freedom fighter". This is exemplified when a group<br />

using irregular military methods is an ally of a state against a mutual enemy, but later<br />

Page 255 of 372


falls out with the state and starts to use those methods against its former ally. During<br />

World War II, the Malayan People's Anti-Japanese Army was allied with the British, but<br />

during the Malayan Emergency, members of its successor (the Malayan Races<br />

Liberation Army), were branded "terrorists" by the British. More recently, Ronald<br />

Reagan and others in the American administration frequently called the mujaheddin<br />

"freedom fighters" during the Soviet–Afghan War yet twenty years later, when a new<br />

generation of Afghan men were fighting against what they perceive to be a regime<br />

installed by foreign powers, their attacks were labelled "terrorism" by George W. Bush.<br />

Groups accused of terrorism understandably prefer terms reflecting legitimate military or<br />

ideological action. Leading terrorism researcher Professor Martin Rudner, director of the<br />

Canadian Centre of <strong>In</strong>telligence and Security Studies at Ottawa's Carleton University,<br />

defines "terrorist acts" as unlawful attacks for political or other ideological goals, and<br />

said:<br />

<strong>The</strong>re is the famous statement: 'One man's terrorist is another man's freedom fighter.' But that is<br />

grossly misleading. It assesses the validity of the cause when terrorism is an act. One can have a<br />

perfectly beautiful cause and yet if one commits terrorist acts, it is terrorism regardless.<br />

Some groups, when involved in a "liberation" struggle, have been called "terrorists" by<br />

the Western governments or media. Later, these same persons, as leaders of the<br />

liberated nations, are called "statesmen" by similar organizations. Two examples of this<br />

phenomenon are the Nobel Peace Prize laureates Menachem Begin and Nelson<br />

Mandela. WikiLeaks editor Julian Assange has been called a "terrorist" by Sarah Palin<br />

and Joe Biden.<br />

Sometimes, states that are close allies, for reasons of history, culture and politics, can<br />

disagree over whether or not members of a certain organization are terrorists. For<br />

instance, for many years, some branches of the United States government refused to<br />

label members of the Provisional Irish Republican Army (IRA) as terrorists while the IRA<br />

was using methods against one of the United States' closest allies (the United Kingdom)<br />

that the UK branded as terrorism. This was highlighted by the Quinn v. Robinson case.<br />

Media outlets who wish to convey impartiality may limit their usage of "terrorist" and<br />

"terrorism" because they are loosely defined, potentially controversial in nature, and<br />

subjective terms.<br />

History<br />

Depending on how broadly the term is defined, the roots and practice of terrorism can<br />

be traced at least to the 1st-century AD. Sicarii Zealots, though some dispute whether<br />

the group, a radical offshoot of the Zealots which was active in Judaea Province at the<br />

beginning of the 1st century AD, was in fact terrorist. According to the contemporary<br />

Jewish-Roman historian Josephus, after the Zealotry rebellion against Roman rule in<br />

Judea, when some prominent Jewish collaborators with Roman rule were killed, Judas<br />

of Galilee formed a small and more extreme offshoot of the Zealots, the Sicarii, in 6 AD.<br />

<strong>The</strong>ir terror was directed against Jewish "collaborators", including temple priests,<br />

Sadducees, Herodians, and other wealthy elites.<br />

Page 256 of 372


<strong>The</strong> term "terrorism" itself was originally used to describe the actions of the Jacobin<br />

Club during the "Reign of Terror" in the French Revolution. "Terror is nothing other than<br />

justice, prompt, severe, inflexible", said Jacobin leader Maximilien Robespierre. <strong>In</strong> 1795,<br />

Edmund Burke denounced the Jacobins for letting "thousands of those hell-hounds<br />

called Terrorists ... loose on the people" of France.<br />

<strong>In</strong> January 1858, Italian patriot Felice Orsini threw three bombs in an attempt to<br />

assassinate French Emperor Napoleon III. Eight bystanders were killed and 142 injured.<br />

<strong>The</strong> incident played a crucial role as an inspiration for the development of the early<br />

terrorist groups.<br />

Arguably the first organization to utilize modern terrorist techniques was the Irish<br />

Republican Brotherhood, founded in 1858 as a revolutionary Irish nationalist group that<br />

carried out attacks in England. <strong>The</strong> group initiated the Fenian dynamite campaign in<br />

1881, one of the first modern terror campaigns. <strong>In</strong>stead of earlier forms of terrorism<br />

based on political assassination, this campaign used modern, timed explosives with the<br />

express aim of sowing fear in the very heart of metropolitan Britain, in order to achieve<br />

political gains.<br />

Page 257 of 372


Another early terrorist group was Narodnaya Volya, founded in Russia in 1878 as a<br />

revolutionary anarchist group inspired by Sergei Nechayev and "propaganda by the<br />

deed" theorist Carlo Pisacane. <strong>The</strong> group developed ideas – such as targeted killing of<br />

the 'leaders of oppression' – that were to become the hallmark of subsequent violence<br />

by small non-state groups, and they were convinced that the developing technologies of<br />

the age – such as the invention of dynamite, which they were the first anarchist group to<br />

make widespread use of – enabled them to strike directly and with discrimination.<br />

Scholars of terrorism refer to four major waves of global terrorism: "the Anarchist, the<br />

Anti-Colonial, the <strong>New</strong> Left, and the Religious. <strong>The</strong> first three have been completed and<br />

lasted around 40 years; the fourth is now in its third decade."<br />

Types<br />

<strong>In</strong>fographics<br />

Depending on the country, the political system, and the time in history, the types of<br />

terrorism are varying.<br />

<strong>In</strong> early 1975, the Law Enforcement Assistant Administration in the United States<br />

formed the National Advisory Committee on Criminal Justice Standards and Goals. One<br />

of the five volumes that the committee wrote was titled Disorders and Terrorism,<br />

produced by the Task Force on Disorders and Terrorism under the direction of H. H. A.<br />

Cooper, Director of the Task Force staff.<br />

<strong>The</strong> Task Force defines terrorism as "a tactic or technique by means of which a violent<br />

act or the threat thereof is used for the prime purpose of creating overwhelming fear for<br />

coercive purposes". It classified disorders and terrorism into six categories:<br />

<br />

<br />

<br />

<br />

Civil Disorder – A form of collective violence interfering with the peace, security,<br />

and normal functioning of the community.<br />

Political Terrorism – Violent criminal behavior designed primarily to generate<br />

fear in the community, or substantial segment of it, for political purposes.<br />

Non-Political Terrorism – Terrorism that is not aimed at political purposes but<br />

which exhibits "conscious design to create and maintain a high degree of fear for<br />

coercive purposes, but the end is individual or collective gain rather than the<br />

achievement of a political objective".<br />

Quasi-Terrorism – <strong>The</strong> activities incidental to the commission of crimes of<br />

violence that are similar in form and method to genuine terrorism but which<br />

nevertheless lack its essential ingredient. It is not the main purpose of the quasiterrorists<br />

to induce terror in the immediate victim as in the case of genuine<br />

terrorism, but the quasi-terrorist uses the modalities and techniques of the<br />

genuine terrorist and produces similar consequences and reaction. For example,<br />

Page 258 of 372


the fleeing felon who takes hostages is a quasi-terrorist, whose methods are<br />

similar to those of the genuine terrorist but whose purposes are quite different.<br />

<br />

<br />

Limited Political Terrorism – Genuine political terrorism is characterized by a<br />

revolutionary approach; limited political terrorism refers to "acts of terrorism<br />

which are committed for ideological or political motives but which are not part of a<br />

concerted campaign to capture control of the state".<br />

Official or State Terrorism – "referring to nations whose rule is based upon fear<br />

and oppression that reach similar to terrorism or such proportions". It may be<br />

referred to as Structural Terrorism defined broadly as terrorist acts carried out<br />

by governments in pursuit of political objectives, often as part of their foreign<br />

policy.<br />

Other sources have defined the typology of terrorism in different ways, for example,<br />

broadly classifying it into domestic terrorism and international terrorism, or using<br />

categories such as vigilante terrorism or insurgent terrorism. One way the typology of<br />

terrorism may be defined:<br />

<br />

Political terrorism<br />

o<br />

Sub-state terrorism<br />

• Social revolutionary terrorism<br />

• Nationalist-separatist terrorism<br />

Page 259 of 372


• Religious extremist terrorism<br />

• Religious fundamentalist Terrorism<br />

• <strong>New</strong> religions terrorism<br />

• Right-wing terrorism<br />

• Left-wing terrorism<br />

• Communist terrorism<br />

o<br />

o<br />

State-sponsored terrorism<br />

Regime or state terrorism<br />

<br />

<br />

Criminal terrorism<br />

Pathological terrorism<br />

Motivations of Terrorists<br />

As well as there being no one agreed definition of terrorism, there is a similar lack of<br />

consensus regarding the causes – or motivations behind – terrorism. Numerous studies<br />

have identified certain behavioral and situational characteristics that are common, and<br />

perhaps causal, to the consequence of terrorism, specific analysis of case studies have<br />

led to suggested motivations to individual historical acts.<br />

A report conducted by Paul Gill, John Horgan and Paige Deckert on behalf of <strong>The</strong><br />

Department of security of UK highlights the vast discrepancies between individual cases<br />

of terrorism recorded. To begin with, 43 percent of lone wolf terrorism is motivated by<br />

religious beliefs. <strong>The</strong> same report indicates that just less than a third (32 percent) have<br />

pre-existing mental health disorders, while many more are found to have these<br />

problems upon arrest. At least 37 percent lived alone at the time of their event planning<br />

and/or execution, a further 26 percent lived with others, and no data were available for<br />

the remaining cases. 40 percent were unemployed at the time of their arrest or terrorist<br />

event. 19 percent subjectively experienced being disrespected by others, while 14<br />

percent experienced being the victim of verbal or physical assault.<br />

<strong>In</strong>timidation<br />

Attacks on 'collaborators' are used to intimidate people from cooperating with the state<br />

in order to undermine state control. This strategy was used in Ireland, in Kenya, in<br />

Algeria and in Cyprus during their independence struggles.<br />

<strong>In</strong>ternational Attention<br />

This strategy was used by Al-Qaeda in its attacks on the World Trade Center and the<br />

Pentagon in the United States on September 11, 2001. <strong>The</strong>se attacks are used to draw<br />

Page 260 of 372


international attention to struggles that are otherwise unreported, such as the<br />

Palestinian airplane hijackings in 1970 and the 1975 Dutch train hostage crisis.<br />

Local/<strong>In</strong>ternal Social Standing<br />

Abrahm suggests that terrorist organizations do not select terrorism for its political<br />

effectiveness. <strong>In</strong>dividual terrorists tend to be motivated more by a desire for social<br />

solidarity with other members of their organization than by political platforms or strategic<br />

objectives, which are often murky and undefined.<br />

Cultural Tolerance of Violence<br />

Additionally, Michael Mousseau shows possible relationships between the type of<br />

economy within a country and ideology associated with terrorism. Many terrorists have<br />

a history of domestic violence.<br />

Perceived Illegitimacy of <strong>The</strong> State<br />

Some terrorists like Timothy McVeigh were motivated by revenge against a state for its<br />

actions against its citizens.<br />

Page 261 of 372


Religious Beliefs/ Zealotry<br />

According to Paul Gill, John Horgan and Paige Deckert on behalf of <strong>The</strong> Department of<br />

security of UK, 43 percent of lone wolf terrorism is motivated by religious beliefs. <strong>The</strong><br />

same report indicates that Just less than a third (32 percent) have pre-existing mental<br />

health disorders, while many are found to have these problems upon arrest. At least 37<br />

percent lived alone at the time of their event planning and/or execution, a further 26<br />

percent lived with others, and no data were available for the remaining cases. 40<br />

percent were unemployed at the time of their arrest or terrorist event. Many were<br />

chronically unemployed and consistently struggled to hold any form of employment for a<br />

significant amount of time. 19 percent subjectively experienced being disrespected by<br />

others, while 14.3 percent experienced being the victim of verbal or physical assault.<br />

Mental Health<br />

Ariel Merari, a psychologist who has studied the psychological profiles of suicide<br />

terrorists since 1983 through media reports that contained biographical details,<br />

interviews with the suicides’ families, and interviews with jailed would-be suicide<br />

attackers, concluded that they were unlikely to be psychologically abnormal.<br />

<strong>In</strong> comparison to economic theories of criminal behaviour, Scott Atran found that suicide<br />

terrorists exhibit none of the socially dysfunctional attributes – such as fatherless,<br />

friendless, jobless situations – or suicidal symptoms. By which he means, they do not<br />

kill themselves simply out of hopelessness or a sense of 'having nothing to lose'.<br />

Nationalism<br />

Although a common factor in terrorism is a strong religious belief there are other factors<br />

such as cultural, social and political that wholly preclude religion. For example, the drive<br />

behind these Chechen terrorists are quite distinct and unique from others. Many of the<br />

Chechens considered themselves secular freedom fighters, nationalist insurgents<br />

seeking to establish an independent secular state of Chechnya. Although a distinction<br />

should be made between national Chechen terrorists and non-Chechen fighters who<br />

have adopted the idea from abroad. Few Chechen fighters fought for the jihads whereas<br />

most of the non-Chechen fighters did (Janeczko, 2014).<br />

Financial Support for Family<br />

Another factor are perceived assurances of financial stability for the actor's families, that<br />

they are given when they join a terrorist organization or complete an attempt of terror.<br />

An extra grant is provided for the families of suicide bombers.<br />

Democracy and Domestic Terrorism<br />

Terrorism is most common in nations with intermediate political freedom, and it is least<br />

common in the most democratic nations. one study suggests that suicide attacks may<br />

Page 262 of 372


e an exception to this general rule. Evidence regarding this particular method of<br />

terrorism reveals that every modern suicide campaign has targeted a democracy–a<br />

state with a considerable degree of political freedom. <strong>The</strong> study suggests that<br />

concessions awarded to terrorists during the 1980s and 1990s for suicide attacks<br />

increased their frequency. <strong>The</strong>re is a connection between the existence of civil liberties,<br />

democratic participation and terrorism. According to Young and Dugan, these things<br />

encourage terrorist groups to organize and generate terror.<br />

Some examples of "terrorism" in non-democratic nations include ETA in Spain under<br />

Francisco Franco (although the group's terrorist activities increased sharply after<br />

Franco's death), the Organization of Ukrainian Nationalists in pre-war Poland, the<br />

Shining Path in Peru under Alberto Fujimori, the Kurdistan Workers Party when Turkey<br />

was ruled by military leaders and the ANC in South Africa. Democracies, such as<br />

Japan, the United Kingdom, the United States, Israel, <strong>In</strong>donesia, <strong>In</strong>dia, Spain, Germany,<br />

Italy and the Philippines, have experienced domestic terrorism.<br />

While a democratic nation espousing civil liberties may claim a sense of higher moral<br />

ground than other regimes, an act of terrorism within such a state may cause a<br />

dilemma: whether to maintain its civil liberties and thus risk being perceived as<br />

ineffective in dealing with the problem; or alternatively to restrict its civil liberties and<br />

thus risk delegitimizing its claim of supporting civil liberties. For this reason, homegrown<br />

terrorism has started to be seen as a greater threat, as stated by former CIA Director<br />

Michael Hayden. This dilemma, some social theorists would conclude, may very well<br />

Page 263 of 372


play into the initial plans of the acting terrorist(s); namely, to delegitimize the state and<br />

cause a systematic shift towards anarchy via the accumulation of negative sentiments<br />

towards the state system.<br />

Religious Terrorism<br />

Terrorist acts throughout history have been performed on religious grounds with the<br />

goal to either spread or enforce a system of belief, viewpoint or opinion. <strong>The</strong> validity and<br />

scope of religious terrorism is limited to an individual's view or a group's view or<br />

interpretation of that belief system's teachings.<br />

According to the Global Terrorism <strong>In</strong>dex by the University of Maryland, College Park,<br />

religious extremism has overtaken national separatism and become the main driver of<br />

terrorist attacks around the world. Since 9/11 there has been a five-fold increase in<br />

deaths from terrorist attacks. <strong>The</strong> majority of incidents over the past several years can<br />

be tied to groups with a religious agenda. Before 2000, it was nationalist separatist<br />

terrorist organizations such as the IRA and Chechen rebels who were behind the most<br />

attacks. <strong>The</strong> number of incidents from nationalist separatist groups has remained<br />

relatively stable in the years since while religious extremism has grown. <strong>The</strong> prevalence<br />

of Islamist groups in Iraq, Afghanistan, Pakistan, Nigeria and Syria is the main driver<br />

behind these trends.<br />

Four of the terrorist groups that have been most active since 2001 are Boko Haram, Al<br />

Qaeda, the Taliban and ISIL. <strong>The</strong>se groups have been most active in Iraq, Afghanistan,<br />

Pakistan, Nigeria and Syria. 80 percent of all deaths from terrorism occurred in one of<br />

these five countries.<br />

Terrorism in Pakistan has become a great problem. From the summer of 2007 until late<br />

2009, more than 1,500 people were killed in suicide and other attacks on civilians for<br />

reasons attributed to a number of causes – sectarian violence between Sunni and Shia<br />

Muslims; easy availability of guns and explosives; the existence of a "Kalashnikov<br />

culture"; an influx of ideologically driven Muslims based in or near Pakistan, who<br />

originated from various nations around the world and the subsequent war against the<br />

pro-Soviet Afghans in the 1980s which blew back into Pakistan; the presence of Islamist<br />

insurgent groups and forces such as the Taliban and Lashkar-e-Taiba. Pakistan is the<br />

10th most dangerous country by criminality index. On July 2, 2013 in Lahore, 50 Muslim<br />

scholars of the Sunni Ittehad Council (SIC) issued a collective fatwa against suicide<br />

bombings, the killing of innocent people, bomb attacks, and targeted killings declaring<br />

them as Haraam or forbidden.<br />

<strong>In</strong> 2015, the Southern Poverty Law Center released a report on terrorism in the United<br />

States. <strong>The</strong> report (titled <strong>The</strong> Age of the Wolf) found that during that period, "more<br />

people have been killed in America by non-Islamic domestic terrorists than jihadists."<br />

<strong>The</strong> "virulent racist and anti-semitic" ideology of the ultra-right wing Christian Identity<br />

movement is usually accompanied by anti-government sentiments. Adherents of<br />

Christian Identity believe that whites of European descent can be traced back to the<br />

Page 264 of 372


"Lost Tribes of Israel" and many consider Jews to be the Satanic offspring of Eve and<br />

the Serpent. This group has committed hate crimes, bombings and other acts of<br />

terrorism. Its influence ranges from the Ku Klux Klan and neo-Nazi groups to the antigovernment<br />

militia and sovereign citizen movements. Christian Identity's origins can be<br />

traced back to Anglo-Israelism. Anglo-Israelism held the view that Jews were<br />

descendants of ancient Israelites who had never been lost. By the 1930s, the<br />

movement had been infected with anti-Semitism, and eventually Christian Identity<br />

theology diverged from traditional Anglo-Israelism, and developed what is known as the<br />

"two seed" theory. According to the two-seed theory, the Jewish people are descended<br />

from Cain and the serpent (not from Shem). <strong>The</strong> white European seedline is descended<br />

from the "lost tribes" of Israel. <strong>The</strong>y hold themselves to "God's laws", not to "man's<br />

laws", and they do not feel bound to a government that they consider run by Jews and<br />

the <strong>New</strong> World Order.<br />

Israel has had problems with Jewish religious terrorism. Yigal Amir assassinated Israeli<br />

Prime Minister Yitzhak Rabin in 1995. For Amir, killing Rabin was an exemplary act that<br />

symbolized the fight against an illegitimate government that was prepared to cede<br />

Jewish Holy Land to the Palestinians.<br />

Perpetrators<br />

<strong>The</strong> perpetrators of acts of terrorism can be individuals, groups, or states. According to<br />

some definitions, clandestine or semi-clandestine state actors may carry out terrorist<br />

acts outside the framework of a state of war. the most common image of terrorism is<br />

that it is carried out by small and secretive cells, highly motivated to serve a particular<br />

cause and many of the most deadly operations in recent times, such as the September<br />

Page 265 of 372


11 attacks, the London underground bombing, 2008 Mumbai attacks and the 2002 Bali<br />

bombing were planned and carried out by a close clique, composed of close friends,<br />

family members and other strong social networks. <strong>The</strong>se groups benefited from the free<br />

flow of information and efficient telecommunications to succeed where others had failed.<br />

Over the years, much research has been conducted to distill a terrorist profile to explain<br />

these individuals' actions through their psychology and socio-economic circumstances.<br />

Others, like Roderick Hindery, have sought to discern profiles in the propaganda tactics<br />

used by terrorists. Some security organizations designate these groups as violent nonstate<br />

actors. A 2007 study by economist Alan B. Krueger found that terrorists were less<br />

likely to come from an impoverished background (28 percent vs. 33 percent) and more<br />

likely to have at least a high-school education (47 percent vs. 38 percent). Another<br />

analysis found only 16 percent of terrorists came from impoverished families, vs. 30<br />

percent of male Palestinians, and over 60 percent had gone beyond high school, vs. 15<br />

percent of the populace.<br />

A study into the poverty-stricken conditions and whether or not, terrorists are more likely<br />

to come from here, show that people who grew up in these situations tend to show<br />

aggression and frustration towards others. This theory is largely debated for the simple<br />

fact that just because one is frustrated, does not make them a potential terrorist.<br />

To avoid detection, a terrorist will look, dress, and behave normally until executing the<br />

assigned mission. Some claim that attempts to profile terrorists based on personality,<br />

physical, or sociological traits are not useful. <strong>The</strong> physical and behavioral description of<br />

the terrorist could describe almost any normal person. the majority of terrorist attacks<br />

are carried out by military age men, aged 16–40.<br />

Non-State Groups<br />

Groups not part of the state apparatus of in opposition to the state are most commonly<br />

referred to as a "terrorist" in the media.<br />

According to the Global Terrorism Database, the most active terrorist group in the<br />

period 1970 to 2010 was Shining Path (with 4,517 attacks), followed by Farabundo<br />

Marti National Liberation Front (FMLN), Irish Republican Army (IRA), Basque<br />

Fatherland and Freedom (ETA), Revolutionary Armed Forces of Colombia (FARC),<br />

Taliban, Liberation Tigers of Tamil Eelam, <strong>New</strong> People's Army, National Liberation Army<br />

of Colombia (ELN), and Kurdistan Workers Party (PKK).<br />

State Sponsors<br />

A state can sponsor terrorism by funding or harboring a terrorist group. Opinions as to<br />

which acts of violence by states consist of state-sponsored terrorism vary widely. When<br />

states provide funding for groups considered by some to be terrorist, they rarely<br />

acknowledge them as such.<br />

Page 266 of 372


State Terrorism<br />

Civilization is based on a clearly defined and widely accepted yet often unarticulated<br />

hierarchy. Violence done by those higher on the hierarchy to those lower is nearly<br />

always invisible, that is, unnoticed. When it is noticed, it is fully rationalized. Violence<br />

done by those lower on the hierarchy to those higher is unthinkable, and when it does<br />

occur it is regarded with shock, horror, and the fetishization of the victims.<br />

— Derrick Jensen<br />

As with "terrorism" the concept of "state terrorism" is controversial. <strong>The</strong> Chairman of the<br />

United Nations Counter-Terrorism Committee has stated that the Committee was<br />

conscious of 12 international Conventions on the subject, and none of them referred to<br />

State terrorism, which was not an international legal concept. If States abused their<br />

power, they should be judged against international conventions dealing with war crimes,<br />

international human rights law, and international humanitarian law. Former United<br />

Nations Secretary-General Kofi Annan has said that it is "time to set aside debates on<br />

so-called 'state terrorism'. <strong>The</strong> use of force by states is already thoroughly regulated<br />

under international law". he made clear that, "regardless of the differences between<br />

governments on the question of the definition of terrorism, what is clear and what we<br />

can all agree on is that any deliberate attack on innocent civilians [or non-combatants],<br />

regardless of one's cause, is unacceptable and fits into the definition of terrorism."<br />

USS Arizona (BB-39) burning during the Japanese surprise attack on Pearl Harbor,<br />

December 7, 1941.<br />

State terrorism has been used to refer to terrorist acts committed by governmental<br />

agents or forces. This involves the use of state resources employed by a state's foreign<br />

policies, such as using its military to directly perform acts of terrorism. Professor of<br />

Political Science Michael Stohl cites the examples that include the German bombing of<br />

London, the Japanese bombing of Pearl Harbor, the British and American firebombing<br />

of Dresden, and the U.S. atomic bombings of Hiroshima and Nagasaki during World<br />

War II. He argues that "the use of terror tactics is common in international relations and<br />

Page 267 of 372


the state has been and remains a more likely employer of terrorism within the<br />

international system than insurgents." He cites the first strike option as an example of<br />

the "terror of coercive diplomacy" as a form of this, which holds the world hostage with<br />

the implied threat of using nuclear weapons in "crisis management" and he argues that<br />

the institutionalized form of terrorism has occurred as a result of changes that took<br />

place following World War II. <strong>In</strong> this analysis, state terrorism exhibited as a form of<br />

foreign policy was shaped by the presence and use of weapons of mass destruction,<br />

and the legitimizing of such violent behavior led to an increasingly accepted form of this<br />

behavior by the state.<br />

Charles Stewart Parnell described William Ewart Gladstone's Irish Coercion Act as<br />

terrorism in his "no-Rent manifesto" in 1881, during the Irish Land War. <strong>The</strong> concept is<br />

used to describe political repressions by governments against their own civilian<br />

populations with the purpose of inciting fear. For example, taking and executing civilian<br />

hostages or extrajudicial elimination campaigns are commonly considered "terror" or<br />

terrorism, for example during the Red Terror or the Great Terror. Such actions are often<br />

described as democide or genocide, which have been argued to be equivalent to state<br />

terrorism.<br />

Empirical studies on this have found that democracies have little democide. Western<br />

democracies, including the United States, have supported state terrorism and mass<br />

killings, with some examples being the <strong>In</strong>donesian mass killings of 1965–66 and<br />

Operation Condor.<br />

Connection with Tourism<br />

<strong>The</strong> connection between terrorism and tourism has been widely studied since the Luxor<br />

massacre in Egypt. <strong>In</strong> the 1970s, the targets of terrorists were politicians and chiefs of<br />

police while now, international tourists and visitors are selected as the main targets of<br />

attacks. <strong>The</strong> attacks on the World Trade Center and the Pentagon on September 11,<br />

2001, were the symbolic epicenter, which marked a new epoch in the use of civil<br />

transport against the main power of the planet. From this event onwards, the spaces of<br />

leisure that characterized the pride of West, were conceived as dangerous and frightful.<br />

Funding<br />

State sponsors have constituted a major form of funding; for example, Palestine<br />

Liberation Organization, Democratic Front for the Liberation of Palestine and other<br />

groups considered to be terrorist organizations, were funded by the Soviet Union. <strong>The</strong><br />

Stern Gang received funding from Italian Fascist officers in Beirut to undermine the<br />

British Mandate for Palestine. Pakistan has created and nurtured terrorist groups as<br />

policy for achieving tactical objectives against its neighbors, especially <strong>In</strong>dia.<br />

"Revolutionary tax" is another major form of funding, and essentially a euphemism for<br />

"protection money". Revolutionary taxes "play a secondary role as one other means of<br />

intimidating the target population".<br />

Page 268 of 372


Other major sources of funding include kidnapping for ransoms, smuggling (including<br />

wildlife smuggling), fraud, and robbery. <strong>The</strong> Islamic State in Iraq and the Levant has<br />

reportedly received funding "via private donations from the Gulf states".<br />

<strong>The</strong> Financial Action Task Force is an inter-governmental body whose mandate, since<br />

October 2001, has included combating terrorist financing.<br />

Tactics<br />

Terrorist attacks are often targeted to maximize fear and publicity, usually using<br />

explosives or poison. Terrorist groups usually methodically plan attacks in advance, and<br />

may train participants, plant undercover agents, and raise money from supporters or<br />

through organized crime. Communications occur through modern telecommunications,<br />

or through old-fashioned methods such as couriers. <strong>The</strong>re is concern about terrorist<br />

attacks employing weapons of mass destruction.<br />

Terrorism is a form of asymmetric warfare, and is more common when direct<br />

conventional warfare will not be effective because forces vary greatly in power.<br />

<strong>The</strong> context in which terrorist tactics are used is often a large-scale, unresolved political<br />

conflict. <strong>The</strong> type of conflict varies widely; historical examples include:<br />

<br />

<br />

<br />

Secession of a territory to form a new sovereign state or become part of a<br />

different state<br />

Dominance of territory or resources by various ethnic groups<br />

Imposition of a particular form of government<br />

Page 269 of 372


Economic deprivation of a population<br />

Opposition to a domestic government or occupying army<br />

Religious fanaticism<br />

Responses<br />

Responses to terrorism are broad in scope. <strong>The</strong>y can include re-alignments of the<br />

political spectrum and reassessments of fundamental values.<br />

Specific types of responses include:<br />

<br />

<br />

<br />

<br />

<br />

<br />

Targeted laws, criminal procedures, deportations, and enhanced police powers<br />

Target hardening, such as locking doors or adding traffic barriers<br />

Preemptive or reactive military action<br />

<strong>In</strong>creased intelligence and surveillance activities<br />

Preemptive humanitarian activities<br />

More permissive interrogation and detention policies<br />

<strong>The</strong> term "counter-terrorism" has a narrower connotation, implying that it is directed at<br />

terrorist actors.<br />

Response in <strong>The</strong> United States<br />

According to the TSA, this is what the remote TSA agent would see on their screen.<br />

According to a report by Dana Priest and William M. Arkin in <strong>The</strong> Washington Post,<br />

"Some 1,271 government organizations and 1,931 private companies work on programs<br />

related to counterterrorism, homeland security and intelligence in about 10,000<br />

locations across the United States."<br />

America's thinking on how to defeat radical Islamists is split along two very different<br />

schools of thought. Republicans, typically follow what is known as the Bush Doctrine,<br />

advocate the military model of taking the fight to the enemy and seeking to democratize<br />

the Middle East. Democrats, by contrast, generally propose the law enforcement model<br />

of better cooperation with nations and more security at home. <strong>In</strong> the introduction of the<br />

U.S. Army / Marine Corps Counterinsurgency Field Manual, Sarah Sewall states the<br />

need for "U.S. forces to make securing the civilian, rather than destroying the enemy,<br />

their top priority. <strong>The</strong> civilian population is the center of gravity – the deciding factor in<br />

the struggle.... Civilian deaths create an extended family of enemies – new insurgent<br />

recruits or informants – and erode support of the host nation." Sewall sums up the<br />

book's key points on how to win this battle: "Sometimes, the more you protect your<br />

force, the less secure you may be.... Sometimes, the more force is used, the less<br />

effective it is.... <strong>The</strong> more successful the counterinsurgency is, the less force can be<br />

used and the more risk must be accepted.... Sometimes, doing nothing is the best<br />

reaction." This strategy, often termed "courageous restraint", has certainly led to some<br />

Page 270 of 372


success on the Middle East battlefield, yet it fails to address the central truth: the<br />

terrorists we face are mostly homegrown.<br />

Terrorism Research<br />

Terrorism research, called terrorism and counter-terrorism research, is an<br />

interdisciplinary academic field which seeks to understand the causes of terrorism, how<br />

to prevent it as well as its impact in the broadest sense. Terrorism research can be<br />

carried out in both military and civilian contexts, for example by research centers such<br />

as the British Centre for the Study of Terrorism and Political Violence, the Norwegian<br />

Centre for Violence and Traumatic Stress Studies, and the <strong>In</strong>ternational Centre for<br />

Counter-Terrorism (ICCT). <strong>The</strong>re are several academic journals devoted to the field.<br />

<strong>In</strong>ternational Agreements<br />

One of the agreements that promote the international legal anti-terror framework is the<br />

Code of Conduct Towards Achieving a World Free of Terrorism that was adopted at the<br />

73rd session of the United Nations General Assembly in 2018. <strong>The</strong> Code of Conduct<br />

was initiated by Kazakhstan President Nursultan Nazarbayev. Its main goal is to<br />

implement a wide range of international commitments to counter terrorism and establish<br />

a broad global coalition towards achieving a world free of terrorism by 2045. <strong>The</strong> Code<br />

was signed by more than 70 countries.<br />

Mass Media<br />

Mass media exposure may be a primary goal of those carrying out terrorism, to expose<br />

issues that would otherwise be ignored by the media. Some consider this to be<br />

manipulation and exploitation of the media.<br />

<strong>The</strong> <strong>In</strong>ternet has created a new channel for groups to spread their messages. This has<br />

created a cycle of measures and counter measures by groups in support of and in<br />

opposition to terrorist movements. <strong>The</strong> United Nations has created its own online<br />

counter-terrorism resource.<br />

<strong>The</strong> mass media will, on occasion, censor organizations involved in terrorism (through<br />

self-restraint or regulation) to discourage further terrorism. This may encourage<br />

organizations to perform more extreme acts of terrorism to be shown in the mass<br />

media. Conversely James F. Pastor explains the significant relationship between<br />

terrorism and the media, and the underlying benefit each receives from the other.<br />

<strong>The</strong>re is always a point at which the terrorist ceases to manipulate the media gestalt. A<br />

point at which the violence may well escalate, but beyond which the terrorist has<br />

become symptomatic of the media gestalt itself. Terrorism as we ordinarily understand it<br />

is innately media-related.<br />

— Novelist William Gibson<br />

Page 271 of 372


Former British Prime Minister Margaret Thatcher famously spoke of the close<br />

connection between terrorism and the media, calling publicity 'the oxygen of terrorism'.<br />

Outcome of Terrorist Groups<br />

How terrorist groups end (n = 268): <strong>The</strong> most common ending for a terrorist group is to<br />

convert to nonviolence via negotiations (43 percent), with most of the rest terminated by<br />

routine policing (40 percent). Groups that were ended by military force constituted only<br />

7 percent.<br />

Jones and Libicki (2008) created a list of all the terrorist groups they could find that were<br />

active between 1968 and 2006. <strong>The</strong>y found 648. of those, 136 splintered and 244 were<br />

still active in 2006. Of the ones that ended, 43 percent converted to nonviolent political<br />

actions, like the Irish Republican Army in Northern Ireland. Law enforcement took out 40<br />

percent. Ten percent won. Only 20 groups, 7 percent, were taken out by military force.<br />

Forty-two groups became large enough to be labeled an insurgency; 38 of those had<br />

ended by 2006. Of those, 47 percent converted to nonviolent political actors. Only 5<br />

percent were taken out by law enforcement. 26 percent won. 21 percent succumbed to<br />

military force. Jones and Libicki concluded that military force may be necessary to deal<br />

with large insurgencies but are only occasionally decisive, because the military is too<br />

often seen as a bigger threat to civilians than the terrorists. To avoid that, the rules of<br />

engagement must be conscious of collateral damage and work to minimize it.<br />

Page 272 of 372


Another researcher, Audrey Cronin, lists six primary ways that terrorist groups end:<br />

1. Capture or killing of a group's leader. (Decapitation).<br />

2. Entry of the group into a legitimate political process. (Negotiation).<br />

3. Achievement of group aims. (Success).<br />

4. Group implosion or loss of public support. (Failure).<br />

5. Defeat and elimination through brute force. (Repression).<br />

6. Transition from terrorism into other forms of violence. (Reorientation).<br />

Databases<br />

<strong>The</strong> following terrorism databases are or were made publicly available for research<br />

purposes, and track specific acts of terrorism:<br />

<br />

<br />

<br />

<br />

Global Terrorism Database, an open-source database by the University of<br />

Maryland, College Park on terrorist events around the world from 1970 through<br />

2017 with more than 150,000 cases.<br />

MIPT Terrorism Knowledge Base<br />

Worldwide <strong>In</strong>cidents Tracking System<br />

Tocsearch (dynamic database)<br />

<strong>The</strong> following public report and index provides a summary of key global trends and<br />

patterns in terrorism around the world<br />

<br />

Global Terrorism <strong>In</strong>dex, produced annually by the <strong>In</strong>stitute for Economics and<br />

Peace<br />

Page 273 of 372


<strong>The</strong> following publicly available resources index electronic and bibliographic resources<br />

on the subject of terrorism<br />

<br />

Human Security Gateway<br />

<strong>The</strong> following terrorism databases are maintained in secrecy by the United States<br />

Government for intelligence and counter-terrorism purposes:<br />

<br />

<br />

Terrorist Identities Datamart Environment<br />

Terrorist Screening Database<br />

Jones and Libicki (2008) includes a table of 268 terrorist groups active between 1968<br />

and 2006 with their status as of 2006: still active, splintered, converted to nonviolence,<br />

removed by law enforcement or military, or won. (<strong>The</strong>se data are not in a convenient<br />

machine-readable format but are available.)<br />

Page 274 of 372


XVIII. <strong>The</strong>ft<br />

<strong>In</strong> common usage, <strong>The</strong>ft is the taking of another person's property or services without<br />

that person's permission or consent with the intent to deprive the rightful owner of it. <strong>The</strong><br />

word is also used as an informal shorthand term for some crimes against property, such<br />

as burglary, embezzlement, larceny, looting, robbery, shoplifting, library theft, and fraud<br />

(obtaining money under false pretenses). <strong>In</strong> some jurisdictions, theft is considered to be<br />

synonymous with larceny; in others, theft has replaced larceny. Someone who carries<br />

out an act of or makes a career of theft is known as a thief. <strong>The</strong> act of theft is also<br />

known by other terms such as stealing, thieving, and filching.<br />

<strong>The</strong>ft is the name of a statutory offence in California, Canada, England and Wales,<br />

Hong Kong, Northern Ireland, the Republic of Ireland, and the Australian states of South<br />

Australia, and Victoria.<br />

Elements<br />

<strong>The</strong> actus reus of theft is usually defined as an unauthorized taking, keeping, or using of<br />

another's property which must be accompanied by a mens rea of dishonesty and the<br />

intent permanently to deprive the owner or rightful possessor of that property or its use.<br />

For example, if X goes to a restaurant and, by mistake, takes Y's scarf instead of her<br />

own, she has physically deprived Y of the use of the property (which is the actus reus)<br />

but the mistake prevents X from forming the mens rea (i.e., because she believes that<br />

she is the owner, she is not dishonest and does not intend to deprive the "owner" of it)<br />

Page 275 of 372


so no crime has been committed at this point. But if she realizes the mistake when she<br />

gets home and could return the scarf to Y, she will steal the scarf if she dishonestly<br />

keeps it (see theft by finding). Note that there may be civil liability for the torts of<br />

trespass to chattels or conversion in either eventuality.<br />

Canada<br />

By Jurisdiction<br />

Section 322(1) of the Criminal Code provides the general definition for theft in Canada:<br />

322. (1) Every one commits theft who fraudulently and without color of right takes, or<br />

fraudulently and without color of right converts to his/her use or to the use of another<br />

person, anything, whether animate or inanimate, with intent<br />

(a) to deprive, temporarily or absolutely, the owner of it, or a person who has a special<br />

property or interest in it, of the thing or of his property or interest in it;<br />

(b) to pledge it or deposit it as security;<br />

(c) to part with it under a condition with respect to its return that the person who parts<br />

with it may be unable to perform; or<br />

(d) to deal with it in such a manner that it cannot be restored in the condition in which it<br />

was at the time it was taken or converted.<br />

Sections 323 to 333 provide for more specific instances and exclusions:<br />

theft from oyster beds (s. 323)<br />

theft by bailee of things under seizure (s. 324)<br />

exception when agent is pledging goods (s. 325)<br />

theft of telecommunications service (s. 326)<br />

possession of device to obtain telecommunication facility or service (s. 327)<br />

theft by or from person having special property or interest (s. 328)<br />

theft by person required to account (s. 330)<br />

theft by person holding power of attorney (s. 331)<br />

misappropriation of money held under direction (s. 332)<br />

exception for ore taken for exploration or scientific research (s. 333)<br />

<strong>In</strong> the general definition above, the Supreme Court of Canada has construed "anything"<br />

very broadly, stating that it is not restricted to tangibles, but includes intangibles. To be<br />

the subject of theft it must, however:<br />

<br />

<br />

<br />

<br />

be property of some sort;<br />

be property capable of being<br />

taken (therefore intangibles are excluded); or<br />

converted (and may be an intangible);<br />

Page 276 of 372


taken or converted in a way that deprives the owner of his/her proprietary interest<br />

in some way.<br />

Because of this, confidential information cannot be the subject of theft, as it is not<br />

capable of being taken as only tangibles can be taken. It cannot be converted, not<br />

because it is an intangible, but because, save in very exceptional far-fetched<br />

circumstances, the owner would never be deprived of it. However, the theft of trade<br />

secrets in certain circumstances does constitute part of the offence of economic<br />

espionage, which can be prosecuted under s. 19 of the Security of <strong>In</strong>formation Act.<br />

For the purposes of punishment, Section 334 divides theft into two separate offences,<br />

according to the value and nature of the goods stolen:<br />

<br />

<br />

<br />

If the thing stolen is worth more than $5000 or is a testamentary instrument the<br />

offence is commonly referred to as <strong>The</strong>ft Over $5000 and is an indictable<br />

offence with a maximum punishment of 10 years imprisonment.<br />

Where the stolen item is not a testamentary instrument and is not worth more<br />

than $5000 it is known as <strong>The</strong>ft Under $5000 and is a hybrid offence, meaning<br />

that it can be treated either as an indictable offence or a less serious summary<br />

conviction offence, depending on the choice of the prosecutor.<br />

if dealt with as an indictable offence, it is punishable by imprisonment for not<br />

more than 2 years, and,<br />

Page 277 of 372


if treated as a summary conviction offence, it is punishable by 6 months<br />

imprisonment, a fine of $2000 or both.<br />

Where a motor vehicle is stolen, Section 333.1 provides for a maximum punishment of<br />

10 years for an indictable offence (and a minimum sentence of six months for a third or<br />

subsequent conviction), and a maximum sentence of 18 months on summary<br />

conviction.<br />

Hong Kong<br />

Article 2 of the <strong>The</strong>ft Ordinance provides the general definition of theft in Hong Kong:<br />

(1) A person commits theft if he dishonestly appropriates property belonging to another<br />

with the intention of permanently depriving the other of it; and thief and steal shall be<br />

construed accordingly.<br />

(2) It is immaterial whether the appropriation is made with a view to gain, or is made for<br />

the thief’s own benefit.<br />

<strong>The</strong> Netherlands<br />

<strong>The</strong>ft is a crime with related articles in the Wetboek van Strafrecht.<br />

<br />

<br />

Article 310 prohibits theft (Dutch: diefstal), which is defined as taking away any<br />

object that (partly) belongs to someone else, with the intention to appropriate it<br />

illegally. Maximum imprisonment is 4 years or a fine of the fifth category.<br />

Article 311 consists of the following:<br />

o<br />

Part 1. Punishable with maximum imprisonment of 6 years or a fine of the<br />

fourth category is:<br />

• 1. <strong>The</strong>ft of cattle;<br />

• 2. <strong>The</strong>ft during certain emergency occasions;<br />

• 3. <strong>The</strong>ft during night in a residence by someone who is there<br />

without knowledge or permission of the owner;<br />

• 4. <strong>The</strong>ft by 2 or more organized people;<br />

• 5. <strong>The</strong>ft, where the thief got access by means of violence, climbing<br />

in, using false keys or disguise;<br />

• 6. Terroristic theft.<br />

o<br />

Part 2. When theft if committed as in 3 with the situation of 4 and 5, the<br />

punishment is a maximum imprisonment of 9 years or a fine of the fifth<br />

category.<br />

<br />

Article 312 consists of the following:<br />

Page 278 of 372


o<br />

o<br />

Part 1 prohibits robbery (Dutch: beroving), which is defined as taking away<br />

any object with violence or with threat of violence. Maximum imprisonment<br />

is 9 years or a fine with the fifth category<br />

Part 2 allows maximum imprisonment of 12 years or a fine of the fifth<br />

category when:<br />

• 1. Robbery was committed during night, in a residence, on the<br />

public road or moving train;<br />

• 2. Robbery was committed by 2 or more people;<br />

• 3. Robbery was committed by violence, climbing in, false key or<br />

disguise;<br />

• 4. Robbery caused severe injury;<br />

• 5. Robbery was terroristic.<br />

o<br />

Part 3 allows maximum imprisonment of 15 years instead of 12 when<br />

robbery caused death to the victim.<br />

<br />

Article 314 consists of the following:<br />

Page 279 of 372


o<br />

o<br />

Part 1 prohibits poaching (Dutch: stroperij), which is defined as taking<br />

away without violence the following: clay, sand, earth, raw wood, fallen<br />

vegetables (see the source for a complete list). Maximum imprisonment is<br />

one month or a fine of the second category.<br />

Part 2 increases the maximum imprisonment to 2 months when the crime<br />

is committed again less than 2 years after the first time.<br />

<br />

Article 315 increases the maximum imprisonment and fine category when<br />

poaching is done with vehicles and draft animals. Maximum imprisonment is 3<br />

years or a fine of the fourth category.<br />

Republic of Ireland<br />

<strong>The</strong>ft is a statutory offence, created by section 4(1) of the Criminal Justice (<strong>The</strong>ft and<br />

Fraud Offences) Act, 2001.<br />

Romania<br />

According to the Romanian Penal Code a person committing theft (furt) can face a<br />

penalty ranging from 1 to 20 years.<br />

Degrees of theft:<br />

<br />

<br />

<br />

<br />

Article 208: <strong>The</strong>ft (1 to 12 years)—When a person steals an object, or uses a<br />

vehicle without permission and no aggravating circumstances apply.<br />

Article 209: Qualified theft (3 to 20 years)<br />

Aggravating circumstances (3 to 15 years): a) by two or more persons together;<br />

b) by a person in possession of a gun or a narcotic substance; c) by a masked or<br />

disguised person; d) against a person who cannot defend his or herself; e) in a<br />

public place; f) in a public transportation vehicle; g) during nighttime; h) during a<br />

natural disaster; i) through burglary, or by using an original or copied key; j)<br />

stealing national treasures; k) stealing official identity papers with the intention to<br />

make use of them; l) stealing official identity badges with the intention to make<br />

use of them.<br />

Aggravating circumstances (4 to 18 years): a) stealing petrol-based products<br />

directly from transportation pipes and vehicles or deposits; b) stealing<br />

components from national electrification, telecommunication, irrigation networks<br />

or from any type of navigational system; c) stealing a siren; d) stealing a public<br />

intervention vehicle or device; e) stealing something which jeopardises the safety<br />

of public transportation.<br />

Page 280 of 372


Aggravating circumstances (10 to 20 years): when the consequences are<br />

extremely grave and affect public institutions or the material stolen is worth over<br />

200,000 RON (approximately US$80,000).<br />

United Kingdom<br />

England and Wales<br />

<strong>In</strong> England and Wales, theft is a statutory offence, created by section 1(1) of the <strong>The</strong>ft<br />

Act 1968. This offence replaces the former offences of larceny, embezzlement and<br />

fraudulent conversion.<br />

<strong>The</strong> marginal note to section 1 of the <strong>The</strong>ft Act 1968 describes it as a "basic definition"<br />

of theft. Sections 1(1) and (2) provide:<br />

1.-(1) A person is guilty of theft, if he dishonestly appropriates property belonging to<br />

another with the intention of permanently depriving the other of it; and "thief" and "steal"<br />

shall be construed accordingly.<br />

(2) It is immaterial whether the appropriation is made with a view to gain, or is made for<br />

the thief’s own benefit.<br />

Page 281 of 372


Sections 2 to 6 of the <strong>The</strong>ft Act 1968 have effect as regards the interpretation and<br />

operation of section 1 of that Act. Except as otherwise provided by that Act, sections 2<br />

to 6 of that Act apply only for the purposes of section 1 of that Act.<br />

Appropriates<br />

Section 3 provides:<br />

(1) Any assumption by a person of the rights of an owner amounts to an appropriation,<br />

and this includes, where he has come by the property (innocently or not) without<br />

stealing it, any later assumption of a right to it by keeping or dealing with it as owner.<br />

(2) Where property or a right or interest in property is or purports to be transferred for<br />

value to a person acting in good faith, no later assumption by him of rights which he<br />

believed himself to be acquiring shall, by reason of any defect in the transferor’s title,<br />

amount to theft of the property.<br />

Property<br />

Section 4(1) provides that:<br />

"Property" includes money and all other property, real or personal, including things in<br />

action and other intangible property.<br />

Edward Griew said that section 4(1) could, without changing its meaning, be reduced,<br />

by omitting words, to:<br />

"Property" includes … all … property.<br />

Sections 4(2) to (4) provide that the following can only be stolen under certain<br />

circumstances:<br />

Land or things forming part of land and severed from it (s. 4(2))<br />

Mushrooms growing wild on any land, or the flowers, fruit or foliage of plants<br />

growing wild on any land (s. 4(3))<br />

Wild creatures or the carcases of wild creatures (s. 4(4))<br />

<strong>In</strong>tangible property<br />

Confidential information and trade secrets are not property within the meaning of<br />

section 4.<br />

<strong>The</strong> words "other intangible property" include export quotas that are transferable for<br />

value on a temporary or permanent basis.<br />

Page 282 of 372


Electricity<br />

Electricity cannot be stolen. It is not property within the meaning of section 4 and is not<br />

appropriated by switching on a current. Cf. the offence of abstracting electricity under<br />

section 13.<br />

Belonging to Another<br />

Section 5 "belonging to another" requires a distinction to be made between ownership,<br />

possession and control:<br />

<br />

<br />

<br />

ownership is where a person is not legally accountable to anyone else for the use<br />

of the property:<br />

possession is where a person is only accountable to the owner for the use of the<br />

property; and<br />

control is where a person is only accountable to two people for the use of the<br />

property.<br />

So if A buys a car for cash, A will be the owner. If A then lends the car to B Ltd (a<br />

company), B Ltd will have possession. C, an employee of B Ltd then uses the car and<br />

has control. If C uses the car in an unauthorized way, C will steal the car from A and B<br />

Ltd. This means that it is possible to steal one's own property.<br />

<strong>In</strong> R v Turner, the owner removed his car from the forecourt of a garage where it had<br />

been left for collection after repair. He intended to avoid paying the bill. <strong>The</strong>re was an<br />

appropriation of the car because it had been physically removed but there were two<br />

issues to be decided:<br />

Page 283 of 372


did the car "belong to another"? <strong>The</strong> garage had a lien i.e. a "proprietary right or<br />

interest" in the car as security for the unpaid bill and this gave the garage a better<br />

right than the owner to possess the car at the relevant time.<br />

what was the relevance of Turner's belief that he could not steal his own<br />

property? <strong>The</strong> defence of mistake of law only applies if the defendant honestly<br />

believes that he has a right in law to act in the given way. Generalized and nonspecific<br />

beliefs about what the law might permit are not a defense.<br />

With <strong>The</strong> <strong>In</strong>tention of Permanently Depriving <strong>The</strong> Other of It<br />

Section 6 "with the intent to permanently deprive the other of it" is sufficiently flexible to<br />

include situations where the property is later returned. For example, suppose that B, a<br />

keen football fan, has bought a ticket for the next home match. T takes the ticket,<br />

watches the match and then returns the ticket to B. <strong>In</strong> this instance, all that T returns is<br />

a piece of paper. Its value as a license to enter the stadium on a particular day has<br />

been permanently lost. Hence, T steals the ticket.<br />

Similarly, if T takes a valuable antique but later repents and returns the goods, T has<br />

committed the actus reus with the mens rea. <strong>The</strong> fact that T's conscience forces a<br />

change of mind is relevant only for sentencing.<br />

Alternative Verdict<br />

<strong>The</strong> offense created by section 12(1) of the <strong>The</strong>ft Act 1968 (TWOC) is available an<br />

alternative verdict on an indictment for theft.<br />

Visiting forces<br />

<strong>The</strong>ft is an offence against property for the purposes of section 3 of the Visiting Forces<br />

Act 1952.<br />

Mode of Trial and Sentence<br />

<strong>The</strong>ft is triable either way. A person guilty of theft is liable, on conviction on indictment,<br />

to imprisonment for a term not exceeding seven years, or on summary conviction to<br />

imprisonment for a term not exceeding six months, or to a fine not exceeding the<br />

prescribed sum, or to both.<br />

Aggravated <strong>The</strong>ft<br />

<strong>The</strong> only offence of aggravated theft is robbery, contrary to section 8 of the <strong>The</strong>ft Act<br />

1968.<br />

Page 284 of 372


Stolen Goods<br />

For the purposes of the provisions of the <strong>The</strong>ft Act 1968 which relate to stolen goods,<br />

goods obtain in England or Wales or elsewhere by blackmail or fraud are regarded as<br />

stolen, and the words "steal", "theft" and "thief" are construed accordingly.<br />

Sections 22 to 24 and 26 to 28 of the <strong>The</strong>ft Act 1968 contain references to stolen goods.<br />

Handling stolen goods<br />

<strong>The</strong> offence of handling stolen goods, contrary to section 22(1) of the <strong>The</strong>ft Act 1968,<br />

can only be committed "otherwise than in the course of stealing".<br />

Similar or Associated Offences<br />

According to its title, the <strong>The</strong>ft<br />

theft and similar or associated<br />

1978.<br />

Act 1968 revises the law as to<br />

offences. See also the <strong>The</strong>ft Act<br />

Northern Ireland<br />

<strong>In</strong> Northern Ireland, theft is a<br />

statutory offence, created by<br />

section 1 of the <strong>The</strong>ft Act (Northern Ireland) 1969.<br />

United States<br />

<strong>In</strong> the United States, plenary regulation of theft exists only at<br />

the state level, in the sense that most thefts by default will be<br />

prosecuted by the state in which the theft occurred. <strong>The</strong> federal<br />

government has criminalized certain narrow categories of theft which<br />

directly affect federal agencies or interstate commerce. <strong>The</strong> Model Penal Code includes<br />

categories of theft by unlawful taking or by unlawfully disposing of property, theft by<br />

deception (fraud), theft by extortion, theft by failure to take measures to return lost or<br />

mislaid or mistakenly delivered property, theft by receipt of stolen property, theft by<br />

failing to make agreed disposition of received funds, and theft of services.<br />

Although many U.S. states have retained larceny as the primary offense, [40] some have<br />

now adopted theft provisions.<br />

Grand theft, also called grand larceny, is a term used throughout the United States<br />

designating theft that is large in magnitude or serious in potential penological<br />

consequences. Grand theft is contrasted with petty theft, also called petit theft, that is<br />

of smaller magnitude or lesser seriousness.<br />

<strong>The</strong>ft laws, including the distinction between grand theft and petty theft for cases falling<br />

within its jurisdiction, vary by state. This distinction is established by statute, as are the<br />

Page 285 of 372


penological consequences. Most commonly, statutes establishing the distinction<br />

between grand theft and petty theft do so on the basis of the value of the money or<br />

property taken by the thief or lost by the victim, with the dollar threshold for grand theft<br />

varying from state to state. Most commonly, the penological consequences of the<br />

distinction include the significant one that grand theft can be treated as a felony, while<br />

petty theft is generally treated as a misdemeanor.<br />

<strong>In</strong> some states, grand theft of a vehicle may be charged as "grand theft auto" (see<br />

motor vehicle theft for more information).<br />

Repeat offenders who continue to steal may become subject to life imprisonment in<br />

certain states.<br />

Sometimes the federal anti-theft-of-government-property law 18 U.S.C. § 640 is used to<br />

prosecute cases where the Espionage Act would otherwise be involved; the theory<br />

being that by retaining sensitive information, the defendant has taken a 'thing of value'<br />

from the government. For examples, see the Amerasia case and United States v.<br />

Manning.<br />

Alabama<br />

When stolen property exceeds the amount of $500 it is a felony offense. If property is<br />

less than $500, then it is a Class A misdemeanor. Unlike some other states, shoplifting<br />

is not defined by a separate statute but falls under the state's general theft statute.<br />

Alaska<br />

<strong>The</strong> Alaska State Code does not use the terms "grand theft" or "grand larceny."<br />

However, it specifies that theft of property valued at more than $1,000 is a felony<br />

whereas thefts of lesser amounts are misdemeanors. <strong>The</strong> felony categories (class 1<br />

and class 2 theft) also include theft of firearms; property taken from the person of<br />

another; vessel or aircraft safety or survival equipment; and of access devices.<br />

Arizona<br />

Felony theft is committed when the value of the stolen property exceeds $1000.<br />

Regardless of the value of the item, if it is a firearm or an animal taken for the purpose<br />

of animal fighting, then the theft is a Class 6 Felony.<br />

California<br />

<strong>The</strong> <strong>The</strong>ft Act of 1927 consolidated a variety of common law crimes into theft. <strong>The</strong> state<br />

now distinguishes between two types of theft, grand theft and petty theft. <strong>The</strong> older<br />

crimes of embezzlement, larceny, and stealing, and any preexisting references to them<br />

now fall under the theft statute.<br />

Page 286 of 372


<strong>The</strong>re are a number of criminal statutes in the California Penal Code defining grand<br />

theft in different amounts. Grand theft generally consists of the theft of something of<br />

value over $950 (including money, labor or property but is lower with respect to various<br />

specified property), <strong>The</strong>ft is also considered grand theft when more than $250 in crops<br />

or marine life forms are stolen, “when the property is taken from the person of another,”<br />

or when the property stolen is an automobile, farm animal, or firearm.<br />

Petty theft is the default category for all other thefts.<br />

Grand theft is punishable by up to a year in jail or prison, and may be charged<br />

(depending upon the circumstances) as a misdemeanor or felony, while petty theft is a<br />

misdemeanor punishable by a fine or imprisonment not exceeding six months in jail or<br />

both.<br />

Florida<br />

<strong>In</strong> general, any property taken that carries a value of more than $300 can be considered<br />

grand theft in certain circumstances.<br />

Georgia<br />

<strong>In</strong> Georgia, when a theft offense involves property valued at $500 or less, the crime is<br />

punishable as a misdemeanor.<br />

Any theft of property determined to be exceeding $500 may be treated as grand theft<br />

and charged as a felony.<br />

Page 287 of 372


Hawaii<br />

<strong>The</strong>ft in the first or second degree is a felony. <strong>The</strong>ft in the first degree means theft<br />

above $20,000 or of a firearm or explosive; or theft over $300 during a declared<br />

emergency. <strong>The</strong>ft in the second degree means theft above $750, theft from the person<br />

of another, or agricultural products over $100 or aqua-cultural products from an<br />

enclosed property.<br />

Illinois<br />

<strong>The</strong>ft is a felony if the value of the property exceeds $300 or the property is stolen from<br />

the person of another. Thresholds at $10,000, $100,000, and $500,000 determine how<br />

severe the punishment can be. <strong>The</strong> location from which property was stolen is also a<br />

factor in sentencing.<br />

Kentucky<br />

KRS 514.030 states that theft by unlawful taking or disposition is generally a Class A<br />

misdemeanor unless the items stolen are a firearm, anhydrous ammonia, a controlled<br />

substance valued at less than $10,000 or any other item or combination of items valued<br />

$500 or higher and less than $10,000 in which case the theft is a Class D felony.<br />

<strong>The</strong>ft of items valued at $10,000 or higher and less than $1,000,000 is a Class C felony.<br />

<strong>The</strong>ft of items valued at $1,000,000 or more is a Class B felony, as is first offense theft<br />

of anhydrous ammonia for the express purpose of manufacturing methamphetamines in<br />

violation of KRS 218A.1432. <strong>In</strong> the latter case, subsequent offenses are a Class A<br />

felony.<br />

Massachusetts<br />

<strong>In</strong> Massachusetts, theft may generally be charged as a felony alue of stolen property is<br />

greater than $250.<br />

Missouri<br />

Stealing is a felony if the value of stolen property exceeds $500. It is also a felony if<br />

“<strong>The</strong> actor physically takes the property appropriated from the person of the victim” or<br />

the stolen property is a vehicle, legal document, credit card, firearm, explosive, U.S. flag<br />

on display, livestock animal, fish with value exceeding $75, captive wildlife, controlled<br />

substance, or ammonia.<br />

Stealing in excess of $25,000 is usually a class B felony (sentence: 5–15 years), while<br />

any other felony stealing (not including the felonies of burglary or robbery) that does not<br />

involve chemicals is a class C felony (sentence: up to 7 years). Non-felony stealing is a<br />

class A misdemeanor (sentence: up to 1 year).<br />

Page 288 of 372


<strong>New</strong> York<br />

Grand larceny consists of stealing property with a value exceeding $1000; or stealing a<br />

public record, secret scientific material, firearm, credit or debit card, ammonia,<br />

telephone with service, or motor vehicle or religious item with value exceeding $100; or<br />

stealing from the person of another or by extortion or from an ATM.<br />

<strong>The</strong> degree of grand larceny is increased if the theft was from an ATM, through<br />

extortion involving fear, or involved a value exceeding the thresholds of $3,000,<br />

$50,000, or $1,000,000.<br />

Vermont<br />

Grand Larceny: Value of goods exceed $900 (13 V.S.A. § 2501)<br />

Virginia<br />

Grand Larceny: Value of goods exceed $200 (Virginia Code § 18.2-95)<br />

Washington State<br />

<strong>The</strong>ft of goods valued between $750 and $5000 is second-degree theft, a Class C<br />

felony. <strong>The</strong>ft of goods valued above $5000, of a search-and-rescue dog on duty, of<br />

public records from a public office or official, of metal wire from a utility, or of an access<br />

device, is a Class B felony, as is theft of a motor vehicle or a firearm.<br />

Page 289 of 372


Australia<br />

Actus reus<br />

Victoria<br />

<strong>The</strong>ft is defined in the <strong>Crime</strong>s Act 1958 (Vic) as when a person "dishonestly<br />

appropriates property belonging to another with the intention of permanently depriving<br />

the other of it.". <strong>The</strong> actus reus and mens rea are defined as follows: Appropriation is<br />

defined in section 73(4) of the <strong>Crime</strong>s Act 1958 (Vic) as the assumption of any of the<br />

owners rights. It does not have to be all the owner's rights, as long as at least one right<br />

has been assumed. If the owner gave their consent to the appropriation there cannot be<br />

an appropriation. However, if this consent is obtained by deception, this consent is<br />

vitiated.<br />

Property – defined in section 71(1) of the <strong>Crime</strong>s Act 1958 (Vic) as being both tangible<br />

property, including money and intangible property. <strong>In</strong>formation has been held not be<br />

property.<br />

Belonging to another – section 73(5) of the <strong>Crime</strong>s Act 1958 (Vic) provides that property<br />

belongs to another if that person has ownership, possession, or a proprietary interest in<br />

the property. Property can belong to more than one person. sections 73(9) & 73(10)<br />

deal with situations where the accused receives property under an obligation or by<br />

mistake.<br />

South Australia<br />

<strong>The</strong>ft is defined in section 134 of the Criminal Consolidation Act 1935 (SA) as being<br />

where a person deals with property dishonestly, without the owners consent and<br />

intending to deprive the owner of their property, or make a serious encroachment on the<br />

proprietary rights of the owner.<br />

Under this law, encroachment on proprietary rights means that the property is dealt with<br />

in a way that creates a substantial risk that the property will not be returned to the<br />

owner, or that the value of the property will be greatly diminished when the owner does<br />

get it back.<br />

Also, where property is treated as the defendants own property to dispose of,<br />

disregarding the actual property owner's rights.<br />

For a basic offence, a person found guilty of this offence is liable for imprisonment of up<br />

to 10 years.<br />

For an aggravated offence, a person found guilty of this offence is liable for<br />

imprisonment of up to 15 years.<br />

Page 290 of 372


Mens Rea<br />

Victoria<br />

<strong>In</strong>tention to permanently deprive – defined at s.73(12) as treating property as it belongs<br />

to the accused, rather than the owner.<br />

Dishonestly – section 73(2) of the <strong>Crime</strong>s Act 1958 (Vic) creates a negative definition of<br />

the term 'dishonestly'. <strong>The</strong> section deems only three circumstances when the accused<br />

is deemed to have been acting honestly. <strong>The</strong>se are a belief in a legal claim of right, a<br />

belief that the owner would have consented, or a belief the owner could not be found.<br />

South Australia<br />

Whether a person's conduct is dishonest is a question of fact to be determined by the<br />

jury, based on their own knowledge and experience. As with the definition in Victoria, it<br />

contains definitions of what is not dishonesty, including a belief in a legal claim of right<br />

or a belief the owner could not be found.<br />

West <strong>In</strong>dies<br />

Page 291 of 372


<strong>In</strong> the British West <strong>In</strong>dies, especially Grenada, there have been a spate of large-scale<br />

thefts of tons of sand from beaches. Both Grenada and Jamaica are considering<br />

increasing fines and jail time for the thefts.<br />

Islam<br />

Religious Views and Practices<br />

<strong>In</strong> parts of the world which govern with sharia law, the punishment for theft is<br />

amputation of the right hand if the thief does not repent. This ruling is derived from sura<br />

5 verse 38 of the Quran which states As to the thief, Male or female, cut off his or her<br />

hands: a punishment by way of example, from Allah, for their crime: and Allah is Exalted<br />

in power. This is viewed as being a deterrent.<br />

Buddhism<br />

<strong>In</strong> Buddhism, one of the five precepts prohibits theft, and involves the intention to steal<br />

what one perceives as not belonging to oneself ("what is not given") and acting<br />

successfully upon that intention. <strong>The</strong> severity of the act of theft is judged by the worth of<br />

the owner and the worth of that which is stolen. Underhand dealings, fraud, cheating<br />

and forgery are also included in this precept. Professions that are seen to violate the<br />

precept against theft are working in the gambling industry or marketing products that are<br />

not actually required for the customer.<br />

Psychology<br />

Possible causes for acts of theft include both economic and non-economic motivations.<br />

For example, an act of theft may be a response to the offender's feelings of anger, grief,<br />

depression, anxiety and compulsion, boredom, power and control issues, low selfesteem,<br />

a sense of entitlement, an effort to conform or fit in with a peer group, or<br />

rebellion. <strong>The</strong>ft from work may be attributed to factors that include greed, perceptions of<br />

economic need, support of a drug addiction, a response to or revenge for work-related<br />

issues, rationalization that the act is not actually one of stealing, response to<br />

opportunistic temptation, or the same emotional issues that may be involved in any<br />

other act of theft.<br />

<strong>The</strong> most common reasons for shoplifting include participation in an organized<br />

shoplifting ring, opportunistic theft, compulsive acts of theft, thrill-seeking, and theft due<br />

to need. Studies focusing on shoplifting by teenagers suggest that minors shoplift for<br />

reasons including the novelty of the experience, peer pressure, the desire to obtain<br />

goods that a minor cannot legally purchase, and for economic reasons, as well as selfindulgence<br />

and rebellion against parents.<br />

Page 292 of 372


XIX. Witness Tampering<br />

and <strong>In</strong>timidation<br />

Witness Tampering is the act of attempting to alter or prevent the testimony of<br />

witnesses within criminal or civil proceedings. Laws regarding witness tampering also<br />

apply to proceedings before the U.S. Congress, executive departments, and<br />

administrative agencies. To be charged with witness tampering in the United States, the<br />

attempt to alter or prevent testimony is sufficient. <strong>The</strong>re is no requirement that the<br />

intended obstruction of justice be completed.<br />

<strong>In</strong> situations where intimidation or retaliation against witnesses is likely (such as cases<br />

involving organized crime), witnesses may be placed in witness protection to prevent<br />

suspects or their colleagues from intimidating or harming them.<br />

<strong>In</strong> the United Kingdom, witness intimidation is covered by Criminal Justice and Public<br />

Order Act 1994, section 51. Under this act it is an offence to perform an act which is<br />

intended to and does intimidate a person who the offender knows or believes to be<br />

involved with a criminal case with the intention of disturbing the proceedings.<br />

United States<br />

<strong>In</strong> the United States, the crime of witness tampering in federal cases is defined by<br />

statute at 18 U.S.C. § 1512, which defines it as "tampering with a witness, victim, or an<br />

informant." <strong>The</strong> punishment for such an offense is up to 20 years if physical force was<br />

Page 293 of 372


used, attempted, or threatened. <strong>The</strong> tampering need not have actually been successful<br />

in order for it to be criminal.<br />

One of the better known cases involving Section 1512 is Arthur Andersen LLP v. United<br />

States, decided by the U.S. Supreme Court in May 2005. <strong>The</strong> Supreme Court ruled that<br />

Section 1512 had been misinterpreted by the Fifth Circuit Court of Appeals, and<br />

reversed the decision of the lower court which had found the firm guilty of violating the<br />

section. <strong>The</strong> issue had, to some extent, become moot, because in 2002 the firm had all<br />

but dissolved as a result of prosecution on this criminal charge.<br />

Examples of witness tampering include American politicians Buddy Cianci, Meg Scott<br />

Phipps and Ted Klaudt, convicted in 2001, 2003 and 2007, respectively.<br />

England and Wales<br />

<strong>In</strong> England and Wales, witness intimidation by unlawful means, such as violence,<br />

bribery, threats, or improper pressure, is known as Perverting the course of justice.<br />

Section 51 of the Criminal Justice and Public Order Act 1994 includes the offences of<br />

intimidating a witness and taking revenge on a witness.<br />

Kosovo<br />

By prosecutors<br />

A current source of controversy is the lack of penalties for prosecutors who commit<br />

witness tampering or other forms of prosecutorial misconduct. <strong>In</strong> the United States,<br />

prosecutors have full immunity from civil liability regardless of how egregious their<br />

actions may be. However, prosecutors do not have immunity from criminal proceedings<br />

and can be professionally censured, but studies demonstrate that this rarely happens.<br />

<strong>In</strong> March 2003, the U.S. Fifth Circuit Court of Appeals, ruled against a man named<br />

Shareef Cousin, who filed a lawsuit against <strong>New</strong> Orleans prosecutors after he was<br />

wrongfully convicted of the 1995 murder of Michael Gerardi. A number of examples of<br />

witness tampering during the trial were uncovered. <strong>In</strong> court, a friend of Cousin's was<br />

expected to testify for the prosecution that Cousin had confessed to him. <strong>In</strong>stead, he<br />

told jurors that he had been promised leniency in his own trial if he would falsely<br />

implicate Cousin for the murder.<br />

An eyewitness then testified that she saw Cousin commit the murder. Her original<br />

statement to police indicated that she had very poor vision and could not identify the<br />

killer. Her statements regarding her vision were not disclosed to the defense. Cousin<br />

also accused the state of illegally detaining many of his witnesses to prevent them from<br />

testifying in his defense.<br />

Page 294 of 372


<strong>In</strong>timidation<br />

<strong>In</strong>timidation (also called cowing) is intentional behavior that "would cause a person of<br />

ordinary sensibilities" to fear injury or harm. It is not necessary to prove that the<br />

behavior was so violent as to cause mean terror or that the victim was actually<br />

frightened.<br />

Threat, criminal threatening (or threatening behavior) is the crime of intentionally or<br />

knowingly putting another person in fear of bodily injury. "Threat of harm generally<br />

involves a perception of injury...physical or mental damage...act or instance of injury, or<br />

a material and detriment or loss to a person." "A terroristic threat is a crime generally<br />

involving a threat to commit violence communicated with the intent to terrorize other."<br />

"<strong>In</strong>timidation" is the name of a criminal offense in several U.S. states.<br />

Description<br />

Threatening behaviors may be conceptualized as a maladaptive outgrowth of normal<br />

competitive urge for inter-relational dominance generally seen in animals. Alternatively,<br />

intimidation may result from the type of society in which individuals are socialized, as<br />

human beings are generally reluctant to engage in confrontation or threaten violence.<br />

Like all behavioral traits, it exists in greater or lesser manifestation in each individual<br />

person over time, but may be a more significant "compensatory behavior" for some as<br />

opposed to others. Behavioral theorists often see threatening behaviors as a<br />

consequence of being threatened by others, including parents, authority figures,<br />

playmates and siblings. "Use of force is justified when a person reasonably believes that<br />

Page 295 of 372


it is necessary for the defense of oneself or another against the immediate use of<br />

unlawful force."<br />

<strong>In</strong>timidation may be employed consciously or unconsciously, and a percentage of<br />

people who employ it consciously may do so as the result of selfishly rationalized<br />

notions of its appropriation, utility or self-empowerment. <strong>In</strong>timidation related to prejudice<br />

and discrimination may include conduct "which annoys, threatens, intimidates, alarms,<br />

or puts a person in fear of their safety...because of a belief or perception regarding such<br />

person's race, color, national origin, ancestry, gender, religion, religious practice, age,<br />

disability or sexual orientation, regardless of whether the belief or perception is correct."<br />

<strong>In</strong>timidation may be manifested in such manner as physical contacts, glowering<br />

countenance, emotional manipulation, verbal abuse, making someone feel lower than<br />

you, purposeful embarrassment and/or actual physical assault. "Behavior may include,<br />

but is not limited to, epithets, derogatory comments or slurs and lewd propositions,<br />

assault, impeding or blocking movement, offensive touching or any physical interference<br />

with normal work or movement, and visual insults, such as derogatory posters or<br />

cartoons."<br />

United States<br />

As a Criminal Offense<br />

"<strong>In</strong>timidation" is the name of a criminal offense in several U.S. states. <strong>The</strong> definitions of<br />

the crime of <strong>In</strong>timidation differ by state.<br />

<strong>In</strong> Montana, <strong>In</strong>timidation is defined as follows:<br />

45-5-203. <strong>In</strong>timidation.<br />

(1) A person commits the offense of intimidation when, with the purpose to cause<br />

another to perform or to omit the performance of any act, the person communicates to<br />

another, under circumstances that reasonably tend to produce a fear that it will be<br />

carried out, a threat to perform without lawful authority any of the following acts:<br />

(a) inflict physical harm on the person threatened or any other person;<br />

(b) subject any person to physical confinement or restraint; or<br />

(c) commit any felony.<br />

(2) A person commits the offense of intimidation if the person knowingly communicates<br />

a threat or false report of a pending fire, explosion, or disaster that would endanger life<br />

or property.<br />

(3) A person convicted of the offense of intimidation shall be imprisoned in the state<br />

prison for any term not to exceed 10 years or be fined an amount not to exceed<br />

$50,000, or both.<br />

Page 296 of 372


Several states have a crime called "Ethnic intimidation". For instance, the law of the<br />

state of Michigan reads:<br />

750.147b Ethnic intimidation.<br />

Sec. 147b.<br />

(1) A person is guilty of ethnic intimidation if that person maliciously, and with specific<br />

intent to intimidate or harass another person because of that person's race, color,<br />

religion, gender, or national origin, does any of the following:<br />

(a) Causes physical contact with another person.<br />

(b) Damages, destroys, or defaces any real or personal property of another<br />

person.<br />

(c) Threatens, by word or act, to do an act described in subdivision (a) or (b), if<br />

there is reasonable cause to believe that an act described in subdivision (a) or<br />

(b) will occur.<br />

(2) Ethnic intimidation is a felony punishable by imprisonment for not more than 2 years,<br />

or by a fine of not more than $5,000.00, or both.<br />

(3) Regardless of the existence or outcome of any criminal prosecution, a person who<br />

suffers injury to his or her person or damage to his or her property as a result of ethnic<br />

intimidation may bring a civil cause of action against the person who commits the<br />

offense to secure an injunction, actual damages, including damages for emotional<br />

distress, or other appropriate relief. A plaintiff who prevails in a civil action brought<br />

pursuant to this section may recover both of the following:<br />

(a) Damages in the amount of 3 times the actual damages described in this<br />

subsection or $2,000.00, whichever is greater.<br />

(b) Reasonable attorney fees and costs.<br />

<strong>Crime</strong>s closely related to intimidation are menacing, coercion, terrorizing, and<br />

assault.<br />

<strong>In</strong> California, making criminal threats is a wobbler and may be charged as either a<br />

misdemeanor or a felony under California Penal Code 422. A felony criminal threat is a<br />

strike under California's three strikes law.<br />

As a Civil Offense<br />

United States<br />

<strong>In</strong>timidation can also be a civil offense, in addition to a criminal offense, in some U.S.<br />

states. For example, in Oregon a violation of the state criminal statute for intimidation<br />

Page 297 of 372


esults in a civil violation. <strong>The</strong> plaintiff in the civil suit for intimidation may then secure<br />

remedies including an injunction or special and general damages.<br />

Page 298 of 372


XX. Transnational <strong>Crime</strong><br />

Transnational <strong>Crime</strong>s are crimes that have actual or potential effect across national<br />

borders and crimes that are intrastate but offend fundamental values of the international<br />

community. <strong>The</strong> term is commonly used in the law enforcement and academic<br />

communities. Transnational organized crime (TOC) refers specifically to transnational<br />

crime carried out by crime organizations.<br />

<strong>The</strong> word transnational describes crimes that are not only international (that is, crimes<br />

that cross borders between countries), but crimes that by their nature involve crossborder<br />

transference as an essential part of the criminal activity. Transnational crimes<br />

also include crimes that take place in one country, but their consequences significantly<br />

affect another country and transit countries may also be involved.<br />

Examples of transnational crimes include: human trafficking, people smuggling,<br />

smuggling/trafficking of goods (such as arms trafficking and drug trafficking and illegal<br />

animal and plant products and other goods prohibited on environmental grounds (e.g.<br />

banned ozone depleting substances), sex slavery, terrorism offences, torture and<br />

apartheid.<br />

Transnational crimes may also be crimes of customary international law or international<br />

crimes when committed in certain circumstances. For example, they may in certain<br />

situations constitute crimes against humanity.<br />

Page 299 of 372


<strong>In</strong> Failed or Failing States<br />

<strong>The</strong> international community is confronted with an increasing level of transnational<br />

crime in which criminal conduct in one country has an impact in another or even several<br />

others. Drug trafficking, human trafficking, computer crimes, terrorism, and a host of<br />

other crimes can involve actors operating outside the borders of a country which might<br />

have a significant interest in stemming the activity in question and prosecuting the<br />

perpetrator. Contemporary transnational crimes take advantage of globalization, trade<br />

liberalization and exploding new technologies to perpetrate diverse crimes and to move<br />

money, goods, services and people instantaneously for purposes of perpetrating<br />

violence for political ends.<br />

Moreover, problems of weakened states and transnational crime create an unholy<br />

confluence that is uniquely challenging. When a criminal operates outside the territory of<br />

an offended state, the offended state might ordinarily appeal to the state from which the<br />

criminal is operating to take some sort of action, such as to prosecute the offender<br />

domestically or extradite the offender so that he or she may face punishment in the<br />

offended state. Nonetheless, in situations in which a government is unable (or unwilling)<br />

to cooperate in the arrest or prosecution of a criminal, the offended state has few<br />

options for recourse. [3]<br />

<strong>In</strong>ternational Cooperation<br />

Given the limits on the exercise of extraterritorial enforcement jurisdiction, states have<br />

developed mechanisms to cooperate in transnational criminal matters. <strong>The</strong> primary<br />

mechanisms used in this regard are extradition, lawful removal, and mutual legal<br />

assistance.<br />

Extradition is the mechanism by which one sovereign requests and obtains custody of a<br />

fugitive located within the jurisdiction and control of another sovereign. It is an ancient<br />

mechanism, dating back to at least the thirteenth century BCE, when an Egyptian<br />

Pharaoh negotiated an extradition treaty with a Hittite King. Through the extradition<br />

process, a sovereign (the requesting state) typically makes a formal request to another<br />

sovereign (the requested state). If the fugitive is found within the territory of the<br />

requested state, then the requested state may arrest the fugitive and subject him or her<br />

to its extradition process. <strong>The</strong> extradition procedures to which the fugitive will be<br />

subjected are dependent on the law and practice of the requested state.<br />

Aside from mechanisms for the return of fugitives, states have also developed<br />

mechanisms for requesting and obtaining evidence for criminal investigations and<br />

prosecutions. When evidence or other forms of legal assistance, such as witness<br />

statements or the service of documents, are needed from a foreign sovereign, states<br />

may attempt to cooperate informally through their respective police agencies or,<br />

alternatively, resort to what is typically referred to as requests for "mutual legal<br />

assistance" [3] <strong>The</strong> practice of mutual legal assistance developed from the comity-based<br />

system of letters rogatory, though it is now far more common for states to make mutual<br />

Page 300 of 372


legal assistance requests directly to the designated "Central Authorities" within each<br />

state. <strong>In</strong> contemporary practice, such requests may still be made on the basis of<br />

reciprocity but may also be made pursuant to bilateral and multilateral treaties that<br />

obligate countries to provide assistance. Many countries are able to provide a broad<br />

range of mutual legal assistance to other countries even in the absence of a treaty.<br />

Torture<br />

<strong>The</strong>re can be few issues on which international legal opinion is more clear than on the<br />

condemnation of torture. Offenders have been recognized as the "common enemies of<br />

mankind"<br />

— Lord Bingham<br />

Page 301 of 372


Page 302 of 372


XXI. Criminal Enterprises, Gangs<br />

and Syndicates<br />

This is a listing of enterprises, gangs, mafias and syndicates that are involved in<br />

organized crime. Tongs and outlaw motorcycle gangs, as well as terrorist, militant, and<br />

paramilitary groups are mentioned if they are involved in criminal activity for funding.<br />

However, since their stated aim and genesis is often ideological rather than commercial,<br />

they are distinct from mafia-type groups.<br />

Drug Cartels<br />

<strong>In</strong> several drug-producing or transit countries, drug traffickers have taken advantage of<br />

local corruption and lack of law enforcement to establish cartels turning in millions if not<br />

billions of dollars each year. Sometimes if government enforcement is particularly poor,<br />

the cartels become quasi-paramilitary organizations.<br />

Latin America<br />

<br />

<br />

<br />

Dominican drug cartels<br />

o Paulino organization<br />

o Féliz organization<br />

Bolivian drug cartels (See also García Meza regime drug trafficking)<br />

o La Corporación<br />

o Santa Cruz cartel<br />

Nicaraguan drug cartels (see also Contras)<br />

o Oscar Danilo Blandón<br />

Page 303 of 372


Peruvian drug cartels (see also Shining Path and Vladimiro Montesinos)<br />

o Zevallos organisation<br />

Honduran drug cartels<br />

o Matta organization<br />

o Cachiros<br />

Venezuelan drug cartels (see also Colectivos)<br />

o Cartel of the Suns<br />

Colombia<br />

Active<br />

<br />

<br />

Bandas criminales (See also Paramilitarism in Colombia)<br />

o Clan del Golfo<br />

<strong>The</strong> Office of Envigado<br />

Defunct<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Medellín Cartel (See also Muerte a Secuestradores)<br />

o<br />

• Miami branch<br />

Cali Cartel (see also Los Pepes)<br />

Norte del Valle Cartel<br />

North Coast Cartel<br />

Leticia Cartel<br />

Los Rastrojos<br />

<strong>New</strong> Generation<br />

Los Nevados<br />

Los Machos<br />

Popular Revolutionary Antiterrorist Army of Colombia<br />

Bloque Meta<br />

Libertadores del Vichada<br />

Black Eagles<br />

Mexico<br />

<br />

<br />

Sinaloa Cartel<br />

o Milenio Cartel (defunct)<br />

o Colima Cartel (defunct)<br />

o Artistas Asesinos (defunct)<br />

o Gente Nueva<br />

o Jalisco <strong>New</strong> Generation Cartel<br />

o Los Ántrax<br />

Gulf Cartel<br />

o Los Rojos<br />

o Los Metros<br />

Page 304 of 372


Los Zetas<br />

o Guatemala branch (defunct)<br />

Knights Templar Cartel<br />

La Familia Michoacana (defunct)<br />

o La Resistencia (defunct)<br />

Juárez Cartel (disbanded)<br />

o La Linea<br />

Tijuana Cartel (disbanded)<br />

o Oaxaca Cartel (defunct)<br />

o Los Santos street gang<br />

Guadalajara Cartel (defunct)<br />

o Sonora Cartel (defunct)<br />

Beltrán-Leyva Cartel (defunct)<br />

o Los Negros (defunct)<br />

o Los Pelones (defunct)<br />

o Los Mazatlecos (still active)<br />

o Guerreros Unidos (still active)<br />

o South Pacific Cartel (defunct)<br />

o <strong>In</strong>dependent Cartel of Acapulco (defunct)<br />

o La Barredora (defunct)<br />

Los Narcosatánicos (defunct)<br />

Asia<br />

<br />

<br />

Golden Triangle<br />

o Burmese drug cartels(see also Myanmar Nationalities Democratic Alliance<br />

Army)<br />

• Khun Sa cartel (see also Mong Tai Army)<br />

• Red Wa Cartel (see also United Wa State Army and National<br />

Democratic Alliance Army)<br />

• Hawngleuk Militia<br />

• Han cartel<br />

o Laotian drug cartels (see also Ouane Rattikone)<br />

Golden Crescent<br />

o Afridi Network<br />

o Afghan drug cartels (see also Taliban)<br />

• Noorzai Organization<br />

• Khan organization<br />

• Karzai organization (alleged)<br />

• Bagcho organization<br />

• Haqqani Network<br />

Page 305 of 372


North American <strong>Organized</strong> <strong>Crime</strong><br />

Canada<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Rivard organization<br />

Red Scorpions<br />

Bacon Brothers<br />

West End Gang<br />

Dubois Brothers<br />

<strong>In</strong>do-Canadian organized crime<br />

o Punjabi Mafia जोहल गिरोह (Canada)<br />

Canadian mafia families<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Rizzuto crime family<br />

Cuntrera-Caruana Mafia clan<br />

Cotroni crime family<br />

Musitano crime family<br />

Papalia crime family<br />

Perri crime family<br />

Siderno Group<br />

Commisso 'ndrina<br />

Luppino crime family<br />

United States<br />

<br />

<br />

<br />

National <strong>Crime</strong> Syndicate<br />

o Seven Group<br />

o Murder, <strong>In</strong>c.<br />

Prohibition-era gangs<br />

o Galveston<br />

• Downtown Gang<br />

• Beach Gang<br />

• <strong>The</strong> Maceo syndicate<br />

o Broadway Mob<br />

o <strong>The</strong> Lanzetta Brothers<br />

o Shelton Brothers Gang<br />

o Sheldon Gang<br />

o Circus Cafe Gang<br />

o Wandering Family<br />

Polish Mob<br />

o Saltis-McErlane Gang<br />

o Kielbasa Posse<br />

o <strong>The</strong> Greenpoint Crew<br />

o Flats Mob<br />

o <strong>The</strong> Flathead gang<br />

Page 306 of 372


Dixie Mafia<br />

o Cornbread Mafia<br />

o State Line Mob<br />

Wall gang<br />

Greek-American organized crime<br />

o Philadelphia Greek Mob<br />

o Velentzas Family<br />

Hispanic-American<br />

o Marielitos<br />

• <strong>The</strong> Corporation<br />

o Puerto Rican mafia<br />

• Agosto organization<br />

• La ONU<br />

• Solano organization<br />

• Negri organization<br />

• Márquez gambling ring<br />

o Polanco-Rodriguez organization<br />

Assyrian/Chaldean mafia<br />

Hawaii<br />

o <strong>The</strong> Company<br />

o Leota mob<br />

Los Angeles<br />

o Nash gang<br />

o Wonderland Gang<br />

Elkins mob<br />

Binion mob<br />

Page 307 of 372


American Mafia<br />

Italian immigrants to the United States in the early 20th century formed various smalltime<br />

gangs which gradually evolved into sophisticated crime syndicates which<br />

dominated organized crime in America for several decades. Although government<br />

crackdowns and a less-tightly knit Italian-American community have largely reduced<br />

their power, they remain an active force in the underworld<br />

Active<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<strong>The</strong> Commission<br />

<strong>The</strong> Five Families of <strong>New</strong> York City<br />

o Bonanno<br />

• <strong>In</strong>delicato crew<br />

• <strong>The</strong> Motion Lounge Crew<br />

o Colombo<br />

• Scarpa crew<br />

o Genovese<br />

• 116th Street Crew<br />

• Greenwich Village Crew<br />

• <strong>New</strong> Jersey Crew<br />

o Gambino<br />

• Ozone Park Boys<br />

• DeMeo crew<br />

• Baltimore Crew<br />

• South Florida faction<br />

• <strong>New</strong> Jersey faction<br />

• <strong>The</strong> Bergin Crew<br />

• Cherry Hill Gambinos<br />

o Lucchese<br />

• <strong>The</strong> Jersey Crew<br />

• <strong>The</strong> Vario Crew<br />

• 107th Street gang<br />

Magaddino crime family<br />

DeCavalcante crime family<br />

<strong>The</strong> Chicago Outfit<br />

o Las Vegas crew (defunct)<br />

Philadelphia crime family<br />

Pittsburgh crime family<br />

Patriarca crime family<br />

o Angiulo Brothers crew<br />

Cleveland crime family<br />

Los Angeles crime family<br />

Kansas City crime family<br />

Trafficante crime family<br />

Detroit Partnership<br />

Page 308 of 372


Milwaukee crime family<br />

<strong>New</strong> Orleans crime family<br />

Defunct<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Morello crime family<br />

Genna crime family<br />

Porrello crime family<br />

St. Louis crime family<br />

Rochester <strong>Crime</strong> Family<br />

Bufalino crime family<br />

Dallas crime family<br />

Denver crime family<br />

San Francisco crime family<br />

San Jose crime family<br />

Seattle crime family<br />

Omaha crime family<br />

Licavoli Mob<br />

Cardinelli gang<br />

<strong>New</strong> York Camorra<br />

East Harlem Purple Gang<br />

Jewish Mafia<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<strong>New</strong> York City<br />

o <strong>The</strong> Bugs and Meyer Mob<br />

o Kaplan gang<br />

o Rosenzweig gang<br />

o Rothstein organization<br />

o Schultz gang<br />

o Shapiro Brothers<br />

o Yiddish Black Hand<br />

o Epstein-Wolmark gang<br />

Boston<br />

o 69th Street Gang<br />

o Sagansky organization<br />

o Solomon organization<br />

Los Angeles<br />

o Cohen crime family (mix between Jewish and Italian members)<br />

<strong>The</strong> Purple Gang<br />

Zwillman gang<br />

Kid Cann's gang<br />

Birger mob<br />

Cleveland Syndicate<br />

Page 309 of 372


African-American <strong>Organized</strong> <strong>Crime</strong><br />

Certain members of the Black Panther Party, particularly the Oakland chapter, also<br />

engaged in criminal activities such as drug dealing and extortion.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<strong>New</strong> York City<br />

o <strong>The</strong> Council<br />

o Harlem numbers racket<br />

o Bumpy Johnson gang<br />

o Supreme Team<br />

o <strong>The</strong> Bebos<br />

o <strong>The</strong> Country Boys<br />

o Matthews Organization<br />

<strong>The</strong> Family<br />

Detroit<br />

o Black Mafia Family<br />

o Young Boys, <strong>In</strong>c.<br />

o Chambers Brothers<br />

Philadelphia<br />

o Black Mafia<br />

o Junior Black Mafia<br />

Oakland, California<br />

o 69 Mob<br />

Baltimore<br />

o<br />

Williams organization (drug trafficking)<br />

Washington, D.C.<br />

o<br />

Chicago<br />

o<br />

o<br />

Atlantic City<br />

o<br />

Rayful Edmond organization<br />

<strong>The</strong>odore Roe's gambling ring<br />

Stokes organization<br />

Aso Posse<br />

Miami<br />

o Miami Boys<br />

Rosemond Organization<br />

Irish Mob<br />

<br />

Prohibition-era Chicago gangs<br />

o North Side Gang<br />

o James Patrick O'Leary organization<br />

o John Patrick Looney gang<br />

o Valley Gang<br />

o Ragen's Colts<br />

o Touhy gang<br />

o Enright gang<br />

Page 310 of 372


Boston<br />

o Mullen Gang<br />

o Winter Hill Gang<br />

o Gustin Gang<br />

o Charlestown Mob<br />

o Killeen gang<br />

Danny Hogan's gang<br />

Danny Walsh gang<br />

Tom Dennison empire<br />

Nucky Johnson's Organization<br />

Danny Greene's Celtic Club<br />

K&A Gang<br />

<strong>New</strong> York<br />

o Dwyer gang<br />

o White Hand Gang<br />

o Higgins gang<br />

o <strong>The</strong> Westies<br />

St Louis<br />

o Hogan Gang<br />

o Egan's Rats<br />

European <strong>Organized</strong> <strong>Crime</strong><br />

<br />

<br />

<br />

<strong>Organized</strong> crime in Sweden<br />

o Original Gangsters<br />

o Fucked For Life<br />

o Uppsala mafia<br />

o Chosen Ones<br />

o Werewolf Legion<br />

o Asir<br />

o Vårvädersligan<br />

Dutch 'Penose'<br />

o Bruinsma drug gang<br />

o Holleeder gang<br />

o Mieremet gang<br />

o Riphagen gang (WWII-era)<br />

o Hopi Boys<br />

French Milieu<br />

o Corsican mafia<br />

• Unione Corse<br />

• Carbone crime family<br />

• Francisci crime family<br />

• Mondoloni crime family<br />

• Brise de Mer gang<br />

o Les Caïds Des Cités<br />

• Faïd gang<br />

Page 311 of 372


o<br />

o<br />

o<br />

o<br />

• <strong>The</strong> Barbarians<br />

Wigs gang<br />

North African Brigade<br />

Tractions Avant gang<br />

Bande des Trois Canards<br />

<br />

<br />

Greece<br />

o Greek mafia<br />

Ireland (See also Irish Republican Army)<br />

o Dublin<br />

• Cahill gang<br />

• Gilligan gang<br />

• Foley gang<br />

• Hyland gang<br />

• Dunne gang<br />

• <strong>The</strong> Westies<br />

o Limerick<br />

• McCarthy-Dundon<br />

• Keane-Collopy<br />

o Rathkeale Rovers<br />

o Kinahan gang<br />

<br />

Spain<br />

o<br />

Galician mafia<br />

<br />

<br />

<br />

<br />

<br />

Poland<br />

o Pruszków mafia<br />

Slovak mafia<br />

Romani clans<br />

o El Clan De La Paca<br />

o Raffael clan<br />

o Sztojka clan<br />

o Rashkov clan<br />

o French gypsy gangs<br />

• Hornec gang<br />

Czech Republic<br />

o Mrázek organization<br />

o Krejčíř organization<br />

<strong>The</strong> Belgian Milieu<br />

o 'Hormone mafia'<br />

o Milieu Liègeois<br />

Page 312 of 372


Italian <strong>Organized</strong> <strong>Crime</strong><br />

<strong>Organized</strong> crime in Italy, especially the south, has existed for hundreds of years and<br />

has given rise to a number of notorious organizations with their own traditions and<br />

subculture which have managed to infiltrate almost every part of Italian society. <strong>The</strong><br />

Italian mafia is often thought of as being the archetype for organized crime worldwide.<br />

<br />

<br />

<br />

Sicilian Mafia<br />

• Cuntrera-Caruana Mafia clan<br />

• Sicilian Mafia Commission<br />

• <strong>In</strong>zerillo Mafia clan<br />

• Mandamenti<br />

• Corleonesi<br />

• Greco Mafia clan<br />

• Motisi Mafia clan<br />

'Ndrangheta<br />

o La Provincia<br />

o Honoured Society (Melbourne)<br />

o Mammoliti 'ndrina<br />

o Bellocco 'ndrina<br />

o Cataldo 'ndrina<br />

o Commisso 'ndrina<br />

o Cordì 'ndrina<br />

o De Stefano 'ndrina<br />

o Pesce 'ndrina<br />

o Barbaro 'ndrina<br />

o Piromalli 'ndrina<br />

o Serraino 'ndrina<br />

o Siderno Group<br />

Camorra<br />

o Secondigliano Alliance<br />

• Licciardi clan<br />

• Contini clan<br />

• Lo Russo clan<br />

• Mallardo clan<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Nuova Camorra Organizzata<br />

Di Lauro Clan<br />

Nuova Famiglia<br />

Casalesi clan<br />

Fabbrocino clan<br />

Giuliano clan<br />

Nuvoletta clan<br />

Vollaro clan<br />

Page 313 of 372


o<br />

o<br />

o<br />

o<br />

Scissionisti di Secondigliano<br />

La Torre clan<br />

Alfieri clan<br />

Russo clan<br />

<br />

<br />

<br />

<br />

<br />

<br />

Sacra Corona Unita<br />

Stidda<br />

Mala del Brenta<br />

Basilischi<br />

Rome<br />

o Banda della Magliana<br />

o Mafia Capitale<br />

Milanese gangs<br />

o Banda della Comasina<br />

o Turatello crew<br />

British Organised <strong>Crime</strong> "Firms"<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

London<br />

o Adams crime family<br />

o <strong>The</strong> Richardson Gang<br />

o <strong>The</strong> Firm<br />

o <strong>The</strong> Syndicate<br />

o Comer gang<br />

o Buttmarsh Boys<br />

o <strong>In</strong>terwar era mobs<br />

• Messina Brothers<br />

• Sabini syndicate<br />

• Hoxton Gang<br />

• Elephant and Castle Mob<br />

• Birmingham Boys<br />

Essex Boys<br />

Manchester<br />

o Quality Street Gang<br />

o Noonan firm<br />

o Cheetham Hillbillies<br />

o <strong>The</strong> Gooch Close Gang<br />

Liverpool<br />

o Curtis Warren's drug empire<br />

o Whitney gang<br />

Aggi Crew<br />

Glasgow<br />

o McGraw firm<br />

o Thompson firm<br />

o Delta <strong>Crime</strong> Syndicate<br />

Brighton razor gangs<br />

Page 314 of 372


Bestwood Cartel<br />

Balkan <strong>Organized</strong> <strong>Crime</strong><br />

Balkan organized crime gained prominence in the chaos following the communist era,<br />

notably the transition to capitalism and the wars in former Yugoslavia.<br />

<br />

<br />

<br />

<br />

<br />

<br />

Albanian mafia<br />

o Kosovan mafia<br />

o Albania<br />

• Gang of Çole<br />

• Gang of Gaxhai<br />

• Gang of Pusi i Mezinit<br />

• Lazarat marijuana growers<br />

o Rudaj Organization (<strong>New</strong> York City)<br />

o Gang of Ismail Lika<br />

o Dobroshi gang (<strong>In</strong>ternational)<br />

o Naserligan (Sweden)<br />

o K-Falangen (Sweden)<br />

Bosnian mafia<br />

o Prazina gang<br />

o Bajramović gang<br />

o Delalić gang<br />

o M-Falangen (Sweden)<br />

Bulgarian mafia (see also Multigroup)<br />

o VIS<br />

o SIC<br />

o Karamanski gang<br />

o TIM<br />

o Naglite<br />

Serbian mafia<br />

o Arkan clan<br />

o Zemun Clan<br />

o Joca Amsterdam gang<br />

o Magaš clan<br />

o Giška gang<br />

o Pink Panthers<br />

o Serb mafia in Scandinavia<br />

• Kotur mob<br />

• Yugoslav Brotherhood<br />

Montenegrin mafia (see also allegations of Milo Đukanović's involvement in<br />

cigarette smuggling)<br />

Macedonian mafia<br />

o Frankfurt mafia<br />

o Bajrush klan<br />

Page 315 of 372


o Nezim klan'<br />

Romanian mafia<br />

o Băhăian organisation<br />

o Clanu Camataru<br />

o Clanu Coordunenilor<br />

o Clanu Rosianu<br />

o Craiova Underground Killers Gang<br />

Croatian organized crime<br />

Post-Soviet <strong>Organized</strong> <strong>Crime</strong><br />

Although organized crime existed in the Soviet era, the gangs really gained in power<br />

and international reach during the transition to capitalism. <strong>The</strong> term Russian Mafia,<br />

'mafiya' or mob is a blanket (and somewhat inaccurate) term for the various organized<br />

crime groups that emerged in this period from the 15 former republics of the USSR and<br />

unlike their Italian counterparts does not mean members are necessarily of Russian<br />

ethnicity or uphold any ancient criminal traditions, although this is the case for some<br />

members.<br />

<br />

<br />

<br />

Russian-Jewish mafia<br />

o Brighton Beach<br />

• Agron gang<br />

• Nayfeld gang<br />

• Balagula gang<br />

o Mogilevich organization<br />

Brothers' Circle (Existence is debatable)<br />

Russian mafia<br />

o Moscow<br />

• Izmaylovskaya gang<br />

• Solntsevskaya bratva<br />

• <strong>New</strong> York branch<br />

• Orekhovskaya gang<br />

o St Petersburg<br />

• Tambov Gang<br />

o Togliatti mafia<br />

o Uralmash gang<br />

o <strong>The</strong> Family<br />

o Lazovsky gang<br />

o Vladivostok gang<br />

o Kurganskaya group<br />

o Tsapok gang<br />

o 'Elephants' group<br />

o Kazan gang<br />

o A.U.E.<br />

Page 316 of 372


Ukrainian mafia<br />

o Donetsk Clan<br />

o Salem gang<br />

o Mukacheve cigarette smuggling syndicate<br />

Lithuanian mafia<br />

o Vilnius Brigade<br />

Estonian mafia<br />

o Linnuvabriku group<br />

Transnistrian mafia<br />

Caucasian <strong>Crime</strong> Syndicates<br />

<br />

<br />

<br />

<br />

Georgian mafia<br />

o Kutaisi clan<br />

o Tbilisi clan<br />

o 21st Century Association<br />

Armenian mafia<br />

o Mirzoyan-Terdjanian organization<br />

o Armenian Power<br />

Azeri mafia<br />

o Janiev organization<br />

Chechen mafia<br />

o Obschina<br />

o Labazanov gang<br />

Central Asian crime syndicates<br />

Uzbek mafia<br />

o Rakhimov organization<br />

Kyrgyz mafia<br />

o Erkinbayev group<br />

o Akmatbayev group<br />

o Kolbayev group<br />

Asian <strong>Organized</strong> <strong>Crime</strong><br />

East Asian Criminal Organizations<br />

<br />

Korean criminal organizations<br />

o Jongro street gang<br />

Japanese Yakuza<br />

<strong>The</strong> yakuza of Japan are similar to the Italian mafias in that they originated centuries<br />

ago and follow a rigid set of traditions, but have several aspects that make them unique,<br />

such as their full-body tattoos and their fairly open place in Japanese society. Many<br />

Page 317 of 372


yakuza groups are umbrella organizations, smaller gangs reporting to a larger crime<br />

syndicate.<br />

Active Yakuza Groups<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Roku-daime Yamaguchi-gumi 六 代 目 山 口 組<br />

o Yoshitomi Group<br />

o Yon-daime Yamaken-gumi 四 代 目 山 健 組<br />

o Ni-daime Kodo-kai 二 代 目 弘 道 会<br />

o Ni-daime Takumi-gumi 二 代 目 宅 見 組<br />

o Go-daime Kokusui-kai 五 代 目 國 粹 会<br />

<strong>In</strong>agawa-kai 稲 川 会<br />

Sumiyoshi-kai 住 吉 会<br />

o Sumiyoshi-ikka Shinwa-kai 住 吉 一 家 親 和 会<br />

• Kansuke Juni-daime 勘 助 十 二 代 目<br />

Kobe Yamaguchi-gumi<br />

Matsuba-kai 松 葉 会<br />

Kyokuto-kai 極 東 会<br />

Dojin-kai [60] 道 仁 会<br />

o Kitamura-gumi<br />

Yon-daime Kudo-kai 四 代 目 工 藤 會<br />

Roku-daime Aizu-Kotetsu-kai 六 代 目 会 津 小 鉄 会<br />

Okinawa Kyokuryu-kai 沖 縄 旭 琉 会<br />

Kyushu Seido-kai 九 州 誠 道 会<br />

Go-daime Kyosei-kai 五 代 目 共 政 会<br />

San-daime Fukuhaku-kai 三 代 目 福 博 会<br />

Soai-kai 双 愛 会<br />

Yon-daime Kyokuryu-kai 四 代 目 旭 琉 会<br />

San-daime Kyodo-kai 三 代 目 俠 道 会<br />

Taishu-kai 太 州 会<br />

Shichi-daime Goda-ikka 七 代 目 合 田 一 家<br />

Toa-kai 東 亜 会<br />

Ni-daime Azuma-gumi 二 代 目 東 組<br />

Yon-daime Asano-gumi 四 代 目 浅 野 組<br />

Hachi-daime Sakaume-gumi 八 代 目 酒 梅 組<br />

Yon-daime Kozakura-ikka 四 代 目 小 桜 一 家<br />

Ni-daime Shinwa-kai 二 代 目 親 和 会<br />

Defunct Yakuza Groups<br />

<br />

<br />

Kantō-kai 関 東 会<br />

Ni-daime Honda-kai 二 代 目 本 多 会<br />

Page 318 of 372


Yamaguchi-gumi<br />

o Goto-gumi 後 藤 組<br />

o Suishin-kai 水 心 会<br />

Ichiwa-kai 一 和 会<br />

San-daime Yamano-kai 三 代 目 山 野 会<br />

Nakano-kai 中 野 会<br />

Kyokuto Sakurai-soke-rengokai 極 東 桜 井 總 家 連 合 会<br />

Triads and Other Chinese Criminal Organizations<br />

<strong>The</strong> Triads is a popular name for a number of Chinese criminal secret societies, which<br />

have existed in various forms over the centuries (see for example Tiandihui). However,<br />

not all Chinese gangs fall into line with these traditional groups, as many non-traditional<br />

criminal organizations have formed, both in China and the Chinese diaspora.<br />

Hong Kong-based Triads<br />

o 14K Group 十 四 K<br />

o Wo Group 和 字 頭<br />

• Wo Shing Wo 和 勝 和<br />

• Wo On Lok (Shui Fong) 和 安 樂 ( 水 房 )<br />

• Wo Hop To 和 合 圖 ( 老 和 )<br />

o Sun Yee On 新 義 安 ( 老 新 )<br />

o Luen Group 聯 字 頭<br />

o Big Circle Gang 大 圈<br />

Sio Sam Ong ( 小 三 王 )<br />

Chinese-American gangs (See also Tongs)<br />

o Wah Ching 華 青<br />

o Ping On<br />

o Black Dragons 黑 龍<br />

o Jackson Street Boys 積 臣 街 小 子<br />

Secret societies in Singapore<br />

o Ang Soon Tong 昂 很 快 塘<br />

o Ghee Hin Kongsi 酥 油 軒 懸 空 寺<br />

o Hai San 海 新<br />

o Wah Kee 華 記<br />

o Ah Kong 新 加 坡 黑 手 黨<br />

<br />

<br />

Taiwan-based Triads<br />

o United Bamboo Gang 竹 聯 幫<br />

o Four Seas Gang 四 海 幫<br />

o Celestial Alliance<br />

Mainland Chinese crime groups (see also Hanlong Group)<br />

Page 319 of 372


o<br />

o<br />

o<br />

Chongqing group 重 慶 組<br />

Defunct<br />

• Honghuzi gangs<br />

• Green Gang 青 帮<br />

Boshe group<br />

<br />

Triads in Cholon<br />

o Wu Bang<br />

Southeast Asian criminal organizations<br />

<br />

<br />

Chao pho<br />

o Red Wa<br />

Filipino crime gangs (See also Abu Sayyaf and <strong>New</strong> People's Army)<br />

• Salonga Group<br />

• Kuratong Baleleng<br />

• Changco gang<br />

• Putik gang<br />

<br />

<br />

<br />

<br />

Cambodian crime gangs<br />

o Teng Bunma organization<br />

<strong>In</strong>donesia<br />

Preman (See also Pancasila Youth and insurgency in Aceh)<br />

o Medan gang<br />

Malaysian crime gangs<br />

o Mamak Gang<br />

Vietnamese Xã Hội Đen<br />

<br />

<br />

<br />

<br />

<br />

Bình Xuyên<br />

Đại Cathay's mafia during the 60s<br />

Năm Cam's mafia of the 90s<br />

Khánh Trắng's "Đồng Xuân Labor Union", a crime syndicate under the guise of a<br />

legal entity<br />

Dung Hà's gang<br />

South Asian Criminal Organizations<br />

<br />

<strong>In</strong>dian mafia<br />

o Mumbai<br />

• D-Company डी कं पनी<br />

Page 320 of 372


o<br />

o<br />

o<br />

o<br />

o<br />

• Rajan gang राजन गिरोह<br />

• Gawli gang िवली गिरोह<br />

• Rajan gang<br />

• Surve gang<br />

• Mudaliar gang<br />

• Mastan gang<br />

• Budesh gang<br />

• Kalani gang<br />

Pathan mafia<br />

• Lala gang<br />

Uttar Pradesh<br />

• Ansari gang<br />

• Yadav gang<br />

Bangalore<br />

• Rai gang<br />

• Ramachandra gang<br />

• Jayaraj gang<br />

Kala Kaccha Gang<br />

Chaddi Baniyan Gang<br />

<br />

<br />

<br />

<br />

Sri Lankan Criminal Groups (See also Tamil Tigers, Eelam People's Democratic<br />

Party and Tamil Makkal Viduthalai Pulikal)<br />

Pakistani mafia (See also Peoples' Aman Committee, Tehrik-i-Taliban Pakistan,<br />

Muttahida Qaumi Movement and ISI involvement with drugs)<br />

o Chotu gang<br />

o Lyari Gang<br />

Mafia Raj<br />

Dacoit gangs<br />

o Singh gang<br />

o Veerappan gang<br />

o Devi gang<br />

Middle Eastern <strong>Organized</strong> <strong>Crime</strong><br />

<br />

<br />

Israeli mafia (see also Stern Gang)<br />

יל'אברג משפחת o Abergil <strong>Crime</strong> Family<br />

פשע משפחת אלפרון o Alperon crime family<br />

הארגון רוזנשטיין זאב o Zeev Rosenstein organization<br />

o Palestinian organized crime ( See also Abu Nidal Organization)<br />

• Doghmush clan<br />

Turkish mafia<br />

Page 321 of 372


o<br />

o<br />

o<br />

o<br />

o<br />

<strong>Crime</strong> groups in Turkey (see also Deep state and Yüksekova Gang)<br />

• Kilic gang<br />

• Cakici gang<br />

• Peker gang<br />

• Yaprak gang<br />

• Topal organisation<br />

• Söylemez Gang<br />

Kurdish mafia (see also Kurdistan Workers' Party)<br />

• Baybasin drug organization<br />

• Cantürk organization<br />

Turkish organised crime in Great Britain<br />

• Arifs<br />

Turkish organised crime in Germany<br />

• Arabaci clan<br />

Imac clan (Netherlands)<br />

<br />

<br />

Iranian organized crime (see also People's Mujahedin of Iran#Fraud and money<br />

laundering, Jundallah and illegal activities of the IRGC)<br />

o Tahvili crime family<br />

Lebanese mafia (See also Lebanese Civil War militias)<br />

o Mhallami-Lebanese crime clans<br />

• Miri-Clan<br />

• Al-Zein Clan<br />

o Juomaa drug trafficking organisation (See also Hezbollah)<br />

o Ibrahim clan<br />

Australian <strong>Organized</strong> <strong>Crime</strong><br />

<br />

<br />

Sydney<br />

o Razor gangs<br />

o 5T gang<br />

o Freeman gang<br />

o <strong>The</strong> Team<br />

o Mr Sin gang<br />

Melbourne<br />

o Carlton Crew<br />

o Moran family<br />

o Williams family<br />

o Pettingill family<br />

o Richmond gang<br />

Caribbean <strong>Crime</strong> Groups<br />

<br />

Chadee gang (Trinidad & Tobago) (see also Jamaat al Muslimeen)<br />

Page 322 of 372


Jamaican Yardies & Posses<br />

o Shower Posse<br />

o POW Posse<br />

o Tottenham Mandem<br />

• Star Gang<br />

o Klans Massive<br />

No Limit Soldiers<br />

Phantom death squad (Guyana)<br />

Zoe Pound (Haitian, see also Tonton Macoute)<br />

African Criminal Organisations<br />

*Mai-Mai militia gangs<br />

Cape Verdean organized crime<br />

Mungiki<br />

Nigerian organized crime<br />

o Confraternities in Nigeria<br />

• Black Axe Confraternity<br />

o Anini gang<br />

Le Roux organization<br />

Moroccan hashish smugglers<br />

o Ahmed organization<br />

Cybercrime Networks<br />

As society enters the <strong>In</strong>formation Age, certain individuals take advantage of easy flow of<br />

information over the <strong>In</strong>ternet to commit online fraud or similar activities. Often the<br />

hackers will form a network to better facilitate their activities. On occasion the hackers<br />

will be a part of a criminal gang involved in more 'blue collar crime', but this is unusual.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

ShadowCrew<br />

Avalanche<br />

DarkMarket<br />

Legion of Doom<br />

Carder.su<br />

Tor Carding Forum<br />

HackBB<br />

Masters of Deception<br />

Russian cybercrime<br />

o<br />

o<br />

o<br />

o<br />

Russian Business Network<br />

Anton Gelonkin internet fraud group<br />

Leo Kuvayev internet spam group<br />

CyberVor<br />

<br />

Darknet markets<br />

Page 323 of 372


o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

AlphaBay<br />

Utopia<br />

<strong>The</strong> Silk Road<br />

Sheep Marketplace<br />

<strong>The</strong>RealDeal<br />

Black Market Reloaded<br />

<strong>The</strong> Farmer's Market<br />

Evolution<br />

Agora<br />

AlphaBay Market<br />

Russian Anonymous Marketplace<br />

Drug and Smuggling Rings<br />

Smuggling is a behavior that has occurred ever since there were laws or a moral code<br />

that forbade access to a specific person or object. At the core of any smuggling<br />

organization is the economic relationship between supply and demand. From the<br />

organization's point of view, the issues are what the consumer wants, and how much<br />

the consumer is willing to pay the smuggler or smuggling organization to obtain it.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

England<br />

o Hawkhurst Gang (historical)<br />

o <strong>The</strong> Aldington Gang (historical)<br />

Organ trafficking organizations<br />

o Gurgaon organ trafficking network<br />

Arms trafficking organizations<br />

o Russian arms traffickers<br />

• Viktor Bout's organization<br />

• Leonid Minin's organization<br />

o Monzer al-Kassar's organization<br />

o Tomislav Damnjanovic organization<br />

o Soghanalian organization<br />

People smuggling<br />

o Snakeheads 蛇 頭<br />

• Sister Ping's organization<br />

o Coyotaje<br />

o Shettie organization<br />

o Mediterranean people smugglers<br />

Lai Changxing organization<br />

Bedouin smugglers<br />

Subotić Tobacco mafia (alleged)<br />

Drug rings<br />

<br />

North American drug rings<br />

o Garza organization<br />

Page 324 of 372


o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Jesse James Hollywood's drug ring<br />

<strong>The</strong> Brotherhood of Eternal Love<br />

Black Tuna Gang<br />

<strong>The</strong> Company<br />

Jung organization<br />

Mancuso organization<br />

Chagra organization<br />

"Freeway" Rick Ross<br />

Ike Atkinson<br />

Cournoyer organization<br />

Cowboy Mafia<br />

Pizza Connection<br />

<strong>The</strong> Yogurt Connection<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Bali Nine<br />

Mr Asia syndicate<br />

<strong>The</strong> French Connection<br />

<strong>The</strong> Couscous connection<br />

Valencia drug ring<br />

Brian Brendan Wright's drug empire<br />

Howard Marks<br />

Rum-running organization<br />

o William McCoy<br />

o Roy Olmstead<br />

Remus organization<br />

Yashukichi network<br />

Edward Ezra's opium smuggling operation<br />

Tyrrell organisation<br />

Guinea-Bissau cocaine traffickers<br />

o Na Tchuto organization<br />

Prison Gangs<br />

Prisons are a natural meeting place for criminals, and for the purposes of protection<br />

from other inmates and business prisoners join gangs. <strong>The</strong>se gangs often develop a<br />

large influence outside the prison walls through their networks. Most prison gangs do<br />

more than offer simple protection for their members. Most often, prison gangs are<br />

responsible for any drug, tobacco or alcohol handling inside correctional facilities.<br />

Furthermore, many prison gangs involve themselves in prostitution, assaults,<br />

kidnappings and murders. Prison gangs often seek to intimidate the other inmates,<br />

pressuring them to relinquish their food and other resources. <strong>In</strong> addition, prison gangs<br />

often exercise a large degree of influence over organized crime in the "free world",<br />

larger than their isolation in prison might lead one to expect.<br />

<br />

<br />

Primeiro Comando da Capital (First Command of the Capital) (São Paulo, Brazil)<br />

Vory v zakone (вор в законе) (Prisons in Russia and other post-Soviet countries)<br />

Page 325 of 372


<strong>The</strong> Numbers Gang (Prisons in South Africa)<br />

Brödraskapet (<strong>The</strong> Brotherhood) (Kumla Prison, Sweden)<br />

<strong>The</strong> Overcoat Gang (Prisons in Australia)<br />

Philippines<br />

o <strong>New</strong> Bilibid Prison<br />

• Commandos<br />

o Wild Boys of DaPeCol (Davao)<br />

Prison gangs in the United States<br />

<br />

<br />

<br />

<br />

<br />

White<br />

o Aryan Brotherhood<br />

o Dead Man <strong>In</strong>corporated<br />

o Public Enemy No. 1<br />

o Nazi Lowriders<br />

o European Kindred<br />

o Aryan Circle<br />

o 211 Crew<br />

o Peckerwoods<br />

o Aryan Brotherhood of Texas<br />

Hispanic<br />

o Barrio Azteca<br />

o Mexican Mafia (La Eme)<br />

o Nuestra Familia<br />

o Texas Syndicate (Syndicato Tejano)<br />

o Ñetas<br />

o Puro Tango Blast<br />

o Mexikanemi<br />

o Hermanos de Pistoleros Latinos<br />

African American<br />

o Black Guerrilla Family<br />

o D.C. Blacks<br />

o United Blood Nation<br />

o KUMI 415<br />

People Nation<br />

Folk Nation<br />

Street Gangs<br />

Youth gangs have often served as a recruiting ground for more organized crime<br />

syndicates, where juvenile delinquents grow up to be full-fledged mobsters, as well as<br />

providing muscle and other low-key work. <strong>In</strong>creasingly, especially in the United States<br />

and other western countries, street gangs are becoming much more organized in their<br />

Page 326 of 372


own right with a hierarchical structure and are fulfilling the role previously taken by<br />

traditional organized crime.<br />

North America<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Friends Stand United<br />

Freight Train Riders of America (alleged)<br />

<strong>The</strong> Baldies<br />

Juggalo gangs<br />

Albanian Boys <strong>In</strong>c<br />

Chicago<br />

o TAP Boyz<br />

o Simon City Royals<br />

o Chicago Gaylords<br />

o Jousters<br />

o Almighty Saints<br />

o Popes<br />

Italian-American street gangs<br />

o South Brooklyn Boys<br />

o Forty-Two Gang<br />

o <strong>The</strong> Tanglewood Boys<br />

Green Street Counts<br />

Zoe Pound<br />

Pacific-Islander American gangs<br />

o Sons of Samoa<br />

o Tongan Crip Gang<br />

Native Mob<br />

Savage Skulls (defunct)<br />

African-American<br />

<br />

<br />

<br />

Chicago<br />

o Gangster Disciples<br />

o Mickey Cobras<br />

o Black Disciples<br />

o Vice Lords<br />

o Black P. Stones<br />

o Four Corner Hustlers<br />

o OutLaw Gangster Disciples<br />

Black P. Stones (Jungles)<br />

Bloods<br />

o Sex Money Murda<br />

o Double II Set<br />

o Pirus<br />

o Nine Trey Gangsters<br />

Page 327 of 372


Crips<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Venice Shoreline Crips<br />

Rollin 60's Neighborhood Crips<br />

Eight Tray Gangsta Crips<br />

East Nashville Crips<br />

Du Roc Crips<br />

Rollin' 30s Harlem Crips<br />

Grape Street Watts Crips<br />

South Side Compton Crips<br />

<br />

<br />

<br />

<br />

<br />

<br />

12th Street Gang<br />

Errol Flynns<br />

Westmob<br />

Hidden Valley Kings<br />

<strong>New</strong> York City<br />

o Decepticons (defunct)<br />

o Black Spades (defunct)<br />

o GS9<br />

Boston<br />

o Lucerne Street Doggz<br />

o Columbia Point Dawgs<br />

o Orchard Park Trailblazers<br />

Asian-American<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<strong>New</strong> York City Chinatown<br />

o Ghost Shadows 鬼 影 幫<br />

o Flying Dragons<br />

o Born To Kill 天 生 殺 手 幫<br />

Asian Boyz 亞 洲<br />

Chung Ching Yee (Joe Boys) 忠 精 義<br />

Menace of Destruction 毀 滅 的 威 脅<br />

Tiny Rascal gang<br />

Fullerton Boys<br />

Satanas<br />

Viet Boyz<br />

Hispanic<br />

<br />

<br />

<br />

Latin Kings<br />

Ghetto Brothers<br />

<strong>New</strong> York City Dominican gangs<br />

o Dominicans Don't Play<br />

o Jheri Curls<br />

o Trinitarios<br />

Page 328 of 372


California<br />

o White Fence<br />

o Whittier gang<br />

o Fresno Bulldogs<br />

o Lott Stoner Gang<br />

o Norteños<br />

o Sureños<br />

• 38th Street gang<br />

• Culver City Boys 13<br />

• Santa Monica 13<br />

• Azusa 13<br />

• Puente 13<br />

• OVS<br />

• Eastside Bolen Parque 13<br />

• Northside Bolen Parque 13<br />

• El Monte Flores 13<br />

• Venice 13<br />

• Tooner Ville Rifa 13<br />

• Clanton 14<br />

• Varrio Nuevo Estrada<br />

• Playboys<br />

• Avenues<br />

• Logan Heights Gang<br />

• Pomona 12th Street Sharkies<br />

Chicago<br />

o La Raza Nation<br />

o Maniac Latin Disciples<br />

o Spanish Cobras<br />

o Spanish Gangster Disciples<br />

Los Mexicles<br />

Latin Syndicate<br />

Historical<br />

<br />

Irish American<br />

o Bottoms Gang<br />

o 19th Street Gang<br />

o Bowe Brothers<br />

o 40 Thieves<br />

o Dead Rabbits<br />

o Gopher Gang<br />

o Grady Gang<br />

o Five Points Gang<br />

o Daybreak Boys<br />

o Tenth Avenue Gang<br />

o Kerryonians<br />

Page 329 of 372


o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Roach Guards<br />

Whyos<br />

Chichesters<br />

Marginals<br />

Live Oak Boys<br />

Potashes<br />

Bottoms Gang<br />

<br />

<br />

<br />

<br />

<br />

<strong>New</strong> York<br />

o Neighbors' Sons<br />

o Boodle Gang<br />

o Loomis Gang<br />

o Baxter Street Dudes<br />

o Honeymoon Gang<br />

o Mandelbaum organization<br />

o Dutch Mob<br />

o Eastman Gang<br />

o Batavia Street Gang<br />

o Bowery Boys<br />

o Charlton Street Gang<br />

o Gas House Gang<br />

o Lenox Avenue Gang<br />

o Crazy Butch Gang<br />

o Hudson Dusters<br />

o Humpty Jackson Gang<br />

o Slaughter House Gang<br />

o Cherry Hill Gang<br />

o Swamp Angels<br />

o Yakey Yakes<br />

o Hook Gang<br />

o Tub of Blood Bunch<br />

Baltimore<br />

o Bloody Tubs<br />

o Plug Uglies<br />

Sydney Ducks<br />

Chicago<br />

o Formby Gang<br />

o Henry Street Gang<br />

Yellow Henry Gang<br />

Gangs in Canada<br />

<br />

Vancouver<br />

o <strong>In</strong>dependent Soldiers<br />

Page 330 of 372


o United Nations<br />

o Red Scorpions<br />

Aboriginal Based <strong>Organized</strong> <strong>Crime</strong><br />

o <strong>In</strong>dian Posse<br />

o Native Syndicate<br />

o Redd Alert<br />

o Manitoba Warriors - 1323<br />

Toronto<br />

o VVT<br />

o Dixon Bloods<br />

o Khimera<br />

Tri-City Skins<br />

Shiners (historical)<br />

South America<br />

<br />

<br />

<br />

Gangs in Brazil<br />

o Rio de Janeiro<br />

• Amigos dos Amigos<br />

• Comando Vermelho<br />

• Terceiro Comando<br />

• Terceiro Comando Puro<br />

o São Paulo<br />

• PCC - Primeiro Comando da Capital<br />

o Brazilian police militias<br />

• Acre death squad<br />

o Maras<br />

o Mara Salvatrucha<br />

o 18th Street gang<br />

Gangs in Haiti<br />

o Zoe Pound<br />

o Cannibal Army<br />

Belize<br />

o George Street Crew<br />

Europe<br />

<br />

Gangs in the United Kingdom<br />

o<br />

o<br />

London<br />

• Ghetto Boys<br />

• Peckham Boys<br />

• PDC<br />

• Brick Lane Massive<br />

• Woolwich Boys<br />

• Wo Shing Wo street gang (defunct)<br />

• Mus Love Crew<br />

Gooch gang<br />

Page 331 of 372


o<br />

o<br />

Birmingham<br />

• Lynx gang<br />

• Burger Bar Boys & Johnson Crew<br />

Croxteth Crew & Strand Crew<br />

<br />

<br />

<br />

<br />

Denmark<br />

o AK81<br />

o Black Cobra<br />

Turkish-German gangs<br />

o 36 Boys<br />

o Black Jackets<br />

Apaches (Belle Époque period)<br />

Red Wall Gang (Dublin)<br />

Africa<br />

<br />

<br />

<br />

Gangs in South Africa<br />

o Cape Ganglands<br />

• Hard Livings<br />

• <strong>The</strong> Americans<br />

Gangs in Nigeria<br />

o Area Boys<br />

• One Million Boys<br />

Morocco<br />

o Tcharmils<br />

Asia<br />

<br />

<br />

<br />

Salakau<br />

Bahala Na Gang<br />

Rugby boys<br />

Oceania<br />

<br />

Gangs in Australia<br />

o Sydney<br />

• Rocks Push<br />

• Dlasthr<br />

o Melbourne<br />

• Apex<br />

o Perth<br />

• Sword Boys<br />

o Evil Warriors<br />

Page 332 of 372


Gangs in <strong>New</strong> Zealand<br />

o Mongrel Mob<br />

o Black Power<br />

o King Cobras<br />

o Killa Beez<br />

o Fourth Reich<br />

Raskol gangs<br />

Other<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Timber mafia<br />

o Malagasy logging syndicates<br />

• 'Rosewood mafia'<br />

Football hooliganism groups<br />

o 6.57 Crew<br />

o Arsenal firm<br />

o Aston Villa Hardcore<br />

Prostitution rings<br />

o Emperors Club VIP<br />

o Heidi Fleiss prostitution ring<br />

o North Preston's Finest<br />

o Vivian's Friends<br />

o Pamela Martin and Associates<br />

Spy rings<br />

o Atomic spies<br />

o Cambridge Five<br />

o Duquesne Spy Ring<br />

o Illegals program<br />

o Portland Spy Ring<br />

o Walker spy ring<br />

Burglary rings<br />

o Dinner Set Gang<br />

o Bling Ring<br />

o Johnston gang<br />

o Sugarman Gang<br />

Fraud rings (See also List of Ponzi schemes)<br />

o Potato Bag gang<br />

o Nigerian 419 gangs<br />

• Chief Nwude and accomplices<br />

o Benson Syndicate<br />

o Dominion of Melchizedek<br />

Illegal gambling rings<br />

o Brazilian Jogo do Bicho rings<br />

• Anísio group<br />

• Capitão Guimarães group<br />

• Andrade group<br />

Page 333 of 372


• Luizinho Drummond group<br />

• Turcão group<br />

• Pinheiro group<br />

o Tan betting syndicate<br />

o Bad <strong>New</strong>z Kennels dogfighting ring<br />

Human trafficking rings<br />

o Domotor family crime group<br />

o la Chancha gang<br />

Wildlife trafficking rings<br />

o Wong organization<br />

Kidnapping<br />

o Black Death Group (alleged)<br />

o <strong>The</strong> College Kidnappers<br />

Criminals-for-hire<br />

o Philadelphia Poison Ring (murder-for-hire)<br />

o Sangerman's Bombers (arson)<br />

<strong>The</strong> Chickens and the Bulls<br />

Historical<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Black Hand<br />

o Chicago Black Hand<br />

Thuggee (See also Criminal Tribes Act)<br />

Garduna<br />

Markham Gang<br />

England<br />

o Early crime syndicates<br />

• Jonathan Wild's crime ring<br />

• Charles Hitchen's crime ring<br />

• Forty Elephants<br />

• Ikey Solomon gang<br />

• Worth gang<br />

o Street gangs<br />

• <strong>The</strong> Yiddishers<br />

• Peaky Blinders<br />

• Scuttlers<br />

• Glasgow<br />

• Penny Mobs<br />

• Tongs<br />

• Razor gangs<br />

• Norman Conks<br />

Predecessors to modern yakuza (See also Genyōsha)<br />

o Tekiya 的 屋<br />

o Bakuto 博 徒<br />

o Kabukimono 傾 奇 者 (カブキもの)<br />

American Frontier gangs (See also List of Old West gangs)<br />

Page 334 of 372


o Ames organization<br />

o Soap Gang criminal empire, Denver, Creede, Colorado, and Skagway,<br />

Alaska 1880s-1890s.<br />

o Swearengen gang<br />

o Banditti of the Prairie<br />

o Dodge City Gang<br />

Dennison syndicate<br />

o <strong>The</strong> Cowboys (Cochise County)<br />

o Blonger gang<br />

Ringvereine (Weimar Germany)<br />

Historic prostitution rings<br />

o Zwi Migdal<br />

• Ashkenazum<br />

o Red Light Lizzie and associates<br />

o Jane the Grabber and associates<br />

Historical Russian gangs (See also Early life of Joseph Stalin)<br />

o Mishka Yaponchik gang<br />

o Kotovsky gang<br />

Stuppagghiari<br />

Page 335 of 372


Page 336 of 372


XXII. References<br />

1. https://en.wikipedia.org/wiki/<strong>Organized</strong>_crime<br />

2. https://en.wikipedia.org/wiki/White-collar_crime<br />

3. https://en.wikipedia.org/wiki/Arms_trafficking<br />

4. https://en.wikipedia.org/wiki/Bribery<br />

5. https://en.wikipedia.org/wiki/Cybercrime<br />

6. https://en.wikipedia.org/wiki/Illegal_drug_trade<br />

7. https://en.wikipedia.org/wiki/Embezzlement<br />

8. https://en.wikipedia.org/wiki/Extortion<br />

9. https://en.wikipedia.org/wiki/Fence_(criminal)<br />

10. https://en.wikipedia.org/wiki/Fraud<br />

11. https://en.wikipedia.org/wiki/Identity_theft<br />

12. https://en.wikipedia.org/wiki/Kidnapping<br />

13. https://en.wikipedia.org/wiki/Loan_shark<br />

14. https://en.wikipedia.org/wiki/Money_laundering<br />

15. https://en.wikipedia.org/wiki/Murder<br />

16. https://en.wikipedia.org/wiki/Prostitution<br />

17. https://en.wikipedia.org/wiki/Racket_(crime)<br />

18. https://en.wikipedia.org/wiki/Terrorism<br />

19. https://en.wikipedia.org/wiki/<strong>The</strong>ft<br />

20. https://en.wikipedia.org/wiki/Witness_tampering<br />

21. https://en.wikipedia.org/wiki/<strong>In</strong>timidation<br />

22. https://en.wikipedia.org/wiki/Transnational_crime<br />

23. https://en.wikipedia.org/wiki/List_of_criminal_enterprises,_gangs_and_syndicates<br />

24. https://openscholarship.wustl.edu/cgi/viewcontent.cgi?article=2101&context=law_lawreview<br />

25. https://fas.org/sgp/crs/misc/R41547.pdf<br />

26. https://www.unodc.org/documents/toc/factsheets/TOC12_fs_general_EN_HIRES.pdf<br />

Page 337 of 372


Notes<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

Page 338 of 372


Notes<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

_____________________________________________________________________________________<br />

Page 339 of 372


Page 340 of 372


Attachment A<br />

Biblical Atonement<br />

and Modern Criminal Law<br />

Page 341 of 372


Washington University Law Review<br />

Volume 65<br />

Issue 4 Festschrift: A Celebration of the Scholarship and Teaching of Gray L. Dorsey<br />

January 1987<br />

Biblical Atonement and Modern Criminal Law<br />

Jerome Hall<br />

Follow this and additional works at: http://openscholarship.wustl.edu/law_lawreview<br />

Part of the Criminal Law Commons, and the Religion Law Commons<br />

Recommended Citation<br />

Jerome Hall, Biblical Atonement and Modern Criminal Law, 65 Wash. U. L. Q. 694 (1987).<br />

Available at: http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7<br />

This Dedication is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for<br />

inclusion in Washington University Law Review by an authorized administrator of Washington University Open Scholarship. For more information,<br />

please contact digital@wumail.wustl.edu.


III. CONCEPTIONS, VALUE AND LAW<br />

<strong>In</strong> Western civilization, a rationally ordered universe and human rationality<br />

are the central tenets of theology and moral philosophy. Conceptions,<br />

values, and principles implied by these premises have become entrenched<br />

in social and legal institutions. Concluding that religious teachings, even<br />

those of antiquity, are consistent with modern legal principles is reasonable,<br />

and almost common sense. An inquiry into whether this relationship<br />

is to any extent causal is fascinating. Professor Jerome Hall, the first President<br />

of AMINTAPHIL, discusses the relationship between the Christian<br />

doctrine of atonement and principles of modern criminal law.<br />

BIBLICAL ATONEMENT AND MODERN<br />

CRIMINAL LAW*<br />

JEROME HALL**<br />

<strong>The</strong> organization of a Section on Law and Religion in 1976 by the<br />

Association of American Law Schools (after Watergate) was followed in<br />

1977 by the incorporation of the Council on Religion and Law. My participation<br />

in both led to the study of theology and especially to the question,<br />

what, if anything, can a legal scholar, particularly one specialized in<br />

penal law and the philosophy of law, contribute to the literature on the<br />

interrelations of law and religion? <strong>In</strong> the English-speaking world not<br />

many legal scholars have written on this subject, and none, to my knowledge,<br />

on the interrelationship of religion and modem criminal law. 1 I<br />

here confine my discussion to the Bible and, more particularly, to some<br />

of the writing on atonement by Christian theologians.<br />

<strong>The</strong> central focus of Christianity is on the crucifixion and resurrection<br />

of Jesus Christ, and the relevant theme, originating in the Old Testament<br />

* This article was originally published in Japan in a Festschrift for Justice Shigemitsu Dando<br />

upon his retirement from the Supreme Court of Japan. It subsequently appeared in THE JOURNAL<br />

OF LAW AND RELIGION, Volume I, Number 2, 1983.<br />

** Jerome Hall, LLD. (H.C.) Tfibingen University 1978, is Professor of Law at the University<br />

of California's Hastings College of the Law. He is a past president of the American Society for<br />

Political and Legal Philosophy, a member of the China Academy, Honorary Director of the Korean<br />

Law Center, and a Director of <strong>The</strong> Council on Religion and Law.<br />

1. See J. HALL, LAW, SOCIAL SCIENCE AND CRIMINAL THEORY, chs. I and 2 (1982).<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

and frequently addressed in the <strong>New</strong> Testament, is that of atonement.<br />

Both the Old Testament and the <strong>New</strong> Testament accept and emphasize<br />

the vicarious significance of the sacrifice-the lamb in the Old Testament,<br />

Jesus in the <strong>New</strong> Testament. <strong>The</strong> one sacrificed takes on itself or<br />

himself the sins of Israel or the sins of all mankind. Likewise, the sacrifice<br />

frees all Israel or all mankind from sin, and the consequence is reconciliation<br />

with God.<br />

But modem ethics, especially Kantian, and modem penal law reject<br />

both connotations of Biblical atonement and the relevant theology. <strong>In</strong><br />

modem penal law, for example, one is responsible only for his own<br />

crimes, not for those of his wife or bother. So, too, no substitute for the<br />

criminal will be punished. <strong>The</strong> offer of a father to go to prison instead of<br />

his convicted son's doing so would be irrelevant, and is hardly conceivable<br />

in modem penal law. Hence, the principal problem: Is there a sharp<br />

conflict between religion on the one side and law and ethics on the other?<br />

Or, since one must distinguish religious faith from knowledge of positive<br />

law and morality, are the two realms compatible?<br />

<strong>The</strong>re have been innumerable interpretations of atonement but for the<br />

present purpose they may be divided into two types or classes-the legal<br />

interpretation and the antilegal interpretation posited solely on God's<br />

love. Not that the legal interpreters did not appreciate God's love; that<br />

would be inconceivable in any Christian theologian. But they also recognized<br />

the "wrath of God," his hatred of evil, and his frequent threats to<br />

impose harsh sanctions. 2 For obvious reasons, I shall be particularly interested<br />

in the legal interpretation, for it is there that we find both the<br />

direct influence of law on religion and theology, and the influence of religion<br />

through its theological view of atonement on penal law. <strong>The</strong>re are<br />

many statements in the Old Testament that express or imply one or more<br />

of the ideas that define "atonement." "And Aaron shall offer the bull, as<br />

a sin offering for himself, and shall make atonement for himself and for<br />

his house.., and shall lay both his hands upon the head of the goat and<br />

send him away into the wilderness ... and make atonement for himself<br />

and for the people." (Lev. 16:6, 21, 24).<br />

One thousand years separate the authors of the earliest books in the<br />

Old Testament from the later prophets who spoke of God not as jealous<br />

or hating but as a loving father and merciful judge. <strong>In</strong>deed, it is in Isaiah<br />

2. This simplification of the difference between the principal types of interpretation will be<br />

more fully elucidated in the following discussion.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


696 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

53 where one finds the later expression of atonement to which Christian<br />

theologians constantly refer and rely on as prophetic of the coming of<br />

Jesus as Messiah. "He was despised and rejected by men.... Surely he<br />

has borne our griefs and carried our sorrows.... He was wounded for<br />

our transgressions . . .upon him was the chastisement that made us<br />

whole, and with his stripes we are healed.... He bore the sins of many,<br />

and made intercession for the transgressors."<br />

<strong>In</strong> the <strong>New</strong> Testament, Jesus, the perfect man-God, "died for the ungodly;"<br />

(Rom. 5:6) "while we were enemies we were reconciled to God<br />

by the death of his Son.... ." (Rom. 5:10) "<strong>The</strong>n as one man's (Adam's)<br />

trespass led to condemnation for all men, so one man's act of righteousness<br />

leads to acquittal and life for all men." (Rom. 5:18, also Heb. 7:25).<br />

"By his wounds you have been healed." (1 Peter 2:24; also Col. 1:14).<br />

"This was to fulfill what was spoken by the prophet Isaiah ..... " (Matt.<br />

8:17). "Christ redeemed us from the curse of the law.... ." (Gal. 3:13).<br />

"Behold, the Lamb of God, who takes away the sin of the world." (John<br />

1:29).<br />

What have the theologians whose interpretations have been called<br />

"legal" said about these passages in the Bible? Tertullian (c. 155 A.D.-<br />

230 A.D.), one of the most erudite of the Church fathers, was said by<br />

some to be a Roman lawyer and he was even identified, probably mistakenly,<br />

with the jurist Tertullianus. <strong>In</strong> any case, the schools in Carthage,<br />

where Tertullian studied, taught rhetoric, law and philosophy, and every<br />

educated Carthaginian knew a great deal of the dominant Roman law. a<br />

Certainly Tertullian's treatises bear the unmistakable marks of a legal<br />

mind. His Apology Against the Heathen 4 is a lawyer's brief criticizing<br />

Roman procedure in the trial of Christians. Tertullian spoke of "God's<br />

wrath" and his "eternal penalties." 5 His central terms-debt, satisfaction,<br />

compensation, guilt-have obvious legal connotations.' He empha-<br />

3. "... (Tertullian) displays a thorough and (it is claimed) profound knowledge of Roman<br />

Law." (T. BARNES, TERTULLIAN 23 (1971) citing Beck, Romisches Recht Bei Tertullian and Cyprian<br />

(1930)). "Secondly, knowledge of Roman law was not the exclusive prerogative of iuris consult.<br />

It was a necessity for advocates pleading cases in court and also a normal possession of the educated<br />

man." Id. at 24.<br />

4. TERTULLIAN, APOLOGETIC AND PRACTICAL TREATISES published in 10 LIBRARY OF FA.<br />

THERS OF THE HOLY CATHOLIC CHURCH 6-12 (1854).<br />

5. Id. at 146, 366.<br />

6. "<strong>The</strong> old Roman law conception appears... in Tertullian's portrayal of God as Judge and<br />

in his teaching that the relationship of man to Him is pre-eminently that of a criminal to his judge."<br />

J. MORGAN, THE IMPORTANCE OF TERTULLIAN IN THE DEVELOPMENT OF CHRISTIAN DOGMA 54<br />

(1928). For examples of Tertullian's use of other legal terms, see MORGAN, id. at 67-76.<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

sized man's duty to make "satisfaction to God by repenting of his sins." 7<br />

"How foolish, moreover, how (unjust) ... not to pay the price (repentance)<br />

and yet to stretch forth the hand for the merchandise- For at<br />

this price the Lord hath determined to grant His forgiveness." ' Repentance<br />

was "satisfaction," 9 appeasement of the wrath of God and avoidance<br />

of punishment. 10 "God sitteth over us as a Judge to exact and to<br />

maintain that righteousness.., and with a view to this establisheth the<br />

entire sum of His law...."11<br />

One derives Tertullian's legal interpretation of the atonement by bringing<br />

together relevant statements in several of his essays. It was Anslem<br />

who provided the classic legal interpretation in a systematic, tight, logical<br />

discussion-the renowned Cur Deus Homo. 1 2 He was born in 1033<br />

(d. 1109) in Piedmont and studied law in Pavia. His thought reveals the<br />

influence of the feudalism of his time, of Lombard law and the Church's<br />

penitentials. "[T]o sin," he said, "is nothing other than not to render to<br />

God what is due." 13 "What is the debt which we owe to God? Whoever<br />

does not pay to God his honor due Him dishonors Him and removes<br />

from Him what belongs to Him.. ."."' "<strong>In</strong>deed God's wrath is nothing<br />

other than his will to punish." 15 Repayment for the dishonor is not sufficient<br />

unless "in proportion to the injury caused by the dishonoring, he<br />

makes some restitution which is acceptable to the one whom he has dishonored.<br />

Satisfaction ought to be proportional to the measure of the<br />

sin."' 6 When earthly rulers "rightly exercise retribution, the Lord Himself<br />

does it; for they have been ordained by Him to this end." 17 It follows<br />

inexorably that either the dishonor of God is "repaid" or there will be<br />

punishment. 18 Thus, in the end, God cannot be dishonored.<br />

<strong>The</strong> next step in Anselm's argument is that no man, indeed, not even<br />

all human beings, can make sufficient satisfaction since all men are sinners.<br />

Christ was a logical necessity since the required satisfaction can<br />

7. TERTULLIAN, supra note 4, at 358.<br />

8. Id. at 359.<br />

9. Id. at 370.<br />

10. Id at 371.<br />

11. Id. at 353.<br />

12. 3 ANSELM OF CANTERBURY (J. Hopkins, H. Richardson, trans., 1976).<br />

13. Id. at 67.<br />

14. Id at 68.<br />

15. Id. at 55.<br />

16. Id.<br />

17. Id at 69.<br />

18. Id. at 71.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


698 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

only be paid by someone who is sinless. Sin calls for payment "greater<br />

than any existing thing besides God.... <strong>The</strong>refore only God can make<br />

this satisfaction." 19 But since man ought to make this satisfaction and<br />

since only God can make it, "it is necessary that a man-God make it." 20<br />

<strong>The</strong> logic of this argument is evident in its successive steps-God's<br />

honor, the sinner's disobedience, God's wrath, the need for satisfaction,<br />

and the inability of sinners to justify sinners-hence the Virgin birth and<br />

the incarnation of the man-God who pays the price and effects the reconciliation.<br />

21 <strong>In</strong> later discussions of the atonement there are variations<br />

from the rigor of Anselm's treatise, but Why God Became Man set the<br />

parameters of those discussions whether pro or con the legal<br />

interpretation.<br />

Calvin (1509-1564) studied law at Orleans and Bourges; hence it is not<br />

surprising that he praised law as God's commands "that he might lift<br />

their minds higher." 22 Law also admonishes, is a necessary deterrent 23<br />

"and urges them on in well-doing." 2 4 "<strong>The</strong> law shows the righteousness<br />

of God ....,25 He anticipated Jhering and Fuller: ". . . if the forms of<br />

the law be separated from its end, one must condemn it as vanity." 26<br />

Alvin wrote of "God's fearful vengeance against the whole of mankind."<br />

2 7 But God, while not ceasing to love his children, is "wondrously<br />

angry toward them . ..he would frighten them . . .to humble their<br />

fleshly pride, . . . and arouse them to repentance." 28 Although "they<br />

who ... provoke his wrath ... will not escape his vengeance,"29 ". . .it is<br />

not, properly speaking, punishment or vengeance, but correction and admonition."<br />

3 A secular judge "applies the penalty to the crime itself.<br />

But when a father ... corrects his son, he does not do this to take yen-<br />

19. Id. at 102.<br />

20. Id.<br />

21. See Anselm's essay, <strong>The</strong> Virgin Conception and Original Sin, id. at 143. <strong>The</strong> influence of<br />

ancient Greek mythology and metaphysics on Christology is beyond the scope of this paper.<br />

22. J. CALVIN, <strong>In</strong>stitution of the Christian Religion, 20 LIBRARY OF CHRISTIAN CLASSICS 349<br />

(J.T. McNeill ed. 1960).<br />

23. Id. at 358-59.<br />

24. Id at 360.<br />

25. Id at 354.<br />

26. Id. at 349.<br />

27. Id at 244-45.<br />

28. Id at 577.<br />

29. Id. at 659.<br />

30. Id.<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

geance on him or to maltreat him but rather to teach him ....<br />

"[T]he whole human race perished" because of Adam's disobedience.<br />

32 "This is our acquittal: the guilt that held us liable for punishment<br />

has been transferred to the head of the Son of God." ' 33 ".... God's<br />

judgment was satisfied by that price.", 34 Calvin writes of Jesus' sacrifice<br />

as "his act of expiation" to "appease the father's righteous wrath. '35<br />

Jesus' "pleading, ' 36 his intercession as man's advocate, brings "our acquittal,"<br />

37 "[t]he curse.., was transferred to him... (who) clothed us<br />

with his purity." 38<br />

Opposition to legal interpretation of atonement, based in part on<br />

Clement and Abelard, was eloquently expressed by Bushnell, an American<br />

clergyman, in 1874. 39 Bushnell argued that Jesus did not suffer for<br />

justice but in self-sacrifice. It dishonors God, indeed it implies that he is<br />

immoral, to say that he "accepts the pains of the good in payment of the<br />

pains of the bad." ' <strong>The</strong> legal interpretation of atonement describes "a<br />

coarse commercial transaction."'" Law is defective, first, because it is<br />

penal and does not bring about reform by free choice. And, second, it is<br />

negative in its prohibitions. 42 Bushnell uses the model of the family and<br />

the school; the mother or the teacher corrects out of love. <strong>The</strong>ir correction<br />

is "not judicially penal ... for it is not graded by the desert of<br />

actions, but by what is wanted for the future benefit and due correction<br />

of the actors." '4 3 It is not "a substantive measure of their iln-desert." 44<br />

Bushnell thought there was "no such thing" as "a penalty undeserved."<br />

Moreover, there is no "common measure" in undeserved penal-<br />

31. Id at 340. "<strong>In</strong> the dogma that the whole human race is condemned on account of the sin of<br />

its first parents, the doctrine of collective responsibility has reached its pitch." WESTERMARCK, 1<br />

THE ORIGIN AND DEVELOPMENT OF THE MORAL IDEAS 50-51 (1971).<br />

32. Calvin, supra n.22, at 509, 510.<br />

33. Id. at 351.<br />

34. Id. at 467.<br />

35. Id. at 502.<br />

36. Id. at 509.<br />

37. Id at 510.<br />

38. H. BUSHNELL, FORGIVENESS AND LAW (1874). See Rashdall, <strong>The</strong> Abelardiun Doctrine of<br />

the Atonement, in DocrINE AND DEVELOPMENT 128 (1898).<br />

39. Bushnell, supra n.39, at 86.<br />

40. Id. at 91.<br />

41. Id. at 109.<br />

42. Id. at 134.<br />

43. Id. at 135. Bushnell says "the word justice does not occur once in the <strong>New</strong> Testament...<br />

Id. at 141.<br />

44. Id. at 143-44.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


700 WASHINGTON UNIVERSITY LAW QUARTERLY [Vol. 65:694<br />

ties and deserved ones. 45 It is contrary to the spirit of the <strong>New</strong><br />

Testament to list a set of "vocables" as substitutes for penalty, compensation,<br />

transferable merits, sins carried over, sins accepted for the sinner<br />

and so on. <strong>The</strong>se "theological counters" and "computations of atonement"<br />

are "to any Christian believer" a "very sad affair," not "altogether<br />

spurious," but "artificial. ' 46 <strong>In</strong> even stronger terms a contemporary theologian<br />

wrote: "To speak as if the Son... appeased or propitiated God<br />

... is blasphemy. 4 7<br />

<strong>In</strong> a similar vein, the philosopher-theologian, H. Rashdall, critical of<br />

every aspect of the legal interpretation, argued that Jesus' death could<br />

help others only in the way that the acts of other righteous persons could<br />

help others-by their example, stimulating benevolence. 4 8 He also rejected<br />

the view that Christ's death was a ransom paid to the Devil or to<br />

God. 49 "God is a loving Father who will pardon sin upon the sole condition<br />

of true repentance." 50 He seeks reconciliation, or at-one-ment. Tertullian's<br />

theory is "coarsened and legalized,"" 1 "poisoned by the<br />

substitution of legal for moral conceptions." 2 To Rashdall, Anselm employed<br />

Lombard conceptions of civil law-satisfaction, debt and Wergild.<br />

53 His "notions of justice are the barbaric ideas of an ancient<br />

Lombard king or the technicalities of a Lombard lawyer... ."I Most<br />

interesting is Rashdall's rejection of "the attribution of guilt to all humanity<br />

for the sin of one, nor can the payment of a penalty by the sinless<br />

Christ rationally or morally be considered to make any easier or any<br />

juster the remission of the penalty which man owes for his own sin." ' 5<br />

"We have no right to pronounce just in God what would have seemed<br />

the highest injustice among men. 9 ' 56<br />

Rashdall strikes his heaviest blow on the retributive theory of punishment.<br />

That theory, he states, is implied in the emphasis on expiation and<br />

penalty in all legal interpretations of atonement. It is "a survival of<br />

45. Id. at 95.<br />

46. F. DILLISTONE, THE CHRISTIAN UNDERSTANDING OF ATONEMENT 244 (1968).<br />

47. H. RASHDALL, THE IDEA OF ATONEMENT IN CHRISTIAN THEOLOGY 35 (1919).<br />

48. Cf. Mark 10:43-45; Matthew 20:26-28.<br />

49. RASHDALL, supra note 48, at 48.<br />

50. Id. at 249.<br />

51. Id. at 253.<br />

52. Id. at 351-52.<br />

53. Id. at 355.<br />

54. Id.<br />

55. Id. at 356.<br />

56. Id. at 422.<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

primitive modes of thought.., it cannot be rational to inflict an evil<br />

except as a means to good-the good of the offender or of others." It is<br />

inconsistent with the Christian ethic of love and the character of God.<br />

"Even on the retributive view of punishment it is impossible to defend<br />

7<br />

the punishment of the innocent in place of the guilty."'<br />

<strong>In</strong> his recent book 5 " Hans Kiing, a Catholic theologian, adds some<br />

surprising innovations in his criticism of the legal interpretations of the<br />

atonement. For him God is "wholly love." 59 Conspicuously omitted<br />

from his <strong>In</strong>dex are the terms "penance," "punishment," "wrath of God"<br />

and "Hell." ' After listing the "juridical concepts" used in legal interpretations-"law,<br />

guilt, penalty, reward, penance, expiation, ransom, satisfaction,<br />

reconciliation, restitution," 6 he characterizes those<br />

interpretations as "a re-Judaizing process in the name of Christianity."" 2<br />

More surprising is his statement that the idea of original inherited sin,<br />

upon which the necessity of the God-man's intercession depends, "seems<br />

problematic." 63 He rejects the theory of redemption on which the legal<br />

interpretation rests because it is legalistic, based on Roman law, "legal<br />

niceties" and human justice, not on the "grace, mercy and love" characteristic<br />

of the <strong>New</strong> Testament." He even rejects "sacrifice" emphasized<br />

in the legal interpretation. "Is God so cruel, even sadistic, that his anger<br />

can be appeased only by the blood of his Son?" <strong>In</strong>stead of "sacrifice,"<br />

Kung would substitute "voluntary personal self-surrender".... "self-giving.",<br />

65 <strong>In</strong>stead of "expiatory sacrifice," Kung offers "reconciliation, representation,<br />

redemption, liberation." ' 66 For Kung, "God loves sinners<br />

more than his righteous. ' 67 "He forgives instead of condemning, liberates<br />

instead of punishing, permits the unrestricted rule of grace instead of<br />

57. H. KUNG, ON BEING A CHRISTIAN (E. Quinn, trans., 1976).<br />

58. Ma at 435.<br />

59. Jesus often threatened hell, everlasting fire and "gnashing of teeth." Matthew 5:22, 30;<br />

8:12; 11; 23; 13; 42; 18:8, 9. "Wrath of god" is a frequent expression in the <strong>New</strong> Testament, Matthew<br />

3:7; Romans 1:18; Ephesians 5:6.<br />

60. KLUNG, supra note 58, at 421.<br />

61. Id<br />

62. Id. at 422.<br />

63. Id. at 423. Similarly, "[i]t [redemption] is ... an outstanding example of a legal notion<br />

being taken up and made into a religious notion by priests and prophets." D. DAUBE, STUDIES IN<br />

BIBLICAL LAW 42 (1947).<br />

64. Kung, supra note 58, at 424-25. KUNG omits any reference to Jesus' first words on the<br />

cross-the first line of Psalm 22.<br />

65. KUNG, supra note 58, at 426.<br />

66. Id. at 274. Kung's italics.<br />

67. Id. at 313.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


702 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

law .... <strong>The</strong> God who prefers the sinner.., the prostitutes and adulterers<br />

to their judges, the law-breakers and outlaws to the guardians of the<br />

law." 6 "He is a God who lavishes his grace on those who do not deserve<br />

it." 6 9 "He is not a God of law, but a God of grace." 70<br />

<strong>The</strong> distinguished theologian, Emil Brunner, provides a detailed refutation<br />

of the anti-legalist interpretations of the atonement. 71 <strong>The</strong>y err, he<br />

argues, in thinking that the only alternative to Anselm is the "wholly<br />

subjective" view that "the death of Jesus was a sublime and noble martyrdom.<br />

'72 <strong>The</strong>ir most serious defect is that they trivialize guilt. "If the<br />

Cross merely denotes the removal of a religious error (namely, that God<br />

is not an angry Judge) then guilt is not taken seriously," '73 Moreover, if<br />

"guilt is merely error, and God is nothing but love, there is no need for<br />

forgiveness; ... all you need is to know it." 74<br />

"Divine punishment also issues necessarily from the Holiness of<br />

God," '75 but at the same time there is "the overwhelming reality of forgiving<br />

love." ' 76 "That God can be both at once, the One who 'is not<br />

mocked,' and the One who 'doth not deal with us after our transgressions,'<br />

that neither aspect is sacrificed to the other ... this fundamental<br />

theme of the whole Bible is the message of the Cross .... , Accordingly,<br />

although Jesus' Passion is not a penalty, certainly not a transaction,<br />

"it is a sacrifice, a vicarious action" in which Jesus identified himself<br />

wholly with the human race.<br />

<strong>In</strong>stead of deprecating law, Brunner eulogizes it. "<strong>The</strong> law is the manifested<br />

Will of the Lord God.... All order, all significance, all beauty,<br />

all trustworthiness, all constancy, all fidelity and all faith, all truth and<br />

all good, are based .. .upon the Law, which constitutes the intrinsic<br />

68. Id. at 435. Tillich has echoed this: ... justice is the structural form of love without which<br />

it would be sheer sentimentality ... there are no conflicts in God between his reconciling love and<br />

his retributive justice." P. TILLICH, 2 SYSTEMATIC THEOLOGY 174 (1957).<br />

69. KUNG, supra note 58, at 314. "thus the law is an enemy.... <strong>The</strong> Divine Love cannot be<br />

imprisoned in the categories of merit and justice .... " G. AULEN, CHRISTUS VICTOR 68 (A.<br />

Herbent trans. 1966).<br />

70. E. BRUNNER, THE MEDIATOR (0. Wyon trans. 1934).<br />

71. Id. at 439.<br />

72. Id. at 471.<br />

73. Id. at 472.<br />

74. Id. at 464.<br />

75. Id. at 449.<br />

76. Id. at 452.<br />

77. Id. at 495.<br />

78. Id. at 461.<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

content of His Will .... ,"79 "[This law] demands the divine reaction, the<br />

divine concern about sin, the divine resistance to this rebellion, and this<br />

breach of order.... If this were not true there would be no seriousness<br />

in the world at all; there would be no meaning in anything, no order, no<br />

stability... chaos and desolation would be supreme." 80 <strong>The</strong> Bible is<br />

"full of such juridical expressions... guilt, remission of guilt, judgment,<br />

judge, punishment, accusation, condemnation, pardon, release...." 81<br />

I leave it to the reader to choose which, if any, interpretation of biblical<br />

atonement he prefers. <strong>The</strong> problem discussed here is an interdisciplinary<br />

one based on certain interrelations of law and religion. More<br />

narrowly, it is focused on the legal interpretation of atonement and especially<br />

on the opposition of vicarious and individual responsibility.<br />

Pervading all of these problems is that of interpretation itself-what<br />

the theologians call exegesis or hermeneutics. A Christian theologian<br />

will interpret Isaiah 53, indeed most of the Old Testament, as prophetic<br />

of the coming of Christ while a Jewish theologian will provide a very<br />

different interpretation of that Testament, including Isaiah 53. So, too,<br />

Kung's negative view of Hinduism and Buddhism is far different from<br />

that of adherents to those world religions. Just as lawyers are influenced<br />

by their clients' interest and interpret statutes in conformity with that<br />

given end, so does a theologian's conception of God determine his interpretation<br />

of a religious text. Just as lawyers pick and choose among the<br />

cases so do theologians select those biblical passages that support their<br />

ordained goal. <strong>In</strong> the practice of law, however, subjectivity is diminished<br />

by the adversary system either directly as in the Anglo-American system<br />

or indirectly as in the civil law systems and, also, in both, by the impartiality<br />

of the judge. 82<br />

Certain other generalizations regarding the interpretations of biblical<br />

atonement may be ventured. First, both legalists and anti-legalists agree<br />

that Jesus bore all men's sins. But the reasons differ widely-from a belief<br />

in orthodox Christology to the simple belief that Jesus identified with<br />

79. Id. at 444.<br />

80. Id. at 465.<br />

81. See J. HALL, Religion, Law and Ethics, in LAW, SOCIAL SCIENCE AND CRIMINAL THEORY<br />

(1982).<br />

82. <strong>In</strong> Judaism "atonement... is effected through suffering by the individual himself. This is<br />

where Judaism and other religious systems differ most widely from Christianity, which does not<br />

think of atonement as affected by man's effort or suffering.... Christianity met [this problem] with<br />

its Christology." O.S. RANKIN, ISRAEL'S WIsDOM LITERATURE 122 (1954 reprint of 1936). See I.<br />

al Farqi, Islum, in THE GREAT ASIAN RELIGIONS 312 (W. Chan ed. 1969).<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


704 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

all suffering, sinful humanity. 83<br />

Second, both sides seem to agree that Jesus' life, if not his crucifixion,<br />

was necessary for the salvation of sinful humanity, although again "necessary"<br />

is given different interpretations ranging from acceptance of orthodox<br />

views of original sin and the incarnation to the inspiration of his<br />

life "unto death."<br />

Third, the legalists praise law and retributive justice, while the antilegalists<br />

criticize and condemn both. For the former, law, far from being<br />

a burden, 84 represents God's communication of his righteousness, his<br />

guidance, and his loving chastisement to lead people away from evil and<br />

toward goodness. For the anti-legalists, acceptance of law even as a minimum<br />

standard turns quickly to criticism of law as "legalistic" and, in<br />

any case, as far inferior to God's loving grace. <strong>The</strong> parallel of that with<br />

Plato's criticism of law in <strong>The</strong> Statesman and his preference for the justice<br />

and wisdom of the philosopher-king are striking. Equally significant<br />

are the biblical foundations of the perennial debates between deontologists<br />

and utilitarians regarding punishment.<br />

We can better understand atonement vis-a-vis present-day problems of<br />

penal law if we first take a backward glance at the place of collective<br />

responsibility and retribution in past ages. Only then can we appreciate<br />

the fact that our ancestors were not irrational in their penology. Moreover,<br />

that history is a necessary prolegomenon to a realistic grasp of present<br />

problems, for in that wider perspective we may discover not only that<br />

the past can guide us toward feasible reforms but also that it imposes<br />

limits on utopian plans to uproot retributive justice.<br />

From the perspectives of sociology and modern penal law collective<br />

responsibility seems superstitious and based on the myth that a society is<br />

a great ego, a person separate from the interactions of individuals; and it<br />

is outrageous from an ethical viewpoint since it imposes punitive sanctions<br />

on innocent persons. But history reveals interesting relevant facts.<br />

First, in pre-industrial societies, both ancient and modern, social groups<br />

are so closely knit in intimate contact and association (whose unity was<br />

symbolized in the leadership of a chief or ruler) that it is the most natural<br />

83. Psalm 19. See A. BUCHLER, STUDIES IN SIN AND ATONEMENT (<strong>In</strong>tro. by F.C. Grant,<br />

1967).<br />

84. See H. ROBINSON, THE HEBREW CONCEPTION OF CORPORATE PERSONALITY (1964). <strong>In</strong><br />

the thought of ancient Israel "sin was more than guilt; it was pollution. It infected the whole neighborhood...<br />

his city, his tribe or nation, and also their cattle and crops." F. Grant, Prolegomenon, in<br />

A. BUCHLER, STUDIES IN SIN AND ATONEMENT XXI, XXVII (1967).<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

thing in the world to think not of or as an individual but, instead, to<br />

think in concepts of the family, the clan, the community, or the nation.<br />

Only with industrialization and the loosening of ties does individualism<br />

make its appearance. Accordingly, we should distinguish present-day sociological<br />

conceptions of the group from the corporate idea that dominated<br />

biblical times. 5<br />

But, secondly, it has become clear that there was not simple unilinear<br />

evolution starting solely from the idea of corporate responsibility and<br />

ending in the substitution of the ethic of individual responsibility. From<br />

ancient times, moral leaders, including dramatists of ancient Greece, limited<br />

corporate liability by insisting that the innocent should not be punished<br />

for crimes committed by others. Moreover, as we shall see,<br />

although the pendulum has swung far from collective to individual liability,<br />

corporate liability is by no means completely absent in contemporary<br />

society, even from present-day law. It was usually the prophets who<br />

spoke of the nation's blessings and its liability. But Jeremiah and Ezekiel<br />

(Ez. 18) were among the first to criticize collective liability, especially the<br />

punishment of innocent persons for the sins of others. 8 6 It is also noteworthy<br />

that in many cases when God punished the nation, it was not for<br />

its sin but because of the ruler's sin; the king was the "owner" of the<br />

people. 8 7 Still, collective thinking was dominant.<br />

Westermarck cites literally hundreds of examples of collective responsibility<br />

among the ancient Greeks, Hebrews, Christians, Japanese, Koreans,<br />

Persians, Hindus and Teutons as well as among many primitive<br />

peoples. 88 He also gives instances of the rejection of collective liability. 9<br />

Sin was regarded as a contagious disease which could be transferred to<br />

85. 0. Rankin, supra note 82 at 53-54, 70. Recent studies by anthropologists support the view<br />

expressed in the Bible, namely, that individual responsibility was sometimes advocated along with<br />

collective responsibility. One anthropologist even says: "<strong>In</strong> fact, individual responsibility always<br />

exists inside corporate groups." <strong>In</strong> the pre-industrial societies which this anthropologist studied,<br />

collective responsibility was manifested in relation to other groups, that is, when a member of group<br />

A killed a member of Group B. MOOR, THE ALLOCATION OF RESPONSIBILITY 100 (M. Glickman<br />

ed. 1972). See T. ELIAS, THE NATURE OF AFIucAN CUSTOMARY LAW 134 (1954).<br />

86. D. Daube, supra note 64, at 162-63.<br />

87. E. WESTERMARCK, 1 THE ORIGIN AND DEVELOPMENT OF THE MORAL IDEAS 32, Ch. 2<br />

and 19 (1917); L. HOBHOUSE, MORALS IN EVOLUTION 70-104 (1916); POLLOCK, MkrTLAND, 1<br />

HISTORY OF ENGLISH LAW 678 (1923).<br />

88. "[Flor another's sin let me not suffer." RIG-VEDA ii, 28; 29; Westermarck, supra note 87,<br />

at 49. See, Deuteronomy 24:16 and 2 Kings 14:6.<br />

89. Westermarck, supra note 87, at 61.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


706 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

others and spread like an epidemic. 90 This led to the ritual of "transferring"<br />

the sins of the people to the sacrificed animal or the human<br />

sacrifice. 91<br />

Because collective responsibility means strict liability, the punishment<br />

of innocent persons, it is abhorrent to the modem mind. As Kant put it,<br />

penal liability is not "transmissible ... like a financial indebtedness...<br />

only the culprit can bear [punishment] which no innocent person can<br />

assume even though he be magnanimous enough to wish to take it upon<br />

himself for the sake of another." 92 Nevertheless, the universality of collective<br />

responsibility in past ages, the group mind-set rather than individualism<br />

(although alleviated from early times by pleas to spare the<br />

innocent), the likelihood that deterrence was also advanced by the threat<br />

to punish a wrongdoer's family, clan or nation-these and other factors<br />

described above made acceptance of the concept of collective responsibility<br />

natural and normal.<br />

<strong>The</strong>re is another phase of social experience that must be considered if<br />

we are to understand biblical atonement, namely, the role of the hero in<br />

history. If "society," viewed either as the aggregate of individuals or as a<br />

separate holistic entity, can be harmed (e.g. in ways that distinguish<br />

crimes from civil damages) 93 it is also true that society benefits from the<br />

sacrifice and contributions of its heroes-its great religious and moral<br />

leaders, its artists, scientists and scholars. All through history people<br />

have identified with and sung the praises of great men and women. <strong>In</strong>deed,<br />

*Carlyle hardly exaggerated when he included "Hero Worship" in<br />

the title of his book since, for him, "Universal History, the history of<br />

what man has accomplished in this world, is at bottom the History of the<br />

Great Men .... 9<br />

A more circumspect study of heroes emphasizes "the vicarious gratification<br />

of the [people's] yearnings through his presumed traits and<br />

90. Id. at 63. Quoting Frazer: <strong>The</strong> Victim must be a "representative of the community...<br />

accepted as a substitute on the principle of social solidarity." Id. at 67-68. See D. BROWNING,<br />

ATONEMENT AND PSYCHOTHERAPY (1966).<br />

91. 1. Kant, Religion Within <strong>The</strong> Lights of Reason Alone 66 (T. Greene, H. Hudson trans.<br />

1934).<br />

92. See J. HALL, GENERAL PRINCIPLES OF CRIMINAL LAW 240-246 (1960).<br />

93. T. CARLYLE, HEROES, HERO WORSHIP AND THE HEROIC IN HISTORY 1 (1840). "Such<br />

great teachers are very few in the world.... <strong>The</strong>y alone can carry us to the life divine." R. SRIVAS-<br />

TAVA, COMPARATIVE RELIGION 241 (1974).<br />

94. S. HOOK, THE HERO IN HISTORY 22 (1943).<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

achievements." 9 Krishna took human form when the need to overcome<br />

unrighteousness became urgent, Buddha's compassion went out to all<br />

suffering humanity, and many heroes in Ancient Greece were believed to<br />

be the sons of gods or goddesses. Nor is it only the great who elicit praise<br />

and gratitude. Many soldiers have sacrificed their lives that their comrades<br />

might live, and countless other "ordinary" persons never mentioned<br />

in the history books make daily sacrifices that others may benefit.<br />

It is in this perspective that versions of the atonement emphasizing Jesus'<br />

identification with all troubled, rejected men and women have great<br />

proximity to the experience of gratitude and love that people have felt for<br />

their heroes. 96<br />

If we combine reverence for the hero and the gratitude and affection he<br />

or she inspires-if we join that to normal acceptance of collective responsibility<br />

especially in past ages, it is no great leap from that platform to<br />

Biblical atonement in both its connotations-bearing the sins of others<br />

and the consequent benefit to the sinners. <strong>The</strong> above experience is projected<br />

into a religious faith.<br />

My concern here, however, is not theological, but secular, 97 especially<br />

with the interactions of law and religion. <strong>In</strong>deed, positive law and religion<br />

are so intertwined, both in the Bible and in the Qur'an, that it is no<br />

exaggeration to speak of the legal component of religion, of law in religion.<br />

<strong>The</strong>re is no better evidence of that than the writing of the theologians<br />

who for centuries advocated legal interpretations of atonement.<br />

If we glance at our present situation we find that some of the relevant<br />

concepts are still operative. Samuel Johnson said: "No man is thought<br />

the worse of here, whose brother was hanged." 98 But humanists are rare,<br />

and who can doubt that the families of some convicted criminals are<br />

often ostracized and suffer other discriminations? <strong>In</strong> wartime hostages<br />

are taken or killed, prisoners in a concentration camp are held responsible<br />

for the conduct of all the prisoners, and teachers penalize an entire<br />

class for the misbehavior of one student, especially if he does not confess.<br />

95. Compare Kant regarding the "superhuman." "[H]is distance from the natural man would<br />

then be so infinitely great that such a divine person could no longer be held up as an example of him.<br />

Man would say: If I too had a perfectly holy will all temptations to evil would of themselves be<br />

thwarted in me... I too should take upon myself not only willingly but joyfully all sorrows... even<br />

to the most ignominious death, since I would see before my eyes the glorious and imminent sequel."<br />

Kant, supra note 91, at 57-58.<br />

96. For my support and defense of religous faith see supra note 92, at 57-58.<br />

97. For my support and defense of religious faith see supra note 1, at 16-26.<br />

98. Daube, supra note 64, at 188.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


708 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

<strong>The</strong>re is strict vicarious liability in modem legal systems when an innocent<br />

employer is fined because of his employee's misconduct. <strong>In</strong>nocent<br />

stockholders pay the fines assessed against the corporation and they also<br />

benefit from most actions of the managers. 9 <strong>In</strong> international relations,<br />

political leaders may provoke wars, and innocent lives are lost. Thus,<br />

collective responsibility remains very much alive. Much of it, perhaps<br />

most of it, does not fall within the precise meaning of "crime," "criminal<br />

law" or "punishment;" this, indeed, has been said by many scholars<br />

about strict penal liability. But the liability of associations, social sanctions,<br />

and the work of social agencies are important aspects of the wider<br />

context in which modem systems of criminal law can be placed to the<br />

advance of knowledge of that law.<br />

<strong>The</strong>re is a final problem to be confronted which raises the most insistent<br />

of all the issues. Following precedent, we have been saying thus far<br />

that the legal interpretation of atonement was influenced by Roman or<br />

Lombard or feudal law. But if we press beyond those indubitable legal<br />

factors, if we seek the cause of many of their penal provisions, we find at<br />

the bottom of them-retribution. <strong>The</strong> usual description of the evolution<br />

and progress of retribution seems persuasive. First came instinctive retaliation<br />

against aggression. Second, comes vengeance which is supported<br />

by social norms, "oo and is limited by a sense of equivalence and<br />

reciprocity, as in barter. Finally, there emerges a principle of retribution<br />

which is refined over the years until it becomes the retributive justice that<br />

moral philosophers espouse.<br />

<strong>The</strong> Bible and the history of theology reveal the outlines of the perennial<br />

battle between those who would punish sinners and criminals because<br />

they were intentional wrongdoers and those who would deter or<br />

reform them. <strong>The</strong>y also reveal the commingling of retributive and utilitarian<br />

concepts. <strong>The</strong> sinner deserves to be punished, and punishment<br />

will also deter potential sinners; but most of all the Bible teaches that<br />

what is paramount is the reform of wrongdoers, i.e., reconciliation with<br />

God, resulting from repentance, restitution, and forgiveness.<br />

99. H. MANNHEIM, GROUP PROBLEMS IN CRIMINAL PUNISHMENT 43 (1955) distinguishes<br />

strict liability from that imposed on members of a union or partnership by reliance on the act of<br />

members in joining those associations. But surely the act of one who buys stock or joins a union is a<br />

very slender reed on which to rest punitive sanctions.<br />

100. H. KELSEN, SOCIETY AND NATURE 52, 55 (1943) W. McCulloch wrote that among the<br />

Koupoules of <strong>In</strong>dia "the greatest misconduct is the forgiveness of an injury, the first virtue, revenge."<br />

KEILSEN, id. at 64-65. Kelsen says at p. 235 that the retributive principle is the origin of the<br />

idea of causation.<br />

Washington University Open Scholarship


1987]<br />

ATONEMENT AND CRIMINAL LAW<br />

<strong>In</strong> modem times the issues have been cast in sharper, mutually exclusive<br />

terms. At the one extreme is Kant's scom of the crass utilitarianism<br />

that defends punishment only because it would deter others. For him,<br />

every human being should be treated as an end in himself, not as a means<br />

to extrinsic objectives. Desert is the only justification for punishing anyone.<br />

At the other extreme is Henry Sidgwick, the eminent moral philosopher,<br />

who wrote that he had "an instinctive and strong moral aversion<br />

to it [retribution] ... it is gradually passing away from the moral consciousness<br />

of educated persons in most advanced communities.... ." But<br />

he admitted that "it is still perhaps the more ordinary view." 1 0 1 Even<br />

stronger was Rashdall's condemnation of retribution. For him, "it cannot<br />

be rational to inflict an evil except as a means to good-the good of<br />

the offender or of others.'<br />

2<br />

It is not my present purpose to unravel the complexities of the voluminous<br />

literature on "punishment." 103 But I should like to suggest a possible<br />

way to advance discussion of this subject.<br />

Retribution is a universal phenomenon and experience among primitive<br />

as well as among civilized people, in ancient Greek drama, in the Old<br />

and <strong>New</strong> Testaments."4 It is implied or expressed in every legal system,<br />

even in those that explicitly reject it and then go on to impose punitive<br />

sanctions on criminals in proportion to the gravity of the harms they<br />

commit. Critics of retributive justice like Sidgwick and Rashdall believe<br />

that all thoughtful persons reject it (pace the heirs of Kant of Hegelta)<br />

but they regretfully acknowledge that "ordinary" people still support it.<br />

Even Plato, on whom Rashdall relied, seems to have made room for it.<br />

<strong>The</strong> plain fact, like it or not, is that retribution, crude or refined, has been<br />

and is inevitable. Responsibility will vary from collective to individual,<br />

or both may coexist, but retribution is constant. Although many academic<br />

utilitarians continue to ignore that fact or to argue as though it an<br />

somehow be made to disappear, non-academic utilitarians simply accept<br />

the inevitable and try to minimize its effect when its manifestation in<br />

specific penalties does not further deterrence or rehabilitation.<br />

<strong>The</strong> factual inevitability of retribution supports the position I have<br />

long advocated: (1) the primacy of retributive justice on the ground of<br />

101. H. SxiDGWICK, THE METHODS OF ETHICS 281 (1901).<br />

102. Rashdall, supra note 48, at 421, 422.<br />

103. See Hall, supra note 92, at ch. 9, and consult the <strong>In</strong>dex in J. HALL, LAW, SOCIAL SCIENCE<br />

AND THEORY (1982).<br />

104. Matthew 13: 41-44; 16:27; Mark 9:42.<br />

http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7


710 WASHINGTON UNIVERSITY LAW QUARTERLY<br />

[Vol. 65:694<br />

desert (guilt) and (2) the advance of the utilitarian ends of punishment<br />

(deterrence and rehabilitation) so far as they do not trivialize or exceed<br />

the limits ofjustice. 105 <strong>The</strong> pendulum has swung sharply in the direction<br />

of retributive justice and, unfortunately, in recent legislation in the<br />

United States rehabilitation has been ignored or rejected. Religion can<br />

remind us of the importance of helping wrongdoers develop an appreciation<br />

of moral values. Especially suggestive are modem versions of the<br />

legal and the anti-legal interpretations of atonement. What the philosopher-king<br />

will do in Utopia or God in heaven is a matter of faith. So far<br />

as the secular problems of crime and punishment are concerned, legal<br />

scholars will agree that sound positive law has great value. Still it seems<br />

necessary to stress the fact that even the soundest penal law limits what<br />

can be achieved in relianpe solely on it. <strong>In</strong> all world religions much emphasis<br />

is placed on the reform of wrongdoers, thought of as turning them<br />

from evil to goodness or as their advance in knowledge and understanding.<br />

<strong>The</strong>re can be little doubt that this aspect of religion has inspired the<br />

reform of penal institutions and much concern for the rehabilitation of<br />

their inmates.<br />

105. HALL, GENERAL PRINCIPLES OF CRIMINAL LAW 130 (lst ed. 1947). 307-308 (2nd ed.<br />

1960). This was not a discovery or a novelty. <strong>In</strong> 1797 Kant wrote: "He must first be found to be<br />

deserving of punishment before any consideration is given to the utility of this punishment for himself<br />

or for his fellow citizens." I. KANT, THE METAPHYSICAL ELEMENTS OF JUSTICE 100 (J. Ladd<br />

trans. 1965).<br />

Washington University Open Scholarship


Page 342 of 372


Attachment B<br />

<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge<br />

for Law Enforcement<br />

Page 343 of 372


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for<br />

U.S. Law Enforcement<br />

Jerome P. Bjelopera<br />

Specialist in <strong>Organized</strong> <strong>Crime</strong> and Terrorism<br />

Kristin M. Finklea<br />

Specialist in Domestic Security<br />

January 6, 2012<br />

CRS Report for Congress<br />

Prepared for Members and Committees of Congress<br />

Congressional Research Service<br />

7-5700<br />

www.crs.gov<br />

R41547


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Summary<br />

<strong>In</strong> the last two decades, organized crime has grown more complex, posing evolving challenges for<br />

U.S. federal law enforcement. <strong>The</strong>se criminals have transformed their operations in ways that<br />

broaden their reach and make it harder for law enforcement to combat them. <strong>The</strong>y have adopted<br />

more-networked structural models, internationalized their operations, and grown more tech savvy.<br />

<strong>The</strong>y are a significant challenge to U.S. law enforcement.<br />

Modern organized criminals often prefer cellular or networked structural models for their<br />

flexibility and avoid the hierarchies that previously governed more traditional organized crime<br />

groups such as the Cosa Nostra. Fluid network structures make it harder for law enforcement to<br />

infiltrate, disrupt, and dismantle conspiracies. Many 21 st century organized crime groups<br />

opportunistically form around specific, short-term schemes and may outsource portions of their<br />

operations rather than keeping it all “in-house.”<br />

Globalization has revolutionized both licit and illicit commerce. Commercial and technological<br />

innovations have reduced national trade barriers, widened transportation infrastructure, and<br />

bolstered volumes of international business. <strong>The</strong> <strong>In</strong>ternet and extensive cellular telephone<br />

networks have fostered rapid communication. <strong>In</strong>tegrated financial systems, which allow for easy<br />

global movement of money, are exploited by criminals to launder their illicit proceeds. Estimates<br />

suggest that money laundering annually accounts for between 2% and 5% of world GDP.<br />

Simultaneously, borders are opportunities for criminals and impediments to law enforcement.<br />

<strong>Organized</strong> criminals have expanded their technological “toolkits,” incorporating technologydriven<br />

fraud into their capabilities. <strong>The</strong>ir operations can harm U.S. citizens without ever having a<br />

physical presence in the country. <strong>The</strong>se illicit activities include cyber intrusions into corporate<br />

databases, theft of individual consumer credit card information, fencing of stolen merchandise<br />

online, and leveraging technology to aid in narcotics smuggling. Further, criminal<br />

organizations—which have historically burrowed into and exploited local ethnic communities—<br />

can now rely on <strong>In</strong>ternet connectivity and extensive, international transportation linkages to target<br />

localities around the globe.<br />

Since the terrorist attacks of September 11, 2001, there has been a shift in law enforcement<br />

attention and resources toward counterterrorism-related activities and away from traditional crime<br />

fighting activities including the investigation of organized crime. Although the effects of<br />

organized crime may not be seen in a consolidated attack resulting in the physical loss of life,<br />

they are far-reaching—impacting economic stability, public health and safety, as well as national<br />

security.<br />

<strong>In</strong> July 2011, the Obama Administration issued its Strategy to Combat Transnational <strong>Organized</strong><br />

<strong>Crime</strong>. It addresses the fact that federal investigation of organized crime matters has not<br />

historically been a centralized effort. Regardless, there still is no single agency charged with<br />

investigating organized crime in the way the Federal Bureau of <strong>In</strong>vestigation (FBI) has been<br />

designated the lead investigative agency for terrorism. Further, resources to tackle this issue are<br />

divided among many federal agencies. As such, Congress may exert its oversight authority<br />

regarding the federal coordination of organized crime investigations via the 2011 strategy.<br />

Policymakers may also debate the efficacy of current resources appropriated to combat organized<br />

crime.<br />

Congressional Research Service


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Contents<br />

<strong>In</strong>troduction...................................................................................................................................... 1<br />

<strong>Organized</strong> <strong>Crime</strong> Adapting to Globalization ................................................................................... 2<br />

Borders and <strong>Organized</strong> <strong>Crime</strong> ................................................................................................... 3<br />

Copycats and Smugglers ..................................................................................................... 3<br />

Drug Trafficking.................................................................................................................. 7<br />

Money Laundering .............................................................................................................. 9<br />

<strong>Organized</strong> <strong>Crime</strong> and Technological Change .......................................................................... 11<br />

Mass Marketing Fraud ...................................................................................................... 11<br />

Cyberspace, Electronic <strong>In</strong>formation, and <strong>Organized</strong> <strong>Crime</strong>.............................................. 13<br />

Online Identity <strong>The</strong>ft and Sophisticated Credit Card Fraud.............................................. 13<br />

<strong>Organized</strong> Retail <strong>Crime</strong> and Online Fencing .................................................................... 15<br />

Bulk Narcotics Smuggling and Technology...................................................................... 16<br />

Exploitation of Ethnic Diaspora Communities........................................................................ 18<br />

Changing Structures ................................................................................................................ 21<br />

Network Models................................................................................................................ 22<br />

Corruption................................................................................................................................ 24<br />

“Ground-Level” Exploitation of Private Businesses......................................................... 24<br />

Big Business and <strong>Organized</strong> Criminals............................................................................. 25<br />

Corruption of Public Officials........................................................................................... 27<br />

<strong>Organized</strong> <strong>Crime</strong>, a “National Security” and “Public Security” Concern ..................................... 28<br />

Conceptualizing <strong>Organized</strong> <strong>Crime</strong> .......................................................................................... 29<br />

Transnational <strong>Organized</strong> <strong>Crime</strong> Defined........................................................................... 30<br />

Statutory Definition........................................................................................................... 34<br />

Issues.............................................................................................................................................. 35<br />

Defining <strong>Organized</strong> <strong>Crime</strong> in Statute................................................................................ 35<br />

Congressional Commission............................................................................................... 36<br />

<strong>In</strong>centives for <strong>In</strong>vestigating <strong>Organized</strong> <strong>Crime</strong> .................................................................. 37<br />

Implementing the National Strategy to Combat TOC ....................................................... 38<br />

Figures<br />

Figure 1. Transnational <strong>Organized</strong> <strong>Crime</strong> Strategy ....................................................................... 34<br />

Contacts<br />

Author Contact <strong>In</strong>formation........................................................................................................... 40<br />

Congressional Research Service


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>In</strong>troduction<br />

<strong>In</strong> the last two decades, organized crime has grown more complex, posing evolving challenges for<br />

U.S. federal law enforcement. This is largely because these criminals have transformed their<br />

operations in ways that broaden their reach and make it harder for law enforcement to define and<br />

combat the threat they pose. Globalization and technological innovation have not only impacted<br />

legitimate commerce, but they have simultaneously revolutionized crime. <strong>In</strong> response to these<br />

forces, organized criminals have adopted more-networked structural models, internationalized<br />

their operations, and grown more tech savvy. Criminals have become more elusive. <strong>The</strong>y see<br />

international borders as opportunities while law enforcement views them as obstacles. Criminals<br />

have expanded their range of tools and targets as well. Meanwhile, law enforcement “plays by<br />

yesterday’s rules and increasingly risks dealing only with the weakest criminals and the easiest<br />

problems,” according to the Strategic Alliance Group, a partnership of seven law enforcement<br />

agencies from five nations. 1<br />

Motivated by money, organized crime fills needs not met by licit market structures and/or exploits<br />

businesses, consumers, and nations for profit. <strong>Organized</strong> criminals have capitalized on<br />

commercial and technological advances that have bolstered communication and international<br />

business. <strong>The</strong>y use innovative methods of moving illegal proceeds around the world. Some<br />

nations have also witnessed the creation of ties between powerful business figures, politicians,<br />

and criminals.<br />

Modern organized criminals may prefer cellular or networked structural models for their<br />

flexibility and avoid the hierarchies governed by elaborate initiation rituals that were favored by<br />

their predecessors. Fluid network structures make it harder for law enforcement to infiltrate,<br />

disrupt, and dismantle conspiracies. Many 21 st century organized crime groups opportunistically<br />

form around specific, short-term schemes. Further, these groups may outsource portions of their<br />

operations rather than keeping all of their expertise “in-house.”<br />

<strong>In</strong> July 2011, to address these and other issues, the Obama Administration issued its Strategy to<br />

Combat Transnational <strong>Organized</strong> <strong>Crime</strong> (2011 Strategy). It described transnational organized<br />

crime (TOC) networks as a strategic threat to national security, laid out a definition of<br />

transnational organized crime, and set forth five policy objectives and six categories of priority<br />

actions in an attempt to devise a cohesive federal response to transnational organized crime. 2<br />

Complicating all of this, since the terrorist attacks of September 11, 2001 (9/11), there has been a<br />

shift in law enforcement attention and resources more toward counterterrorism-related activities<br />

and away from traditional crime fighting activities—including the investigation of organized<br />

crime.<br />

1 <strong>The</strong>se law enforcement agencies include the U.S. Federal Bureau of <strong>In</strong>vestigation (FBI); Drug Enforcement<br />

Administration (DEA); Immigration and Customs Enforcement (ICE); the United Kingdom’s Serious Organised <strong>Crime</strong><br />

Agency (SOCA); the Australian <strong>Crime</strong> Commission and Australian Federal Police; the <strong>New</strong> Zealand Police; and the<br />

Royal Canadian Mounted Police. See SOCA, “SOCA Working in Partnership Worldwide,” http://www.soca.gov.uk/<br />

about-soca/working-in-partnership/international-partnerships. <strong>In</strong>telligence Committee Futures Working Group, <strong>Crime</strong><br />

and Policing Futures, Strategic Alliance Group, March 2008, p. 2. (Hereafter, <strong>In</strong>telligence Committee Futures Working<br />

Group, Futures.)<br />

2 For details see Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, July 2011, http://www.whitehouse.gov/sites/<br />

default/files/Strategy_to_Combat_Transnational_<strong>Organized</strong>_<strong>Crime</strong>_July_2011.pdf. (Hereafter: Strategy to Combat<br />

Transnational <strong>Organized</strong> <strong>Crime</strong>.)<br />

Congressional Research Service 1


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

This report provides an analysis of how organized crime has capitalized on globalization by using<br />

borders as opportunities, relying on fast-paced technological change, and adapting its<br />

organizational structures. It illustrates how these transformations can impact U.S. persons,<br />

businesses, and interests. <strong>The</strong> report includes a discussion of how U.S. law enforcement<br />

conceptualizes organized crime in the 21 st century and concludes by examining potential issues<br />

for Congress, including the extent to which organized crime is a national security threat (partly to<br />

be tackled by U.S. law enforcement agencies), congressional oversight regarding the federal<br />

coordination of organized crime investigations, and the utility of current resources appropriated to<br />

combat organized crime.<br />

This report employs a broad conceptualization of organized crime in its narrative discussion of<br />

criminal activity. <strong>In</strong> other words, the analysis includes groups engaged in sustained criminal<br />

enterprises, such as—but not limited to—drug traffickers, mafia families, smugglers, violent<br />

gangs, and fraudsters. <strong>The</strong>se operations may or may not have a transnational dimension to them<br />

(which is a requirement under the guidelines of the 2011 Strategy), but they directly impact U.S.<br />

persons, businesses, and/or interests. While this conceptualization may be broader than the<br />

definition laid out in the 2011 Strategy, it incorporates a range of criminality that may inform<br />

Congress in future legislation impacting organized crime. <strong>The</strong> cases and examples discussed in<br />

this report are not intended to set definitional boundaries for organized crime.<br />

<strong>Organized</strong> <strong>Crime</strong> Adapting to Globalization<br />

<strong>Organized</strong> crime targeting the United States has internationalized and its structures have flattened.<br />

<strong>The</strong> popular image of mobsters employing elaborate initiation rituals and strict codes of conduct<br />

to control crews that assail their own communities is outmoded. Today, nimble, adaptive, loosely<br />

structured small groups with global reach harm consumers, businesses, and government interests<br />

on a daily basis. Commercial and technological innovations are behind this transformation. <strong>The</strong>y<br />

have helped to reduce national trade barriers, widen transportation infrastructure, and bolster<br />

volumes of international business. Smugglers have taken advantage of growing international<br />

commerce to hide illicit trade. <strong>The</strong> <strong>In</strong>ternet and extensive cellular telephone networks have<br />

fostered rapid communication, simultaneously revolutionizing licit and illicit commerce. For<br />

example, integrated financial systems allow for easy global movement of money. Estimates<br />

suggest that money laundering annually accounts for between 2% and 5% of world GDP. 3<br />

Criminal organizations targeting the United States operate in many of the world’s nations. Areas<br />

wracked by social disorder, inadequate policing, and poor governance offer opportunities for<br />

organized crime to take root. 4 <strong>The</strong>se groups exploit diaspora communities in the United States as<br />

cover for their operations, situating elements of their global operations among immigrant<br />

enclaves.<br />

<strong>Organized</strong> crime groups are becoming more entrepreneurial or market focused, reacting to<br />

changes in both illicit and licit economies. 5 Of course, they are still heavily involved in activities<br />

3 Moisės Naím, Illicit: How Smugglers, Traffickers, and Copycats are Hijacking the Global Economy (<strong>New</strong> York:<br />

Anchor Books, 2006) p. 16. (Hereafter: Naím, Illicit.)<br />

4 <strong>In</strong>telligence Committee Futures Working Group, Futures, p. 5. See also United Nations Office on Drugs and <strong>Crime</strong><br />

(UNODC), <strong>The</strong> Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat Assessment, (Vienna: UNODC,<br />

2010), p. 221.<br />

5 Jharna Chatterjee, <strong>The</strong> Changing Structure of <strong>Organized</strong> <strong>Crime</strong> Groups, Royal Canadian Mounted Police, 2005, pp. 2,<br />

(continued...)<br />

Congressional Research Service 2


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

such as narcotics trafficking and money laundering (which have been greatly impacted by<br />

globalization), but organized criminals are increasingly involved in less “traditional” high-tech<br />

operations encompassing identity theft, counterfeiting of goods, and various types of fraud.<br />

Borders and <strong>Organized</strong> <strong>Crime</strong><br />

Modern organized criminals prey upon weaknesses in international transportation and customs<br />

security regimens. 6 Border policing efforts have attempted to keep pace with the expansion of<br />

international commerce. <strong>Organized</strong> criminals attempting to smuggle goods, people, or<br />

information across borders also face enhanced border security regimens resulting from the<br />

terrorist attacks of 9/11. Regardless, specialized criminal networks smuggle items such as<br />

narcotics, counterfeit goods, stolen goods, and bulk cash, as well as humans, around the world<br />

and into the United States. <strong>The</strong>y have hidden their contraband within the growing volume of<br />

legitimate global trade. Prior to the global recession, between 1995 and 2008 the volume of<br />

global containerized traffic tripled. 7 Drug traffickers move large loads of cocaine, eventually<br />

destined for U.S. markets, from South America to Mexico via containerized shipping.<br />

<strong>In</strong>ternational counterfeiters use containers to smuggle their fake goods into the United States. As<br />

Moisės Naím has succinctly put it, most illicit trade involves copycats, smugglers, and<br />

traffickers. 8 While individuals can and do engage in these activities, a good deal can be attributed<br />

to organized crime.<br />

Copycats and Smugglers<br />

Criminal groups engage in counterfeiting and smuggling across and within the borders of the<br />

United States. This activity includes a wide range of products and influences the lives of everyday<br />

Americans, U.S. businesses, and government.<br />

Counterfeiting and Piracy<br />

Counterfeiting highlights the nexus between globalization and the modernization of organized<br />

crime. Although it is difficult, if not impossible, to determine how deeply immersed organized<br />

criminals are in this activity, at least one study has suggested serious involvement. 9 Further, in a<br />

recent speech before the <strong>In</strong>ternational <strong>In</strong>tellectual Property Summit, Attorney General Holder<br />

reinforced the need for the international law enforcement community to combat “the international<br />

networks of organized criminals now seeking to profit from IP [intellectual property] crimes.” 10<br />

(...continued)<br />

7-8, http://dsp-psd.pwgsc.gc.ca/Collection/PS64-9-2005E.pdf. (Hereafter: Chatterjee, <strong>The</strong> Changing Structure.)<br />

6 For more on this, see Naím, Illicit; Melvyn Levitsky, “Transnational Criminal Networks and <strong>In</strong>ternational Security,”<br />

Syracuse Journal of <strong>In</strong>ternational Law and Commerce, vol. 30, no. 2 (Summer 2003), pp. 227-240.<br />

7 Research and <strong>In</strong>novative Technology Administration, Bureau of Transportation Statistics, America’s Container Ports:<br />

Freight Hubs That Connect Our Nation to Global Markets, Department of Transportation, June 2009, pp. 7-8,<br />

http://www.bts.gov/publications/americas_container_ports/2009/pdf/entire.pdf.<br />

8 Naím, Illicit, pp. 1-8.<br />

9 See, for example, Gregory F. Treverton et al., Film Piracy, <strong>Organized</strong> <strong>Crime</strong>, and Terrorism, RAND Corporation,<br />

Santa Monica, CA, 2009, p. 27, http://www.rand.org/pubs/monographs/2009/RAND_MG742.pdf. (Hereafter,<br />

Treverton et al., Film Piracy.)<br />

10 Department of Justice, “Attorney General Eric Holder Speaks at the <strong>In</strong>ternational <strong>In</strong>tellectual Property Summit,”<br />

(continued...)<br />

Congressional Research Service 3


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>In</strong> areas such as film piracy, counterfeiting does not necessarily involve high entry costs or large<br />

legal penalties when compared to more conventional criminal activity such as drug trafficking. 11<br />

It is also potentially very lucrative. With little infrastructure—a high-speed <strong>In</strong>ternet connection,<br />

scanner, and copier and off-the-shelf software—criminals around the globe can easily imitate the<br />

branding and packaging that accompanies products, let alone copy the products themselves. 12<br />

Counterfeiting and pirating goods 13 involves the violation of intellectual property rights (IPR), 14<br />

essential to creative and high-tech industries particularly reliant on copyrights, trademarks, and<br />

patents to protect innovation. Counterfeiting and piracy potentially harm legitimate businesses<br />

and consumers, sapping profits and brand value and flooding markets with inferior and even<br />

dangerous products masquerading as legitimate goods. Aside from enforcement outlays, the<br />

activity also costs governments tax revenue and may slow economic growth by driving down<br />

incentives to innovate. 15<br />

Between FY2005 and FY2008, the yearly domestic value 16 of IPR-related law enforcement<br />

seizures of contraband in the United States leaped from $93 million to $273 million. <strong>In</strong> FY2009,<br />

(...continued)<br />

press release, October 18, 2010, http://www.justice.gov/iso/opa/ag/speeches/2010/ag-speech-101018.html.<br />

11 Treverton et al., Film Piracy.<br />

12 Treverton et al., Film Piracy, p. 3; Deputy Assistant Attorney General Criminal Division, Department of Justice,<br />

Jason M. Weinstein, Statement Before the United States House of Representatives Committee on Oversight and<br />

Government Reform Subcommittee on Government Management, Organization, and Procurement, Department of<br />

Justice, Prepared Testimony “Protecting <strong>In</strong>tellectual Property Rights in a Global Economy: Current Trends and Future<br />

Challenges,” December 9, 2009, p. 2, http://oversight.house.gov/images/stories/Hearings/Government_Management/<br />

<strong>In</strong>tellectual_Property_Rights/Draft_DAAG_Weinstein_testimony_OMB_CLEARED_with_new_date.pdf.<br />

13 U.S. Government Accountability Office (GAO), <strong>In</strong>tellectual Property, p. 5 offers the following definition: “‘Pirated<br />

copyright goods’ refer to any goods that are copies made without the consent of the right holder or person duly<br />

authorized by the right holder. ‘Counterfeit goods’ refer to any goods, including packaging or bearing without<br />

authorization, a trademark that is identical to a trademark validly registered for those goods, or that cannot be<br />

distinguished in its essential aspects from such a trademark, and that, thereby, infringes the rights of the owner of the<br />

trademark in question. According to the U.S. Food and Drug Administration (FDA), ‘counterfeit drugs’ are defined<br />

under U.S. law as those sold under a product name without proper authorization, where the identity of the source drug<br />

is knowingly and intentionally mislabeled in a way that suggests that it is the authentic and approved product.”<br />

14 U.S. Government Accountability Office (GAO), <strong>In</strong>tellectual Property: Observations on Efforts to Quantify the<br />

Economic Effects of Counterfeit and Pirated Goods, GAO-1-423, April 2010, p. 5, http://www.gao.gov/new.items/<br />

d10423.pdf defines intellectual property (IP) as “any innovation, commercial or artistic, or any unique name, symbol,<br />

logo, or design used commercially. IP rights protect the economic interests of the creators of these works by giving<br />

them property rights over their creations.” <strong>The</strong> report describes copyright as “[a] set of exclusive rights subsisting in<br />

original works of authorship fixed in any tangible medium of expression now known or later developed, for a fixed<br />

period of time. For example, works may be literary, musical, or artistic.” <strong>The</strong> report defines trademark as “[a]ny sign or<br />

any combination of signs capable of distinguishing the source of goods or services is capable of constituting a<br />

trademark. Such signs—in particular, words (including personal names), letters, numerals, figurative elements, and<br />

combinations of colors, as well as any combination of such signs—are eligible for registration as trademarks.” Patents<br />

are “[e]xclusive rights granted to inventions for a fixed period of time, whether products or processes, in all fields of<br />

technology, provided they are new, not obvious (involve an inventive step), and have utility (are capable of industrial<br />

application).”<br />

15 U.S. Government Accountability Office (GAO), <strong>In</strong>tellectual Property; U.S. Chamber of Commerce, “Protecting<br />

<strong>In</strong>tellectual Property,” pp. 9-15, http://www.uschamber.com/IP.htm. IPR infringement may also have some positive<br />

effects for consumers who may derive benefit from the lower costs of pirated goods. <strong>In</strong>dustry may also eventually<br />

generate more sales as consumers possibly develop interest in purchasing legitimate versions of cheaper counterfeit<br />

products they have sampled.<br />

16 According to U.S. Customs and Border Protection, “domestic value” is the “cost of seized goods, plus the cost of<br />

shipping and importing the goods into the U.S. and an amount for profit.”<br />

Congressional Research Service 4


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

the domestic value of seizures dropped 4%. 17 This is likely due to the global recession. Products<br />

originating in China—both Mainland China and Hong Kong—accounted for over 85% of these<br />

IPR seizures in FY2008 and FY2009. 18 Two 2010 operations in the United States together netted<br />

$240 million in counterfeit materials. <strong>The</strong> hauls included fake Rolex watches, Coach handbags,<br />

pirated DVDs, and fake pharmaceutical products. Much of the material came from China. 19<br />

Auto <strong>The</strong>ft Rings<br />

Another example of organized criminals viewing borders as opportunity involves auto theft.<br />

Although international automobile theft has existed almost as long as cars have been around, 20 the<br />

integration of worldwide markets and expansion of international shipping have greatly impacted<br />

it by facilitating international transport of stolen automobiles. Assessing the level of such activity<br />

is very difficult since few metrics for it exist. Regardless, today’s international automobile theft<br />

rings benefit from the high levels of cargo container traffic ushered in by globalization. <strong>The</strong>se<br />

groups profit by stealing vehicles in the United States and shipping them abroad, where they are<br />

sold. Such illicit operations react to global demand for luxury vehicles, and in some instances are<br />

extremely responsive to market forces. <strong>The</strong>y trawl large U.S. metropolitan areas that have<br />

assortments of vehicles and rely on rail or port facilities to move stolen vehicles abroad. 21<br />

<strong>In</strong> June 2010, law enforcement officials announced indictments of 17 participants in an alleged<br />

scheme that pilfered 450 cars annually in <strong>New</strong> York, <strong>New</strong> Jersey, and Connecticut. According to<br />

law enforcement officials, the group, described as a “steal to order” outfit by <strong>New</strong> York State<br />

Attorney General Andrew Cuomo, filled specific requests from U.S. customers and others in<br />

Senegal and netted up to $25,000 per car. <strong>The</strong> group supposedly relied on specialists who could<br />

reprogram car keys to match a vehicle’s specific code, exporters, and two car dealership<br />

employees, among others. <strong>The</strong> ring allegedly stored vehicles in four Bronx, NY, garages and<br />

loaded those destined for Senegal into shipping containers, concealing the cars behind furniture. 22<br />

17 U.S. Customs and Border Protection, “Yearly Comparisons: Seizure Statistics for <strong>In</strong>tellectual Property Rights (FY<br />

2005-FY2009),” January 2010, http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/seizure/seizure_stats.xml; U.S.<br />

Customs and Border Protection, U.S. Immigration and Customs Enforcement, “<strong>In</strong>tellectual Property Rights Seizure<br />

Statistics: FY 2009,” October 2009, p. 2, http://www.cbp.gov/linkhandler/cgov/trade/priority_trade/ipr/seizure/<br />

fy09_stats.ctt/fy09_stats.pdf; U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement,<br />

“<strong>In</strong>tellectual Property Rights Seizure Statistics: FY 2008,” January 2009, p. 2, http://www.cbp.gov/linkhandler/cgov/<br />

trade/priority_trade/ipr/seizure/fy08_final_stat.ctt/fy08_final_stat.pdf.<br />

18 U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, “<strong>In</strong>tellectual Property Rights<br />

Seizure Statistics: FY2009,” October 2009, p. 12, http://www.cbp.gov/linkhandler/cgov/trade/priority_trade/ipr/pubs/<br />

seizure/fy09_stats.ctt/fy09_stats.pdf; U.S. Customs and Border Protection, U.S. Immigration and Customs<br />

Enforcement, “<strong>In</strong>tellectual Property Rights Seizure Statistics: FY2008,” January 2009, p. 13, http://www.cbp.gov/<br />

linkhandler/cgov/trade/priority_trade/ipr/pubs/seizure/fy08_final_stat.ctt/fy08_final_stat.pdf.<br />

19 Keith Johnson, “U.S. Seizes Big Batches of Fake Goods,” Wall Street Journal, April 26, 2010.<br />

20 See “Stolen American Autos Clog the Mexican Market,” <strong>New</strong> York Times, February 5, 1922,<br />

http://query.nytimes.com/mem/archive-free/pdf?res=9D0DE5D71130EE3ABC4D53DFB4668389639EDE.<br />

21 Eva Dou, “<strong>New</strong>-York Based <strong>The</strong>ft Ring Shipped Hot Cars to Senegal,” Associated Press, June 30, 2010.<br />

22 Ibid; Rob Sgobbo, Joe Jackson, and Brendan Brosh, “U.S. to Senegal Car <strong>The</strong>ft Ring Busted, Attorney General<br />

Andrew Cuomo Says,” <strong>New</strong> York Daily <strong>New</strong>s, June 30, 2010.<br />

Congressional Research Service 5


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Human Smuggling and Trafficking<br />

Criminal organizations are taking advantage of an unprecedented era of international migration,<br />

including illegal migration to the United States. 23 However, since 2007 illegal immigration to the<br />

United States has declined. 24 This may be attributable, in part, to dwindling job opportunities<br />

resulting from the global recession and increased immigration enforcement activity along the U.S.<br />

Southwest border. 25 Nonetheless, criminal organizations continue to capitalize on the desire of<br />

unauthorized immigrants to enter the United States. Networks of human smugglers and others—<br />

including Mexican drug trafficking organizations (DTOs) that have broadened their moneygenerating<br />

activities to include human and weapon smuggling, counterfeiting, kidnapping for<br />

ransom, and extortion—bring unauthorized immigrants across the border and into the United<br />

States. 26 <strong>In</strong> one well-known case, Cheng Chui Ping—also known as “Sister Ping”—sentenced in<br />

March 2006, had led an international human smuggling ring that was responsible for smuggling<br />

Chinese villagers to the United States between the early 1980s and April 2000. <strong>In</strong> a 2006 press<br />

release, the Department of Justice (DOJ) described her as “one of the first, and ultimately most<br />

successful, alien smugglers of all time.” 27 At the start, Ping’s smuggling ring brought small<br />

numbers of villagers to the United States via aircraft, using fake immigration documents. She<br />

turned from exclusive reliance on air transit to include the use of maritime shipping as her<br />

operation matured. This way, Ping likely exploited increasing volumes of international seaborne<br />

cargo engendered by globalization to mask her illegal movement of human beings. She eventually<br />

developed the capability to smuggle hundreds of victims at a time via cargo ships, where the<br />

villagers could be stashed below the deck until they reached their U.S. destination and eventually<br />

paid her exorbitant smuggling fees. 28 Criminals who smuggle individuals into the United States<br />

may also turn the smuggling into a trafficking situation by increasing the immigrants’ debts owed<br />

once they have been smuggled to the United States. <strong>The</strong> smugglers/traffickers may then require<br />

their victims to work for a period of time to pay off the debts. 29<br />

<strong>Organized</strong> crime exploits individuals through both labor and sex trafficking. <strong>In</strong> 2006, the FBI<br />

reported that human trafficking generates about $9.5 billion for organized crime annually. 30<br />

23 Naím, Illicit p. 89; Jackie Turner and Liz Kelly, “<strong>In</strong>tersections Between Diasporas and <strong>Crime</strong> Groups in the<br />

Constitution of the Human Trafficking Chain,” British Journal of Criminology, vol. 49, no. 2 (March 2009), p. 184.<br />

24 Jeffrey S. Passel and D'Vera Cohn, U.S. Unauthorized Immigration Flows Are Down Sharply Since Mid-Decade,<br />

Pew Hispanic Center, Report, Washington, DC, September 1, 2010, p. i, http://pewhispanic.org/files/reports/126.pdf.<br />

25 Miriam Jordan, “Illegal Immigration to U.S. Slows Sharply,” Wall Street Journal, September 1, 2010,<br />

http://online.wsj.com/article/SB10001424052748703882304575465742670985642.html?mod=googlenews_wsj.<br />

26 Also, while some drug trafficking organizations may not be directly involved in human smuggling, they may tax the<br />

smugglers who wish to use the established drug trafficking routes. For details on Mexican cartels and human<br />

smuggling, see David Luhnow and Jose De Cordoba, “Mexican Military Finds 72 Bodies Near Border,” Wall Street<br />

Journal, August 26, 2010, http://online.wsj.com/article/<br />

SB10001424052748703632304575450761550490920.html#articleTabs%3Darticle; Josh Meyer, “Drug Cartels Raise<br />

the Stakes on Human Smuggling,” Los Angeles Times, March 23, 2009, http://articles.latimes.com/2009/mar/23/nation/<br />

na-human-smuggling23.<br />

27 Department of Justice, “Sister Ping Sentenced to 35 Years in Prison for Alien Smuggling, Hostage Taking, Money<br />

Laundering, and Ransom Proceeds Conspiracy,” press release, March 16, 2006, http://www.justice.gov/usao/nys/<br />

pressreleases/March06/sisterpingsentencingpr.pdf.<br />

28 Ibid.<br />

29 Department of Justice, “Hudson County Bar Owner Pleads Guilty to Role in <strong>In</strong>ternational Human Smuggling Ring,”<br />

press release, September 12, 2006, http://www.justice.gov/usao/nj/press/files/pdffiles/medr0912rel.pdf.<br />

30 Department of State, Trafficking <strong>In</strong> Persons Report 2006, June 2006, p. 13, http://www.state.gov/documents/<br />

organization/66086.pdf.<br />

Congressional Research Service 6


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

However, as the Government Accountability Office (GAO) has noted, estimates regarding the<br />

global scale of human trafficking are questionable; 31 as such, any estimates regarding the<br />

proceeds generated through these crimes may not be representative of their true scope. <strong>The</strong>se<br />

criminal organizations target both U.S. citizens and foreign nationals who are drawn to visions of<br />

better lives in the United States.<br />

<strong>In</strong>ternational borders often play a central role in the dynamics involved in forced labor and sex<br />

trafficking. <strong>In</strong> many instances, victims likely perceive borders and border security regimens as<br />

insurmountable barriers via legitimate means, requiring them to turn to illicit methods of transit<br />

offered by traffickers. <strong>Organized</strong> criminals prey on victims’ powerful desires to live or work in<br />

other countries. While the following two cases may not have been prosecuted by DOJ as<br />

traditional “organized crime,” the networks involved highlight some of the dynamics involved in<br />

labor and sex trafficking. <strong>In</strong> August 2010, federal law enforcement announced an indictment of<br />

six individuals for participation in an alleged conspiracy to exploit Thai nationals through forced<br />

labor in the United States. <strong>The</strong> defendants allegedly enticed workers to the United States by<br />

offering opportunities for lucrative jobs. Once in the United States, the approximately 400 Thai<br />

workers had their passports confiscated, were threatened with economic harm and deportation,<br />

and were forced to work on farms in Washington and Hawaii. 32 <strong>In</strong> another case, four individuals<br />

from the United States, Mexico, and Guatemala were sentenced in April 2010 for involvement in<br />

a sex trafficking organization that targeted young Mexican women. <strong>The</strong>y lured these women to<br />

the United States on the promise of better lives or legitimate employment. Once the women were<br />

brought to the United States, they were instead physically threatened, beaten, intimidated, and<br />

forced to engage in commercial sex. 33 DOJ has also reported an uptick in Asian organized crime<br />

groups becoming involved as pimps or brokers in domestic human sex trafficking. Although the<br />

increase is noted for Asian organized crime groups, involvement in sex trafficking is certainly not<br />

limited by ethnic or geographic origin; these criminals collaborate with other, non-Asian groups<br />

to further their sex trafficking enterprises. 34<br />

Drug Trafficking<br />

<strong>In</strong> the last decade, cocaine has become a truly global commodity dependent on illicit market<br />

fluctuations. Traffickers now can leverage wide, international distribution networks to ride out<br />

pressures or changes that may make their traditional illicit markets less hospitable. According to<br />

media reports, some Colombian and Mexican cocaine suppliers have shifted sizeable amounts of<br />

product using containerized shipping—hiding their illicit material within the daily globalized<br />

flow of legitimate seaborne international commerce. 35 And some of the Mexican Gulf Cartel’s<br />

31 Government Accountability Office (GAO), Human Trafficking: Better Data, Strategy, and Reporting Needed to<br />

Enhance U.S. Antitrafficking Efforts Abroad, GAO-06-825, July 2006, http://www.gao.gov/new.items/d06825.pdf.<br />

32 Department of Justice, “Six People Charged in Human Trafficking Conspiracy for Exploiting 400 Thai Farm<br />

Workers,” press release, September 2, 2010, http://www.justice.gov/opa/pr/2010/September/10-crt-999.html. For<br />

another case involving forced labor, see Department of Justice, “Uzbek Man Sentenced for Role in Multi-National<br />

Racketeering and Forced Labor Enterprise,” press release, May 9, 2011, http://www.justice.gov/opa/pr/2011/May/11-<br />

crt-589.html.<br />

33 Department of Justice, “Four Defendants Sentenced to Prison in Human Trafficking Ring,” press release, April 28,<br />

2010, http://www.justice.gov/usao/gan/press/2010/04-28-10.pdf.<br />

34 Comments by DOJ officials at the 2010 National Conference on Human Trafficking, May 3–5, Arlington, VA.<br />

35 Mark Townsend, “How Liverpool Docks Became a Hub of Europe’s Deadly Cocaine Trade,” <strong>The</strong> Guardian, May<br />

16, 2010.<br />

Congressional Research Service 7


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

smuggling activity involving European markets has used the United States as a transshipment<br />

point. 36<br />

When it comes to the internationalization of cocaine markets, not all the news involves the<br />

growth of supply, however. Global demand for cocaine has partly impacted U.S. bound supplies<br />

of the drug. Cocaine availability levels in the United States have decreased since 2006. Diversion<br />

of cocaine to European and Latin American markets by Colombian and Mexican drug cartels has<br />

fueled this downturn in availability, as have coca eradication efforts, large seizures, law<br />

enforcement pressure on Mexican cartels, and violent inter-cartel rivalries. 37<br />

While the story of globalized drug smuggling impacting the United States often revolves around<br />

Colombian and Mexican cartels specializing in drugs such as cocaine, marijuana, heroin, and<br />

methamphetamine, criminal groups trafficking narcotics come in all sizes and handle a variety of<br />

drugs. Because of the ease of international communications, travel, and transportation networks<br />

inherent in globalization, drug trafficking groups need not be directly tied to the large cartels to<br />

have significant worldwide reach. Even relatively small groups can forge far-flung supply and<br />

transportation links.<br />

<strong>The</strong> FBI’s operation Black Eagle tracked a small Albanian network of alleged criminals based in<br />

northern <strong>New</strong> Jersey who were indicted in March 2009. 38 <strong>The</strong> network purportedly had domestic<br />

ties to Chicago, Detroit, and Texas, as well as international links to Macedonia and Albania. At<br />

one point, the group of opportunists supposedly conspired to smuggle 100 kilograms of heroin<br />

from Albania to the United States. According to the FBI, the group planned to use a Balkan front<br />

company to conceal the heroin in containerized shipments of furniture bound for the United<br />

States. <strong>The</strong> heroin was purportedly to come from Afghanistan, likely via Turkey and into Albania.<br />

<strong>The</strong>re was no clear cut leadership in the loosely knit group. <strong>The</strong> heroin deal was going to be one<br />

last score before some of the criminals “retired,” according to the FBI. <strong>The</strong>y were also likely<br />

involved with stealing and selling pharmaceuticals, illegal gambling, dealing ecstasy, and theft of<br />

retail goods. 39<br />

<strong>In</strong> another case involving a relatively small group, Phuong Thi Tran pleaded guilty in February<br />

2010 for her involvement in what has been described in press reports as an Asian drug trafficking<br />

ring that smuggled ecstasy pills and other drugs into the United States from Canada, where they<br />

were manufactured. Tran, who lived in Canada, is originally from Vietnam and served as the<br />

36 Michele M. Leonhart, DEA Acting Administrator, “Prepared Remarks: Project Reckoning Press Conference,”<br />

September 17, 2008, http://www.justice.gov/dea/speeches/s091808.html.<br />

37 National Drug <strong>In</strong>telligence Center, National Drug Threat Assessment, February 2010, p. 29, http://www.justice.gov/<br />

ndic/pubs38/38661/38661p.pdf.<br />

38 Federal Bureau of <strong>In</strong>vestigation, <strong>New</strong>ark Division, “Federal Agents Shut Down <strong>In</strong>ternational Smorgasbord of<br />

<strong>Crime</strong>,” press release, March 18, 2009, http://newark.fbi.gov/pressrel/pressrel09/nk031809.htm.<br />

39 Federal Bureau of <strong>In</strong>vestigation, “<strong>In</strong>side the FBI: Albanian <strong>Organized</strong> <strong>Crime</strong>,” November 27, 2009,<br />

http://www.fbi.gov/inside/archive/inside112709.htm. For more on Albanian organized crime activity in the United<br />

States see Department of Justice, “Two Leaders of Violent Albanian Drug Gang Found Guilty in Manhattan Federal<br />

Court,” press release, December 7, 2011, http://www.fbi.gov/newyork/press-releases/2011/two-leaders-of-violentalbanian-drug-gang-found-guilty-in-manhattan-federal-court;<br />

Department of Justice, “Sixteen Members of <strong>In</strong>ternational<br />

<strong>Organized</strong> <strong>Crime</strong> Group Charged with Kidnapping, Narcotics, Robbery and Firearms <strong>Crime</strong>s,” press release, June 8,<br />

2010, http://www.fbi.gov/newyork/press-releases/2010/nyfo060810.htm.<br />

Congressional Research Service 8


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

group’s ringleader. She oversaw an operation that smuggled millions of ecstasy pills into the<br />

United States between 2002 and 2008, when she was arrested. 40<br />

Money Laundering<br />

Making ill-gotten gains appear legitimate is critical to the success of organized criminals. For<br />

many criminals, the movement of money—either as bulk cash or digital transactions—across<br />

international borders plays an integral role in this process. <strong>The</strong>y use many techniques to launder<br />

money, often exploiting legitimate financial structures to mask the illegal origins of their profits.<br />

Money laundering includes three fundamental steps: (1) placement, the introduction of illicit<br />

funds into licit financial systems; (2) layering, the movement (often international) of illicit funds<br />

through a variety of business structures to obscure its origins; and (3) integration, the use of illicit<br />

funds that at this stage appear legitimate in lawful business transactions. 41 It is impossible to<br />

determine with any accuracy how much money is laundered by organized criminals whose<br />

operations impact the United States. However, U.S. government estimates suggest that Mexican<br />

and Columbian drug trafficking organizations earn between $18 billion and $39 billion annually<br />

from sales in the United States. 42 Annually, perhaps between $20 billion and $25 billion in bank<br />

notes is smuggled across the Southwest border into Mexico. 43 How much of this is profit and then<br />

laundered is unclear. 44 While bulk cash smuggling is an important means by which criminals<br />

move illegal profits from the United States into Mexico, they have increasingly turned to storedvalue<br />

cards 45 to move money. With these cards, criminals are able to avoid the reporting<br />

requirement under which they would have to declare any amount over $10,000 in cash moving<br />

across the border. 46 Aside from bulk cash smuggling and stored-value cards, Mexican traffickers<br />

move and launder money by using digital currency accounts, e-businesses that facilitate money<br />

transfers via the <strong>In</strong>ternet, online role-playing games or virtual worlds that enable the exchange of<br />

game-based currencies for real currency, and “mobile payments through cell phones that provide<br />

40 Department of Justice, “Ringleader of <strong>In</strong>ternational Drug Trafficking Ring Pleads Guilty for Role in Drug Smuggling<br />

Case,” press release, February 24, 2010, http://www.justice.gov/usao/pae/<strong>New</strong>s/Pr/2010/feb/<br />

tran_guilty_plea_release.pdf; Troy Graham, “Woman at Center of Asian Drug-Trafficking Ring Gets Nearly Six Year<br />

Term,” Philadelphia <strong>In</strong>quirer, August 25, 2010, http://www.philly.com/inquirer/local/<br />

20100825_Woman_at_center_of_Asian_drug-trafficking_ring_gets_nearly_six-year_term.html.<br />

41 Brian Seymour, “Global Money Laundering,” Journal of Applied Security Research, vol. 3, no. 3-4 (2008), pp. 374-<br />

375. (Hereafter, Seymour, “Global Money.”)<br />

42 Dennis C. Blair, Director of National <strong>In</strong>telligence, “Annual Threat Assessment of the US <strong>In</strong>telligence Community for<br />

the Senate Select Committee on <strong>In</strong>telligence,” Office of the Director of National <strong>In</strong>telligence, February 2, 2010, p. 31.<br />

(Hereafter, Blair, “Annual Threat Assessment.”)<br />

43 William Booth and Nick Miroff, “Stepped-Up Efforts by U.S., Mexico Fail to Stem Flow of Drug Money South,”<br />

Washington Post, August 25, 2010, http://www.washingtonpost.com/wp-dyn/content/article/2010/08/25/<br />

AR2010082506161.html.<br />

44 For a discussion of estimates, see Douglas Farah, Money Laundering and Bulk Cash Smuggling: Challenges for the<br />

Mérida <strong>In</strong>itiative, Woodrow Wilson <strong>In</strong>ternational Center For Scholars, Mexico <strong>In</strong>stitute and University of San Diego<br />

Trans-Border <strong>In</strong>stitute, Working Paper Series on U.S.-Mexico Security Cooperation, Washington, DC, May 2010, p. 6,<br />

http://wilsoncenter.org/topics/pubs/Money%20Laundering%20and%20Bulk%20Cash%20Smuggling.%20Farah.pdf.<br />

(Hereafter, Farah, Money Laundering.)<br />

45 A stored value card looks like a debit or credit card, but stores value directly on the card using magnetic strip<br />

technology.<br />

46 Legislation has been introduced in the 111 th Congress (H.R. 5127) that would, among other things, classify stored<br />

value cards as monetary instruments in order to require individuals to declare to Customs over $10,000 that they are<br />

carrying on a stored value card.<br />

Congressional Research Service 9


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

traffickers with remote access to existing payment mechanisms such as bank and credit card<br />

accounts and prepaid cards.” 47<br />

<strong>Organized</strong> criminals also use the globalized international financial system in the layering stage of<br />

money laundering. <strong>The</strong> United States is impacted by this from at least two directions. Criminals<br />

operating abroad can exploit U.S. structures to launder money while those operating domestically<br />

can wash their illicit profits abroad in an attempt to avoid U.S. law enforcement. Large financial<br />

markets such as <strong>New</strong> York, where criminal activity is potentially hidden within voluminous<br />

legitimate business, are used by criminals. Criminals use banks and businesses to launder money<br />

in offshore locations with strict privacy laws such as Panama, the Cayman Islands, or the Isle of<br />

Man. <strong>In</strong> these locales, law enforcement struggles to determine the true ownership of assets. 48<br />

<strong>In</strong>ternational or domestic shell companies can be used for money laundering. <strong>The</strong>y are legal<br />

entities that have no independent operations or assets of their own and largely exist only on paper.<br />

Shell companies have legitimate purposes, for example, “they may be formed to obtain financing<br />

prior to starting operations.” 49 Regardless, DOJ has identified U.S.-based shell companies as<br />

especially difficult to investigate because “lax company formation laws [allow] criminals [to]<br />

form [them] quickly and cheaply and obtain virtual anonymity.” 50<br />

<strong>Organized</strong> criminals likely rely on the veneer of legitimacy conferred by U.S.-based shell<br />

companies, which in many instances allow criminals to conceal their ownership. 51 Most U.S.<br />

states do not require owner information when companies are formed or even on annual or<br />

biennial reports. 52 <strong>In</strong>dividuals can distance themselves from the actual formation of specific shell<br />

companies by using company formation agents (registered agents) to establish them. Shell<br />

companies enable criminals to move money around the globe through legitimate bank accounts<br />

without attracting law enforcement scrutiny. With relative ease, a criminal organization can open<br />

multiple shell companies worldwide and systematically distance ill-gotten gains from their<br />

criminal origins, leaving behind a hard-to-untangle web of accounts, legitimate corporations, and<br />

transactions. 53 Both Mexico’s Sinaloa Cartel and alleged Eurasian organized crime figure Semion<br />

Mogilevich have likely used U.S. shell companies to launder money. 54<br />

47 Farah, Money Laundering, 23.<br />

48 Seymour, “Global Money,” pp. 375-376.<br />

49 U.S. Government Accountability Office (GAO), Company Formations: Minimal Ownership <strong>In</strong>formation Is Collected<br />

and Available, GAO-06-376, April 2006, p. 1, http://www.gao.gov/new.items/d06376.pdf. Hereafter GAO, Company<br />

Formations.<br />

50 Jennifer Shasky Calvery, Senior Counsel to the Deputy Attorney General, Department of Justice, Statement Before<br />

the United States Senate Committee on Homeland Security and Governmental Affairs, Hearing, “Examining State<br />

Business <strong>In</strong>corporation Practices: A Discussion of the <strong>In</strong>corporation Transparency and Law Enforcement Assistance<br />

Act,” June 18, 2009, pp 1-2, http://www.justice.gov/ola/testimony/111-1/2009-06-18-dag-shasky-incorporation.pdf.<br />

(Hereafter, Shasky, “Examining State Business.”)<br />

51 GAO, Company Formations, p. 1.<br />

52 GAO, Company Formations, p. 13.<br />

53 Shasky, “Examining State Business,” pp. 4-5; Seymour, “Global Money,” p. 375.<br />

54 Jennifer Shasky, Senior Counsel to the Deputy Attorney General, Department of Justice, Statement Before the<br />

United States Senate Committee on Homeland Security and Governmental Affairs, Hearing, “Business Formation and<br />

Financial <strong>Crime</strong>: Finding a Legislative Solution,” November 5, 2009, p. 1, http://hsgac.senate.gov/public/index.cfm?<br />

FuseAction=Hearings.Hearing&Hearing_ID=88d1a5fb-7312-4e9e-92b2-8558ccd44f22. Legislation has been<br />

introduced in the 111 th Congress (S. 569, H.R. 6098) that would establish uniform requirements for states regarding<br />

beneficial ownership of public corporations and limited liability companies.<br />

Congressional Research Service 10


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>Organized</strong> <strong>Crime</strong> and Technological Change<br />

<strong>Organized</strong> criminals have expanded their technological “toolkits.” <strong>The</strong>y have adapted to<br />

incorporate technology-driven fraud into their capabilities. 55 <strong>The</strong>ir operations can harm U.S.<br />

citizens without ever having a physical presence in the country. <strong>Organized</strong> crime groups engage<br />

in a wide variety of tech savvy mass marketing frauds. Even traditional arenas of criminal activity<br />

such as illegal gambling have been transformed by the <strong>In</strong>ternet. For example, illegal gambling has<br />

been a staple in the Cosa Nostra’s criminal diet for decades. <strong>In</strong> recent years, they have branched<br />

out into <strong>In</strong>ternet gambling, 56 which debuted in the mid 1990s. 57 Operation Heat, an investigation<br />

by the <strong>New</strong> Jersey Division of Criminal Justice, led to the arrest of Brian Cohen, who allegedly<br />

facilitated the Lucchese family’s offshore gambling activities. According to law enforcement<br />

officials, the family earned billions of dollars via offshore <strong>In</strong>ternet activity that included a website<br />

and a Costa Rican wire room that handled transactions, both managed by Cohen. 58<br />

Mass Marketing Fraud<br />

<strong>The</strong> <strong>In</strong>ternational Mass-Marketing Fraud Working Group defines mass marketing fraud as<br />

Fraud schemes that use mass-communications media—including telephones, the <strong>In</strong>ternet,<br />

mass mailings, television, radio, and even personal contact—to contact, solicit, and obtain<br />

money, funds, or other items of value from multiple victims in one or more jurisdictions. 59<br />

Mass marketing fraud involves a wide range of criminal activity that has been transformed by<br />

globalization and technological change. It can be perpetrated by individuals, small groups, or<br />

sophisticated criminal enterprises. Parsing out exactly how much of this activity can be attributed<br />

to organized criminals is tricky, but experts suggest that “fraudulent mass marketing operations<br />

are increasingly transnational, interconnected, and fluid.” 60 “Boiler room” scams, one iteration of<br />

the fraud with a long history, entail groups of fraudsters making high-pressure deceptive<br />

merchandise pitches and misleading service offers to unwitting customers around the world.<br />

Recently, criminals have innovated based on tried-and-true boiler room schemes by outsourcing<br />

some activity to specialists, internationalizing their operations, and adopting sophisticated<br />

concealment strategies for their communications capabilities and locations.<br />

55 Criminal <strong>In</strong>telligence Service Canada (CISC), 2010 Report on <strong>Organized</strong> <strong>Crime</strong>, May 2010, p. 12,<br />

http://www.cisc.gc.ca/annual_reports/annual_report_2010/document/report_oc_2010_e.pdf. (Hereafter, CISC, 2010<br />

Report.)<br />

56 For information on unlawful <strong>In</strong>ternet gambling, see CRS Report RS22749, Unlawful <strong>In</strong>ternet Gambling Enforcement<br />

Act (UIGEA) and Its Implementing Regulations, by Brian T. Yeh and Charles Doyle.<br />

57 On the advent of <strong>In</strong>ternet gambling, see David G. Schwartz, Roll the Bones: <strong>The</strong> History of Gambling, (<strong>New</strong> York:<br />

Gotham Books, Penguin Group (USA), 2006) pp. 488-494.<br />

58 George Anastasia, “Officials Charge Man Who Allegedly Ran Mob Gambling Website,” Philadelphia <strong>In</strong>quirer, May<br />

29, 2010, http://www.philly.com/inquirer/local/nj/<br />

20100529_Officials_charge_man_who_allegedly_ran_mob_gambling_website.html.<br />

59 <strong>In</strong>ternational Mass-Marketing Fraud Working Group (IMMFWG), Mass-Marketing Fraud: A Threat Assessment,<br />

June 2010, p. 3. (Hereafter, IMMFWG, Mass Marketing Fraud.) <strong>The</strong> IMMFWG includes law enforcement, regulatory,<br />

and consumer protection agencies from Australia, Belgium, Canada, the Netherlands, Nigeria, the United Kingdom,<br />

and the United States. Europol is also involved.<br />

60 IMMFWG, Mass Marketing Fraud, p. 14.<br />

Congressional Research Service 11


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>The</strong> Cosa Nostra and other organized criminals use boiler rooms. 61 <strong>In</strong> June 2010, the FBI raided<br />

an alleged boiler room operation involving Anthony Guarino, a purported Bonnano family<br />

soldier. According to law enforcement officials, the boiler room hoodwinked elderly investors<br />

into buying shares of companies, and 40% of the money taken in was handed over to the boiler<br />

room operators as commissions. 62<br />

Technology Transforms Advance Fee Fraud (AFF)<br />

Since the 1970s, technological advancements have revolutionized advance fee fraud (AFF)<br />

operations—a form of mass marketing fraud used by criminal organizations and individual<br />

fraudsters. Today, these schemes often involve criminals appealing for money via unsolicited<br />

(spam) emails. <strong>The</strong>se emails typically request an initial cash payment from recipients. <strong>The</strong> initial<br />

cash payment supposedly facilitates the disbursement of a much larger sum of money to the email<br />

recipients. 63 <strong>The</strong> later sum never arrives. A recent AFF email scam attempting to dupe people into<br />

believing they had been contacted by the FBI’s Detroit Field Office asked email recipients to<br />

forward $14,300 in return for the release of over $18 million to their accounts. <strong>In</strong> one of the<br />

emails associated with this scheme, the fraudsters suggest that “the <strong>In</strong>ternational clamp down on<br />

Terrorist [sic]” has frozen the larger pot of money. 64<br />

Also known as “419 scams” after a section in the Nigerian criminal code, the broad outlines of<br />

the modern version of AFF originated in Nigeria during the 1970s and early 1980s, and perhaps<br />

even earlier. AFF’s original incarnation may stretch back to the 1500s in the “Spanish Prisoner”<br />

scheme. Wealthy English business owners were asked to help pay for a rescue mission to save<br />

someone held captive in Spain. <strong>In</strong> return, they would supposedly receive part of the vast alleged<br />

reward payment. Of course, it never came. 65 <strong>In</strong> the late 1970s and early 1980s, Nigerian<br />

fraudsters became known for mailing unsolicited letters requesting monetary assistance in<br />

transferring frozen or hidden funds out of West African countries. When fax machines became<br />

commonplace, perpetrators quickly reached many more victims with less effort. <strong>The</strong> <strong>In</strong>ternet and<br />

email further revolutionized AFF operations.<br />

Today, these schemes are global, emanating from many other countries. 66 <strong>The</strong> spamming<br />

networks involved often have short lives focusing on specific schemes. 67 Recent estimates<br />

suggest that AFF networks may have swindled over $2 billion from U.S. companies and citizens<br />

in 2009. 68 <strong>In</strong> July 2011, six defendants were sentenced for running an AFF scam that duped U.S.<br />

61 Ibid.<br />

62 Chad Bray, “FBI Raids Alleged Boiler Room,” Wall Street Journal, June 10, 2010, http://online.wsj.com/article/<br />

SB10001424052748703890904575297220025441524.html.<br />

63 Federal Bureau of <strong>In</strong>vestigation, “Common Fraud Schemes,” http://www.fbi.gov/majcases/fraud/fraudschemes.htm.<br />

64 Federal Bureau of <strong>In</strong>vestigation, Detroit Division, “Scam E-Mail/Letter Claiming To Be Associated with FBI Detroit<br />

SAC Arena,” press release, May 25, 2010, http://detroit.fbi.gov/pressrel/pressrel10/de052510.htm.<br />

65 Harvey Glickman, “<strong>The</strong> Nigerian ‘419’ Advance Fee Scams: Prank or Peril?,” Canadian Journal of African Studies,<br />

vol. 39, no. 3 (2005), pp. 463-476.<br />

66 Edward Fokuoh Ampratwum, “Advance Fee Fraud, ‘419,’ and <strong>In</strong>vestor Confidence in the Economies of Sub-<br />

Saharan Africa (SSA) ,” Journal of Financial <strong>Crime</strong>, vol. 16, no. 1 (2009), pp. 68-69.<br />

67 Matthew Zook, “Your Urgent Assistance Is Required: <strong>The</strong> <strong>In</strong>tersection of 419 Spam and <strong>New</strong> Networks of<br />

Imagination,” Ethics, Place, and Environment, vol. 10, no. 1 (March 2007), pp. 66-70.<br />

68 Jeremy Kirk, “Advance Fee Fraud Scams Rise Dramatically in 2009,” Compuworld, January 28, 2010,<br />

http://www.computerworld.com/s/article/9149890/Advance_fee_fraud_scams_rise_dramatically_in_2009.<br />

Congressional Research Service 12


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

sweepstakes participants into believing that they had won substantial cash prizes. This money<br />

would have purportedly been sent to the victims once they paid the required taxes and fees.<br />

Ultimately, there was no lottery prize, and the fraud netted about $2 million. 69 Estimates indicate<br />

that today’s AFF networks only need to dupe 1% of the people or businesses they reach to turn a<br />

profit. 70<br />

Cyberspace, Electronic <strong>In</strong>formation, and <strong>Organized</strong> <strong>Crime</strong><br />

As the history of AFF may indicate, organized criminals have adapted to the digital age by<br />

becoming expert at stealing information stored and shared electronically. Many are adept at<br />

manipulating and defrauding victims in the virtual world. All of this covers a range of activity<br />

including cyber intrusions into corporate databases, the theft of individual consumer credit card<br />

information, and a wide variety of fraudulent online activity. <strong>The</strong> criminal groups operating in<br />

cyberspace can be broken into two categories: (1) part-timers—those who leverage digital<br />

information to enhance other activities, and (2) full-timers—those who solely commit and<br />

specialize in online or digital crimes. 71 While this is a helpful distinction to draw for discussion<br />

purposes, it is difficult to attribute specific volumes of criminal activity to each category of<br />

actors. General statistics suggest that organized criminals from both categories play a large role in<br />

online data theft. For instance, in selected data breaches investigated by Verizon and the U.S.<br />

Secret Service (USSS) involving businesses around the globe during 2009, 85% of compromised<br />

computer records were attributed to organized crime. As 94% of all compromised records in this<br />

study were in the financial services sector, many of those records targeted by organized criminals<br />

were likely from financial organizations as well. 72<br />

Online Identity <strong>The</strong>ft and Sophisticated Credit Card Fraud<br />

<strong>Organized</strong> criminals are involved in stealing the identities of online consumers and have engaged<br />

in technologically advanced credit card fraud. <strong>The</strong>se illicit ventures pilfer from the bank accounts<br />

of ordinary citizens and often cast a wide net to maximize the number of victims.<br />

Some organized crime groups have stolen money from victims on intenet auction sites such as<br />

eBay. For example, on March 13, 2010, Georgi Boychev Georgiev, a Bulgarian national pleaded<br />

guilty in U.S. federal court to laundering money for a transnational criminal network involved in<br />

eBay fraud. <strong>The</strong> scam did not physically exist in the United States, but it accrued more than $1.4<br />

69 Federal Bureau of <strong>In</strong>vestigation, “Six Defendants Sentenced in Manhattan Federal Court for <strong>The</strong>ir <strong>In</strong>volvement in a<br />

Multi-Million-Dollar Lottery Telemarketing Fraud Scheme,” press release, July 1, 2011, http://www.fbi.gov/newyork/<br />

press-releases/2011/six-defendants-sentenced-in-manhattan-federal-court-for-their-involvement-in-a-multi-milliondollar-lottery-telemarketing-fraud-scheme.<br />

70 Blaise J. Bergiel, Erich B. Bergiel, and Phillip W. Balsmeir, “<strong>In</strong>ternet Cross Border <strong>Crime</strong>: A Growing Problem,”<br />

Journal of Website Promotion, vol. 3, no. 3/4 (2008), p. 135.<br />

71 This parallels the first two elements in Kim-Kwang Raymond Choo’s three-part typology of criminal activity in<br />

cyberspace. <strong>The</strong> typology includes “(1) traditional organized crime groups which make use of ICT [information and<br />

communications technologies] to enhance their terrestrial criminal activities; (2) organized cybercrime groups which<br />

operate exclusively online; and (3) organized groups of ideologically and politically motivated individuals who make<br />

use of ICT to facilitate their criminal conduct.” See Kim-Kwang Raymond Choo, “<strong>Organized</strong> <strong>Crime</strong> Groups in<br />

Cyberspace: A Typology,” Trends in <strong>Organized</strong> <strong>Crime</strong>, vol. 11, no. 3 (September 2008), pp. 271.<br />

72 Wade Baker et al., 2010 Data Breach <strong>In</strong>vestigations Report: A Study Conducted by the Verizon RISK Team in<br />

Cooperation with the United States Secret Service, Verizon, July 2010, pp. 2-15, http://www.verizonbusiness.com/<br />

resources/reports/rp_2010-data-breach-report_en_xg.pdf.<br />

Congressional Research Service 13


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

million from U.S. victims in 2005 and 2006. <strong>The</strong> network posted fraudulent advertisements on<br />

eBay and used a ruse dubbed “eBay Secure Traders” to bilk people out of cash that was wired<br />

directly into Eastern European bank accounts. 73 <strong>In</strong> another case from April 2010, Romanian law<br />

enforcement, the FBI, and USSS cooperated in the dismantling an alleged eBay fraud ring that<br />

purportedly involved 70 individuals from what have been described in media sources as three<br />

different organized cybercrime groups. According to news reports, the scheme included hijacking<br />

the eBay accounts of legitimate consumers and then using the hijacked accounts to stage fake<br />

sales of non-existent merchandise on eBay. Fraudsters purportedly scammed bidders from Spain,<br />

Italy, France, <strong>New</strong> Zealand, Denmark, Sweden, Germany, Austria, Canada, Switzerland, and the<br />

United States, generating $1 million in profits since 2006. 74<br />

Eurasian criminals in California are engaging in identity theft in which they leverage<br />

technological savvy, old-school organized crime strategies, and <strong>In</strong>ternet connectivity to reap<br />

thousands of dollars in profits. <strong>In</strong> 2009 in the city of Redondo Beach in Southern California,<br />

Armenian or Russian criminals allegedly targeted a gas station with an Armenian owner<br />

(exploiting their own ethnic group). <strong>The</strong>y placed one of their crew members as an employee at<br />

the station, where he implanted high-tech skimming devices at gas pumps to steal customer credit<br />

card information, victimizing more than 1,000 individuals, including Redondo Beach police<br />

officers. <strong>The</strong> employee quit work and the group made off with more than $300,000 from people’s<br />

accounts. 75 Another case, this time in the Las Vegas area in 2008, involved an alleged Armenian<br />

criminal group that reportedly skimmed more than 1,000 credit and debit cards using insiders at<br />

restaurants, bars, and smoke shops. <strong>In</strong> some instances, the crew manufactured its own cards using<br />

stolen information. 76 Losses approached $1.5 million. 77 <strong>In</strong> 2009, Las Vegas authorities also<br />

uncovered a skimming scheme complete with a credit card manufacturing lab. 78 This crew used<br />

skimmers that captured information from magnetic strips on credit cards as well as pin numbers<br />

using a camera. 79<br />

73 Department of Justice, “Foreign National Pleads Guilty for Role in <strong>In</strong>ternational Money Laundering Scheme<br />

<strong>In</strong>volving More than $1.4 Million in Losses to Victims,” press release, May 13, 2010, http://www.justice.gov/opa/pr/<br />

2010/May/10-crm-568.html.<br />

74 Angela Moscaritolo, “Romanian Police, FBI Break Up 70-Strong eBay Fraud Ring,” SC Magazine, April 7, 2010,<br />

http://www.scmagazineus.com/romanian-police-fbi-break-up-70-strong-ebay-fraud-ring/article/167554/.<br />

75 Paul Teetor, “Russian or Armenian Mob Used ‘Model Employee’ Con at PCH Arco,” LA Weekly, June 18, 2009.<br />

76 Lawrence Mower, “ID <strong>The</strong>ft Operation Outlined,” Las Vegas Review-Journal, December 8, 2008.<br />

77 “Eurasian <strong>Organized</strong> <strong>Crime</strong> Task Force Members Arrest 12 <strong>In</strong>dividuals Following Federal Credit Card Fraud and<br />

Identity <strong>The</strong>ft Charges,” States <strong>New</strong>s Service, December 9, 2008. See also: Department of Justice, “Men Sentenced for<br />

Credit Card Fraud Conspiracy,” press release, June 10, 2011, http://www.justice.gov/usao/nv/press/june2011/<br />

palikyan06102011.htm.<br />

78 “Three Arrested in Credit Card Forgery Ring,” KTNV ABC, March 26, 2009.<br />

79 “18 Month Credit Card Fraud Ring Leads to Three Arrests,” KTNV ABC, March 25, 2009. Additionally, in February<br />

2011, DOJ announced an indictment charging 29 defendants tied to an organized crime group called “Armenian<br />

Power” or “AP.” DOJ noted “Among the conspiracies charged in the racketeering indictment is a bank fraud and<br />

counterfeit credit card scheme that victimized hundreds of customers of 99 Cents Only Stores throughout Southern<br />

California. AP members allegedly caused more than $2 million in losses when they secretly installed sophisticated<br />

‘skimming’ devices to steal customer account information at cash registers and then used the skimmed information to<br />

create counterfeit debit and credit cards.” See Department of Justice, “Armenian Power <strong>Organized</strong> <strong>Crime</strong> Group<br />

Targeted in Federal <strong>In</strong>dictments That Allege Racketeering Offenses, <strong>In</strong>cluding Bank Fraud Schemes, Kidnappings, and<br />

Drug Trafficking,” press release, February 16, 2011, http://www.fbi.gov/losangeles/press-releases/2011/la021611.htm.<br />

For another case involving skimming, see Department of Justice, “Rancho Cordova Man Arrested for Identity <strong>The</strong>ft<br />

and Trafficking in Counterfeit Credit Card <strong>In</strong>formation,” press release, April 21, 2011, http://www.justice.gov/usao/<br />

cae/news/docs/2011/04-21-11Avagyan<strong>In</strong>dictment.html.<br />

Congressional Research Service 14


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>In</strong> March 2010, Albert Gonzalez, the leader of the largest identity theft and retail hacking ring<br />

prosecuted by the United States, was sentenced to 20 years in prison. 80 Through “wardriving”—a<br />

technique in which individuals drive around in a car with a laptop computer and search for<br />

unsecured wireless networks—the ring hacked into credit card payment systems at retailers<br />

including TJX Companies, BJ’s Wholesale Club, OfficeMax, Boston Market, Barnes & Noble<br />

and Sports Authority, and stole more than 40 million credit and debit card numbers. Gonzalez<br />

also provided malware to hackers to aid them in evading anti-virus programs and firewalls in<br />

order to access companies’ networks and payment systems. <strong>The</strong> conspirators, located in the<br />

United States, Ukraine, and Estonia, laundered their illicit proceeds through banks in Eastern<br />

Europe.<br />

<strong>Organized</strong> Retail <strong>Crime</strong> and Online Fencing<br />

While not necessarily viewed as “organized crime” by U.S. law enforcement agencies, as its<br />

name implies organized retail crime (ORC), or organized retail theft, bears some of the hallmarks<br />

of organized criminal activity. ORC typically refers to large-scale retail theft and fraud by<br />

organized groups of professional shoplifters, or “boosters.” 81 ORC involves a host of retail crimes<br />

ranging from retail, manufacturing, distribution, and cargo theft to gift card fraud, receipt fraud,<br />

and ticket switching. 82 <strong>The</strong> organized crime rings resell illegally acquired merchandise in a<br />

variety of fencing operations such as flea markets, swap meets, pawn shops, and, more recently,<br />

online marketplaces. Most stolen merchandise is sold to a low-level fence, commonly called a<br />

“street fence.” Street fences will either sell these goods directly to the public or will sell the<br />

merchandise to mid-level fences who run “cleaning operations” that remove security tags and<br />

store labels as well as repackage stolen goods so they appear as though they came directly from<br />

the manufacturer. This “cleaning” may even involve changing the expiration date on perishable<br />

goods such as over-the-counter medication and infant formula.<br />

Globalization and technological innovation have allowed more and more transactions to take<br />

place online rather than face-to-face. This holds true for retail crime, where thieves have turned to<br />

“e-fencing”—using the <strong>In</strong>ternet and online marketplaces as means to fence ill-gotten goods. 83<br />

This has increased criminals’ anonymity, global reach, and profitability. Online markets allow<br />

criminals to easily distribute stolen goods across the nation and around the globe. E-fencing has<br />

also proven to be more profitable to criminals than has fencing at physical locations. While<br />

criminals may profit about 30 cents on the dollar (30% of the retail price) by selling goods at<br />

physical fencing locations, they can make about 70 cents on the dollar via e-fencing. 84<br />

A criminal network based in Baltimore serves as an example of an operation that integrated<br />

traditional as well as more technologically advanced fencing techniques. As of September 2010,<br />

80 Department of Justice, “Leader of Hacking Ring Sentenced for Massive Identity <strong>The</strong>fts from Payment Processor and<br />

U.S. Retail Networks,” press release, March 26, 2010, http://www.justice.gov/opa/pr/2010/March/10-crm-329.html.<br />

81 A “booster” is someone who steals merchandise and then sells it to a fence for a profit. A “fence” is someone who<br />

knowingly buys illegally obtained goods from a booster and then sells the goods for a profit. For more information on<br />

ORC, see CRS Report R41118, <strong>Organized</strong> Retail <strong>Crime</strong>, by Kristin M. Finklea.<br />

82 Ticket switching involves means by which criminals alter the UPC bar codes on merchandise so that the items ring<br />

up differently–significantly below the original price–at check-out.<br />

83 King Rogers, “<strong>Organized</strong> Retail <strong>The</strong>ft,” in Retail <strong>Crime</strong>, Security, and Loss Prevention: An Encyclopedic Reference,<br />

ed. Charles A. Sennewald and John H. Christman (Elseiver <strong>In</strong>c., 2008).<br />

84 National Retail Federation, 2009 <strong>Organized</strong> Retail <strong>Crime</strong> Survey, 2009, p. 8.<br />

Congressional Research Service 15


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

at least 10 defendants, including the owners of pawn shops implicated in the scheme, had pleaded<br />

guilty to roles in this organized retail crime ring. 85 <strong>In</strong> this conspiracy, boosters stole products,<br />

including over-the-counter medications, health and beauty aids, gift cards, DVDs, and tools, from<br />

retailers such as Target, Safeway, Wal-Mart, and Kohl’s. Several pawn shops bought these stolen<br />

goods from boosters, cleaned them, and then transported them to other locations for resale. Some<br />

co-conspirators used online marketplaces such as eBay and Amazon.com to fence the stolen<br />

goods. <strong>In</strong> all, the case involved about $20 million in stolen goods.<br />

Bulk Narcotics Smuggling and Technology<br />

Technological advances have transformed cocaine and other narcotics trafficking. <strong>In</strong> the early<br />

1990s, Colombian traffickers—moving narcotics to the United States and elsewhere around the<br />

globe—began experimenting with semisubmersible maritime smuggling vessels, which at first<br />

were likely too impractical, costly, and risky to operate. Hybrids of traditional submarines and<br />

boats, these craft have small above-water profiles—about 18 inches. <strong>In</strong>creased law enforcement<br />

seizures of cocaine shipments carried by more traditional surface vessels encouraged traffickers<br />

to adopt semisubmersible technology. 86 Colombian traffickers likely co-opted experts from the<br />

legitimate world to develop this technology. Most often, semisubmersibles are used to move<br />

product from coastal areas to boats waiting on the open seas. While their current use likely<br />

responds in part to interdiction pressures, it also reflects the global availability of expertise,<br />

designs, and materials. Vast illicit global cocaine markets have also made such endeavors<br />

possible, producing huge profits for traffickers that are then tilled into technology to circumvent<br />

law enforcement. But semisubmersibles, which account for 27% of the maritime movement of<br />

cocaine toward the United States, themselves are not immune to capture. 87 Since 2006, law<br />

enforcement has regularly seized semisubmersible cocaine smuggling vessels from Colombian<br />

drug traffickers on the high seas or in clandestine shipyards hidden in coastal mangrove swamps.<br />

<strong>The</strong> Drug Trafficking Vessel <strong>In</strong>terdiction Act of 2008 (P.L. 110-407) enhanced the federal<br />

government’s ability to prosecute traffickers operating submersible and semisubmersible vessels<br />

by making it a federal crime to operate, embark on, or conspire to operate these vessels in<br />

international waters with the intent to avoid detection.<br />

<strong>In</strong> early July 2010, police in Ecuador seized a fiberglass submarine designed to operate fully<br />

submerged at a depth of 65 feet. <strong>The</strong> diesel-powered, twin-screw sub, a marked step forward in<br />

technology, was likely intended to transport cocaine on the high seas and could carry 10 tons of<br />

cocaine on a 10-day voyage. This vessel represented a large improvement over the<br />

semisubmersibles that have been regularly seized from traffickers since 2006. 88<br />

85 Department of Justice, “Pawn Shop Owner Pleads Guilty in Scheme to Launder $20 Million in Proceeds of Stolen<br />

Merchandise: Admitted Laundering Millions of Dollars in Proceeds of Stolen Over-the-Counter Medicines, Health and<br />

Beauty Aid Products, Gift Cards, DVDs, Tools, and Other Items,” press release, September 3, 2010,<br />

http://baltimore.fbi.gov/dojpressrel/pressrel10/ba090310a.htm.<br />

86 Steven S. Dudley, Drug Trafficking Organizations in Central America: Transportistas, Mexican Cartels, and Maras,<br />

Woodrow Wilson <strong>In</strong>ternational Center For Scholars, Mexico <strong>In</strong>stitute and University of San Diego Trans-Border<br />

<strong>In</strong>stitute, Working Paper Series on U.S.-Mexico Security Cooperation, Washington, DC, May 2010, p. 17,<br />

http://wilsoncenter.org/topics/pubs/<br />

Drug%20Trafficking%20Organizations%20in%20Central%20America.%20Dudley.pdf.<br />

87 Rear Admiral Vincent Atkins, U.S. Coast Guard, Testimony before the House Subcommittee on Homeland Security,<br />

on Department of Homeland Security Air and Marine Operations and <strong>In</strong>vestments, April 19, 2010, http://www.dhs.gov/<br />

ynews/testimony/testimony_1271690315007.shtm.<br />

88 Jim Popkin, “Authorities in Awe of Drug Runners’ Jungle-Built, Kevlar-Coated Supersubs,” Wired Magazine, March<br />

(continued...)<br />

Congressional Research Service 16


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Mexican drug traffickers have increasingly relied upon ultralight aircraft 89 to smuggle drugs<br />

across the Southwest border into the United States. <strong>The</strong>se small planes can fly as low as tree level<br />

and are less easily detected than the larger aircrafts that were used by the traffickers prior to<br />

2007. 90 While some traffickers may land the ultralights on the U.S. side of the border to pass off<br />

drug loads to distributors, others attach drop baskets that can carry over 300 pounds of marijuana<br />

or other drugs. <strong>The</strong>se drop baskets release packages of drugs that will fall to the ground when a<br />

lever in the aircraft is activated, and then local gangs or traffickers can pick up and distribute the<br />

drugs. <strong>In</strong> May 2009, a low-flying ultralight aircraft carrying about 275 pounds of marijuana,<br />

estimated to be worth $220,480, crashed in Yuma, AZ. <strong>The</strong> pilot escaped, but two suspected coconspirators<br />

were arrested. 91<br />

Cross-Border Tunnels<br />

Mexican drug traffickers rely on the use of underground, cross-border tunnels to smuggle drugs<br />

from Mexico into the United States. Tunneling, while not in and of itself a new tool—having been<br />

used for hundreds of years during conflicts and for escapes—has increased not only in prevalence<br />

but in sophistication. 92 Early tunnels were rudimentary, “gopher hole” tunnels dug on the<br />

Mexican side of the border, traveling just below the surface, and popping out on the U.S. side as<br />

close as 100 feet from the border. Slightly more advanced tunnels began to rely on existing<br />

infrastructure, which may be shared by neighboring border cities such as the tunnel shared by<br />

Nogales, AZ, in the United States and Nogales, Sonora, in Mexico. <strong>The</strong>se interconnecting tunnels<br />

may tap into storm drains or sewage systems in order to move drugs even further than smugglers<br />

could move them by digging tunnels alone. <strong>The</strong> most sophisticated tunnels can have rail,<br />

ventilation, and electrical systems. <strong>In</strong> January 2006 in Otay Mesa, CA, a tunnel, stretching nearly<br />

three-quarters of a mile in length and traveling over 85 feet below the surface of the earth, was<br />

discovered, where more than two tons of marijuana was seized. 93 <strong>The</strong> tunnel had lighting,<br />

ventilation, and groundwater drainage systems. <strong>In</strong> November 2010, the San Diego Tunnel Task<br />

Force—created in 2003 as a partnership between the U.S. Immigration and Customs Enforcement<br />

(...continued)<br />

29, 2011, http://www.wired.com/magazine/2011/03/ff_drugsub/all/1; “DEA <strong>In</strong>tel Aids in Seizure of Fully-Operational<br />

Narco Submarine in Ecuador,” press release, July 3, 2010; Chirs Kraul, “Ecuador Police Seize 100-foot Narco-<br />

Submarine Being Built Secretly,” Los Angeles Times, July 6, 2010, http://www.latimes.com/news/nationworld/world/<br />

la-fg-ecuador-narco-sub-20100706,0,162212.story; Douglas A. Kash and Eli White, “A <strong>New</strong> Law Counters the<br />

Semisubmersible Smuggling Threat,” Federal Bureau of <strong>In</strong>vestigation, March 2010, http://www.fbi.gov/publications/<br />

leb/2010/march2010/smuggling_feature.htm; U.S. Southern Command, “<strong>The</strong> Self-Propelled Semi-Submersibles<br />

Threat,” February 20, 2009, http://www.southcom.mil/appssc/factFiles.php?id=83.<br />

89 <strong>The</strong> Federal Aviation Administration (FAA) does not classify ultralights as “aircraft.” For the FAA definition of an<br />

ultralight, see the Code of Federal Regulations (CFR) Title 14, Section 103, http://ecfr.gpoaccess.gov/cgi/t/text/textidx?c=ecfr&sid=77f64066b8e425c01339f918e6e9f291&rgn=div5&view=text&node=14:2.0.1.3.16&idno=14.<br />

Legislation has been introduced in the 111 th Congress (H.R. 5307) that would include ultralights in the definition of an<br />

aircraft in order to increase law enforcement’s abilities to prosecute drug smuggling cases.<br />

90 Agence France-Presse, “Mexican Drug Traffickers Using Tiny Planes for US Market,” MSN <strong>New</strong>s, September 2,<br />

2010, http://news.ph.msn.com/business/article.aspx?cp-documentid=4311772.<br />

91 U.S. Customs and Border Protection, “Ultralight Plane Crashes in Arizona, Smugglers Apprehended,” press release,<br />

May 30, 2009, http://www.cbp.gov/xp/cgov/newsroom/news_releases/archives/2009_news_releases/may_2009/<br />

05302009.xml.<br />

92 Ken Stier, “Underground Threat: Tunnels Pose Trouble from Mexico to Middle East,” Time, May 2, 2009.<br />

93 U.S. Drug Enforcement Administration, “DEA/ICE Uncover ‘Massive’ Cross-Border Drug Tunnel, Cement lined<br />

passage thought to link warehouses in Tijuana and Otay Mesa,” press release, January 26, 2006,<br />

http://www.justice.gov/dea/pubs/pressrel/pr012606.html.<br />

Congressional Research Service 17


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

(ICE), DEA, and the U.S. Border Patrol working along with state law enforcement and Mexican<br />

counterparts—uncovered a 600-yard passageway stretching from Tijuana to Otay Mesa. About 30<br />

tons of marijuana, with an estimated street value of about $20 million, were seized in the United<br />

States and Mexico. 94 About a year later, the task force unearthed two other tunnels in Otay Mesa<br />

within a two-week period. One of them stretched 612 yards and had electric rail cars, lighting,<br />

reinforced walls, and wooden floors. 95<br />

U.S. law enforcement uses various tactics and simultaneously faces numerous challenges in<br />

detecting these cross-border tunnels. About 125 tunnels have been discovered since the 1990s—<br />

primarily in Arizona and California—and more than 75 of these have been found since 2006. 96<br />

One such method of tunnel detection is the use of ground penetrating radar (GPR). 97 However,<br />

this technology is limited by factors including soil conditions, tunnel diameter, and tunnel depth.<br />

Law enforcement may also use sonic equipment to detect the sounds of digging and tunnel<br />

construction and seismic technologies to detect blasts that may be linked to tunnel excavation.<br />

U.S. officials have acknowledged that law enforcement currently does not have technology that is<br />

reliably able to detect sophisticated tunnels. 98 Rather, tunnels are more effectively discovered as a<br />

result of human intelligence and tips rather than technology.<br />

Exploitation of Ethnic Diaspora Communities<br />

Criminal organizations structured along ethnic lines sometimes base their operations in immigrant<br />

communities. 99 <strong>The</strong>y use these enclaves to provide cover for their dealings and occasionally also<br />

exploit their ethnic compatriots. Historically, criminal groups have burrowed into local ethnic<br />

communities, but now this is enhanced by the fact that they can leverage <strong>In</strong>ternet connectivity and<br />

extensive, international transportation linkages from localities around the globe. A number of<br />

recent cases highlight these issues.<br />

<strong>In</strong> October 2010, a total of 73 individuals were indicted in the largest single Medicare fraud ever<br />

charged. 100 As described by DOJ, the Mirzoyan-Terdjanian organization, an Armenian criminal<br />

group, ran fake clinics in 25 states, but had its leadership based in Los Angeles and <strong>New</strong> York<br />

City, 101 two areas with large immigrant populations from the former Soviet Union, (e.g.,<br />

94 U.S. Drug Enforcement Administration, “Tunnel Task Force Discovers Cross Border Tunnel, 30 tons of Marijuana<br />

Seized in <strong>In</strong>vestigation,” press release, November 3, 2010, http://www.justice.gov/dea/pubs/states/newsrel/2010/<br />

sd110310.html.<br />

95 Immigration and Customs Enforcement, “Highly Sophisticated Cross-Border Drug Tunnel Discovered Near San<br />

Diego,” press release, November 15, 2011, http://www.ice.gov/news/releases/1111/111130sandiego.htm.<br />

96 Michael Thurston, “Record drugs haul seized from US-Mexico border tunnel,” AFP, November 4, 2010,<br />

http://www.google.com/hostednews/afp/article/ALeqM5jQ20K1Iy7AaXLBGtqiAxnfkCMTGQ?docId=<br />

CNG.a14f67109bad6c916ff3ce51f338a2d8.3b1.<br />

97 For more information, see http://www.geophysical.com/militarysecurity.htm.<br />

98 Ken Stier, “Underground Threat: Tunnels Pose Trouble from Mexico to Middle East,” Time, May 2, 2009.<br />

99 Klaus von Lampe, “Re-Conceptualizing Transnational <strong>Organized</strong> <strong>Crime</strong>: Offenders as Problem Solvers,”<br />

<strong>In</strong>ternational Journal of Security and Terrorism, vol. 2, no. 1 (2011), p. 9. (Hereafter: von Lampe, “Re-<br />

Conceptualizing.” )<br />

100 Department of Justice, “Manhattan U.S. Attorney Charges 44 members and Associates of an Armenian-American<br />

<strong>Organized</strong> <strong>Crime</strong> Enterprise with $100 Million Medicare Fraud,” press release, October 13, 2010,<br />

http://newyork.fbi.gov/dojpressrel/pressrel10/nyfo101310.htm. (Hereafter, DOJ press release, “Manhattan U.S.<br />

Attorney”; DOJ press release, “Seventy-Three Members.”)<br />

101 DOJ press release, “Seventy-Three Members.”<br />

Congressional Research Service 18


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Glendale, in the Los Angeles region, is home to 200,000 Armenian Americans). According to the<br />

president of the Los Angeles chapter of the Armenian-American Chamber of Commerce, this<br />

community is exploited by a handful of criminals who were “raised under communist rule in the<br />

former Soviet republic of Armenia, where exploiting a corrupt government was seen as fair<br />

game.” 102<br />

Members of the Mirzoyan-Terdjanian group<br />

allegedly billed Medicare for more than $163<br />

million in fraudulent medical services. <strong>The</strong>y<br />

reaped about $35 million in profits. 103 <strong>The</strong> case<br />

involves the stolen identities of both doctors and<br />

Medicare beneficiaries and the creation of at least<br />

118 spurious medical clinics across at least 25<br />

states, all part of a largely “virtual” operation.<br />

FBI Assistant Director in Charge Janice K.<br />

Fedarcyk described the organization as<br />

completely notional. <strong>The</strong>re were no real<br />

medical clinics behind the fraudulent billings,<br />

just stolen doctors’ identities. <strong>The</strong>re were no<br />

colluding patients signing in at the clinics for<br />

unneeded treatments, just stolen patient<br />

identities. <strong>The</strong> whole doctor-patient interaction<br />

was a mirage. But the money was real, while it<br />

lasted. 104<br />

<strong>The</strong> indictment in the case also linked Armen<br />

Kazarian to the scheme. Arrested in Los Angeles,<br />

Kazarian, an Armenian residing in the United<br />

States, had substantial influence in the criminal<br />

underworld as a vor v zakone, a Russian term<br />

meaning “thief-in-law.” 105 Kazarian had<br />

reputedly lied to federal authorities to obtain<br />

asylum after emigrating to the United States in<br />

<strong>Organized</strong> <strong>Crime</strong> and<br />

Health Care Fraud<br />

Acting Deputy Attorney General Gary G. Grinder<br />

has stated that “the emergence of international<br />

organized crime in domestic health care fraud<br />

schemes signals a dangerous expansion that poses a<br />

serious threat to consumers” 1 <strong>The</strong> health care<br />

system as well as both public and private assistance<br />

programs have been targets of individual scammers<br />

and organized criminals alike. Criminals steal the<br />

identities—or create fake identities—of medical<br />

providers, clinics and businesses, and patients.<br />

According to the most recent data, in FY2009 U.S.<br />

Attorneys opened 1,014 health care fraud<br />

investigations, encompassing 1,786 defendants. 1 Aside<br />

from the Mirzoyan-Terdjanian organization indicted<br />

by DOJ, other criminal networks—Eurasian and<br />

Nigerian groups—involved in large-scale health care<br />

fraud in Los Angeles have recently been caught by<br />

U.S. law enforcement. According to news reports,<br />

organized crime has turned to targeting Medicare and<br />

Medicaid for profit. 1 It is very likely that the groups in<br />

Los Angeles favored stealing doctor and patient<br />

identities for fraudulent billing over more violent and<br />

less lucrative criminal activity. One expert has<br />

suggested, “[Health care fraud is] lucrative and it’s<br />

safe for them [organized criminals]. Why rob a bank<br />

and risk getting shot when you can click a mouse and<br />

bill Medicare or Medicaid, basically lie on some forms<br />

and make millions of dollars doing so.” 1<br />

1996. 106 <strong>In</strong> the course of the scheme, Kazarian mediated disputes for the Mirzoyan-Terdjanian<br />

group and allegedly threatened to assault and kill an associate. <strong>In</strong> July 2011, Kazarian pled guilty<br />

102 Thomas Watkins, “Armenian <strong>Organized</strong> <strong>Crime</strong> Grows More Complex,” Associated Press, October 16, 2010,<br />

http://news.yahoo.com/s/ap/20101016/ap_on_re_us/us_armenian_crime_2.<br />

103 <strong>In</strong> December 2011, one of the group’s leaders, Robert Terdjanian, pled guilty to charges related to the case. See<br />

Bruce Golding, “Swan Song for Gangster,” <strong>New</strong> York Post, December 20, 2011, http://www.nypost.com/p/news/local/<br />

manhattan/swan_song_for_gangster_T3KqaxeuQkAVNhHjioXmaJ.<br />

104 DOJ press release, “Manhattan U.S. Attorney.”<br />

105 <strong>The</strong> indictment describes a thief-in-law as “a member of a select group of high-level criminal figures from Russia<br />

and the Former Soviet Union who receives tribute from other criminals, offers protection, and uses his recognized<br />

position of authority to resolve disputes among criminals, including through threats and instances of violence.” See<br />

United States vs. Armen Kazarian, Davit Mirzoyan, Robert Terdjanian, et al., <strong>In</strong>dictment in the U.S. District Court for<br />

the Southern District of <strong>New</strong> York, filed October 13, 2010, http://www.scribd.com/full/39274052?access_key=key-<br />

7m8lpi9tq05hn86c111. (Hereafter, United States vs. Armen Kazarian.)<br />

106 Michael Wilson, William K. Rashbaum, “Real Patients, Real Doctors, Fake Everything Else,” <strong>New</strong> York Times,<br />

October 13, 2010, http://www.nytimes.com/2010/10/14/nyregion/14fraud.html?_r=1&scp=1&sq=<br />

Real%20Patients,%20Real%20Doctors,%20Fake%20Everything%20Else&st=cse; United States vs. Armen Kazarian.<br />

Congressional Research Service 19


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

to racketeering in the case. 107 <strong>The</strong> indictment suggests that members of the organization, many of<br />

them Armenian nationals or immigrants, sent criminal proceeds to Armenia, purchasing real<br />

estate and operating businesses with the funds. 108<br />

<strong>In</strong> June 2010, DOJ charged five Ukrainian brothers with extortion and conspiring to engage in a<br />

pattern of racketeering activity. This far-flung operation based out of Philadelphia and Ukraine<br />

had allegedly trafficked about 30 Ukrainians into the United States via Mexico, exploiting them<br />

in cleaning crews operating in stores, private residences, and office buildings in Pennsylvania,<br />

<strong>New</strong> York, <strong>New</strong> Jersey, Maryland, and Washington, DC. According to DOJ, the brothers failed to<br />

pay their victims, threatened them with violence, physically abused them, and housed them in<br />

overcrowded quarters. One of the brothers is accused of raping a trafficked woman on several<br />

occasions. 109 <strong>The</strong> victims of this scheme likely trusted the brothers as immigrants who had ties to<br />

the United States and were willing to help others start new lives in the country.<br />

<strong>In</strong> another case, at least five Chinese citizens involved in operating Asian massage parlors in<br />

Kansas were sentenced between April and October of 2009 for their roles in exploiting Chinese<br />

women in the United States. 110 <strong>The</strong> defendants recruited women from China to work in the United<br />

States as masseuses. <strong>The</strong>y then confiscated the women’s identification documents and used these<br />

documents to fraudulently wire proceeds from illegal activities back to China. <strong>The</strong>y forced the<br />

women to work for 14 hours every day, locked them inside the massage parlors to sleep at night,<br />

and forced them to perform sexual services for the male patrons of the massage parlors.<br />

West African criminal networks specializing in AFF operate in many nations including the United<br />

States, where members have assimilated into local ethnic communities. Many West African<br />

fraudsters based outside of their home countries direct proceeds back to organizations in their<br />

homelands. More recently, it appears that some of these diaspora-based criminals are operating<br />

independently and retaining their ill-gotten gains. 111<br />

107 Department of Justice, “Leader of Armenian <strong>Organized</strong> <strong>Crime</strong> Ring Pleads Guilty in Manhattan Federal Court to<br />

Racketeering,” press release, July 8, 2011, http://www.justice.gov/usao/nys/pressreleases/July11/<br />

kazarianarmenpleapr.pdf.<br />

108 United States vs. Armen Kazarian.<br />

109 Department of Justice, “Five Brothers Charged in Human Trafficking Scheme that Smuggled Young Ukrainian<br />

Migrants,” press release, June 30, 2010, http://www.justice.gov/opa/pr/2010/June/10-crt-765.html; Nathan Gorenstein,<br />

“5 Brothers Charged with Human Trafficking,” Philadelphia <strong>In</strong>quirer, June 30, 2010, http://www.philly.com/philly/<br />

news/breaking/97508149.html?cmpid=15585797; United States v. Omelyan Botsvynyuk, et al, <strong>In</strong>dictment in the U.S.<br />

District Court for the Eastern District of Pennsylvania, n.d. http://www.justice.gov/usao/pae/<strong>New</strong>s/Pr/2010/Jun/<br />

botsvynyuk_indictment.pdf. <strong>In</strong> October 2011, two of the brothers, Omelyan and Stepan Botsvynyuk, were convicted<br />

“of conspiracy to violate the Racketeer <strong>In</strong>fluenced and Corrupt Organizations (RICO) Act in connection with a human<br />

trafficking scheme.” At the time of the duo’s trial, two other brothers were in Canada awaiting extradition and the<br />

remaining sibling was a fugitive. See Department of Justice, “Brothers Convicted in Human Trafficking Scheme,”<br />

press release, October 12, 2011, http://www.fbi.gov/philadelphia/press-releases/2011/brothers-convicted-in-humantrafficking-scheme;<br />

Michael Matza, “Trial Set to Begin for Botsvynyuk Brothers in Human-Trafficking Case,”<br />

Philadelphia <strong>In</strong>quirer, September 13, 2011, http://articles.philly.com/2011-09-13/news/30149728_1_t-visa-programhuman-trafficking-immigrant-rights-groups.<br />

110 Federal Bureau of <strong>In</strong>vestigation, “Leader of Asian Massage Parlor Scheme Sentenced for Coercing Prostitution,<br />

Money Laundering, Identity <strong>The</strong>ft,” press release, October 14, 2009, http://kansascity.fbi.gov/dojpressrel/pressrel09/<br />

kc101409.htm.<br />

111 IMMFWG, Mass Marketing Fraud, p. 15.<br />

Congressional Research Service 20


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Changing Structures<br />

<strong>The</strong> traditional image of organized crime involves elaborate hierarchies, behavioral codes, and<br />

initiation rituals. Some criminal organizations like the Cosa Nostra retain a strong element of<br />

hierarchy. However, in the last 20 years the criminal underworld has likely moved away from<br />

rigid hierarchical organizational structures and toward decentralized and more flexible “network”<br />

models. One scholar has argued that the public is still wedded to hierarchical archetypes<br />

particularly when conceptualizing how smugglers operate:<br />

Still infused with images of cartels and syndicates—rigid, top-down organizations—we are<br />

not accustomed to thinking of flexible, even unchartable networks of intermediaries that<br />

operate across many borders and provide different services. Some are permanently linked<br />

and others vary in their composition, activities, and geographical scope depending on<br />

markets and circumstances. Thus, brokers and agents with access to multiple suppliers,<br />

conveyors, and buyers are more significant in the drug trade than are old-fashioned<br />

“kingpins.” For all these brokers, expanding into new product lines, legal or illegal is just a<br />

logical business step. 112<br />

As discussed elsewhere, criminals (much like legitimate businesses) have internationalized their<br />

operations, particularly in the last two decades. <strong>The</strong> fast movement of people, goods, and<br />

information stimulated by globalization and technological change has encouraged<br />

decentralization and outsourcing. Networks are especially suited for this type of environment. 113<br />

Global businesses and criminal organizations now give critical roles to individuals or groups<br />

outside of an organization’s core that are often physically separated by thousands of miles. <strong>In</strong><br />

some cases, such as Colombian drug trafficking organizations, law enforcement successes against<br />

criminal hierarchies may have encouraged the adaptation of networks. 114 Criminals conduct more<br />

business offshore because of the efficiencies offered by the <strong>In</strong>ternet and advances in the world’s<br />

transportation and communication infrastructures. 115 <strong>In</strong> the underground economy, these changes<br />

have encouraged the abandonment of exclusivity implied by the elaborate codes of behavior,<br />

ethnic bonds, and rigid hierarchy that once typified organized crime. 116<br />

Networked structures shield organized criminals from law enforcement efforts. 117 Beyond its<br />

immediate duties, one element or node in a network can have little understanding of the entire<br />

network’s criminal activity. It is possible for a network to operate without a single constituent part<br />

knowing the entire scheme. <strong>In</strong> larger networks with clear cut leaders, layers of peripheral nodes<br />

112 Naím, Illicit, pp. 219-220. For a similar discussion that also cites Naím, see Juan Carlos Garzón, Mafia & Co. <strong>The</strong><br />

Criminal Networks in Mexico, Brazil, and Colombia, (Washington, DC: Woodrow Wilson <strong>In</strong>ternational Center for<br />

Scholars, Latin American Program, English translation of 2008 Spanish ed., 2010) pp. 33-34. (Hereafter, Garzón,<br />

Mafia & Co.)<br />

113 Phil Williams, “Transnational Criminal Networks,” in Networks and Netwars, ed. John Arquilla, David Ronfeldt<br />

(Santa Monica, CA: National Defenses Research <strong>In</strong>stitute, RAND, 2002), pp. 77-78. (Hereafter: Williams,<br />

“Transnational Criminal Networks.”)<br />

114 Scott H. Decker and Margaret Townsend Chapman, Drug Smugglers on Drug Smuggling: Lessons from the <strong>In</strong>side<br />

(Philadelphia: Temple University Press, 2008), pp. 34-36.<br />

115 Stephen Aguilar-Millan et al., “<strong>The</strong> Globalization of <strong>Crime</strong>,” <strong>The</strong> Futurist, November/December 2008, p. 42.<br />

116 Chatterjee, <strong>The</strong> Changing Structure. pp, 2, 7-8.<br />

117 Carlo Morselli, <strong>In</strong>side Criminal Networks (<strong>New</strong> York: Springer, 2009), p. 71.<br />

Congressional Research Service 21


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

likely do not know who directs them. Disruption of peripheral network elements by law<br />

enforcement may alert core players to shut down the enterprise. 118<br />

Network Models<br />

Illicit networks broadly follow two models. “Hub and spoke” networks involve peripheral nodes<br />

tied to a leadership core. Core players initiate schemes, settle conflicts, and provide guidance to<br />

others. <strong>In</strong> this model, activity moves from core to peripheral players while the peripheral entities<br />

do not interact with one another. “Chain” networks involve the flow of information or movement<br />

of criminal goods from node to node in linear fashion without a discernable center of gravity or<br />

central command. 119 <strong>The</strong>y often lack obvious individual focal points for policing efforts.<br />

Networks can quickly adapt to changing market conditions or the elimination of nodes by law<br />

enforcement by quickly recruiting replacement specialists. Unlike hierarchies such as the Cosa<br />

Nostra, networks have few membership requirements, initiation rituals, or loyalty tests. <strong>The</strong>se<br />

organizations can also shift allegiances easily, opportunistically drawing in participants for<br />

specific tasks. 120<br />

Blurring of Forms<br />

Some powerful criminal groups that still favor traditional hierarchical structures featuring distinct<br />

lines of authority simultaneously exhibit networked characteristics as well, especially a flattening<br />

of leadership arrangements and outsourcing of some activities to criminals outside their<br />

immediate command and control structures. For example, in the United States hierarchical<br />

Mexican drug cartels rely on networks to handle aspects of trafficking. Violent U.S. gangs<br />

transport wholesale quantities of narcotics into the United States and procure weapons for some<br />

cartels. 121 Prison gangs, for instance, are highly structured, and both national- and regional-level<br />

prison gangs have formed alliances with Mexican DTOs. For example, the Barrio Azteca prison<br />

gang—operating primarily in southwestern Texas and southeastern <strong>New</strong> Mexico—has partnered<br />

with the Juárez cartel and generates much of its money from smuggling marijuana, heroin, and<br />

cocaine across the Southwest border. 122 Similarly, one author of a broad study of criminal<br />

organizations in Mexico, Brazil, and Colombia has noted that these groups embody<br />

118 Williams, “Transnational Criminal Networks,” pp. 64-75.<br />

119 Mette Eilstrup-Sangiovanni and Calvert Jones, “Assessing the Dangers of Illicit Networks: Why al-Qaida May Be<br />

Less Threatening Than Many Think,” <strong>In</strong>ternational Security, Fall 2008, pp. 12-13.<br />

120 For networked structures among Colombian drug traffickers, see Michael Kenney, “<strong>The</strong> Architecture of Drug<br />

Trafficking,” in From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and<br />

Competitive Adaptation (University Park, PA: Pennsylvania State University Press, 2007), pp. 25-47. (Hereafter,<br />

Kenney, From Pablo to Osama.)<br />

121 National Gang <strong>In</strong>telligence Center and National Drug <strong>In</strong>telligence Center, National Gang Threat Assessment, 2009,<br />

January 2009, pp. 11-12, http://www.fbi.gov/publications/ngta2009.pdf.<br />

122 Ibid., p. 28. Barrio Azteca members are also involved in other crimes, such as extortion, kidnapping, and alien<br />

smuggling. For more information, see Tom Diaz, “Barrio Azteca—Border Boys Linked to Mexican Drug Trafficking<br />

Organizations—Part Three,” April 17, 2009, http://tomdiaz.wordpress.com/2009/04/17/barrioazteca%E2%80%93border-bad-boys-linked-to-mexican-drug-trafficking-organizations-%E2%80%94-part-three/.<br />

See<br />

also the Department of Justice website at http://www.usdoj.gov/criminal/gangunit/gangs/prison.html.<br />

Congressional Research Service 22


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

characteristics of what he dubs the “Godfather Model”—rigid hierarchy—and the “Facebook<br />

Model”—dynamic network. 123<br />

Advantage: Networks Challenge Law Enforcement<br />

<strong>The</strong> shift to networked structures may suggest that criminals are more elusive than ever as the<br />

illicit world evolves rapidly, while law enforcement “plays by yesterday’s rules and increasingly<br />

risks dealing only with the weakest criminals and the easiest problems.” 124 According to one<br />

study, when combating agile drug cartels, a number of impediments hobble law enforcement<br />

officials. Most broadly, the hierarchical authority embodied in bureaucratic structures complicates<br />

the decision-making process. 125 Additionally, law enforcement potentially faces<br />

interagency coordination problems that further complicate, and decelerate, decision making,<br />

comprehensive legal and bureaucratic constraints to action, and ambiguous incentive<br />

structures that undermine some agents’ willingness to share information—and others’<br />

commitment to winning the war on drugs. 126<br />

Yet another challenge for law enforcement investigating more-networked organized criminal<br />

groups may arise from constraints in extraterritorial jurisdiction. While some criminal actors in a<br />

network may conduct business offshore or overseas and federal law enforcement does have<br />

extraterritorial jurisdiction to investigate and prosecute individuals who criminally violate U.S.<br />

interests abroad, this jurisdiction does not necessarily cover all crimes committed by organized<br />

crime groups. 127 Further, jurisdictional issues can present substantial diplomatic and practical<br />

challenges for law enforcement.<br />

Disadvantage: Networks Have Exploitable Weaknesses<br />

Some of the strengths suggested by network structure can also be interpreted as weaknesses.<br />

<strong>The</strong>ir inherent compartmentalization potentially impedes efficient information sharing, as key<br />

players keep peripheral actors in the dark about important aspects of complex schemes. This<br />

suggests that highly networked organizations more effectively engage in simpler criminal<br />

conspiracies. Decentralization can undermine the development of strategy and slow down<br />

decision making. It may also encourage excessive risk taking by peripheral actors who are not<br />

controlled by hierarchical roles rooted in rules enforced by the organization. Decentralization<br />

possibly also nurtures challengers who compete with core leaders and foster organizational<br />

instability. 128 Maintaining networks also likely requires “time-consuming” effort geared toward<br />

“building and fostering relationships.” 129<br />

123 Garzón, Mafia & Co. pp. 23-24.<br />

124 <strong>In</strong>telligence Committee Futures Working Group, Futures, p. 2.<br />

125 Kenney, From Pablo to Osama, p. 132-133.<br />

126 Ibid.<br />

127 See the Omnibus Diplomatic Security and Antiterrorism Act of 1968, Title XII of P.L. 99-399. For more detailed<br />

information regarding the United States extraterritorial jurisdiction as well as the specific crimes included in this<br />

jurisdiction, see CRS Report 94-166, Extraterritorial Application of American Criminal Law, by Charles Doyle.<br />

128 Mette Eilstrup-Sangiovanni and Calvert Jones, “Assessing the Dangers of Illicit Networks: Why al-Qaida May Be<br />

Less Threatening Than Many Think,” <strong>In</strong>ternational Security, Fall 2008, pp. 16-33.<br />

129 von Lampe, “Re-Conceptualizing,” p. 9.<br />

Congressional Research Service 23


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Corruption<br />

Some criminal networks co-opt or attract participants from the licit realm, using their specialized<br />

skills to provide “logistical advantages.” 130 <strong>The</strong>se skills are especially valuable in a globalized,<br />

high tech era in which technology is critical in overcoming geographical barriers that once slowed<br />

international trade. Corrupt individuals maintain their status in above-board business or<br />

governmental jobs, providing criminals with clean assets, closely guarded information,<br />

specialized access, sensitive information, or resources. Corrupt licit-realm actors also potentially<br />

lend criminal enterprises a sense of legitimacy. 131 Because of globalization, it is likely harder to<br />

disprove a criminal’s claims that he is a legitimate businessman, especially if the proof lies<br />

overseas or in multiple jurisdictions. <strong>The</strong> efforts of organized criminals to draw into their<br />

organizations legitimate persons can be described from three broad perspectives: grass-roots,<br />

private sector criminal infiltration of businesses; co-optation of powerful business leaders; and<br />

public corruption.<br />

“Ground-Level” Exploitation of Private Businesses<br />

Non-executive employees or self-employed individuals can provide criminal organizations with<br />

highly specialized capabilities in our highly networked age. <strong>The</strong> possibilities for co-opted private<br />

sector specialists are plentiful. <strong>The</strong> three examples below suggest this.<br />

• Viktar Krus operated a network that illegally brought foreign workers into the<br />

United States. He relied on legitimate facilitators such as Beth Ann Broyles, an<br />

Illinois immigration attorney who prepared fraudulent immigration petitions for<br />

the organization. Broyles claimed that she initially did not know that she was<br />

involved in criminal activity. When she eventually discerned that she was,<br />

Broyles rationalized her participation by believing that she was actually<br />

somehow assisting immigrants. She was among two dozen co-defendants who<br />

worked in Krus’s network. Additionally, Krus likely relied on bribing hotel<br />

employees to inflate the number of workers they needed to hire. Between 2003<br />

and 2008, he used at least 10 shell companies and evaded millions of dollars in<br />

taxes while bringing in 3,800 immigrants, many illegally, to work in the service<br />

sector and industrial jobs in the Norfolk, VA, region and elsewhere around the<br />

United States. He grossed $34 million, forced people to live 12-15 to an<br />

apartment, garnered fees from their wages, and charged legitimate businesses $10<br />

per hour for their labor. Krus received a seven-year prison sentence for<br />

conspiracy, tax fraud, visa fraud, and money laundering. 132<br />

130 Ibid.<br />

131 CISC, 2010 Report, p. 15, http://www.cisc.gc.ca/annual_reports/annual_report_2010/document/<br />

report_oc_2010_e.pdf. See also Carlo Morselli and Cynthia Giguere, “Legitimate Strengths in Criminal Networks,”<br />

<strong>Crime</strong>, Law, and Social Change, 2006, pp. 185-200.<br />

132 Tim McGlone, “Lawyer Sentenced for Part in Immigration Fraud Ring,” <strong>The</strong> Virginian-Pilot, January 26, 2010;<br />

McGlone, “Belarus Man Gets 7 Years for Illegal Workers,” <strong>The</strong> Virginian-Pilot, July 18, 2009,<br />

http://hamptonroads.com/2009/07/belarus-man-gets-7-years-illegal-workers; McGlone, “Prosecutors Tie Illegal<br />

Workers to <strong>In</strong>ternational <strong>Crime</strong> Syndicate,” <strong>The</strong> Virginian-Pilot, January 17, 2009; McGlone, “Illegal-Immigrant<br />

Network Supplied Region and Beyond,” <strong>The</strong> Virginian-Pilot, January 14, 2009; Bureau of Immigration and Customs<br />

Enforcement, “22 Charged with Massive <strong>In</strong>ternational Visa Scheme,” press release, January 13, 2009. For similar<br />

examples involving Eurasian organized criminals, see Alexander Sukharenko, “<strong>The</strong> Use of Corruption by ‘Russian’<br />

<strong>Organized</strong> <strong>Crime</strong> in the United States,” Trends in <strong>Organized</strong> <strong>Crime</strong>, vol. 8, no. 2 (Winter 2004).<br />

Congressional Research Service 24


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

• According to DOJ, the Tran organization, a criminal group that cheated<br />

approximately 27 casinos in the United States and Canada out of more than $7<br />

million, bribed card dealers and supervisors at casinos to advance its scheme. <strong>In</strong><br />

what has been dubbed “the largest cheating ring of all time,” 133 corrupt dealers<br />

rigged their shuffles during mini-baccarat and blackjack games. <strong>The</strong> group also<br />

used technologically advanced tools such as hidden transmitters and custom<br />

software to predict the order in which cards would reappear during games. 134 <strong>The</strong><br />

organization began its operations in 2002, and the initial indictment was returned<br />

against the group in May 2007. 135<br />

• DOJ’s <strong>Organized</strong> <strong>Crime</strong> and Racketeering Section helped prosecute Victor<br />

Kaganov in connection with an illegal money transmitting business he allegedly<br />

ran in Oregon. <strong>In</strong> March 2011, Kaganov pled guilty to operating an illegal money<br />

transmitting business. 136 DOJ has not publicly linked Kaganov, who was indicted<br />

in March 2010, to any organized crime figures. However, Kaganov purportedly<br />

opened multiple shell corporations in Oregon on behalf of Russian clients. He<br />

used the shells to shuttle more than $172 million via more than 4,200 wire<br />

transactions “in and out of the United States to more than 50 countries,”<br />

according to DOJ. 137 His supposed criminal activity highlights services that<br />

organized criminals could potentially use to launder money.<br />

Big Business and <strong>Organized</strong> Criminals<br />

<strong>In</strong> his Annual Threat Assessment for 2010, then-Director of National <strong>In</strong>telligence Dennis Blair<br />

noted that government, organized crime, intelligence services, and big business figures are<br />

growing increasingly close in their interactions. He stated,<br />

an increasing risk from Russian organized crime is that criminals and criminally linked<br />

oligarchs [powerful Eurasian businessmen who rose to power in the immediate post-Soviet<br />

period] will enhance the ability of state or state-allied actors to undermine competition in<br />

gas, oil, aluminum, and precious metals markets. 138<br />

However, based on open source information, it is often difficult to determine with any degree of<br />

certainty whether oligarchs or other powerful international entrepreneurs with interests in U.S.<br />

markets or investors have criminal connections.<br />

133 Liz Benston, “As Baccarat Grows in Popularity, So Does Cheating,” Las Vegas Sun, August 30, 2010,<br />

http://www.lasvegassun.com/news/2010/aug/30/baccarat-grows-popularity-so-does-cheating/.<br />

134 Department of Justice, “Former Mohegan Sun Card Dealer Sentenced to Prison for <strong>In</strong>volvement in Cheating<br />

Conspiracy,” press release, April 7, 2010, http://newhaven.fbi.gov/dojpressrel/pressrel10/nh040710.htm; Department of<br />

Justice, “Leader of Casino-Cheating Criminal Enterprise Sentenced to 70 Months in Prison for Targeting Casinos<br />

Across the United States,” press release, March 15, 2010, http://www.justice.gov/opa/pr/2010/March/10-crm-265.html.<br />

135 Department of Justice, “Eight More <strong>In</strong>dividuals Charged in Casino-Cheating Conspiracy,” press release, September<br />

18, 2009, http://www.justice.gov/opa/pr/2009/September/09-crm-999.html.<br />

136 Department of Justice, “Tigard Man Pleads Guilty to Operating Illegal Money Transmitting Business,” press<br />

release, March 1, 2011, http://www.justice.gov/usao/or/PressReleases/2011/20110301_Kaganov.html.<br />

137 Department of Justice, “Tigard Man <strong>In</strong>dicted in Connection with Illegal Money Transmitting Business Shell<br />

Corporations Created by Defendant to Move Millions of Dollars in and out of United States,” press release, March 3,<br />

2010, http://portland.fbi.gov/dojpressrel/pressrel10/pd030310.htm.<br />

138 Blair, “Annual Threat Assessment,” p. 44.<br />

Congressional Research Service 25


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Russian billionaire Oleg Deripaska exemplifies this difficulty. According to unnamed U.S. federal<br />

officials cited in news reports, Deripaska has struggled to maintain a U.S. visa because of his<br />

alleged ties to organized crime. 139 Prior to the global financial crisis, he possessed a $28 billion<br />

fortune and was the ninth-wealthiest person in the world. 140 He obtained a U.S. visa in 2005, but<br />

it was revoked soon thereafter. 141 According to press reporting, in 2009 the FBI set up two U.S.<br />

visits by Deripaska for undisclosed reasons on a limited entry permit from the Department of<br />

Homeland Security (DHS). 142 Claims of criminal connections have publicly dogged him for years.<br />

But Deripaska has never been convicted of a crime and has strongly denied all accusations. 143 His<br />

difficulty getting a U.S. visa may have kept some U.S. bankers from participation in an initial<br />

public offering (IPO) involving his aluminum company, UC Rusal. 144 <strong>The</strong> IPO occurred in<br />

January 2010 on the Hong Kong stock exchange. 145<br />

Like Deripaska, Stanley Ho, a billionaire casino magnate from Macau, has routinely denied<br />

accusations of ties to organized crime. According to media reports, U.S. officials have long<br />

suspected Ho had links to Chinese criminal groups known as triads. 146 <strong>The</strong>se suspicions recently<br />

resurfaced and involved his daughter, Pansy, and a casino venture in Macau. Pansy and Nevadabased<br />

MGM Resorts <strong>In</strong>ternational (MGM) 147 jointly operate the MGM Macau, which opened in<br />

December 2007. 148<br />

Pansy Ho’s co-ownership of MGM Macau emerged as an issue for <strong>New</strong> Jersey gaming regulators<br />

because MGM also possessed a 50% share in Atlantic City’s Borgata Hotel Casino and Spa.<br />

According to <strong>New</strong> Jersey law, MGM had to prove “by clear and convincing evidence, its ‘good<br />

character, honesty and integrity’ on a continuing basis” to maintain its 50% share in the<br />

Borgata. 149 <strong>In</strong> essence, the company and its partners had to be found suitable to operate in <strong>New</strong><br />

Jersey.<br />

139 Gregory L. White and Diana Cimilluca, “Some Bankers Cool on Hot Rusal IPO,” Wall Street Journal, November 9,<br />

2009, http://online.wsj.com/article/NA_WSJ_PUB:SB125755269536534861.html. (Hereafter, White and Cimilluca,<br />

“Some Bankers.”) Evan Perez, Gregory L. White, “FBI Lets Barred Tycoon Visit U.S.,” October 30, 2009,<br />

http://online.wsj.com/article/NA_WSJ_PUB:SB125685578903317087.html. (Hereafter, Perez and White, “FBI Lets<br />

Barred Tycoon.”)<br />

140 “<strong>The</strong> World’s Billionaires: #9 Oleg Deripaska,” Forbes.com, March 5, 2008, http://www.forbes.com/lists/2008/10/<br />

billionaires08_Oleg-Deripaska_UCP9.html.<br />

141 Perez and White, “FBI Lets Barred Tycoon.”<br />

142 White and Cimilluca, “Some Bankers”; Perez and White, “FBI Lets Barred Tycoon.”<br />

143 John Helmer, “Deripaska in ‘Russian Mafia’ Probe,” BusinessDay, May 14, 2010, http://www.businessday.co.za/<br />

articles/Content.aspx?id=108965; Misha Glenny, Robert Booth, and Tom Parfitt, “US Refused Oligarch Visa Over<br />

Alleged Criminal Associations,” <strong>The</strong> Guardian, October 31, 2008, http://www.guardian.co.uk/world/2008/oct/31/olegderipaska-us-visa-rusal.<br />

144 White and Cimilluca, “Some Bankers.”<br />

145 “Aluminum giant RusAl raises $2.24 bln with Hong Kong IPO,” RIA Novosti, January 22, 2010, http://en.rian.ru/<br />

business/20100122/157651607.html.<br />

146 Neil Gough, “Triads Thrive in Ho’s Casinos, US Report Says,” South China Morning Post, March 19, 2010.<br />

Alexandra Berzon and A.D. Pruitt, “MGM Mirage Knew Ally Was Unfit,” Wall Street Journal, March 17, 2010,<br />

http://online.wsj.com/article/SB10001424052748704743404575127673757750744.html.<br />

147 Formerly MGM Mirage.<br />

148 Tom Mitchell, “Spotlight on MGM Mirage’s ‘Wild Card,” Financial Times, March 19, 2010.<br />

149 State of <strong>New</strong> Jersey Department of Law and Public Safety, Special Report of the Division of Gaming Enforcement<br />

to the Casino Control Commission on Its <strong>In</strong>vestigation of MGM Mirage’s Joint Venture with Pansy Ho in Macau,<br />

Special Administrative Region, People’s Republic of China, Redacted, May 18, 2009, p. 1, http://www.state.nj.us/<br />

casinos/home/info/docs/MGM/dge_%20report_redacted.pdf. (Hereafter, DGE, “Report.”)<br />

Congressional Research Service 26


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

It appears that MGM’s direct ties to the Ho family were troubling to <strong>New</strong> Jersey regulators. <strong>In</strong><br />

May 2009, the <strong>New</strong> Jersey Division of Gaming Enforcement (DGE) published a report based on<br />

its own investigation of MGM’s partnership with Pansy Ho in Macau. <strong>The</strong> DGE report<br />

recommended that both Pansy and Stanley Ho be found “unsuitable persons” by the <strong>New</strong> Jersey<br />

Casino Control Commission. 150 <strong>The</strong> DGE noted the elder Ho’s “continued business ties to persons<br />

associated with organized crime” and his daughter’s “direct, substantial, and continuing business<br />

and financial ties to her father.” 151 <strong>In</strong> March 2010, MGM decided to sell its interest in the Borgata<br />

rather than sever ties with Pansy Ho. 152<br />

Corruption of Public Officials<br />

<strong>Organized</strong> criminals corrupt public employees, especially individuals who have sensitive jobs. <strong>In</strong><br />

many cases, criminals seek people who have skills, particular access to information, or job<br />

responsibilities that lend themselves to specific schemes. For example, some criminals whose<br />

operations depend on personal identification documents seek to inveigle employees with unique<br />

access to such information, and smugglers lure people charged with protecting borders into their<br />

operations.<br />

<strong>In</strong> August 2010, Vitaly Fedorchuk was sentenced to 46 months in prison for leading a criminal<br />

organization in the Cleveland, OH, area that fraudulently procured Ohio driver’s licenses and<br />

identification cards for foreign nationals. To do so, Fedorchuk’s group relied on Sonya Hilaszek, a<br />

corrupt employee at the Deputy Registrar’s Office in Parma, OH. She also pleaded guilty in the<br />

case and received a prison sentence of 33 months. DOJ accused Hilaszek of producing documents<br />

for between 300 and 500 individuals. <strong>The</strong> criminal group charged foreign nationals—many were<br />

from Ukraine or Uzbekistan and in the United States illegally—between $1,500 and $3,000 for<br />

the documents. Fedorchuk’s group also allegedly cooperated with criminals in Ukraine to<br />

fraudulently obtain non-immigrant visas from the U.S. Embassy in Kyiv. <strong>The</strong>y purportedly relied<br />

on corrupt Ukrainian nationals employed by the Embassy and charged $12,000 per visa. 153<br />

Mexican drug traffickers corrupt employees of federal agencies charged with protecting the<br />

Southwest border. <strong>The</strong> number of cases involving corruption at Customs and Border Protection<br />

(CBP) reported by the DHS Office of <strong>In</strong>spector General have risen from 245 in FY2006 to more<br />

than 770 (projected) for FY2010. 154 <strong>In</strong> FY2009 alone, the DHS <strong>In</strong>spector General opened 839<br />

investigations of potential corruption regarding DHS employees. Of the 839 investigations, 576<br />

worked for CBP, 164 for ICE, 64 for U.S. Citizen and Immigration Services (CIS), and 35 for the<br />

Transportation Security Administration (TSA). 155 While none of these figures establish exactly<br />

150 DGE, “Report,” pp. 70-71.<br />

151 DGE, “Report,” p. 71.<br />

152 Wayne Parry, “NJ: Asian Casino Boss Has Mob Ties in China,” Associated Press, March 17, 2010.<br />

153 Department of Justice, “Three More Sentenced as Part of Bureau of Motor Vehicle Fraud Ring,” press release,<br />

August, 19, 2010, http://cleveland.fbi.gov/dojpressrel/pressrel10/cl081910a.htm; Patrick O'Donnell, “Parma Clerk<br />

Issued Illegal Licenses, FBI Charges,” Cleveland Plain Dealer, October 30, 2009.<br />

154 Ceci Connolly, “<strong>The</strong> <strong>In</strong>side Woman,” Washington Post, September 12, 2010, http://www.washingtonpost.com/wpdyn/content/article/2010/09/11/AR2010091105087.html.<br />

(Hereafter, Connolly, “<strong>The</strong> <strong>In</strong>side Woman.”)<br />

155 See testimony by Thomas M. Frost, Assistant <strong>In</strong>spector General for <strong>In</strong>vestigations, U.S. Department of Homeland<br />

Security before the U.S. Congress, Senate Committee on Homeland Security and Governmental Affairs, Ad Hoc<br />

Subcommittee on State, Local, and Private Sector Preparedness and <strong>In</strong>tegration, <strong>New</strong> Border War: Corruption of U.S.<br />

Officials by Drug Cartels, 111 th Cong., 1 st sess., March 11, 2010.<br />

Congressional Research Service 27


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

how many of these corruption cases are attributable to organized crime, they do suggest a<br />

growing challenge for federal law enforcement focused on combating smuggling and trafficking<br />

groups along the border. <strong>In</strong> an attempt to prevent corruption, federal investigation and law<br />

enforcement agencies may vet potential employees. For instance, in 2009 available resources<br />

allowed CBP to polygraph 10%–15% of applicants applying for border patrol positions, and of<br />

those who were polygraphed, about 60% were found unsuitable for service. 156<br />

Two cases highlight the potential for corruption by organized crime along the Southwest border.<br />

<strong>In</strong> May 2010, Martha Garnica, a former CBP technician and officer, pleaded guilty to corruption<br />

and drug and alien smuggling charges. 157 She played a significant role in smuggling operations<br />

for the Ciudad Juarez-based La Linea criminal organization. 158 <strong>In</strong> another case, Jose Raul<br />

Montano, Jr. was sentenced to 140 months in prison for bribery, cocaine trafficking, and alien<br />

smuggling while assigned as a CBP officer at the Brownsville Gateway Port of Entry (POE) in<br />

Brownsville, TX. He allowed Mexican drug traffickers and alien smugglers to illegally transport<br />

drugs and people into the United States. At the POE, Montano permitted vehicles containing<br />

illicit shipments to pass—without inspection—through the lane he worked. <strong>In</strong> return, Mexican<br />

criminals bribed him. By the time of his arrest in April 2009, he received between $8,000 and<br />

$10,000 per vehicle. 159<br />

<strong>Organized</strong> <strong>Crime</strong>, a “National Security” and “Public<br />

Security” Concern<br />

Clearly, organized crime can be seen as a public security concern, largely endangering people,<br />

businesses, and property. <strong>In</strong> fact, in 1995 the National <strong>In</strong>telligence Council (NIC) produced a<br />

National <strong>In</strong>telligence Estimate (NIE) on international organized crime that emphasized just this.<br />

However, the U.S. intelligence community’s view of international organized crime has shifted<br />

critically in the intervening years. <strong>In</strong> early 2010, the NIC issued a second NIE on the topic.<br />

While, according to DOJ officials, most of the salient issues in the 2010 NIE are consistent with<br />

those discussed in the 1995 NIE, a key difference emerged. <strong>The</strong> 2010 NIE argues that<br />

international organized crime has evolved into a national security concern as well. 160 DOJ<br />

officials have described these national security threats in five broad categories: (1) penetrating or<br />

156 See testimony by James F. Tomsheck, Assistant Commissioner, Office of <strong>In</strong>ternal Affairs, Customs and Border<br />

Protection before the U.S. Congress, Senate Committee on Homeland Security and Governmental Affairs, Ad Hoc<br />

Subcommittee on State, Local, and Private Sector Preparedness and <strong>In</strong>tegration, <strong>New</strong> Border War: Corruption of U.S.<br />

Officials by Drug Cartels, 111 th Cong., 1 st sess., March 11, 2010.<br />

157 Immigration and Customs Enforcement, “Ex-CBP Employee Receives 20 Years in Drug, Alien Smuggling,<br />

Corruption Case,” press release, August 26, 2010, http://www.ice.gov/pi/nr/1008/100826elpaso.htm.<br />

158 Connolly, “<strong>The</strong> <strong>In</strong>side Woman.”<br />

159 Department of Justice, “Former CBP Officer Sentenced to Prison for Bribery, Cocaine Trafficking, and Alien<br />

Smuggling,” press release, March 31, 2010, http://sanantonio.fbi.gov/dojpressrel/pressrel10/sa033110.htm.<br />

160 Remarks by DOJ officials at the National <strong>In</strong>stitute of Justice Conference 2010, panel on <strong>In</strong>ternational <strong>Organized</strong><br />

<strong>Crime</strong>: Recent Developments in Policy and Research, June 14, 2010. For this report, “public security threat” means<br />

threats to people, businesses, or property, and “national security threat” means threats to government, sovereignty, and<br />

economic stability. This differentiation is based on John Bailey, Combating <strong>Organized</strong> <strong>Crime</strong> and Drug Trafficking in<br />

Mexico: What Are Mexican and U.S. Strategies? Are they Working? Woodrow Wilson <strong>In</strong>ternational Center For<br />

Scholars, Mexico <strong>In</strong>stitute and University of San Diego Trans-Border <strong>In</strong>stitute, Working Paper Series on U.S.-Mexico<br />

Security Cooperation, Washington, DC, May 2010, p. 3, fn. 2, http://wilsoncenter.org/topics/pubs/<br />

Combating%20<strong>Organized</strong>%20<strong>Crime</strong>.%20Bailey.pdf.<br />

Congressional Research Service 28


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

influencing state institutions—particularly in those states with weak governance; (2) threatening<br />

the global economy by infiltrating financial and commercial markets, driving out legitimate<br />

businesses, and using a variety of illegal business practices; (3) engaging in cybercrimes across a<br />

range of fraudulent activities impacting individuals, businesses, and global trust systems; (4)<br />

partnering with terrorist organizations and insurgent groups such as the Revolutionary Armed<br />

Forces of Colombia (FARC), Taliban, and Hezbollah; and (5) expanding the reach of drug<br />

trafficking such that DTOs ally with other criminal organizations—regardless of ethnic<br />

background—and with local drug distributors.<br />

Alleged Eurasian mob boss Semion Mogilevich embodies both the public and national security<br />

dimensions of organized crime. <strong>In</strong> October 2009, the FBI placed Mogilevich on its Ten Most<br />

Wanted Fugitives list. 161 He is wanted for leading a financial scheme that defrauded investors of<br />

$150 million between 1993 and 1998. <strong>The</strong> company that he allegedly controlled at the heart of<br />

the operation, YBM Magnex, was based in <strong>New</strong>town, PA, and was incorporated in Canada. 162<br />

Mogilevich was also likely involved in laundering money through YBM Magnex and a network<br />

of offshore companies. 163 By purportedly swindling investors, Mogilevich ran an operation that<br />

harmed members of the public. More broadly—and involving national security interests—the FBI<br />

and DOJ have suggested that the reputed mob boss also has his hands in Eastern European natural<br />

gas markets and that he uses his ill-gotten gains to influence “governments and their<br />

economies.” 164 Russian law enforcement arrested Mogilevich in January 2008 on tax evasion<br />

charges but released him in July 2009 on an oath not to flee. 165<br />

Although analysts have assessed organized crime as being a threat to both public security as well<br />

as a national security, the scope of these threats cannot be fully evaluated without a clearer<br />

understanding of the scope of organized crime.<br />

Conceptualizing <strong>Organized</strong> <strong>Crime</strong><br />

One of the primary challenges in conceptualizing organized crime is that it is usually not thought<br />

of as a specific crime, but rather as a large number of illicit activities committed by groups of<br />

individuals who are often so loosely connected that the members themselves do not know who<br />

their criminal associates may be. This has historically led to a lack of consistency in the way<br />

different groups—scholars, policymakers, various federal law enforcement agencies, and nation<br />

states—view what constitutes organized crime and think about how to combat it. <strong>The</strong> inconsistent<br />

conceptualization of organized crime has also made it difficult to measure its impact. 166<br />

161 FBI, “Top Ten Fugitives: Global Con Artist and Ruthless Criminal,” October 21, 2009, http://www.fbi.gov/page2/<br />

oct09/mogilevich_102109.html. (Hereafter: FBI, “Global Con Artist.”)<br />

162 FBI, “Philadelphia Fugitive Placed on the FBI’s ‘Ten Most Wanted Fugitives’ List,” press release, October 21,<br />

2009, http://philadelphia.fbi.gov/pressrel/pressrel09/ph102109a.htm. Jeanne Meserve, “FBI: Mobster More Powerful<br />

than Gotti,” CNN, October 24, 2009, http://articles.cnn.com/2009-10-21/justice/mogilevich.fbi.most.wanted_1_fbiwire-fraud-semion-mogilevich?_s=PM:CRIME.<br />

163 Williams, “Transnational Criminal Networks,” p. 70.<br />

164 FBI, “Global Con Artist;” Attorney General Michael B. Mukasey, “Attorney General Michael B. Mukasey Delivers<br />

Remarks at the CSIS Forum on Combating <strong>In</strong>ternational <strong>Organized</strong> <strong>Crime</strong>,” April 23, 2008, Political/Congressional<br />

Transcript Wire.<br />

165 “Russian Court Releases Reputed <strong>Crime</strong> Boss,” <strong>The</strong> Associated Press, July 27, 2009.<br />

166 This report focuses on U.S. agency and federal statutory definitions of organized crime. For a discussion of<br />

scholarly definitions, see CRS Report R40525, <strong>Organized</strong> <strong>Crime</strong> in the United States: Trends and Issues for Congress,<br />

(continued...)<br />

Congressional Research Service 29


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>The</strong> 2011 Strategy laid out the federal government’s first broad conceptualization of<br />

“transnational organized crime,” focusing on it as a national security concern. 167 To what extent<br />

this definition will drive Administration policy is unclear. <strong>In</strong> evaluating the 2011 Strategy,<br />

policymakers may exercise their oversight authority regarding both the adequacy of the<br />

Administration’s definition of transnational organized crime as well as its utilization in driving<br />

counter-crime policies.<br />

Transnational <strong>Organized</strong> <strong>Crime</strong> Defined<br />

<strong>The</strong> 2011 Strategy offers the following definition of organized crime:<br />

Transnational organized crime refers to those self-perpetuating associations of individuals<br />

who operate transnationally for the purpose of obtaining power, influence, monetary and/or<br />

commercial gains, wholly or in part by illegal means, while protecting their activities<br />

through a pattern of corruption and/or violence, or while protecting their illegal activities<br />

through a transnational organizational structure and the exploitation of transnational<br />

commerce or communication mechanisms. <strong>The</strong>re is no single structure under which<br />

transnational organized criminals operate; they vary from hierarchies to clans, networks, and<br />

cells, and may evolve to other structures. <strong>The</strong> crimes they commit also vary. Transnational<br />

organized criminals act conspiratorially in their criminal activities and possess certain<br />

characteristics which may include, but are not limited to:<br />

<strong>In</strong> at least part of their activities they commit violence or other acts which are likely to<br />

intimidate, or make actual or implicit threats to do so;<br />

<strong>The</strong>y exploit differences between countries to further their objectives, enriching their<br />

organization, expanding its power, and/or avoiding detection/apprehension;<br />

<strong>The</strong>y attempt to gain influence in government, politics, and commerce through corrupt<br />

as well as legitimate means;<br />

<strong>The</strong>y have economic gain as their primary goal, not only from patently illegal activities<br />

but also from investment in legitimate businesses; and<br />

<strong>The</strong>y attempt to insulate both their leadership and membership from detection, sanction,<br />

and/or prosecution through their organizational structure. 168<br />

As the term “transnational organized crime” (TOC) may suggest, any definition of it should detail<br />

three elements: (1) “transnationality,” (2) organization, and (3) crime. While the above TOC<br />

definition, and more generally the 2011 Strategy’s text, hit on all three elements, key gaps in<br />

understanding the Administration’s framing of TOC remain.<br />

(...continued)<br />

by Kristin M. Finklea.<br />

167 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. 5.<br />

168 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. ii. This definition originally appeared in Department of<br />

Justice, Overview of the Law Enforcement Strategy to Combat <strong>In</strong>ternational <strong>Organized</strong> <strong>Crime</strong>, April 2008, p. 2,<br />

http://www.justice.gov/ag/speeches/2008/ioc-strategy-public-overview.pdf.<br />

Congressional Research Service 30


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Transnationality<br />

<strong>The</strong> strategy’s definition addresses the concept of “transnationality” in the broadest terms,<br />

suggesting that TOC is transnational because it operates transnationally. At least three factors—<br />

none of which are discussed in the definition—may determine how transnational a group is:<br />

residence, product provenance, and supply chain complexity. 169<br />

Regarding residence, a TOC group’s members can reside in multiple countries, clearly making it<br />

a transnational network. However, if all members reside in a single country, but a seemingly<br />

minor aspect of the group’s activities is situated outside this home country, is the criminal<br />

network still considered transnational?<br />

• Does controlling a bank account in one country while committing crimes in<br />

another make a network transnational?<br />

• Can a group be considered transnational simply if its communications concerning<br />

criminal activity are routed outside of its home country via international<br />

communications networks?<br />

<strong>In</strong> terms of product provenance, it seems clear that illicit trade (whether it involves people, goods,<br />

services, or information) from one country to another is a transnational activity. However, can a<br />

domestically based group be considered transnational if the illicit product it handles in the United<br />

States had a foreign origin but the group played no role in getting it across international borders?<br />

• A street-level cocaine dealer may have never directly colluded with foreign<br />

criminals, but the cocaine he retails originated abroad. Does this automatically<br />

make him part of a TOC network? 170<br />

Supply chain complexity is also likely a prominent feature of TOC. This involves managing the<br />

routes that illicit products take.<br />

• Does the complexity of a group’s supply chain factor into measurement of how<br />

transnational the group is? This complexity can include elements such as the<br />

number of borders a product crosses as well as the resources a group expends to<br />

move a product. <strong>The</strong>se resources can include money used for things such as<br />

bribing public officials, protecting illicit routes from other criminals, the<br />

acquisition and retention of technical expertise, and the development of tools and<br />

infrastructure to maintain the route (e.g., shell companies, front companies, drug<br />

smuggling semi-submersibles, cross-border smuggling tunnels).<br />

<strong>The</strong>se factors suggest a broader question: does the level of transnationality inherent in a network<br />

impact how the U.S. government views it as a threat? <strong>In</strong> other words, if one network is more<br />

transnational than another, is it a greater concern? Would an organized crime group with<br />

transnational ties necessarily be a larger threat than a criminal network based solely in the United<br />

States?<br />

169 von Lampe, “Re-Conceptualizing,” pp. 4-5, discusses the “nature of what crosses the border.” This is subsumed by<br />

product provenance in this report. von Lampe also describes “directionality,” which is part of supply chain complexity<br />

in this report.<br />

170 <strong>The</strong> product that a TOC group moves across borders should also likely factor in the threat it poses to national<br />

security. A group trafficking firearms may pose a higher threat to national security than an alien smuggling<br />

organization or vise versa. How the strategy ranks these threats is unclear.<br />

Congressional Research Service 31


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Organization<br />

<strong>The</strong> TOC definition includes almost any form of organization. This is reflected in the strategy’s<br />

emphasis on the organizational fluidity of TOC. 171 As this may suggest, the definition lacks<br />

precise baselines for the concept of “organization.” Two baselines seem central here. <strong>The</strong> first<br />

involves routine. <strong>In</strong> essence, to qualify as “organized” does a network have to routinely<br />

cooperate? If so, what constitutes routine cooperation? <strong>The</strong> second baseline is size. How small is<br />

“organized”—can it be as basic as two individuals collaborating? Low thresholds for these two<br />

baselines—allowing TOC to include groups as small as two individuals who do not routinely<br />

interact—may render the concept of “organization” meaningless. <strong>In</strong> other words, with low<br />

thresholds, almost any criminal activity that does not involve a sole operator could be defined as<br />

“organized.” <strong>In</strong> an attempt to clarify matters, the definition suggests that TOC groups are “selfperpetuating,”<br />

but the definition does not explain what this concept entails. Seemingly, any group<br />

not construed and controlled by some external authority or environmental condition is “selfperpetuating.”<br />

<strong>Crime</strong><br />

<strong>The</strong> TOC definition in the 2011 Strategy broadly describes some of the activities TOC groups can<br />

engage in to turn profits and protect themselves—violence, exploiting the “differences between<br />

countries,” and gaining influence in legitimate sectors. Going beyond the definition, the strategy’s<br />

text lays out 10 areas of illicit activity in which TOC poses “a growing threat to national and<br />

international security.” 172 <strong>The</strong>se 10 areas encompass a wide swath of federal law enforcement<br />

activity.<br />

1. Penetration of State <strong>In</strong>stitutions, Corruption, and Threats to Governance<br />

2. Threats to the Economy, U.S. Competitiveness, and Strategic Markets<br />

3. <strong>Crime</strong>-Terror-<strong>In</strong>surgency Nexus<br />

4. Expansion of Drug Trafficking<br />

5. Human Smuggling<br />

6. Trafficking in Persons<br />

7. Weapons Trafficking<br />

8. <strong>In</strong>tellectual Property <strong>The</strong>ft<br />

9. Cybercrime<br />

10. <strong>The</strong> Critical Role of Facilitators. 173<br />

171 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. 3.<br />

172 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, pp. 5-8.<br />

173 Ibid. “Facilitators” are “semi-legitimate players such as accountants, attorneys, notaries, bankers, and real estate<br />

brokers, who cross both the licit and illicit worlds and provide services to legitimate customers, criminals, and terrorists<br />

alike.” See Ibid., p. 8.<br />

Congressional Research Service 32


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

It is unclear what sway the 2011 Strategy’s definition will hold over what is practically<br />

investigated as “transnational organized crime” by federal agencies. This is because these 10<br />

areas touch on a range of U.S. law enforcement activity that involves many federal agencies,<br />

including numerous components of both DOJ and DHS. <strong>The</strong> 10 areas clearly enumerate crimes<br />

such as drug and weapons trafficking. However, the areas can subsume other illegal activity. For<br />

example, many crimes related to financial fraud and identity theft potentially fall under<br />

“Cybercrime,” “<strong>In</strong>tellectual Property <strong>The</strong>ft,” or “Threats to the Economy, U.S. Competitiveness,<br />

and Strategic Markets.” <strong>In</strong> the past, numerous investigative programs within the federal<br />

government have been developed to combat crimes subsumed by the 10 areas without specifically<br />

characterizing them as “organized crime.”<br />

Complicating things, neither the definition nor the 2011 Strategy lay out a methodology for<br />

somehow differentiating among TOC actors in terms of the potential impact of their crimes—<br />

namely, the threat they pose to U.S. national security or public interests. Without a methodology<br />

establishing thresholds based on severity, vastly different criminals potentially fall under the<br />

strategy’s purview. A 15-year-old gang member and his friends who illegally download<br />

Hollywood movies from a foreign website is arguably a much different target for law<br />

enforcement than a powerful international mobster with vast economic resources and an army of<br />

foot soldiers. However, the strategy potentially targets both. A form of threat assessment rubric<br />

may focus federal efforts, thus focusing the groups or individuals targeted by the strategy.<br />

While the 2011 Strategy does not articulate a threat assessment methodology, two items suggest<br />

that Administration efforts supporting the strategy involve some calculation of threat. First, an<br />

interagency “Threat Mitigation Working Group” has been given the responsibility of identifying<br />

TOC networks “present[ing] a sufficiently high national security risk.” 174 Whether or not the<br />

networks identified by this working group will be the only ones targeted by efforts embraced<br />

under the strategy is unclear. Second, four TOC groups were listed in an annex to a new executive<br />

order issued in conjunction with the 2011 Strategy. 175 <strong>The</strong> order established a sanctions program<br />

“to block the property of and prohibit transactions with significant transnational criminal<br />

networks that threaten national security, foreign policy, or economic interests.” 176 While it is<br />

unclear exactly how or why the four groups were chosen, presumably some calculation of threat<br />

was involved. 177<br />

<strong>The</strong> Definition, 2011 Strategy, and Key Questions<br />

Because the strategy’s TOC definition is broad, it may be difficult to ascertain answers to a<br />

number of questions critical to policymaking (see Figure 1). First, how much harm is imposed by<br />

transnational organized crime? Second, how many federal resources are directly and indirectly<br />

dedicated to combating TOC? Third, which federal agencies are primarily responsible for fighting<br />

TOC? Fourth, how are threats prioritized by the new strategy. Are national security concerns<br />

weighed against other concerns such as public security when targeting specific TOC groups?<br />

Without clear answers to these questions, it may be difficult for Congress to exercise both<br />

174 Ibid., p. 1.<br />

175 Executive Order 13581, “Blocking Property of Transnational Criminal Organizations,” 76 Federal Register 44757-<br />

44759, July 24, 2011.<br />

176 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. 1.<br />

177 <strong>The</strong> four TOC groups are the Brothers’ Circle, Camorra, Yakuza, and Los Zetas.<br />

Congressional Research Service 33


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

legislative and oversight responsibilities in order to bolster the federal government’s abilities to<br />

counter organized crime.<br />

Figure 1. Transnational <strong>Organized</strong> <strong>Crime</strong> Strategy<br />

Key Issues for Policymakers<br />

Source: CRS<br />

Statutory Definition<br />

<strong>The</strong>re is no current statutory definition of organized crime. <strong>The</strong> Omnibus <strong>Crime</strong> Control and Safe<br />

Streets Act of 1968, as amended (P.L. 90-351), 178 had at one point defined organized crime as “the<br />

unlawful activities of the members of a highly organized, disciplined association engaged in<br />

supplying illegal goods and services, including but not limited to gambling, prostitution, loan<br />

sharking, narcotics, labor racketeering, and other unlawful activities of members of such<br />

organizations.” This definition—repealed in the Justice System Improvement Act of 1979 (P.L.<br />

96-157)—appears to be even broader than DOJ’s or the FBI’s conceptualizations. Similarly, in the<br />

Racketeer <strong>In</strong>fluenced and Corrupt Organizations (RICO) 179 provisions, organized crime is<br />

178 Omnibus <strong>Crime</strong> Control and Safe Streets Act of 1968, as amended (P.L. 90-351).<br />

179 18 U.S.C. § 1961-1968. It was enacted as Title IX of the <strong>Organized</strong> <strong>Crime</strong> Control Act of 1970 (P.L. 91- 452).<br />

Congressional Research Service 34


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

described in terms of an “enterprise” and a “pattern of racketeering activity.” 180 <strong>The</strong> predicate<br />

offenses for racketeering include a host of state and federal crimes listed in 18 U.S.C. § 1961.<br />

Although RICO does not define organized crime, it provides a definition for an “enterprise.” It<br />

does not, however, describe those attributes of a criminal enterprise that distinguish it from a<br />

legal enterprise. <strong>In</strong> addition, this provision describes organized crime more in terms of the illegal<br />

activities committed by conspirators rather than in terms of the criminal organization. As such,<br />

these statutory provisions could encompass the activities of not only organized crime groups but<br />

of terrorist groups and corrupt businesses as well. Largely describing organized crime as a list of<br />

crimes may help in the effective prosecution of these groups, but it provides little aid in<br />

developing an understanding of the groups themselves. 181 Moreover, the statutory provisions offer<br />

limited guidance regarding criminal organizations and the nature of their operational structure.<br />

Issues<br />

Defining <strong>Organized</strong> <strong>Crime</strong> in Statute<br />

Currently, there is no statutory definition of organized crime. RICO 182 provisions describe<br />

organized crime in terms of an “enterprise” and a “pattern of racketeering activity.” 183 <strong>The</strong> U.S.<br />

Code does not, however, provide guidance and information surrounding the nature of criminal<br />

organizations and their operational structure. <strong>The</strong>re also appears to be a divergence between the<br />

RICO provisions and what federal law enforcement—namely the FBI—considers to be organized<br />

crime. For instance, patterns of racketeering activity specified under RICO indicate that criminal<br />

organizations may be engaged in a host of crimes including, but not limited to, an act or threat<br />

involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, dealing in a<br />

controlled substance, and other illegal activities. Although drug trafficking is included in RICO’s<br />

predicate offenses, law enforcement does not necessarily consider drug trafficking or DTOs to be<br />

within the purview of organized crime investigations. One reason for this may be that federal law<br />

enforcement tends to segment investigations more on the basis of the criminal violation than on<br />

the basis of the criminal actor. While legislating a federal definition of organized crime may not<br />

180 As defined in 18 U.S.C. § 1961, an “‘enterprise’ includes any individual, partnership, corporation, association, or<br />

other legal entity, and any union or group of individuals associated ... although not [necessarily] a legal entity,” and a<br />

“‘pattern of racketeering activity’ requires at least two acts of racketeering activity” to occur within 10 years of one<br />

another for a criminal organization to be prosecuted for racketeering. Racketeering is defined as any number of<br />

violations, including an act or threat involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, or<br />

dealing in a controlled substance. See 18 U.S.C. § 1961 for a comprehensive list of the predicate offenses for<br />

racketeering.<br />

181 Frank E. Hagan, ‘“<strong>Organized</strong> <strong>Crime</strong>’ and ‘organized crime’ <strong>In</strong>determinate Problems of Definition,” Trends in<br />

<strong>Organized</strong> <strong>Crime</strong>, vol. 9, no. 4 (Summer 2006), p. 127. See also James O. Finkenauer, “Problems of Definition: What<br />

Is <strong>Organized</strong> <strong>Crime</strong>?” Trends in <strong>Organized</strong> <strong>Crime</strong>, vol. 8, no. 3 (Spring 2005), pp. 63-83.<br />

182 18 U.S.C. § 1961-1968. It was enacted as Title IX of the <strong>Organized</strong> <strong>Crime</strong> Control Act of 1970 (P.L. 91- 452).<br />

183 As defined in 18 U.S.C. § 1961, an “‘enterprise’ includes any individual, partnership, corporation, association, or<br />

other legal entity, and any union or group of individuals associated ... although not [necessarily] a legal entity,” and a<br />

“‘pattern of racketeering activity’ requires at least two acts of racketeering activity” to occur within 10 years of one<br />

another for a criminal organization to be prosecuted for racketeering. Racketeering is defined as any number of<br />

violations, including an act or threat involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, or<br />

dealing in a controlled substance. See 18 U.S.C. § 1961 for a comprehensive list of the predicate offenses for<br />

racketeering.<br />

Congressional Research Service 35


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

necessarily solve this disconnect with law enforcement, it might lead to changes in the way law<br />

enforcement views and investigates organized crime.<br />

A second statutory issue that Congress may consider is that of organized crime in the U.S.<br />

Criminal Code. For instance, while there is a Chapter (113B) in Title 18 that deals specifically<br />

with terrorism and related crimes, there is no centralized section that speaks specifically to<br />

organized crime. 184 Yet organized crime has been described as a leading threat to U.S. security.<br />

Though the lack of centralization of organized crime-related statutes may not impact law<br />

enforcement’s abilities to investigate and prosecute organized crime, it is indicative of the<br />

approach by which the federal government views it. And, as mentioned, the harm caused by<br />

organized crime may not be clearly estimated without a common understanding of what defines<br />

organized crime. Building on this, accurately gauging the public and national security threat<br />

posed by organized crime may be complicated without a solid notion of the harm it routinely<br />

causes.<br />

Congressional Commission<br />

Beginning in the 1950s, congressional concern about organized crime has resulted not only in<br />

legislative efforts to combat it, but in commissions and in various series of hearings aimed at<br />

gathering information on the scope of organized crime. One of the first such efforts was the<br />

Senate Special Committee to <strong>In</strong>vestigate <strong>Organized</strong> <strong>Crime</strong> in <strong>In</strong>terstate Commerce in 1950 and<br />

1951 led by Senator Kefauver. Another example of such congressional attention is the series of<br />

Senate hearings on organized crime in 1958 and 1963 led by Senator McClellan. <strong>The</strong>re was also<br />

the 1967 Commission on <strong>Crime</strong> in the United States led by Attorney General Katzenbach. More<br />

recently, and particularly since the terrorist attacks of September 11, 2001, congressional attention<br />

has shifted away from traditional crime fighting—including organized crime—toward<br />

counterterrorism.<br />

Of the more recent hearings involving organized crime topics, focus has primarily been on threats<br />

posed by the DTOs in Mexico. While this is one of the most visible organized crime threats—not<br />

only are some of the actors exceedingly violent, but this violence is seen directly along the U.S.<br />

Southwest border—it is likely not the sole serious organized crime threat to the United States. As<br />

discussed, numerous other organized crime groups, though perhaps not as violent, commit crimes<br />

that impact the economic stability, public safety, and domestic security of the United States. As<br />

such, one option that Congress may ultimately consider is the convening of a congressional<br />

commission to evaluate the scope of organized crime. Such an evaluation might help<br />

policymakers determine whether they have provided law enforcement with the appropriate tools<br />

to combat today’s threats posed by organized crime. It may also result in a clarification of how<br />

the federal government defines organized crime and consequently how investigative efforts at the<br />

federal level are organized. <strong>The</strong> Administration has also proposed a legislative package related to<br />

the 2011 Strategy. 185 <strong>In</strong> light of this, Congress may consider exploring the issue of transnational<br />

organized crime more extensively.<br />

184 Some may consider 18 U.S.C. § 1951-1968 (Chapters 95 and 96, Racketeering and RICO, respectively) to be a<br />

primary portion of the Code addressing organized crime.<br />

185 U.S. Department of Justice, “Statement of Assistant Attorney General Lanny A. Breuer Before the Senate Judiciary<br />

Subcommittee on <strong>Crime</strong> and Terrorism,” press release, November 1, 2011, http://www.justice.gov/criminal/pr/<br />

testimony/2011/crm-testimony-111101.html.<br />

Congressional Research Service 36


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

<strong>In</strong>centives for <strong>In</strong>vestigating <strong>Organized</strong> <strong>Crime</strong><br />

While the effects of certain, high-profile crimes—such as terrorism—are readily seen, the<br />

aftermath of organized crime is not always as striking, nor does it produce the same negative<br />

visceral reactions. Some argue that this may be one reason for the shift in law enforcement<br />

attention and resources more toward counterterrorism-related activities and further away from<br />

traditional crime fighting activities since the terrorist attacks of September 11, 2001. However,<br />

although the effects of organized crime may not be seen in a consolidated attack resulting in the<br />

physical loss of life, the effects are far-reaching. As mentioned, organized crime impacts<br />

economic stability, public health and safety, and national security. Consequently, some experts<br />

argue that there should be some form of incentive (as well as disincentive) to entice law<br />

enforcement to target more monetary and manpower resources toward investigating organized<br />

crime. 186<br />

One such form of incentive that Congress may consider is federal grants to state and local law<br />

enforcement for training and technical assistance to investigate and prosecute organized crime.<br />

<strong>The</strong>re are several grant programs—such as the Community Oriented Policing Services (COPS)<br />

grant program 187 and the Edward Byrne Memorial Justice Assistance Grant (JAG) program 188 —<br />

through which state and local law enforcement assistance is available for a variety of purpose<br />

areas. However, these purposes do not directly specify as a purpose area the use of funds for<br />

combating organized crime. <strong>The</strong>refore, policymakers may consider a specific grant program<br />

providing not only funding, but technical training and assistance.<br />

Other suggestions that experts have put forward involve the use of negative peer reviews to<br />

incentivize law enforcement around the world to focus resources toward combating organized<br />

crime. 189 As discussed, various state and federal law enforcement agencies investigate organized<br />

crime in the United States. As such, one option Congress may consider could be to direct the<br />

formation of a domestic peer review system 190 for law enforcement agencies charged with<br />

investigating organized crime. Participation in some form of peer review system could be tied to<br />

law enforcement assistance and grant funding eligibility.<br />

186 <strong>In</strong>ternational Peace <strong>In</strong>stitute, Transnational <strong>Organized</strong> <strong>Crime</strong>: Task Forces on Multilateral Security Capacity, IPI<br />

Blue Papers No. 2, 2009, http://www.ipinst.org/media/pdf/publications/toc_final.pdf. (Hereafter, IPI, Transnational<br />

<strong>Organized</strong> <strong>Crime</strong>.)<br />

187 For more information on COPS, see CRS Report RL33308, Community Oriented Policing Services (COPS):<br />

Background and Funding, by Nathan James as well as CRS Report R40709, Community Oriented Policing Services<br />

(COPS): Current Legislative Issues, by Nathan James.<br />

188 For more information on JAG, see CRS Report RS22416, Edward Byrne Memorial Justice Assistance Grant (JAG)<br />

Program, by Nathan James.<br />

189 IPI, Transnational <strong>Organized</strong> <strong>Crime</strong>.<br />

190 Peer review systems are used in a variety of academic, professional, and government settings to evaluate an<br />

individual or organization’s work or policies. <strong>The</strong> work or policies are open to examination by other experts and<br />

equivalent entities. For instance, the Office of Management and Budget (OMB) has promulgated guidelines for federal<br />

regulatory agencies to follow peer review requirements prior to disseminating influential scientific and statistical<br />

information. See Office of Management and Budget, “Guidelines for Ensuring and Maximizing the Quality,<br />

Objectivity, Utility, and <strong>In</strong>tegrity of <strong>In</strong>formation Disseminated by Federal Agencies; Republication,” Vol. 67, No. 36,<br />

Federal Register, February 22, 2002.<br />

Congressional Research Service 37


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Implementing the National Strategy to Combat TOC<br />

Congress may wish to consider oversight of the national strategy’s implementation by federal law<br />

enforcement agencies. <strong>In</strong> part, the strategy involves many law enforcement agencies, their<br />

investigative resources, and their intelligence collection efforts. A critical issue may be the<br />

coordination of these activities.<br />

Coordination of Domestic Efforts<br />

As mentioned, the federal investigation of organized crime matters has not historically been a<br />

centralized effort, and even with the 2011 Strategy, there is no single lead agency charged with<br />

investigating organized crime. 191 Specific agencies have had jurisdiction over an organized crime<br />

case based on the criminal violations involved. For instance, organized crime cases built around<br />

drug trafficking offenses have generally been investigated by the DEA, whereas those cases built<br />

around human trafficking cases are typically investigated by ICE. However, many organized<br />

crime cases may involve offenses that fall under the jurisdiction of multiple investigative<br />

agencies. For example, organized crime groups involved in crimes ranging from counterfeiting<br />

and financial institution fraud to identity crimes, computer crimes, and money laundering may be<br />

investigated by the U.S. Secret Service (USSS), FBI, ICE, and any number of other federal, state,<br />

and local law enforcement agencies. As a result of structuring organized crime investigations<br />

around the alleged crimes, it is not always clear which agency will take the lead on a particular<br />

case. This can lead to inter-agency conflicts, and if case information is not effectively<br />

communicated between agencies, each agency involved may not have a comprehensive view of<br />

the case. <strong>The</strong>re are, however, several law enforcement fusion centers, such as the <strong>Organized</strong><br />

<strong>Crime</strong> Drug Enforcement Task Force (OCDETF) Fusion Center (OFC), the <strong>In</strong>ternational<br />

<strong>Organized</strong> <strong>Crime</strong> <strong>In</strong>telligence and Operations Center (IOC-2), and the El Paso <strong>In</strong>telligence Center<br />

(EPIC), that are charged with consolidating and disseminating intelligence on various organized<br />

crime matters. Additionally, different agencies across federal, state, and local levels participate in<br />

these centers.<br />

For instance, the OFC assimilates information for the OCDETF Program, which targets major<br />

drug trafficking and money laundering organizations. Federal agencies that participate in the<br />

OCDETF Program include the DEA; FBI; ICE; Bureau of Alcohol, Tobacco, Firearms, and<br />

Explosives (ATF); U.S. Marshals; <strong>In</strong>ternal Revenue Service (IRS); U.S. Coast Guard (USCG); 94<br />

U.S. Attorneys Offices; and DOJ’s Criminal and Tax Divisions. <strong>The</strong>se federal agencies also<br />

collaborate with state and local law enforcement.<br />

<strong>In</strong> May 2009, DOJ announced the creation of the IOC-2—housed at the OFC—which brings<br />

together the FBI; ICE; DEA; IRS; ATF; U.S. Secret Service; U.S. Postal <strong>In</strong>spection Service<br />

(USPIS); U.S. Department of State, Bureau of Diplomatic Security; U.S. Department of Labor,<br />

Office of the <strong>In</strong>spector General; and DOJ’s Criminal Division in partnership with the 94 U.S.<br />

Attorneys’ Offices and the U.S. Department of the Treasury, Office of Terrorism and Financial<br />

<strong>In</strong>telligence. Unlike the OFC, the IOC-2 has yet to be funded. 192 It is charged with analyzing and<br />

191 For a discussion of federal law enforcement efforts to combat organized crime, see CRS Report R40525, <strong>Organized</strong><br />

<strong>Crime</strong> in the United States: Trends and Issues for Congress, by Kristin M. Finklea.<br />

192 <strong>In</strong> the FY2011 Budget Request, the Administration requests an additional $15.0 million for the Department of<br />

Justice to combat organized crime. $7.6 million of this is requested for funding DOJ staffing of the IOC-2. <strong>The</strong>re were<br />

no specific funds requested for the other agencies contributing to the IOC-2.<br />

Congressional Research Service 38


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

resolving conflicts in information on a host of organized crime cases, not solely those that center<br />

on drug trafficking.<br />

EPIC was originally established as an intelligence center to collect and disseminate information<br />

relating to drug, alien, and weapon smuggling in support of field enforcement entities throughout<br />

the Southwest border region. Following 9/11, counterterrorism also became part of its mission.<br />

Though these crimes are not exclusively committed by organized crime groups, they may be, and<br />

thus EPIC is involved in combating organized crime. EPIC is jointly operated by the DEA and<br />

U.S. Customs and Border Protection (CBP), and other participating agencies include ICE, USCG,<br />

U.S. Secret Service, Department of Defense (DOD), Department of the <strong>In</strong>terior, FBI, ATF, U.S.<br />

Marshals Service, Federal Aviation Administration, National Drug <strong>In</strong>telligence Center (NDIC),<br />

IRS, National Geospatial-<strong>In</strong>telligence Agency, Joint Task Force-North, Joint <strong>In</strong>teragency Task<br />

Force-South, Texas Department of Public Safety, Texas Air National Guard, and El Paso County<br />

Sheriff’s Office.<br />

<strong>In</strong> evaluating the most effective means to share organized crime intelligence, Congress may<br />

consider several options. One option may include increasing support for intelligence fusion<br />

centers such as the OFC, IOC-2, and EPIC. Another option could involve the creation of an<br />

interagency organization similar to the National Counterterrorism Center (NCTC), but centered<br />

around organized crime. Such an organization would be responsible for “analyzing the [organized<br />

crime] threat, sharing that information with … partners, and integrating all instruments of<br />

national power to ensure unity of effort” 193 against organized crime. On the prosecution end, DOJ<br />

has already announced a proposed consolidation of the <strong>Organized</strong> <strong>Crime</strong> and Racketeering<br />

Section (OCRS), the Criminal Division’s gang unit, and the National Gang Targeting,<br />

Enforcement, and Coordination Center (GangTECC) into a single <strong>Organized</strong> <strong>Crime</strong> and Gang<br />

Section. 194 This harmonizes the prosecution of organized crime and gang cases, which DOJ has<br />

cited as being similar.<br />

One non-legislative option that Congress may consider regarding the coordination of federal law<br />

enforcement efforts to combat organized crime is enforcing its oversight over existing fusion<br />

centers. <strong>In</strong> June 2010, the DOJ Office of the <strong>In</strong>spector General (OIG) issued a review of EPIC. 195<br />

<strong>The</strong> OIG found that EPIC’s users value its products, but that EPIC could benefit from<br />

improvement in fully developing the National Seizure System and coordinating the High <strong>In</strong>tensity<br />

Drug Trafficking Area (HIDTA) program, consistently coordinating with intelligence<br />

organizations across the country, maintaining and analyzing current information from all<br />

available sources, and creating objective performance measures by which to evaluate its<br />

programs, among other things. Similarly, in November 2009 the OIG reviewed DOJ’s anti-gang<br />

intelligence and coordination centers. 196 As a result of the review, the OIG determined that the<br />

National Gang <strong>In</strong>telligence Center had not created a gang information database, as had been<br />

directed by Congress.<br />

193 NCTC mission statement, available at http://www.nctc.gov/about_us/about_nctc.html.<br />

194 Ryan J. Reilly, “Gang Unit, <strong>Organized</strong> <strong>Crime</strong> Section to Merge,” Main Justice, July 12, 2010.<br />

195 Department of Justice, Office of the <strong>In</strong>spector General, Review of the Drug Enforcement Administration’s El Paso<br />

<strong>In</strong>telligence Center, I-2010-005, June 2010, pp. ii - iii, http://www.justice.gov/oig/reports/DEA/a1005.pdf.<br />

196 Department of Justice, Office of the <strong>In</strong>spector General, A Review of the Department’s Anti-Gang <strong>In</strong>telligence and<br />

Coordination Centers, I-2010-001, November 2009, http://www.justice.gov/oig/reports/FBI/i2010001.pdf.<br />

Congressional Research Service 39


<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />

Author Contact <strong>In</strong>formation<br />

Jerome P. Bjelopera<br />

Specialist in <strong>Organized</strong> <strong>Crime</strong> and Terrorism<br />

jbjelopera@crs.loc.gov, 7-0622<br />

Kristin M. Finklea<br />

Specialist in Domestic Security<br />

kfinklea@crs.loc.gov, 7-6259<br />

Congressional Research Service 40


Page 344 of 372


Attachment C<br />

Transnational <strong>Organized</strong> <strong>Crime</strong> – <strong>The</strong> Globalized<br />

Illegal Economy<br />

Page 345 of 372


FACTS<br />

Transnational <strong>Organized</strong> <strong>Crime</strong> –<br />

<strong>The</strong> Globalized Illegal Economy<br />

<strong>The</strong> fictionalized images of organized crime are far from the<br />

truth. <strong>The</strong> reality is less Hollywood and far more about fluid<br />

organized criminal networks profiting from the sale of illegal<br />

goods wherever there is a demand. <strong>The</strong>se international illegal<br />

markets are anonymous and more complex than ever and each<br />

year generate billions of dollars.<br />

Every year, countless lives are lost as a result of organized<br />

crime. Drug-related health problems and violence, firearm<br />

deaths and the unscrupulous methods and motives of human<br />

traffickers and migrant smugglers are all part of this. Each year<br />

millions of victims are affected as a result of the activities of<br />

organized crime groups.<br />

Transnational organized crime is big business. <strong>In</strong> 2009 it was<br />

estimated to generate $870 billion — an amount equal to<br />

1.5 per cent of global GDP. 1 That is more than six times the<br />

amount of official development assistance for that year, and<br />

the equivalent of close to 7 per cent of the world’s exports of<br />

merchandise.<br />

Hidden cost to society<br />

Transnational organized crime encompasses virtually all serious<br />

profit-motivated criminal actions of an international nature<br />

where more than one country is involved. <strong>The</strong>re are many<br />

activities that can be characterized as transnational organized<br />

crime, including drug trafficking, smuggling of migrants,<br />

human trafficking, money-laundering, trafficking in firearms,<br />

counterfeit goods, wildlife and cultural property, and even<br />

some aspects of cybercrime. It threatens peace and human<br />

security, leads to human rights being violated and undermines<br />

the economic, social, cultural, political and civil development<br />

of societies around the world. <strong>The</strong> vast sums of money involved<br />

can compromise legitimate economies and have a direct impact<br />

on governance, such as through corruption and the “buying”<br />

of elections.<br />

Different forms of transnational organized crime<br />

Transnational organized crime is not stagnant, but is an everchanging<br />

industry, adapting to markets and creating new<br />

forms of crime. <strong>In</strong> short, it is an illicit business that transcends<br />

cultural, social, linguistic and geographical boundaries and one<br />

that knows no borders or rules.<br />

Drug trafficking continues to be the most lucrative form of<br />

business for criminals, with an estimated annual value of $320<br />

billion. 2 <strong>In</strong> 2009, UNODC placed the approximate annual worth<br />

of the global cocaine and opiate markets alone at $85 billion<br />

and $68 billion, respectively. 3<br />

Human trafficking is a global crime in which men, women<br />

and children are used as products for sexual or labour-based<br />

exploitation. While figures vary, an estimate from the <strong>In</strong>ternational<br />

Labour Organization (ILO) in 2005 indicated the<br />

number of victims of trafficking at any given time to be<br />

around 2.4 million, with annual profits of about $32 billion.<br />

4 Recent research on overall forced labour trends however<br />

would suggest that the scope of the problem is much bigger. 5<br />

<strong>In</strong> Europe, the trafficking of mostly women and children for<br />

Transnational organized crime:<br />

Let’s put them<br />

out of business<br />

www.unodc.org/toc


FACTS<br />

sexual exploitation alone brings in $3 billion annually and<br />

involves 140,000 victims at any one time, with an annual flow<br />

of 70,000 victims. 6<br />

Smuggling of migrants is a well-organized business moving<br />

people around the globe through criminal networks, groups<br />

and routes. Migrants can be offered a “smuggling package”<br />

by organized crime groups, and the treatment they get along<br />

the route corresponds to the price they pay to their smugglers.<br />

<strong>In</strong> the process of being smuggled, their rights are often<br />

breached and they can be robbed, raped, beaten, held for<br />

ransom or even left to die in some cases, when the risks get<br />

too high for their smugglers. Many smugglers do not care<br />

if migrants drown in the sea, die of dehydration in a desert<br />

or suffocate in a container. Every year this trade is valued at<br />

billions of dollars. <strong>In</strong> 2009 some $6.6 billion was generated<br />

through the illegal smuggling of 3 million migrants from<br />

Latin America to North America, 7 while the previous year<br />

55,000 migrants were smuggled from Africa into Europe for a<br />

sum of $150 million. 8<br />

Illicit trading in firearms brings in around $170 million to<br />

$320 million annually 9 and puts handguns and assault rifles<br />

in the hands of criminals and gangs. It is difficult to count the<br />

victims of these illicit weapons, but in some regions (such as<br />

the Americas) there is a strong correlation between homicide<br />

rates and the percentage of homicides by firearms. 10<br />

Trafficking in natural resources includes the smuggling of raw<br />

materials such as diamonds and rare metals (often from conflict<br />

zones). <strong>The</strong> trafficking of timber in South-East Asia generates<br />

annual revenues of $3.5 billion. 11 <strong>In</strong> addition to funding criminal<br />

groups, this strand of criminal activity ultimately contributes<br />

to deforestation, climate change and rural poverty.<br />

<strong>The</strong> illegal trade in wildlife is another lucrative business for<br />

organized criminal groups, with poachers targeting skins<br />

and body parts for export to foreign markets. Trafficking in<br />

elephant ivory, rhino horn and tiger parts from Africa and<br />

South-East Asia to Asia produces $75 million in criminal<br />

profits each year and threatens the existence of some species.<br />

12 <strong>Organized</strong> crime groups also deal in live and rare plants<br />

and animals threatening their very existence to meet demand<br />

from collectors or unwitting consumers. According to the<br />

WWF, traffickers illegally move over 100 million tons of fish,<br />

1.5 million live birds and 440,000 tons of medicinal plants<br />

per year. 13<br />

<strong>The</strong> sale of fraudulent medicines is a worrying business, as it<br />

represents a potentially deadly trade for consumers. Piggybacking<br />

on the rising legitimate trade in pharmaceuticals from Asia<br />

to other developing regions, criminals traffic fraudulent medicines<br />

from Asia, in particular to South-East Asia and Africa to<br />

the value of $1.6 billion. 14 <strong>In</strong>stead of curing people, however,<br />

they can result in death or cause resistance to drugs used to<br />

treat deadly infectious diseases like malaria and tuberculosis. <strong>In</strong><br />

addition to traditional trafficking methods, criminals continue<br />

to build a lucrative online trade in fraudulent medicines targeting<br />

developed and developing countries alike, which can also<br />

lead to health implications for consumers.<br />

Cybercrime encompasses several areas, but one of the most<br />

profitable for criminals is identity theft, which generates around<br />

$1 billion each year. 15 Criminals are increasingly exploiting the<br />

<strong>In</strong>ternet to steal private data, access bank accounts and fraudulently<br />

attain payment card details.<br />

Global threats, local effects<br />

While transnational organized crime is a global threat, its effects<br />

are felt locally. When organized crime takes root it can<br />

destabilize countries and entire regions, thereby undermining<br />

development assistance in those areas. <strong>Organized</strong> crime groups<br />

can also work with local criminals, leading to an increase in<br />

corruption, extortion, racketeering and violence, as well as a<br />

range of other more sophisticated crimes at the local level. Violent<br />

gangs can also turn inner cities into dangerous areas and<br />

put citizens’ lives at risk.<br />

<strong>Organized</strong> crime affects people in the developing and the developed<br />

worlds. Money is laundered through banking systems.<br />

People become victims of identity theft, with 1.5 million people<br />

each year being caught out. 16 <strong>In</strong> many developed countries,<br />

criminal groups traffic women for sexual exploitation and children<br />

for purposes of forced begging, burglary and pickpocketing.<br />

Car theft is also an organized business, with vehicles stolen<br />

to order and taken abroad. Fraudulent medicines and food<br />

products enter the licit market and not only defraud the public<br />

but can put their lives and health at risk. Added to this is the<br />

trade in counterfeit products, which deprives countries of tax<br />

revenues. This can also have an impact on legitimate companies<br />

when illegally produced goods displace sales of original products,<br />

which in turn hurts employer revenues.<br />

<strong>Organized</strong> crime adds to an increase in public spending for<br />

security and policing and undermines the very human rights<br />

standards that many countries strive to preserve, particularly<br />

when activities such as human trafficking in human beings,<br />

kidnapping and extortion are taken into consideration. It can<br />

also fuel local crime, which in turn drives up costs such as<br />

insurance premiums and adds to the general level of criminality<br />

and insecurity in society.<br />

Transnational organized crime:<br />

Let’s put them<br />

out of business<br />

www.unodc.org/toc


FACTS<br />

Too hot to handle. How is money laundered?<br />

<strong>The</strong> profits of most crimes are generated as cash, which is risky<br />

for criminals. Difficult to hide, cash increases the probability<br />

of exposure, theft by rival criminals and seizure by the police.<br />

When cash enters the legitimate economy, it is particularly vulnerable<br />

to identification and law enforcement intervention. As<br />

a result, criminals move to prevent cash from attracting suspicion.<br />

For example, they may move it abroad, or they might use<br />

it to buy other assets or try to introduce it into the legitimate<br />

economy through businesses that have a high cash turnover. As<br />

an integral part of transnational organized crime, it is estimated<br />

that some 70 per cent of illicit profits are likely to have been<br />

laundered through the financial system. Yet less than 1 per cent<br />

of those laundered proceeds are intercepted and confiscated. 17<br />

Putting them out of business. What can we do about<br />

organized crime?<br />

Combating a global phenomenon such as transnational organized<br />

crime requires partnerships at all levels. Governments, businesses,<br />

civil society, international organizations and people in<br />

all corners of the world have a part to play. Some aspects that<br />

are critical in fighting organized crime include:<br />

• Coordination: integrated action at the international level<br />

is crucial in identifying, investigating and prosecuting the<br />

people and groups behind these crimes.<br />

• Education and awareness-raising: ordinary citizens should<br />

learn more about organized crime and how it affects<br />

everyday lives. Express your concerns to policy and decision<br />

makers so that this truly global threat is considered by<br />

politicians to be a top priority among the public’s major<br />

concerns. Consumers also have a key role to play: know<br />

what you are purchasing, do so ethically and make sure that<br />

you do not fuel organized crime.<br />

• <strong>In</strong>telligence and technology: criminal justice systems and<br />

conventional law enforcement methods are often no match<br />

for powerful criminal networks. Better intelligence methods<br />

need to be developed through the training of more specialized<br />

law enforcement units, which should be equipped with<br />

state-of-the-art technology.<br />

• Assistance: developing countries need assistance in building<br />

their capacity to counter these threats. An important<br />

tool that can help with this is the United Nations Convention<br />

against Transnational <strong>Organized</strong> <strong>Crime</strong>, which has<br />

been ratified by 170 parties 18 and provides a universal legal<br />

framework to help identify, deter and dismantle organized<br />

criminal groups. <strong>In</strong> October 2012 the sixth session of the<br />

Conference of the Parties to the United Nations Convention<br />

against Transnational <strong>Organized</strong> <strong>Crime</strong> will be held in<br />

Vienna. That biennial series of meetings brings together<br />

Governments from across the world to promote and review<br />

the execution of the Convention in order to ensure better<br />

implementation in tackling this international issue. At<br />

a practical level, UNODC helps strengthen the capacity of<br />

States to track and prevent money-laundering with training<br />

and technical assistance for following the money trail. <strong>The</strong>se<br />

measures can help cut off the profits of crime.<br />

Disclaimer<br />

This fact sheet has not been formally edited. <strong>The</strong> content of this fact sheet does not necessarily reflect the views or policies of UNODC or contributory<br />

organizations and neither does it imply any endorsement. <strong>The</strong> designations employed and the presentation of material in this fact sheet does not imply the<br />

expression of any opinion whatsoever on the part of UNODC concerning the legal status of any country, territory or city or its authorities, or concerning the<br />

delimitation of its frontiers and boundaries.<br />

Transnational organized crime:<br />

Let’s put them<br />

out of business<br />

www.unodc.org/toc


FACTS<br />

1<br />

United Nations Office on Drugs and <strong>Crime</strong>, Estimating Illicit Financial<br />

Flows Resulting from Drug Trafficking and Other Transnational<br />

<strong>Organized</strong> <strong>Crime</strong>s: Research Report (Vienna, October 2011). Available<br />

from www.unodc.org/documents/data-and-analysis/Studies/Illicit_<br />

financial_flows_2011_web.pdf.<br />

2<br />

Based on 2005 figures (World Drug Report 2011 (United Nations<br />

publication, Sales No. E.11.XI.10)). Available from www.unodc.org/wdr.<br />

3<br />

World Drug Report 2011.<br />

4<br />

Based on 2005 estimates from the <strong>In</strong>ternational Labour Organization<br />

(ILO). More recent and precise estimates by ILO on overall forced<br />

labour trends however would lead us to think that the scope of<br />

the problem is much bigger. (<strong>In</strong>ternational Labour Office, A Global<br />

Alliance against Forced Labour: Global Report under the Followup<br />

to the ILO Declaration on Fundamental Principles and Rights<br />

at Work (Geneva, ILO, 2005)). Available from www.ilo.org/wcmsp5/<br />

groups/public/@ed_norm/@declaration/documents/publication/<br />

wcms_081882.pdf.<br />

5<br />

<strong>In</strong>ternational Labour Organization, Global Estimate of Forced Labour<br />

2012: Results and Methodology (Geneva, ILO, 2012). Available<br />

from http://www.ilo.org/sapfl/<strong>In</strong>formationresources/ILOPublications/<br />

WCMS_182004/lang--en/index.htm<br />

6<br />

United Nations Office on Drugs and <strong>Crime</strong>, “Trafficking in persons to<br />

Europe for sexual exploitation”, June 2010. Available from www.unodc.<br />

org/documents/publications/TiP_Europe_EN_LORES.pdf.<br />

7<br />

<strong>The</strong> Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat<br />

Assessment (United Nations publication, Sales No. E.10.IV.6.2010).<br />

Available from www.unodc.org/documents/data-and-analysis/tocta/<br />

TOCTA_Report_2010_low_res.pdf.<br />

8<br />

Ibid.<br />

9<br />

UNODC.<br />

10<br />

United Nations Office on Drugs and <strong>Crime</strong>, 2011 Global Study on<br />

Homicide: Trends, Contexts, Data (2011). Available from www.unodc.<br />

org/documents/data-and-analysis/statistics/Homicide/Globa_study_<br />

on_homicide_2011_web.pdf.<br />

11<br />

<strong>The</strong> Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat<br />

Assessment.<br />

12<br />

Ibid.<br />

13<br />

See http://wwf.panda.org/about_our_earth/species/problems/illegal_<br />

trade/<br />

14<br />

Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat<br />

Assessment.<br />

15<br />

Ibid.<br />

16<br />

Ibid.<br />

17<br />

United Nations Office on Drugs and <strong>Crime</strong>, Estimating Illicit Financial<br />

Flows Resulting from Drug Trafficking.<br />

18<br />

See http://treaties.un.org/Pages/ViewDetails.spx?src=TREATY&mtdsg_<br />

no=XVIII-12&chapter=18&lang=en.<br />

Transnational organized crime:<br />

Let’s put them<br />

out of business<br />

www.unodc.org/toc


Page 346 of 372


Advocacy Foundation Publishers<br />

Page 347 of 372


Advocacy Foundation Publishers<br />

<strong>The</strong> e-Advocate Quarterly<br />

Page 348 of 372


Issue Title Quarterly<br />

Vol. I 2015 <strong>The</strong> Fundamentals<br />

I<br />

<strong>The</strong> ComeUnity ReEngineering<br />

Project <strong>In</strong>itiative<br />

Q-1 2015<br />

II <strong>The</strong> Adolescent Law Group Q-2 2015<br />

III<br />

Landmark Cases in US<br />

Juvenile Justice (PA)<br />

Q-3 2015<br />

IV <strong>The</strong> First Amendment Project Q-4 2015<br />

Vol. II 2016 Strategic Development<br />

V <strong>The</strong> Fourth Amendment Project Q-1 2016<br />

VI<br />

Landmark Cases in US<br />

Juvenile Justice (NJ)<br />

Q-2 2016<br />

VII Youth Court Q-3 2016<br />

VIII<br />

<strong>The</strong> Economic Consequences of Legal<br />

Decision-Making<br />

Q-4 2016<br />

Vol. III 2017 Sustainability<br />

IX <strong>The</strong> Sixth Amendment Project Q-1 2017<br />

X<br />

<strong>The</strong> <strong>The</strong>ological Foundations of<br />

US Law & Government<br />

Q-2 2017<br />

XI <strong>The</strong> Eighth Amendment Project Q-3 2017<br />

XII<br />

<strong>The</strong> EB-5 <strong>In</strong>vestor<br />

Immigration Project*<br />

Q-4 2017<br />

Vol. IV 2018 Collaboration<br />

XIII Strategic Planning Q-1 2018<br />

XIV<br />

<strong>The</strong> Juvenile Justice<br />

Legislative Reform <strong>In</strong>itiative<br />

Q-2 2018<br />

XV <strong>The</strong> Advocacy Foundation Coalition Q-3 2018<br />

Page 349 of 372


XVI<br />

for Drug-Free Communities<br />

Landmark Cases in US<br />

Juvenile Justice (GA)<br />

Q-4 2018<br />

Page 350 of 372


Issue Title Quarterly<br />

Vol. V 2019 Organizational Development<br />

XVII <strong>The</strong> Board of Directors Q-1 2019<br />

XVIII <strong>The</strong> <strong>In</strong>ner Circle Q-2 2019<br />

XIX Staff & Management Q-3 2019<br />

XX Succession Planning Q-4 2019<br />

XXI <strong>The</strong> Budget* Bonus #1<br />

XXII Data-Driven Resource Allocation* Bonus #2<br />

Vol. VI 2020 Missions<br />

XXIII Critical Thinking Q-1 2020<br />

XXIV<br />

<strong>The</strong> Advocacy Foundation<br />

Endowments <strong>In</strong>itiative Project<br />

Q-2 2020<br />

XXV <strong>In</strong>ternational Labor Relations Q-3 2020<br />

XXVI Immigration Q-4 2020<br />

Vol. VII 2021 Community Engagement<br />

XXVII<br />

<strong>The</strong> 21 st Century Charter Schools<br />

<strong>In</strong>itiative<br />

Q-1 2021<br />

XXVIII <strong>The</strong> All-Sports Ministry @ ... Q-2 2021<br />

XXIX Lobbying for Nonprofits Q-3 2021<br />

XXX<br />

XXXI<br />

Advocacy Foundation Missions -<br />

Domestic<br />

Advocacy Foundation Missions -<br />

<strong>In</strong>ternational<br />

Q-4 2021<br />

Bonus<br />

Page 351 of 372


Vol. VIII<br />

2022 ComeUnity ReEngineering<br />

XXXII<br />

<strong>The</strong> Creative & Fine Arts Ministry<br />

@ <strong>The</strong> Foundation<br />

Q-1 2022<br />

XXXIII <strong>The</strong> Advisory Council & Committees Q-2 2022<br />

XXXIV<br />

<strong>The</strong> <strong>The</strong>ological Origins<br />

of Contemporary Judicial Process<br />

Q-3 2022<br />

XXXV <strong>The</strong> Second Chance Ministry @ ... Q-4 2022<br />

Vol. IX 2023 Legal Reformation<br />

XXXVI <strong>The</strong> Fifth Amendment Project Q-1 2023<br />

XXXVII <strong>The</strong> Judicial Re-Engineering <strong>In</strong>itiative Q-2 2023<br />

XXXVIII<br />

<strong>The</strong> <strong>In</strong>ner-Cities Strategic<br />

Revitalization <strong>In</strong>itiative<br />

Q-3 2023<br />

XXXVIX Habeas Corpus Q-4 2023<br />

Vol. X 2024 ComeUnity Development<br />

XXXVX<br />

<strong>The</strong> <strong>In</strong>ner-City Strategic<br />

Revitalization Plan<br />

Q-1 2024<br />

XXXVXI <strong>The</strong> Mentoring <strong>In</strong>itiative Q-2 2024<br />

XXXVXII <strong>The</strong> Violence Prevention Framework Q-3 2024<br />

XXXVXIII <strong>The</strong> Fatherhood <strong>In</strong>itiative Q-4 2024<br />

Vol. XI 2025 Public <strong>In</strong>terest<br />

XXXVXIV Public <strong>In</strong>terest Law Q-1 2025<br />

L (50) Spiritual Resource Development Q-2 2025<br />

Page 352 of 372


LI<br />

Nonprofit Confidentiality<br />

<strong>In</strong> <strong>The</strong> Age of Big Data<br />

Q-3 2025<br />

LII <strong>In</strong>terpreting <strong>The</strong> Facts Q-4 2025<br />

Vol. XII 2026 Poverty <strong>In</strong> America<br />

LIII<br />

American Poverty<br />

<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

Q-1 2026<br />

LIV Outcome-Based Thinking Q-2 2026<br />

LV Transformational Social Leadership Q-3 2026<br />

LVI <strong>The</strong> Cycle of Poverty Q-4 2026<br />

Vol. XIII 2027 Raising Awareness<br />

LVII ReEngineering Juvenile Justice Q-1 2027<br />

LVIII Corporations Q-2 2027<br />

LVIX <strong>The</strong> Prison <strong>In</strong>dustrial Complex Q-3 2027<br />

LX Restoration of Rights Q-4 2027<br />

Vol. XIV 2028 Culturally Relevant Programming<br />

LXI Community Culture Q-1 2028<br />

LXII Corporate Culture Q-2 2028<br />

LXIII Strategic Cultural Planning Q-3 2028<br />

LXIV<br />

<strong>The</strong> Cross-Sector/ Coordinated<br />

Service Approach to Delinquency<br />

Prevention<br />

Q-4 2028<br />

Page 353 of 372


Vol. XV 2029 <strong>In</strong>ner-Cities Revitalization<br />

LXIV<br />

LXV<br />

LXVI<br />

Part I – Strategic Housing<br />

Revitalization<br />

(<strong>The</strong> Twenty Percent Profit Margin)<br />

Part II – Jobs Training, Educational<br />

Redevelopment<br />

and Economic Empowerment<br />

Part III - Financial Literacy<br />

and Sustainability<br />

Q-1 2029<br />

Q-2 2029<br />

Q-3 2029<br />

LXVII Part IV – Solutions for Homelessness Q-4 2029<br />

LXVIII<br />

<strong>The</strong> Strategic Home Mortgage<br />

<strong>In</strong>itiative<br />

Bonus<br />

Vol. XVI 2030 Sustainability<br />

LXVIII Social Program Sustainability Q-1 2030<br />

LXIX<br />

<strong>The</strong> Advocacy Foundation<br />

Endowments <strong>In</strong>itiative<br />

Q-2 2030<br />

LXX Capital Gains Q-3 2030<br />

LXXI Sustainability <strong>In</strong>vestments Q-4 2030<br />

Vol. XVII 2031 <strong>The</strong> Justice Series<br />

LXXII Distributive Justice Q-1 2031<br />

LXXIII Retributive Justice Q-2 2031<br />

LXXIV Procedural Justice Q-3 2031<br />

LXXV (75) Restorative Justice Q-4 2031<br />

LXXVI Unjust Legal Reasoning Bonus<br />

Page 354 of 372


Vol. XVIII 2032 Public Policy<br />

LXXVII Public <strong>In</strong>terest Law Q-1 2032<br />

LXXVIII Reforming Public Policy Q-2 2032<br />

LXXVIX ... Q-3 2032<br />

LXXVX ... Q-4 2032<br />

Page 355 of 372


<strong>The</strong> e-Advocate Monthly Review<br />

2018<br />

Transformational Problem Solving January 2018<br />

<strong>The</strong> Advocacy Foundation February 2018<br />

Opioid <strong>In</strong>itiative<br />

Native-American Youth March 2018<br />

<strong>In</strong> the Juvenile Justice System<br />

Barriers to Reducing Confinement April 2018<br />

Latino and Hispanic Youth May 2018<br />

<strong>In</strong> the Juvenile Justice System<br />

Social Entrepreneurship June 2018<br />

<strong>The</strong> Economic Consequences of<br />

Homelessness in America S.Ed – June 2018<br />

African-American Youth July 2018<br />

<strong>In</strong> the Juvenile Justice System<br />

Gang Deconstruction August 2018<br />

Social Impact <strong>In</strong>vesting September 2018<br />

Opportunity Youth: October 2018<br />

Disenfranchised Young People<br />

<strong>The</strong> Economic Impact of Social November 2018<br />

of Social Programs Development<br />

Gun Control December 2018<br />

2019<br />

<strong>The</strong> U.S. Stock Market January 2019<br />

Prison-Based Gerrymandering February 2019<br />

Literacy-Based Prison Construction March 2019<br />

Children of <strong>In</strong>carcerated Parents April 2019<br />

Page 356 of 372


African-American Youth in <strong>The</strong> May 2019<br />

Juvenile Justice System<br />

Racial Profiling June 2019<br />

Mass Collaboration July 2019<br />

Concentrated Poverty August 2019<br />

De-<strong>In</strong>dustrialization September 2019<br />

Overcoming Dyslexia October 2019<br />

Overcoming Attention Deficit November 2019<br />

<strong>The</strong> Gift of Adversity December 2019<br />

2020<br />

<strong>The</strong> Gift of Hypersensitivity January 2020<br />

<strong>The</strong> Gift of <strong>In</strong>trospection February 2020<br />

<strong>The</strong> Gift of <strong>In</strong>troversion March 2020<br />

<strong>The</strong> Gift of Spirituality April 2020<br />

<strong>The</strong> Gift of Transformation May 2020<br />

Property Acquisition for<br />

Organizational Sustainability June 2020<br />

<strong>In</strong>vesting for Organizational<br />

Sustainability July 2020<br />

Biblical Law & Justice TLFA August 2020<br />

Gentrification AF September 2020<br />

Environmental Racism NpA October 2020<br />

Law for <strong>The</strong> Poor AF November 2020<br />

…<br />

Page 357 of 372


2021<br />

Biblically Responsible <strong>In</strong>vesting TLFA – January 2021<br />

<strong>In</strong>ternational Criminal Procedure LMI – February 2021<br />

Spiritual Rights TLFA – March 2021<br />

<strong>The</strong> <strong>The</strong>ology of Missions TLFA – April 2021<br />

Legal Evangelism, <strong>In</strong>telligence,<br />

Reconnaissance & Missions LMI – May 2021<br />

<strong>The</strong> Law of War LMI – June 2021<br />

Generational Progression AF – July 2021<br />

Predatory Lending AF – August 2021<br />

<strong>The</strong> Community Assessment Process NpA – September 2021<br />

Accountability NpA – October 2021<br />

Nonprofit Transparency NpA – November 2021<br />

Redefining Unemployment AF – December 2021<br />

2022<br />

21 st Century Slavery AF – January 2022<br />

Acquiesce to Righteousness TLFA – February 2022<br />

ComeUnity Capacity-Building NpA – March 2022<br />

Nonprofit Organizational Assessment NpA – April 2022<br />

Debt Reduction AF – May 2022<br />

Case Law, Statutory Law,<br />

Municipal Ordinances and Policy ALG – June 2022<br />

Organizational Dysfunction NpA - July 2022<br />

<strong>In</strong>stitutional Racism Collab US – August 2022<br />

Page 358 of 372


<strong>The</strong> Ripple Effects of Ministry TLFA - September 2022<br />

<strong>The</strong> Sarbanes-Oxley Act of 2002 NpA – October 2022<br />

<strong>Organized</strong> <strong>Crime</strong> (<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong>) ALG – May 2022<br />

…<br />

Page 359 of 372


<strong>The</strong> e-Advocate Quarterly<br />

Special Editions<br />

Crowdfunding Winter-Spring 2017<br />

Social Media for Nonprofits October 2017<br />

Mass Media for Nonprofits November 2017<br />

<strong>The</strong> Opioid Crisis in America: January 2018<br />

Issues in Pain Management<br />

<strong>The</strong> Opioid Crisis in America: February 2018<br />

<strong>The</strong> Drug Culture in the U.S.<br />

<strong>The</strong> Opioid Crisis in America: March 2018<br />

Drug Abuse Among Veterans<br />

<strong>The</strong> Opioid Crisis in America: April 2018<br />

Drug Abuse Among America’s<br />

Teens<br />

<strong>The</strong> Opioid Crisis in America: May 2018<br />

Alcoholism<br />

<strong>The</strong> Economic Consequences of June 2018<br />

Homelessness in <strong>The</strong> US<br />

<strong>The</strong> Economic Consequences of July 2018<br />

Opioid Addiction in America<br />

Page 360 of 372


<strong>The</strong> e-Advocate Journal<br />

of <strong>The</strong>ological Jurisprudence<br />

Vol. I - 2017<br />

<strong>The</strong> <strong>The</strong>ological Origins of Contemporary Judicial Process<br />

Scriptural Application to <strong>The</strong> Model Criminal Code<br />

Scriptural Application for Tort Reform<br />

Scriptural Application to Juvenile Justice Reformation<br />

Vol. II - 2018<br />

Scriptural Application for <strong>The</strong> Canons of Ethics<br />

Scriptural Application to Contracts Reform<br />

& <strong>The</strong> Uniform Commercial Code<br />

Scriptural Application to <strong>The</strong> Law of Property<br />

Scriptural Application to <strong>The</strong> Law of Evidence<br />

Page 361 of 372


Legal Missions <strong>In</strong>ternational<br />

Page 362 of 372


Issue Title Quarterly<br />

Vol. I 2015<br />

I<br />

II<br />

God’s Will and <strong>The</strong> 21 st Century<br />

Democratic Process<br />

<strong>The</strong> Community<br />

Engagement Strategy<br />

Q-1 2015<br />

Q-2 2015<br />

III Foreign Policy Q-3 2015<br />

IV<br />

Public <strong>In</strong>terest Law<br />

in <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

Q-4 2015<br />

Vol. II 2016<br />

V Ethiopia Q-1 2016<br />

VI Zimbabwe Q-2 2016<br />

VII Jamaica Q-3 2016<br />

VIII Brazil Q-4 2016<br />

Vol. III 2017<br />

IX <strong>In</strong>dia Q-1 2017<br />

X Suriname Q-2 2017<br />

XI <strong>The</strong> Caribbean Q-3 2017<br />

XII United States/ Estados Unidos Q-4 2017<br />

Vol. IV 2018<br />

XIII Cuba Q-1 2018<br />

XIV Guinea Q-2 2018<br />

XV <strong>In</strong>donesia Q-3 2018<br />

XVI Sri Lanka Q-4 2018<br />

Page 363 of 372


Vol. V 2019<br />

XVII Russia Q-1 2019<br />

XVIII Australia Q-2 2019<br />

XIV South Korea Q-3 2019<br />

XV Puerto Rico Q-4 2019<br />

Issue Title Quarterly<br />

Vol. VI 2020<br />

XVI Trinidad & Tobago Q-1 2020<br />

XVII Egypt Q-2 2020<br />

XVIII Sierra Leone Q-3 2020<br />

XIX South Africa Q-4 2020<br />

XX Israel Bonus<br />

Vol. VII 2021<br />

XXI Haiti Q-1 2021<br />

XXII Peru Q-2 2021<br />

XXIII Costa Rica Q-3 2021<br />

XXIV China Q-4 2021<br />

XXV Japan Bonus<br />

Vol VIII 2022<br />

XXVI Chile Q-1 2022<br />

Page 364 of 372


<strong>The</strong> e-Advocate Juvenile Justice Report<br />

______<br />

Vol. I – Juvenile Delinquency in <strong>The</strong> US<br />

Vol. II. – <strong>The</strong> Prison <strong>In</strong>dustrial Complex<br />

Vol. III – Restorative/ Transformative Justice<br />

Vol. IV – <strong>The</strong> Sixth Amendment Right to <strong>The</strong> Effective Assistance of Counsel<br />

Vol. V – <strong>The</strong> <strong>The</strong>ological Foundations of Juvenile Justice<br />

Vol. VI – Collaborating to Eradicate Juvenile Delinquency<br />

Page 365 of 372


<strong>The</strong> e-Advocate <strong>New</strong>sletter<br />

Genesis of <strong>The</strong> Problem<br />

Family Structure<br />

Societal <strong>In</strong>fluences<br />

Evidence-Based Programming<br />

Strengthening Assets v. Eliminating Deficits<br />

2012 - Juvenile Delinquency in <strong>The</strong> US<br />

<strong>In</strong>troduction/Ideology/Key Values<br />

Philosophy/Application & Practice<br />

Expungement & Pardons<br />

Pardons & Clemency<br />

Examples/Best Practices<br />

2013 - Restorative Justice in <strong>The</strong> US<br />

2014 - <strong>The</strong> Prison <strong>In</strong>dustrial Complex<br />

25% of the World's <strong>In</strong>mates Are <strong>In</strong> the US<br />

<strong>The</strong> Economics of Prison Enterprise<br />

<strong>The</strong> Federal Bureau of Prisons<br />

<strong>The</strong> After-Effects of <strong>In</strong>carceration/<strong>In</strong>dividual/Societal<br />

<strong>The</strong> Fourth Amendment Project<br />

<strong>The</strong> Sixth Amendment Project<br />

<strong>The</strong> Eighth Amendment Project<br />

<strong>The</strong> Adolescent Law Group<br />

2015 - US Constitutional Issues <strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />

Page 366 of 372


2018 - <strong>The</strong> <strong>The</strong>ological Law Firm Academy<br />

<strong>The</strong> <strong>The</strong>ological Foundations of US Law & Government<br />

<strong>The</strong> Economic Consequences of Legal Decision-Making<br />

<strong>The</strong> Juvenile Justice Legislative Reform <strong>In</strong>itiative<br />

<strong>The</strong> EB-5 <strong>In</strong>ternational <strong>In</strong>vestors <strong>In</strong>itiative<br />

2017 - Organizational Development<br />

<strong>The</strong> Board of Directors<br />

<strong>The</strong> <strong>In</strong>ner Circle<br />

Staff & Management<br />

Succession Planning<br />

Bonus #1 <strong>The</strong> Budget<br />

Bonus #2 Data-Driven Resource Allocation<br />

2018 - Sustainability<br />

<strong>The</strong> Data-Driven Resource Allocation Process<br />

<strong>The</strong> Quality Assurance <strong>In</strong>itiative<br />

<strong>The</strong> Advocacy Foundation Endowments <strong>In</strong>itiative<br />

<strong>The</strong> Community Engagement Strategy<br />

2019 - Collaboration<br />

Critical Thinking for Transformative Justice<br />

<strong>In</strong>ternational Labor Relations<br />

Immigration<br />

God's Will & <strong>The</strong> 21st Century Democratic Process<br />

<strong>The</strong> Community Engagement Strategy<br />

<strong>The</strong> 21st Century Charter Schools <strong>In</strong>itiative<br />

2020 - Community Engagement<br />

Page 367 of 372


Extras<br />

<strong>The</strong> Nonprofit Advisors Group <strong>New</strong>sletters<br />

<strong>The</strong> 501(c)(3) Acquisition Process<br />

<strong>The</strong> Board of Directors<br />

<strong>The</strong> Gladiator Mentality<br />

Strategic Planning<br />

Fundraising<br />

501(c)(3) Reinstatements<br />

<strong>The</strong> Collaborative US/ <strong>In</strong>ternational <strong>New</strong>sletters<br />

How You Think Is Everything<br />

<strong>The</strong> Reciprocal Nature of Business Relationships<br />

Accelerate Your Professional Development<br />

<strong>The</strong> Competitive Nature of Grant Writing<br />

Assessing <strong>The</strong> Risks<br />

Page 368 of 372


Page 369 of 372


About <strong>The</strong> Author<br />

John C (Jack) Johnson III<br />

Founder & CEO – <strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />

________<br />

Jack was educated at Temple University, in Philadelphia, Pennsylvania and Rutgers<br />

Law School, in Camden, <strong>New</strong> Jersey. <strong>In</strong> 1999, he moved to Atlanta, Georgia to pursue<br />

greater opportunities to provide Advocacy and Preventive Programmatic services for atrisk/<br />

at-promise young persons, their families, and Justice Professionals embedded in the<br />

Juvenile Justice process in order to help facilitate its transcendence into the 21 st Century.<br />

<strong>The</strong>re, along with a small group of community and faith-based professionals, “<strong>The</strong> Advocacy Foundation, <strong>In</strong>c." was conceived<br />

and developed over roughly a thirteen year period, originally chartered as a Juvenile Delinquency Prevention and Educational<br />

Support Services organization consisting of Mentoring, Tutoring, Counseling, Character Development, Community Change<br />

Management, Practitioner Re-Education & Training, and a host of related components.<br />

<strong>The</strong> Foundation’s Overarching Mission is “To help <strong>In</strong>dividuals, Organizations, & Communities Achieve <strong>The</strong>ir Full Potential”, by<br />

implementing a wide array of evidence-based proactive multi-disciplinary "Restorative & Transformative Justice" programs &<br />

projects currently throughout the northeast, southeast, and western international-waters regions, providing prevention and support<br />

services to at-risk/ at-promise youth, to young adults, to their families, and to Social Service, Justice and Mental<br />

Health professionals” in each jurisdiction served. <strong>The</strong> Foundation has since relocated its headquarters to Philadelphia,<br />

Pennsylvania, and been expanded to include a three-tier mission.<br />

<strong>In</strong> addition to his work with the Foundation, Jack also served as an Adjunct Professor of Law & Business at National-Louis<br />

University of Atlanta (where he taught Political Science, Business & Legal Ethics, Labor & Employment Relations, and Critical<br />

Thinking courses to undergraduate and graduate level students). Jack has also served as Board President for a host of wellestablished<br />

and up & coming nonprofit organizations throughout the region, including “Visions Unlimited Community<br />

Development Systems, <strong>In</strong>c.”, a multi-million dollar, award-winning, Violence Prevention and Gang <strong>In</strong>tervention Social Service<br />

organization in Atlanta, as well as Vice-Chair of the Georgia/ Metropolitan Atlanta Violence Prevention Partnership, a state-wide<br />

300 organizational member violence prevention group led by the Morehouse School of Medicine, Emory University and <strong>The</strong><br />

Original, Atlanta-Based, Martin Luther King Center.<br />

Attorney Johnson’s prior accomplishments include a wide-array of Professional Legal practice areas, including Private Firm,<br />

Corporate and Government postings, just about all of which yielded significant professional awards & accolades, the history and<br />

chronology of which are available for review online at Linked<strong>In</strong>.com. Throughout his career, Jack has served a wide variety of<br />

for-profit corporations, law firms, and nonprofit organizations as Board Chairman, Secretary, Associate, and General Counsel<br />

since 1990.<br />

www.<strong>The</strong>Advocacy.Foundation<br />

Clayton County Youth Services Partnership, <strong>In</strong>c. – Chair; Georgia Violence Prevention Partnership, <strong>In</strong>c – Vice Chair; Fayette<br />

County NAACP - Legal Redress Committee Chairman; Clayton County Fatherhood <strong>In</strong>itiative Partnership – Principal<br />

<strong>In</strong>vestigator; Morehouse School of Medicine School of Community Health Feasibility Study Steering Committee; Atlanta<br />

Violence Prevention Capacity Building Project Partner; Clayton County Minister’s Conference, President 2006-2007; Liberty <strong>In</strong><br />

Life Ministries, <strong>In</strong>c. Board Secretary; Young Adults Talk, <strong>In</strong>c. Board of Directors; ROYAL, <strong>In</strong>c Board of Directors; Temple<br />

University Alumni Association; Rutgers Law School Alumni Association; Sertoma <strong>In</strong>ternational; Our Common Welfare Board of<br />

Directors President 2003-2005; River’s Edge Elementary School PTA (Co-President); Summerhill Community Ministries<br />

(Winter Sports Athletic Director); Outstanding Young Men of America; Employee of the Year; Academic All-American -<br />

Basketball; Church Trustee; Church Diaconate Ministry (Walking Deacon); Pennsylvania Commission on <strong>Crime</strong> & Delinquency<br />

(Nominee).<br />

www.<strong>The</strong>AdvocacyFoundation.org<br />

Page 370 of 372


Page 371 of 372


Page 372 of 372

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!