Organized Crime In The New Millennium
Organized Crime In The New Millennium
Organized Crime In The New Millennium
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>The</strong> e-Advocate<br />
Monthly<br />
…a Compendium of Works on:<br />
<strong>Organized</strong> <strong>Crime</strong><br />
<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
Exodus 20<br />
Proverbs 28:5 | 1 Samuel 8:3 | 2 Samuel 11:2-17<br />
Matthew 2:16 | Mark 14:55-56 | Acts 6:13; 25:7<br />
“Helping <strong>In</strong>dividuals, Organizations & Communities<br />
Achieve <strong>The</strong>ir Full Potential”<br />
Special Edition| ALG – May 2022
Page 2 of 372
Walk by Faith; Serve with Abandon<br />
Expect to Win!<br />
Page 3 of 372
Page 4 of 372
<strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />
Helping <strong>In</strong>dividuals, Organizations & Communities<br />
Achieve <strong>The</strong>ir Full Potential<br />
Since its founding in 2003, <strong>The</strong> Advocacy Foundation has become recognized as an effective<br />
provider of support to those who receive our services, having real impact within the communities<br />
we serve. We are currently engaged in community and faith-based collaborative initiatives,<br />
having the overall objective of eradicating all forms of youth violence and correcting injustices<br />
everywhere. <strong>In</strong> carrying-out these initiatives, we have adopted the evidence-based strategic<br />
framework developed and implemented by the Office of Juvenile Justice & Delinquency<br />
Prevention (OJJDP).<br />
<strong>The</strong> stated objectives are:<br />
1. Community Mobilization;<br />
2. Social <strong>In</strong>tervention;<br />
3. Provision of Opportunities;<br />
4. Organizational Change and Development;<br />
5. Suppression [of illegal activities].<br />
Moreover, it is our most fundamental belief that in order to be effective, prevention and<br />
intervention strategies must be Community Specific, Culturally Relevant, Evidence-Based, and<br />
Collaborative. <strong>The</strong> Violence Prevention and <strong>In</strong>tervention programming we employ in<br />
implementing this community-enhancing framework include the programs further described<br />
throughout our publications, programs and special projects both domestically and<br />
internationally.<br />
www.<strong>The</strong>Advocacy.Foundation<br />
ISBN: ......... ../2017<br />
......... Printed in the USA<br />
Advocacy Foundation Publishers<br />
Philadelphia, PA<br />
(878) 222-0450 | Voice | Data | SMS<br />
Page 5 of 372
Page 6 of 372
Dedication<br />
______<br />
Every publication in our many series’ is dedicated to everyone, absolutely everyone, who by<br />
virtue of their calling and by Divine inspiration, direction and guidance, is on the battlefield dayafter-day<br />
striving to follow God’s will and purpose for their lives. And this is with particular affinity<br />
for those Spiritual warriors who are being transformed into excellence through daily academic,<br />
professional, familial, and other challenges.<br />
We pray that you will bear in mind:<br />
Matthew 19:26 (NLT)<br />
Jesus looked at them intently and said, “Humanly speaking, it is impossible.<br />
But with God everything is possible.” (Emphasis added)<br />
To all of us who daily look past our circumstances, and naysayers, to what the Lord says we will<br />
accomplish:<br />
Blessings!!<br />
- <strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />
Page 7 of 372
Page 8 of 372
<strong>The</strong> Transformative Justice Project<br />
Eradicating Juvenile Delinquency Requires a Multi-Disciplinary Approach<br />
<strong>The</strong> Juvenile Justice system is incredibly<br />
overloaded, and Solutions-Based programs are<br />
woefully underfunded. Our precious children,<br />
therefore, particularly young people of color, often<br />
get the “swift” version of justice whenever they<br />
come into contact with the law.<br />
Decisions to build prison facilities are often based<br />
on elementary school test results, and our country<br />
incarcerates more of its young than any other<br />
nation on earth. So we at <strong>The</strong> Foundation labor to<br />
pull our young people out of the “school to prison”<br />
pipeline, and we then coordinate the efforts of the<br />
legal, psychological, governmental and educational<br />
professionals needed to bring an end to<br />
delinquency.<br />
We also educate families, police, local businesses,<br />
elected officials, clergy, schools and other<br />
stakeholders about transforming whole communities, and we labor to change their<br />
thinking about the causes of delinquency with the goal of helping them embrace the<br />
idea of restoration for the young people in our care who demonstrate repentance for<br />
their mistakes.<br />
<strong>The</strong> way we accomplish all this is a follows:<br />
1. We vigorously advocate for charges reductions, wherever possible, in the<br />
adjudicatory (court) process, with the ultimate goal of expungement or pardon, in<br />
order to maximize the chances for our clients to graduate high school and<br />
progress into college, military service or the workforce without the stigma of a<br />
criminal record;<br />
2. We then endeavor to enroll each young person into an Evidence-Based, Data-<br />
Driven Transformative Justice program designed to facilitate their rehabilitation<br />
and subsequent reintegration back into the community;<br />
3. While those projects are operating, we conduct a wide variety of ComeUnity-<br />
ReEngineering seminars and workshops on topics ranging from Juvenile Justice<br />
to Parental Rights, to Domestic issues to Police friendly contacts, to Mental<br />
Health intervention, to CBO and FBO accountability and compliance;<br />
Page 9 of 372
4. Throughout the process, we encourage and maintain frequent personal contact<br />
between all parties;<br />
5 Throughout the process we conduct a continuum of events and fundraisers<br />
designed to facilitate collaboration among professionals and community<br />
stakeholders; and finally<br />
6. 1 We disseminate Monthly and Quarterly publications, like our e-Advocate series<br />
<strong>New</strong>sletter and our e-Advocate Monthly and Quarterly Electronic Compilations to<br />
all regular donors in order to facilitate a lifelong learning process on the everevolving<br />
developments in both the Adult and Juvenile Justice systems.<br />
And in addition to the help we provide for our young clients and their families, we also<br />
facilitate Community Engagement through the Transformative Justice process,<br />
thereby balancing the interests of local businesses, schools, clergy, social<br />
organizations, elected officials, law enforcement entities, and other interested<br />
stakeholders. Through these efforts, relationships are built, rebuilt and strengthened,<br />
local businesses and communities are enhanced & protected from victimization, young<br />
careers are developed, and our precious young people are kept out of the prison<br />
pipeline.<br />
Additionally, we develop Transformative “Void Resistance” (TVR) initiatives to elevate<br />
concerns of our successes resulting in economic hardship for those employed by the<br />
penal system.<br />
TVR is an innovative-comprehensive process that works in conjunction with our<br />
Transformative Justice initiatives to transition the original use and purpose of current<br />
systems into positive social impact operations, which systematically retrains current<br />
staff, renovates facilities, creates new employment opportunities, increases salaries and<br />
is data-proven to enhance employee’s mental wellbeing and overall quality of life – an<br />
exponential Transformative Social Impact benefit for ALL community stakeholders.<br />
This is a massive undertaking, and we need all the help and financial support you can<br />
give! We plan to help 75 young persons per quarter-year (aggregating to a total of 250<br />
per year) in each jurisdiction we serve) at an average cost of under $2,500 per client,<br />
per year. *<br />
Thank you in advance for your support!<br />
* FYI:<br />
1<br />
<strong>In</strong> addition to supporting our world-class programming and support services, all regular donors receive our Quarterly e-<strong>New</strong>sletter<br />
(<strong>The</strong> e-Advocate), as well as <strong>The</strong> e-Advocate Quarterly Magazine.<br />
Page 10 of 372
1. <strong>The</strong> national average cost to taxpayers for minimum-security youth incarceration,<br />
is around $43,000.00 per child, per year.<br />
2. <strong>The</strong> average annual cost to taxpayers for maximum-security youth incarceration<br />
is well over $148,000.00 per child, per year.<br />
- (US <strong>New</strong>s and World Report, December 9, 2014);<br />
3. <strong>In</strong> every jurisdiction in the nation, the Plea Bargaining rate is above 99%.<br />
<strong>The</strong> Judicial system engages in a tri-partite balancing task in every single one of these<br />
matters, seeking to balance Rehabilitative Justice with Community Protection and<br />
Judicial Economy, and, although the practitioners work very hard to achieve positive<br />
outcomes, the scales are nowhere near balanced where people of color are involved.<br />
We must reverse this trend, which is right now working very much against the best<br />
interests of our young.<br />
Our young people do not belong behind bars.<br />
- Jack Johnson<br />
Page 11 of 372
Page 12 of 372
<strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />
Helping <strong>In</strong>dividuals, Organizations & Communities<br />
Achieve <strong>The</strong>ir Full Potential<br />
…a compendium of works on<br />
<strong>Organized</strong> <strong>Crime</strong><br />
<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
“Turning the Improbable <strong>In</strong>to the Exceptional”<br />
Atlanta<br />
Philadelphia<br />
______<br />
John C Johnson III<br />
Founder & CEO<br />
(878) 222-0450<br />
Voice | Data | SMS<br />
www.<strong>The</strong>Advocacy.Foundation<br />
Page 13 of 372
Page 14 of 372
And God spoke all these words:<br />
Biblical Authority<br />
______<br />
Exodus 20:1-20 (NIV)<br />
<strong>The</strong> Ten Commandments<br />
2<br />
“I am the Lord your God, who brought you out of Egypt, out of the land of slavery.<br />
3<br />
“You shall have no other gods before me.<br />
4<br />
“You shall not make for yourself an image in the form of anything in heaven above or<br />
on the earth beneath or in the waters below. 5 You shall not bow down to them or<br />
worship them; for I, the Lord your God, am a jealous God, punishing the children for the<br />
sin of the parents to the third and fourth generation of those who hate me, 6 but showing<br />
love to a thousand generations of those who love me and keep my commandments.<br />
7<br />
“You shall not misuse the name of the Lord your God, for the Lord will not hold anyone<br />
guiltless who misuses his name.<br />
8<br />
“Remember the Sabbath day by keeping it holy. 9 Six days you shall labor and do all<br />
your work, 10 but the seventh day is a sabbath to the Lord your God. On it you shall not<br />
do any work, neither you, nor your son or daughter, nor your male or female servant,<br />
nor your animals, nor any foreigner residing in your towns. 11 For in six days<br />
the Lord made the heavens and the earth, the sea, and all that is in them, but he<br />
rested on the seventh day. <strong>The</strong>refore the Lord blessed the Sabbath day and made it<br />
holy.<br />
12<br />
“Honor your father and your mother, so that you may live long in the<br />
land the Lord your God is giving you.<br />
13<br />
“You shall not murder.<br />
14<br />
“You shall not commit adultery.<br />
15<br />
“You shall not steal.<br />
16<br />
“You shall not give false testimony against your neighbor.<br />
17<br />
“You shall not covet your neighbor’s house. You shall not covet your neighbor’s wife,<br />
or his male or female servant, his ox or donkey, or anything that belongs to your<br />
neighbor.”<br />
Page 15 of 372
18<br />
When the people saw the thunder and lightning and heard the trumpet and saw the<br />
mountain in smoke, they trembled with fear. <strong>The</strong>y stayed at a distance 19 and said to<br />
Moses, “Speak to us yourself and we will listen. But do not have God speak to us or we<br />
will die.”<br />
20<br />
Moses said to the people, “Do not be afraid. God has come to test you, so that the<br />
fear of God will be with you to keep you from sinning.”<br />
Proverbs 28:5<br />
5<br />
Evildoers do not understand what is right,<br />
but those who seek the Lord understand it fully.<br />
1 Samuel 8:3<br />
3<br />
But his sons did not follow his ways. <strong>The</strong>y turned aside after dishonest gain and<br />
accepted bribes and perverted justice.<br />
2 Samuel 11:2-17<br />
2<br />
One evening David got up from his bed and walked around on the roofof the palace.<br />
From the roof he saw a woman bathing. <strong>The</strong> woman was very beautiful, 3 and David<br />
sent someone to find out about her. <strong>The</strong> man said, “She is Bathsheba, the daughter of<br />
Eliam and the wife of Uriah the Hittite.” 4 <strong>The</strong>n David sent messengers to get her. She<br />
came to him, and he slept with her. (Now she was purifying herself from her monthly<br />
uncleanness.) <strong>The</strong>n she went back home. 5 <strong>The</strong> woman conceived and sent word to<br />
David, saying, “I am pregnant.”<br />
6<br />
So David sent this word to Joab: “Send me Uriah the Hittite.” And Joab sent him to<br />
David. 7 When Uriah came to him, David asked him how Joab was, how the soldiers<br />
were and how the war was going. 8 <strong>The</strong>n David said to Uriah, “Go down to your house<br />
and wash your feet.” So Uriah left the palace, and a gift from the king was sent after<br />
him. 9 But Uriah slept at the entrance to the palace with all his master’s servants and did<br />
not go down to his house.<br />
10<br />
David was told, “Uriah did not go home.” So he asked Uriah, “Haven’t you just come<br />
from a military campaign? Why didn’t you go home?”<br />
11<br />
Uriah said to David, “<strong>The</strong> ark and Israel and Judah are staying in tents, [a] and my<br />
commander Joab and my lord’s men are camped in the open country. How could I go to<br />
my house to eat and drink and make love to my wife? As surely as you live, I will not do<br />
such a thing!”<br />
12<br />
<strong>The</strong>n David said to him, “Stay here one more day, and tomorrow I will send you back.”<br />
So Uriah remained in Jerusalem that day and the next. 13 At David’s invitation, he ate<br />
Page 16 of 372
and drank with him, and David made him drunk. But in the evening Uriah went out to<br />
sleep on his mat among his master’s servants; he did not go home.<br />
14<br />
<strong>In</strong> the morning David wrote a letter to Joab and sent it with Uriah. 15 <strong>In</strong> it he wrote, “Put<br />
Uriah out in front where the fighting is fiercest. <strong>The</strong>n withdraw from him so he will be<br />
struck down and die.”<br />
16<br />
So while Joab had the city under siege, he put Uriah at a place where he knew the<br />
strongest defenders were. 17 When the men of the city came out and fought against<br />
Joab, some of the men in David’s army fell; moreover, Uriah the Hittite died.<br />
Matthew 2:16<br />
16<br />
When Herod realized that he had been outwitted by the Magi, he was furious, and he<br />
gave orders to kill all the boys in Bethlehem and its vicinity who were two years old and<br />
under, in accordance with the time he had learned from the Magi.<br />
Mark 14:55-56<br />
55<br />
<strong>The</strong> chief priests and the whole Sanhedrin were looking for evidence against Jesus so<br />
that they could put him to death, but they did not find any. 56 Many testified falsely<br />
against him, but their statements did not agree.<br />
Acts 6:13<br />
13<br />
<strong>The</strong>y produced false witnesses, who testified, “This fellow never stops speaking<br />
against this holy place and against the law.<br />
Acts 25:7<br />
7<br />
When Paul came in, the Jews who had come down from Jerusalem stood around him.<br />
<strong>The</strong>y brought many serious charges against him, but they could not prove them.<br />
Page 17 of 372
Page 18 of 372
Table of Contents<br />
…a compilation of works on<br />
<strong>Organized</strong> <strong>Crime</strong><br />
<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
Biblical Authority<br />
I. <strong>In</strong>troduction: <strong>Organized</strong> <strong>Crime</strong> and White Collar <strong>Crime</strong>……………….. 21<br />
II. Arms Trafficking………………………………………………………….... 57<br />
III. Bribery………………………………………………………………………. 63<br />
IV. Cybercrime…………………………………………………………………. 73<br />
V. Drug Trafficking……………………………………………………………. 85<br />
VI. Embezzlement……………………………………………………………. 105<br />
VII. Extortion…………………………………………………………………… 111<br />
VIII. Fencing Stolen Goods…………………………………………………… 115<br />
IX. Fraud………………………………………………………………………. 123<br />
X. Identity <strong>The</strong>ft……………………………………………………………… 133<br />
XI. Kidnapping…………….………………………………………………….. 155<br />
XII. Loan Sharking………………………………………………………......... 161<br />
XIII. Money Laundering……………………………………………………….. 169<br />
XIV. Murder……………………………………………………………………… 201<br />
XV. Prostitution………………………………………………………………… 219<br />
XVI. Racketeering……………………………………………………………… 245<br />
XVII. Terrorism………………………………………………………………….. 249<br />
XVIII. <strong>The</strong>ft……………………………………………………………………….. 275<br />
XIX. Witness Tampering and <strong>In</strong>timidation......………………………….…… 293<br />
XX. Transnational <strong>Crime</strong>……………………………………………………… 299<br />
XXI. Criminal Enterprises, Gangs and Syndicates…………………………. 303<br />
XXII. References……………………………………………………................. 337<br />
________<br />
Attachments<br />
A. Biblical Atonement and Modern Criminal Law<br />
B. <strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for Law Enforcement<br />
C. Transnational <strong>Organized</strong> <strong>Crime</strong> – <strong>The</strong> Globalized Illegal Economy<br />
Copyright © 2003 – 2019 <strong>The</strong> Advocacy Foundation, <strong>In</strong>c. All Rights Reserved.<br />
Page 19 of 372
This work is not meant to be a piece of original academic<br />
analysis, but rather draws very heavily on the work of<br />
scholars in a diverse range of fields. All material drawn upon<br />
is referenced appropriately.<br />
Page 20 of 372
I. <strong>In</strong>troduction<br />
<strong>Organized</strong> <strong>Crime</strong><br />
<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
<strong>Organized</strong> <strong>Crime</strong> is a category of transnational, national, or local groupings of highly<br />
centralized enterprises run by criminals who intend to engage in illegal activity, most<br />
commonly for profit. Some criminal organizations, such as terrorist groups, are politically<br />
motivated. Sometimes criminal organizations force people to do business with them,<br />
such as when a gang extorts money from shopkeepers for "protection". Gangs may<br />
become disciplined enough to be considered organized. A criminal organization or<br />
gang can also be referred to as a mafia, mob, or crime syndicate; the network,<br />
subculture and community of criminals may be referred to as the underworld.<br />
European sociologists (e.g. Diego Gambetta) define the mafia as a type of organized<br />
crime group that specializes in the supply of extra-legal protection and quasi law<br />
enforcement. Gambetta's classic work on the Sicilian Mafia generates an economic<br />
study of the mafia, which exerts great influence on studies of the Russian Mafia, the<br />
Chinese Mafia, Hong Kong Triads and the Japanese Yakuza.<br />
Page 21 of 372
Other organizations—including states, churches, militaries, police forces, and<br />
corporations—may sometimes use organized-crime methods to conduct their activities,<br />
but their powers derive from their status as formal social institutions. <strong>The</strong>re is a<br />
tendency to distinguish organized crime from other forms of crime, such as white-collar<br />
crime, financial crimes, political crimes, war crime, state crimes, and treason.<br />
This distinction is not always apparent and academics continue to debate the matter.<br />
For example, in failed states that can no longer perform basic functions such as<br />
education, security, or governance (usually due to fractious violence or to extreme<br />
poverty), organized crime, governance and war sometimes complement each other.<br />
<strong>The</strong> term "Oligarchy" has been used to describe democratic countries whose political,<br />
social and economic institutions come under the control of a few families and business<br />
oligarchs.<br />
<strong>In</strong> the United States, the <strong>Organized</strong> <strong>Crime</strong> Control Act (1970) defines organized crime<br />
as "[t]he unlawful activities of [...] a highly organized, disciplined association<br />
[...]".Criminal activity as a structured process is referred to as racketeering. <strong>In</strong> the UK,<br />
police estimate that organized crime involves up to 38,000 people operating in 6,000<br />
various groups.<br />
Due to the escalating violence of Mexico's drug war, a report issued by the United<br />
States Department of Justice characterizes the Mexican drug cartels as the "greatest<br />
organized crime threat to the United States".<br />
Organizational<br />
Patron-Client Networks<br />
Models<br />
Patron-client networks are defined by fluid interactions. <strong>The</strong>y produce crime groups that<br />
operate as smaller units within the overall network, and as such tend towards valuing<br />
significant others, familiarity of social and economic environments, or tradition. <strong>The</strong>se<br />
networks are usually composed of:<br />
<br />
<br />
<br />
<br />
<br />
<br />
Hierarchies based on 'naturally' forming family, social and cultural traditions;<br />
'Tight-knit' focus of activity/labor;<br />
Fraternal or nepotistic value systems;<br />
Personalized activity; including family rivalries, territorial disputes, recruitment<br />
and training of family members, etc.;<br />
Entrenched belief systems, reliance of tradition (including religion, family values,<br />
cultural expectations, class politics, gender roles, etc.); and,<br />
Communication and rule enforcement mechanisms dependent on organizational<br />
structure, social etiquette, history of criminal involvement, and collective decisionmaking.<br />
Page 22 of 372
Bureaucratic/ Corporate Operations<br />
Bureaucratic/corporate organized crime groups are defined by the general rigidity of<br />
their internal structures. <strong>The</strong>y focus more on how the operations works, succeeds,<br />
sustains itself or avoids retribution, they are generally typified by:<br />
<br />
<br />
<br />
<br />
<br />
<br />
A complex authority structure;<br />
An extensive division of labor between classes within the organization;<br />
Meritocratic (as opposed to cultural or social attributes);<br />
Responsibilities carried out in an impersonal manner;<br />
Extensive written rules/regulations (as opposed to cultural praxis dictating<br />
action); and,<br />
'Top-down' communication and rule enforcement mechanisms.<br />
However, this model of operation has some flaws:<br />
<br />
<br />
<br />
<strong>The</strong> 'top-down' communication strategy is susceptible to interception, more so<br />
further down the hierarchy being communicated to;<br />
Maintaining written records jeopardizes the security of the organization and relies<br />
on increased security measures;<br />
<strong>In</strong>filtration at lower levels in the hierarchy can jeopardize the entire organization<br />
(a 'house of cards' effect); and,<br />
Page 23 of 372
Death, injury, incarceration or internal power struggles dramatically heighten the<br />
insecurity of operations.<br />
While bureaucratic operations emphasize business processes and strongly authoritarian<br />
hierarchies, these are based on enforcing power relationships rather than an overlying<br />
aim of protectionism, sustainability or growth.<br />
Youth and Street Gangs<br />
An estimate on youth street gangs nationwide provided by Hannigan, et al., marked an<br />
increase of 35% between 2002 and 2010. A distinctive gang culture underpins many,<br />
but not all, organized groups; this may develop through recruiting strategies, social<br />
learning processes in the corrective system experienced by youth, family or peer<br />
involvement in crime, and the coercive actions of criminal authority figures. <strong>The</strong> term<br />
“street gang” is commonly used interchangeably with “youth gang,” referring to<br />
neighborhood or street-based youth groups that meet “gang” criteria. Miller (1992)<br />
defines a street gang as “a self-formed association of peers, united by mutual interests,<br />
with identifiable leadership and internal organization, who act collectively or as<br />
individuals to achieve specific purposes, including the conduct of illegal activity and<br />
control of a particular territory, facility, or enterprise." Some reasons youth join gangs<br />
include to feel accepted, attain status, and increase their self-esteem. A sense of unity<br />
brings together many of the youth gangs that lack the family aspect at home.<br />
"Zones of transition" are deteriorating neighborhoods with shifting populations. <strong>In</strong> such<br />
areas, conflict between groups, fighting, "turf wars", and theft promote solidarity and<br />
cohesion. Cohen (1955): working class teenagers joined gangs due to frustration of<br />
inability to achieve status and goals of the middle class; Cloward and Ohlin (1960):<br />
blocked opportunity, but unequal distribution of opportunities lead to creating different<br />
types of gangs (that is, some focused on robbery and property theft, some on fighting<br />
and conflict and some were retreatists focusing on drug taking); Spergel (1966) was one<br />
of the first criminologists to focus on evidence-based practice rather than intuition into<br />
gang life and culture. Participation in gang-related events during adolescence<br />
perpetuate a pattern of maltreatment on their own children years later. Klein (1971) like<br />
Spergel studied the effects on members of social workers’ interventions. More<br />
interventions actually lead to greater gang participation and solidarity and bonds<br />
between members. Downes and Rock (1988) on Parker’s analysis: strain theory<br />
applies, labeling theory (from experience with police and courts), control theory<br />
(involvement in trouble from early childhood and the eventual decision that the costs<br />
outweigh the benefits) and conflict theories. No ethnic group is more disposed to gang<br />
involvement than another, rather it is the status of being marginalized, alienated or<br />
rejected that makes some groups more vulnerable to gang formation, and this would<br />
also be accounted for in the effect of social exclusion, especially in terms of recruitment<br />
and retention. <strong>The</strong>se may also be defined by age (typically youth) or peer group<br />
influences, and the permanence or consistency of their criminal activity. <strong>The</strong>se groups<br />
also form their own symbolic identity or public representation which are recognizable by<br />
the community at large (include colors, symbols, patches, flags and tattoos).<br />
Page 24 of 372
Research has focused on whether the gangs have formal structures, clear hierarchies<br />
and leadership in comparison with adult groups, and whether they are rational in pursuit<br />
of their goals, though positions on structures, hierarchies and defined roles are<br />
conflicting. Some studied street gangs involved in drug dealing - finding that their<br />
structure and behavior had a degree of organizational rationality. Members saw<br />
themselves as organized criminals; gangs were formal-rational organizations, Strong<br />
organizational structures, well defined roles and rules that guided members’ behavior.<br />
Also a specified and regular means of income (i.e., drugs). Padilla (1992) agreed with<br />
the two above. However some have found these to be loose rather than well-defined<br />
and lacking persistent focus, there was relatively low cohesion, few shared goals and<br />
little organizational structure. Shared norms, value and loyalties were low, structures<br />
"chaotic", little role differentiation or clear distribution of labor. Similarly, the use of<br />
violence does not conform to the principles behind protection rackets, political<br />
intimidation and drug trafficking activities employed by those adult groups. <strong>In</strong> many<br />
cases gang members graduate from youth gangs to highly developed OC groups, with<br />
some already in contact with such syndicates and through this we see a greater<br />
propensity for imitation. Gangs and traditional criminal organizations cannot be<br />
universally linked (Decker, 1998), however there are clear benefits to both the adult and<br />
youth organization through their association. <strong>In</strong> terms of structure, no single crime group<br />
is archetypal, though in most cases there are well-defined patterns of vertical integration<br />
(where criminal groups attempt to control the supply and demand), as is the case in<br />
arms, sex and drug trafficking.<br />
Entrepreneurial<br />
<strong>In</strong>dividual Difference<br />
<strong>The</strong> entrepreneurial model looks at either the individual criminal or a smaller group of<br />
organized criminals, that capitalize off the more fluid 'group-association' of<br />
contemporary organized crime. This model conforms to social learning theory or<br />
differential association in that there are clear associations and interaction between<br />
criminals where knowledge may be shared, or values enforced, however, it is argued<br />
that rational choice is not represented in this. <strong>The</strong> choice to commit a certain act, or<br />
associate with other organized crime groups, may be seen as much more of an<br />
entrepreneurial decision - contributing to the continuation of a criminal enterprise, by<br />
maximizing those aspects that protect or support their own individual gain. <strong>In</strong> this<br />
context, the role of risk is also easily understandable, however it is debatable whether<br />
the underlying motivation should be seen as true entrepreneurship or entrepreneurship<br />
as a product of some social disadvantage.<br />
<strong>The</strong> criminal organization, much in the same way as one would assess pleasure and<br />
pain, weighs such factors as legal, social and economic risk to determine potential profit<br />
and loss from certain criminal activities. This decision-making process rises from the<br />
entrepreneurial efforts of the group's members, their motivations and the environments<br />
in which they work. Opportunism is also a key factor – the organized criminal or criminal<br />
Page 25 of 372
group is likely to frequently reorder the criminal associations they maintain, the types of<br />
crimes they perpetrate, and how they function in the public arena (recruitment,<br />
reputation, etc.) in order to ensure efficiency, capitalization and protection of their<br />
interests.<br />
Multi-Model Approach<br />
Culture and ethnicity provide an environment where trust and communication between<br />
criminals can be efficient and secure. This may ultimately lead to a competitive<br />
advantage for some groups; however, it is inaccurate to adopt this as the only<br />
determinant of classification in organized crime. This categorization includes the Sicilian<br />
Mafia, ’Ndrangheta, ethnic Chinese criminal groups, Japanese Yakuza (or Boryokudan),<br />
Colombian drug trafficking groups, Nigerian organized crime groups, Corsican mafia,<br />
Korean criminal groups and Jamaican posses. From this perspective, organized crime<br />
is not a modern phenomenon - the construction of 17th and 18th century crime gangs<br />
fulfill all the present day criteria of criminal organizations (in opposition to the Alien<br />
Conspiracy <strong>The</strong>ory). <strong>The</strong>se roamed the rural borderlands of central Europe embarking<br />
on many of the same illegal activities associated with today’s crime organizations, with<br />
the exception of money laundering. When the French revolution created strong nation<br />
states, the criminal gangs moved to other poorly controlled regions like the Balkans and<br />
Southern Italy, where the seeds were sown for the Sicilian Mafia - the lynchpin of<br />
organized crime in the <strong>New</strong> World.<br />
Model Type Environment Group Processes Impacts<br />
National<br />
Transnational<br />
Transnational/Transactional<br />
Entrepreneurial/Transactional<br />
Historical or<br />
cultural basis<br />
Politically and<br />
economically<br />
unstable<br />
Any<br />
Developed/high<br />
technology<br />
regions<br />
Family or<br />
hierarchy<br />
Vertical<br />
integration<br />
Flexible.<br />
Small<br />
size.<br />
<strong>In</strong>dividuals<br />
or pairs.<br />
Secrecy/bonds.<br />
Links to<br />
insurgents<br />
Legitimate<br />
cover<br />
Violent.<br />
Opportunistic.<br />
Risk taking<br />
Operating<br />
through<br />
legitimate<br />
enterprise<br />
Local<br />
corruption/influence.<br />
Fearful community.<br />
Stable supply of illicit<br />
goods. High-level<br />
corruption.<br />
Unstable supply of<br />
range of illicit goods.<br />
Exploits young local<br />
offenders.<br />
Provision of illicit<br />
services, e.g.,<br />
money laundering,<br />
fraud, criminal<br />
networks.<br />
Typical Activities<br />
<strong>Organized</strong> crime groups provide a range of illegal services and goods. <strong>Organized</strong> crime<br />
often victimizes businesses through the use of extortion or theft and fraud activities like<br />
hijacking cargo trucks, robbing goods, committing bankruptcy fraud (also known as<br />
"bust-out"), insurance fraud or stock fraud (inside trading). <strong>Organized</strong> crime groups also<br />
victimize individuals by car theft (either for dismantling at "chop shops" or for export), art<br />
Page 26 of 372
theft, bank robbery, burglary, jewelry and gems theft and heists, shoplifting, computer<br />
hacking, credit card fraud, economic espionage, embezzlement, identity theft, and<br />
securities fraud ("pump and dump" scam). Some organized crime groups defraud<br />
national, state, or local governments by bid rigging public projects, counterfeiting<br />
money, smuggling or manufacturing untaxed alcohol (bootlegging) or cigarettes<br />
(buttlegging), and providing immigrant workers to avoid taxes.<br />
<strong>Organized</strong> crime groups seek out corrupt public officials in executive, law enforcement,<br />
and judicial roles so that their activities can avoid, or at least receive early warnings<br />
about, investigation and prosecution.<br />
Activities of organized crime include loansharking of money at very high interest rates,<br />
assassination, blackmailing, bombings, bookmaking and illegal gambling, confidence<br />
tricks, copyright infringement, counterfeiting of intellectual property, fencing, kidnapping,<br />
prostitution, smuggling, drug trafficking, arms trafficking, oil smuggling, antiquities<br />
smuggling, organ trafficking, contract killing, identity document forgery, money<br />
laundering, bribery, seduction, electoral fraud, insurance fraud, point shaving, price<br />
fixing, illegal taxicab operation, illegal dumping of toxic waste, illegal trading of nuclear<br />
materials, military equipment smuggling, nuclear weapons smuggling, passport fraud,<br />
providing illegal immigration and cheap labor, people smuggling, trading in endangered<br />
species, and trafficking in human beings. <strong>Organized</strong> crime groups also do a range of<br />
Page 27 of 372
usiness and labor racketeering activities, such as skimming casinos, insider trading,<br />
setting up monopolies in industries such as garbage collecting, construction and cement<br />
pouring, bid rigging, getting "no-show" and "no-work" jobs, political corruption and<br />
bullying.<br />
Assault<br />
Violence<br />
<strong>The</strong> commission of violent crime may form part of a criminal organization's 'tools' used<br />
to achieve criminogenic goals (for example, its threatening, authoritative, coercive,<br />
terror-inducing, or rebellious role), due to psychosocial factors (cultural conflict,<br />
aggression, rebellion against authority, access to illicit substances, counter-cultural<br />
dynamic), or may, in and of itself, be crime rationally chosen by individual criminals and<br />
the groups they form. Assaults are used for coercive measures, to "rough up" debtors,<br />
competition or recruits, in the commission of robberies, in connection to other property<br />
offenses, and as an expression of counter-cultural authority; violence is normalized<br />
within criminal organizations (in direct opposition to mainstream society) and the<br />
locations they control.<br />
Whilst the intensity of violence is dependent on the types of crime the organization is<br />
involved in (as well as their organizational structure or cultural tradition) aggressive acts<br />
range on a spectrum from low-grade physical assaults to murder. Bodily harm and<br />
grievous bodily harm, within the context of organized crime, must be understood as<br />
indicators of intense social and cultural conflict, motivations contrary to the security of<br />
the public, and other psychosocial factors.<br />
Murder<br />
Murder has evolved from the honor and vengeance killings of the Yakuza or Sicilian<br />
mafia which placed large physical and symbolic importance on the act of murder, its<br />
purposes and consequences, to a much less discriminate form of expressing power,<br />
enforcing criminal authority, achieving retribution or eliminating competition. <strong>The</strong> role of<br />
the hit man has been generally consistent throughout the history of organized crime,<br />
whether that be due to the efficiency or expediency of hiring a professional assassin or<br />
the need to distance oneself from the commission of murderous acts (making it harder<br />
to prove liability). This may include the assassination of notable figures (public, private<br />
or criminal), once again dependent on authority, retribution or competition. Revenge<br />
killings, armed robberies, violent disputes over controlled territories and offenses<br />
against members of the public must also be considered when looking at the dynamic<br />
between different criminal organizations and their (at times) conflicting needs.<br />
Terrorism<br />
<strong>In</strong> addition to what is considered traditional organized crime involving direct crimes of<br />
fraud swindles, scams, racketeering and other Racketeer <strong>In</strong>fluenced and Corrupt<br />
Organizations Act (RICO) predicate acts motivated for the accumulation of monetary<br />
Page 28 of 372
gain, there is also non-traditional organized crime which is engaged in for political or<br />
ideological gain or acceptance. Such crime groups are often labelled terrorist groups.<br />
<strong>The</strong>re is no universally agreed, legally binding, criminal law definition of terrorism.<br />
Common definitions of terrorism refer only to those violent acts which are intended to<br />
create fear (terror), are perpetrated for a religious, political or ideological goal,<br />
deliberately target or disregard the safety of non-combatants (e.g., neutral military<br />
personnel or civilians), and are committed by non-government agencies. Some<br />
definitions also include acts of unlawful violence and war, especially crimes against<br />
humanity (see the Nuremberg Trials), Allied authorities deeming the German Nazi<br />
Party, its paramilitary and police organizations, and numerous associations subsidiary<br />
to the Nazi Party "criminal organizations". <strong>The</strong> use of similar tactics by criminal<br />
organizations for protection rackets or to enforce a code of silence is usually not labeled<br />
terrorism though these same actions may be labeled terrorism when done by a<br />
politically motivated group.<br />
Notable groups include Al-Qaeda, Animal Liberation Front, Army of God, Black<br />
Liberation Army, <strong>The</strong> Covenant, <strong>The</strong> Sword, and the Arm of the Lord, Earth Liberation<br />
Front, Irish Republican Army, Kurdistan Workers' Party, Lashkar e Toiba, May 19th<br />
Communist Organization, <strong>The</strong> Order, Revolutionary Armed Forces of Colombia,<br />
Page 29 of 372
Symbionese Liberation Army, Taliban, United Freedom Front and Weather<br />
Underground.<br />
Other<br />
<br />
<br />
<br />
<br />
<br />
<br />
Arms trafficking<br />
Arson<br />
Coercion<br />
Extortion<br />
Protection racket<br />
Sexual assault<br />
Financial <strong>Crime</strong><br />
<strong>Organized</strong> crime groups generate large amounts of money by activities such as drug<br />
trafficking, arms smuggling and financial crime. This is of little use to them unless they<br />
can disguise it and convert it into funds that are available for investment into legitimate<br />
enterprise. <strong>The</strong> methods they use for converting its ‘dirty’ money into ‘clean’ assets<br />
encourages corruption. <strong>Organized</strong> crime groups need to hide the money’s illegal origin.<br />
It allows for the expansion of OC groups, as the ‘laundry’ or ‘wash cycle’ operates to<br />
cover the money trail and convert proceeds of crime into usable assets.<br />
Money laundering is bad for international and domestic trade, banking reputations and<br />
for effective governments and rule of law. Accurate figures for the amounts of criminal<br />
proceeds laundered are almost impossible to calculate, and the Financial Action Task<br />
Force on Money Laundering (FATF), an intergovernmental body set up to combat<br />
money laundering, has stated that "overall it is absolutely impossible to produce a<br />
reliable estimate of the amount of money laundered and therefore the FATF does not<br />
publish any figures in this regard". However, in the US estimated figures of money<br />
laundering have been put at between $200 – $600 billion per year throughout the 1990s<br />
(US Congress Office 1995; Robinson 1996), and in 2002 this was estimated between<br />
$500 billion to $1 trillion per year (UN 2002). This would make organized crime the third<br />
largest business in world after foreign exchange and oil (Robinson 1996). <strong>The</strong> rapid<br />
growth of money laundering is due to:<br />
<br />
<br />
<br />
the scale of organized crime precluding it from being a cash business - groups<br />
have little option but to convert its proceeds into legitimate funds and do so by<br />
investment, by developing legitimate businesses and purchasing property;<br />
globalization of communications and commerce - technology has made rapid<br />
transfer of funds across international borders much easier, with groups<br />
continuously changing techniques to avoid investigation; and,<br />
a lack of effective financial regulation in parts of the global economy.<br />
Page 30 of 372
Money laundering is a three-stage process:<br />
<br />
Placement: (also called immersion) groups ‘smurf’ small amounts at a time to<br />
avoid suspicion; physical disposal of money by moving crime funds into the<br />
legitimate financial system; may involve bank complicity, mixing licit and illicit<br />
funds, cash purchases and smuggling currency to safe havens.<br />
<br />
Layering: disguises the trail to foil pursuit. Also called ‘heavy soaping’. It involves<br />
creating false paper trails, converting cash into assets by cash purchases.<br />
<br />
<strong>In</strong>tegration: (also called ‘spin dry): Making it into clean taxable income by realestate<br />
transactions, sham loans, foreign bank complicity and false import and<br />
export transactions.<br />
Means of money laundering:<br />
<br />
<br />
<br />
Money transmitters, black money markets purchasing goods, gambling,<br />
increasing the complexity of the money trail.<br />
Underground banking (flying money), involves clandestine ‘bankers’ around the<br />
world.<br />
It often involves otherwise legitimate banks and professionals.<br />
Page 31 of 372
<strong>The</strong> policy aim in this area is to make the financial markets transparent, and minimize<br />
the circulation of criminal money and its cost upon legitimate markets.<br />
Counterfeiting<br />
<strong>In</strong> 2007, the OECD reported the scope of counterfeit products to include food,<br />
pharmaceuticals, pesticides, electrical components, tobacco and even household<br />
cleaning products in addition to the usual films, music, literature, games and other<br />
electrical appliances, software and fashion. A number of qualitative changes in the trade<br />
of counterfeit products:<br />
<br />
<br />
<br />
<br />
a large increase in fake goods which are dangerous to health and safety;<br />
most products repossessed by authorities are now household items rather than<br />
luxury goods;<br />
a growing number of technological products; and,<br />
production is now operated on an industrial scale.<br />
Tax evasion<br />
<strong>The</strong> economic effects of organized crime have been approached from a number of both<br />
theoretical and empirical positions, however the nature of such activity allows for<br />
misrepresentation. <strong>The</strong> level of taxation taken by a nation-state, rates of unemployment,<br />
mean household incomes and level of satisfaction with government and other economic<br />
factors all contribute to the likelihood of criminals to participate in tax evasion. As most<br />
organized crime is perpetrated in the liminal state between legitimate and illegitimate<br />
markets, these economic factors must adjusted to ensure the optimal amount of<br />
taxation without promoting the practice of tax evasion. As with any other crime,<br />
technological advancements have made the commission of tax evasion easier, faster<br />
and more globalized. <strong>The</strong> ability for organized criminals to operate fraudulent financial<br />
accounts, utilize illicit offshore bank accounts, access tax havens or tax shelters, and<br />
operating goods smuggling syndicates to evade importation taxes help ensure financial<br />
sustainability, security from law enforcement, general anonymity and the continuation of<br />
their operations.<br />
<strong>In</strong>ternet Fraud<br />
Cybercrime<br />
Identity theft is a form of fraud or cheating of another person's identity in which<br />
someone pretends to be someone else by assuming that person's identity, typically in<br />
order to access resources or obtain credit and other benefits in that person's name.<br />
Victims of identity theft (those whose identity has been assumed by the identity thief)<br />
can suffer adverse consequences if held accountable for the perpetrator's actions, as<br />
can organizations and individuals who are defrauded by the identity thief, and to that<br />
extent are also victims. <strong>In</strong>ternet fraud refers to the actual use of <strong>In</strong>ternet services to<br />
present fraudulent solicitations to prospective victims, to conduct fraudulent<br />
Page 32 of 372
transactions, or to transmit the proceeds of fraud to financial institutions or to others<br />
connected with the scheme. <strong>In</strong> the context of organized crime, both may serve as<br />
means through which other criminal activity may be successfully perpetrated or as the<br />
primary goal themselves. Email fraud, advance-fee fraud, romance scams, employment<br />
scams, and other phishing scams are the most common and most widely used forms of<br />
identity theft, though with the advent of social networking fake websites, accounts and<br />
other fraudulent or deceitful activity has become commonplace.<br />
Copyright <strong>In</strong>fringement<br />
Copyright infringement is the unauthorized or prohibited use of works under copyright,<br />
infringing the copyright holder's exclusive rights, such as the right to reproduce or<br />
perform the copyrighted work, or to make derivative works. Whilst almost universally<br />
considered under civil procedure, the impact and intent of organized criminal operations<br />
in this area of crime has been the subject of much debate. Article 61 of the Agreement<br />
on Trade-Related Aspects of <strong>In</strong>tellectual Property Rights (TRIPs) requires that signatory<br />
countries establish criminal procedures and penalties in cases of willful trademark<br />
counterfeiting or copyright piracy on a commercial scale.<br />
More recently copyright holders have demanded that states provide criminal sanctions<br />
for all types of copyright infringement. <strong>Organized</strong> criminal groups capitalize on<br />
consumer complicity, advancements in security and anonymity technology, emerging<br />
markets and new methods of product transmission, and the consistent nature of these<br />
provides a stable financial basis for other areas of organized crime.<br />
Page 33 of 372
Cyberwarfare<br />
Cyberwarfare refers to politically motivated hacking to conduct sabotage and<br />
espionage. It is a form of information warfare sometimes seen as analogous to<br />
conventional warfare although this analogy is controversial for both its accuracy and its<br />
political motivation. It has been defined as activities by a nation-state to penetrate<br />
another nation's computers or networks with the intention of causing civil damage or<br />
disruption. Moreover, it acts as the "fifth domain of warfare," and William J. Lynn, U.S.<br />
Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has<br />
formally recognized cyberspace as a new domain in warfare . . . [which] has become<br />
just as critical to military operations as land, sea, air, and space." Cyber espionage is<br />
the practice of obtaining confidential, sensitive, proprietary or classified information from<br />
individuals, competitors, groups, or governments using illegal exploitation methods on<br />
internet, networks, software and/or computers. <strong>The</strong>re is also a clear military, political, or<br />
economic motivation. Unsecured information may be intercepted and modified, making<br />
espionage possible internationally. <strong>The</strong> recently established Cyber Command is<br />
currently debating whether such activities as commercial espionage or theft of<br />
intellectual property are criminal activities or actual "breaches of national security."<br />
Furthermore, military activities that use computers and satellites for coordination are at<br />
risk of equipment disruption. Orders and communications can be intercepted or<br />
replaced. Power, water, fuel, communications, and transportation infrastructure all may<br />
be vulnerable to sabotage. According to Clarke, the civilian realm is also at risk, noting<br />
that the security breaches have already gone beyond stolen credit card numbers, and<br />
that potential targets can also include the electric power grid, trains, or the stock market.<br />
Computer Viruses<br />
<strong>The</strong> term "computer virus" may be used as an overarching phrase to include all types of<br />
true viruses, malware, including computer worms, Trojan horses, most rootkits,<br />
spyware, dishonest adware and other malicious and unwanted software (though all are<br />
technically unique), and proves to be quite financially lucrative for criminal<br />
organizations, offering greater opportunities for fraud and extortion whilst increasing<br />
security, secrecy and anonymity. Worms may be utilized by organized crime groups to<br />
exploit security vulnerabilities (duplicating itself automatically across other computers a<br />
given network), while a Trojan horse is a program that appears harmless but hides<br />
malicious functions (such as retrieval of stored confidential data, corruption of<br />
information, or interception of transmissions). Worms and Trojan horses, like viruses,<br />
may harm a computer system's data or performance. Applying the <strong>In</strong>ternet model of<br />
organized crime, the proliferation of computer viruses and other malicious software<br />
promotes a sense of detachment between the perpetrator (whether that be the criminal<br />
organization or another individual) and the victim; this may help to explain vast<br />
increases in cyber-crime such as these for the purpose of ideological crime or terrorism.<br />
<strong>In</strong> mid July 2010, security experts discovered a malicious software program that had<br />
infiltrated factory computers and had spread to plants around the world. It is considered<br />
Page 34 of 372
"the first attack on critical industrial infrastructure that sits at the foundation of modern<br />
economies," notes the <strong>New</strong> York Times.<br />
Corporate <strong>Crime</strong><br />
White-Collar <strong>Crime</strong> and Corruption<br />
Corporate crime refers to crimes committed either by a corporation (i.e., a business<br />
entity having a separate legal personality from the natural persons that manage its<br />
activities), or by individuals that may be identified with a corporation or other business<br />
entity (see vicarious liability and corporate liability). Note that some forms of corporate<br />
corruption may not actually be criminal if they are not specifically illegal under a given<br />
system of laws. For example, some jurisdictions allow insider trading.<br />
Labor Racketeering<br />
Labor racketeering has developed since the 1930s, affecting national and international<br />
construction, mining, energy production and transportation sectors immensely. Activity<br />
has focused on the importation of cheap or unfree labor, involvement with union and<br />
public officials (political corruption), and counterfeiting.<br />
Political Corruption<br />
Political corruption is the use of legislated powers by government officials for illegitimate<br />
private gain. Misuse of government power for other purposes, such as repression of<br />
political opponents and general police brutality, is not considered political corruption.<br />
Page 35 of 372
Neither are illegal acts by private persons or corporations not directly involved with the<br />
government. An illegal act by an officeholder constitutes political corruption only if the<br />
act is directly related to their official duties. Forms of corruption vary, but include bribery,<br />
extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption<br />
may facilitate criminal enterprise such as drug trafficking, money laundering, and human<br />
trafficking, it is not restricted to these activities. <strong>The</strong> activities that constitute illegal<br />
corruption differ depending on the country or jurisdiction. For instance, certain political<br />
funding practices that are legal in one place may be illegal in another. <strong>In</strong> some cases,<br />
government officials have broad or poorly defined powers, which make it difficult to<br />
distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to<br />
involve over 1 trillion US dollars annually. A state of unrestrained political corruption is<br />
known as a kleptocracy, literally meaning "rule by thieves".<br />
Drug Trafficking<br />
Mexican drug cartels and their areas of influence<br />
Heroin: Source countries / production: three major<br />
regions known as the Golden Triangle (Burma, Laos,<br />
Thailand), Golden Crescent (Afghanistan) and<br />
Central and South America. <strong>The</strong>re are suggestions<br />
that due to the continuing decline in opium production<br />
in South East Asia, traffickers may begin to look to<br />
Afghanistan as a source of heroin."<br />
Sex Trafficking<br />
Human Trafficking<br />
Human trafficking for the purpose of sexual exploitation is a major cause of<br />
contemporary sexual slavery and is primarily for prostituting women and children into<br />
sex industries. Sexual slavery encompasses most, if not all, forms of forced prostitution.<br />
<strong>The</strong> terms "forced prostitution" or "enforced prostitution" appear in international and<br />
humanitarian conventions but have been insufficiently understood and inconsistently<br />
applied. "Forced prostitution" generally refers to conditions of control over a person who<br />
is coerced by another to engage in sexual activity. Official numbers of individuals in<br />
sexual slavery worldwide vary.<br />
<strong>In</strong> 2001 <strong>In</strong>ternational Organization for Migration estimated 400,000, the Federal Bureau<br />
of <strong>In</strong>vestigation estimated 700,000 and UNICEF estimated 1.75 million. <strong>The</strong> most<br />
common destinations for victims of human trafficking are Thailand, Japan, Israel,<br />
Belgium, the Netherlands, Germany, Italy, Turkey and the United States, according to a<br />
report by UNODC.<br />
Page 36 of 372
Illegal Immigration and People Smuggling<br />
People smuggling is defined as "the facilitation, transportation, attempted<br />
transportation or illegal entry of a person or persons across an international border, in<br />
violation of one or more countries laws, either clandestinely or through deception, such<br />
as the use of fraudulent documents".<br />
<strong>The</strong> term is understood as and often used interchangeably with migrant smuggling,<br />
which is defined by the United Nations Convention Against Transnational <strong>Organized</strong><br />
<strong>Crime</strong> as "...the procurement, in order to obtain, directly or indirectly, a financial or other<br />
material benefit, of the illegal entry of a person into a state party of which the person is<br />
not a national".<br />
This practice has increased over the past few decades and today now accounts for a<br />
significant portion of illegal immigration in countries around the world.<br />
People smuggling generally takes place with the consent of the person or persons being<br />
smuggled, and common reasons for individuals seeking to be smuggled include<br />
employment and economic opportunity, personal and/or familial betterment, and escape<br />
from persecution or conflict.<br />
Page 37 of 372
Contemporary Slavery and Forced Labor<br />
<strong>The</strong> number of slaves today remains as high as 12 million to 27 million. This is probably<br />
the smallest proportion of slaves to the rest of the world's population in history. Most are<br />
debt slaves, largely in South Asia, who are under debt bondage incurred by lenders,<br />
sometimes even for generations. It is the fastest growing criminal industry and is<br />
predicted to eventually outgrow drug trafficking.<br />
Pre-Nineteenth Century<br />
Historical Origins<br />
Today, crime is sometimes thought of as an urban phenomenon, but for most of human<br />
history it was the rural interfaces that encountered the majority of crimes (bearing in<br />
mind the fact that for most of human history, rural areas were the vast majority of<br />
inhabited places). For the most part, within a village, members kept crime at very low<br />
rates; however, outsiders such as pirates, highwaymen, and bandits attacked trade<br />
routes and roads, at times severely disrupting commerce, raising costs, insurance rates<br />
and prices to the consumer. According to criminologist Paul Lunde, "Piracy and banditry<br />
were to the preindustrial world what organized crime is to modern society."<br />
If we take a global rather than strictly domestic view, it becomes evident even crime of<br />
the organized kind has a long if not necessarily noble heritage. <strong>The</strong> word 'thug' dates to<br />
early 13th-century <strong>In</strong>dia, when Thugs, or gangs of criminals, roamed from town to town,<br />
looting and pillaging. Smuggling and drug-trafficking rings are as old as the hills in Asia<br />
and Africa, and extant criminal organizations in Italy and Japan trace their histories back<br />
several centuries...<br />
As Lunde states, "Barbarian conquerors, whether Vandals, Goths, the Norse, Turks or<br />
Mongols are not normally thought of as organized crime groups, yet they share many<br />
features associated with thriving criminal organizations. <strong>The</strong>y were for the most part<br />
non-ideological, predominantly ethnically based, used violence and intimidation, and<br />
adhered to their own codes of law." Terrorism is linked to organized crime, but has<br />
political aims rather than solely financial ones, so there is overlap but separation<br />
between terrorism and organized crime.<br />
Nineteenth Century<br />
During the Victorian era, criminals and gangs started to form organizations which would<br />
be collectively become London's criminal underworld. Criminal societies in the<br />
underworld started to develop their own ranks and groups which were sometimes called<br />
families, and were often made up of lower-classes and operated on pick-pocketry,<br />
prostitution, forgery and counterfeiting, commercial burglary and even moneylaundering<br />
schemes. Unique also were the use of slangs and argots used by Victorian<br />
criminal societies to distinguish each other. One of the most infamous crime bosses in<br />
the Victorian underworld was Adam Worth, who was nicknamed "the Napoleon of the<br />
Page 38 of 372
criminal world" or "the Napoleon of <strong>Crime</strong>" and became the inspiration behind the<br />
popular character of Professor Moriarty.<br />
<strong>Organized</strong> crime in the United States first came to prominence in the Old West and<br />
historians such as Brian J. Robb and Erin H. Turner traced the first organized crime<br />
syndicates to the Coschise Cowboy Gang and the Wild Bunch. <strong>The</strong> Cochise Cowboys,<br />
though loosely organized, were unique for their criminal operations in the Mexican<br />
border, in which they would steal and sell cattle as well smuggled contraband goods in<br />
between the countries.<br />
Twentieth Century<br />
Donald Cressey’s Cosa Nostra model studied Mafia families exclusively and this limits<br />
his broader findings. Structures are formal and rational with allocated tasks, limits on<br />
entrance, and influence the rules established for organizational maintenance and<br />
sustainability. <strong>In</strong> this context there is a difference between organized and professional<br />
crime; there is well-defined hierarchy of roles for leaders and members, underlying rules<br />
and specific goals that determine their behavior, and these are formed as a social<br />
system, one that was rationally designed to maximize profits and to provide forbidden<br />
Page 39 of 372
goods. Albini saw organized criminal behavior as consisting of networks of patrons and<br />
clients, rather than rational hierarchies or secret societies.<br />
<strong>The</strong> networks are characterized by a loose system of power relations. Each participant<br />
is interested in furthering his own welfare. Criminal entrepreneurs are the patrons and<br />
they exchange information with their clients in order to obtain their support. Clients<br />
include members of gangs, local and national politicians, government officials and<br />
people engaged in legitimate business. People in the network may not directly be part of<br />
the core criminal organization. Furthering the approach of both Cressey and Albini, Ianni<br />
and Ianni studied Italian-American crime syndicates in <strong>New</strong> York and other cities.<br />
Kinship is seen as the basis of organized crime rather than the structures Cressey had<br />
identified; this includes fictive godparental and affinitive ties as well as those based on<br />
blood relations, and it is the impersonal actions, not the status or affiliations of their<br />
members, that define the group. Rules of conduct and behavioral aspects of power and<br />
networks and roles include the following:<br />
<br />
<br />
<br />
<br />
<br />
<br />
family operates as a social unit, with social and business functions merged;<br />
leadership positions down to middle management are kinship based;<br />
the higher the position, the closer the kinship relationship;<br />
group assigns leadership positions to a central group of family members,<br />
including fictive godparental relationship reinforcement;<br />
the leadership group are assigned to legal or illegal enterprises, but not both;<br />
and,<br />
transfer of money, from legal and illegal business, and back to illegal business is<br />
by individuals, not companies.<br />
Strong family ties are derived from the traditions of southern Italy, where family rather<br />
than the church or state is the basis of social order and morality.<br />
<strong>The</strong> "Disorganized <strong>Crime</strong>" and Choice <strong>The</strong>ses<br />
One of the most important trends to emerge in criminological thinking about OC in<br />
recent years is the suggestion that it is not, in a formal sense, "organized" at all.<br />
Evidence includes lack of centralized control, absence of formal lines of communication,<br />
fragmented organizational structure. It is distinctively disorganized. For example,<br />
Seattle's crime network in the 1970s and 80s consisted of groups of businessmen,<br />
politicians and of law enforcement officers. <strong>The</strong>y all had links to a national network via<br />
Meyer Lansky, who was powerful, but there was no evidence that Lansky or anyone<br />
else exercised centralized control over them.<br />
While some crime involved well-known criminal hierarchies in the city, criminal activity<br />
was not subject to central management by these hierarchies nor by other controlling<br />
groups, nor were activities limited to a finite number of objectives. <strong>The</strong> networks of<br />
criminals involved with the crimes did not exhibit organizational cohesion. Too much<br />
emphasis had been placed on the Mafia as controlling OC. <strong>The</strong> Mafia were certainly<br />
Page 40 of 372
powerful but they "were part of a heterogeneous underworld, a network characterized<br />
by complex webs of relationships." OC groups were violent and aimed at making money<br />
but because of the lack of structure and fragmentation of objectives, they were<br />
"disorganized".<br />
Further studies showed neither bureaucracy nor kinship groups are the primary<br />
structure of organized crime, rather they were in partnerships or a series of joint<br />
business ventures. Despite these conclusions, all researchers observed a degree of<br />
managerial activities among the groups they studied. All observed networks and a<br />
degree of persistence, and there may be utility in focusing on the identification of<br />
organizing roles of people and events rather than the group's structure. <strong>The</strong>re may be<br />
three main approaches to understand the organizations in terms of their roles as social<br />
systems:<br />
<br />
<br />
<br />
Organizations as Rational Systems: Highly formalized structures in terms of<br />
bureaucracy’s and hierarchy, with formal systems of rules regarding authority<br />
and highly specific goals;<br />
Organizations as Natural Systems: Participants may regard the organization<br />
as an end in itself, not merely a means to some other end. Promoting group<br />
values to maintain solidarity is high on the agenda. <strong>The</strong>y do not rely on profit<br />
maximization. <strong>The</strong>ir perversity and violence in respect of relationships is often<br />
remarkable, but they are characterized by their focus on the connections<br />
between their members, their associates and their victims; and,<br />
Organizations as Open Systems: High levels of interdependence between<br />
themselves and the environment in which they operate. <strong>The</strong>re is no one way in<br />
which they are organized or how they operate. <strong>The</strong>y are adaptable and change<br />
to meet the demands of their changing environments and circumstances.<br />
<strong>Organized</strong> crime groups may be a combination of all three.<br />
<strong>In</strong>ternational Governance Approach<br />
<strong>In</strong>ternational consensus on defining organized crime has become important since the<br />
1970s due its increased prevalence and impact. e.g., UN in 1976 and EU 1998. OC is<br />
Page 41 of 372
"...the large scale and complex criminal activity carried on by groups of persons,<br />
however loosely or tightly organized for the enrichment of those participating at the<br />
expense of the community and its members. It is frequently accomplished through<br />
ruthless disregard of any law, including offenses against the person and frequently in<br />
connection with political corruption." (UN) "A criminal organization shall mean a lasting,<br />
structured association of two or more persons, acting in concert with a view to<br />
committing crimes or other offenses which are punishable by deprivation of liberty or a<br />
detention order of a maximum of at least four years or a more serious penalty, whether<br />
such crimes or offenses are an end in themselves or a means of obtaining material<br />
benefits and, if necessary, of improperly influencing the operation of public authorities."<br />
(UE) Not all groups exhibit the same characteristics of structure. However, violence and<br />
corruption and the pursuit of multiple enterprises and continuity serve to form the<br />
essence of OC activity.<br />
<strong>The</strong>re are eleven characteristics from the European Commission and Europol pertinent<br />
to a working definition of organized crime. Six of those must be satisfied and the four in<br />
italics are mandatory. Summarized, they are:<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
more than two people;<br />
their own appointed tasks;<br />
activity over a prolonged or indefinite period of time;<br />
the use discipline or control;<br />
perpetration of serious criminal offenses;<br />
operations on an international or transnational level;<br />
the use violence or other intimidation;<br />
the use of commercial or businesslike structures;<br />
engagement in money laundering;<br />
exertion of influence on politics, media, public administration, judicial authorities<br />
or the economy; and,<br />
motivated by the pursuit of profit and/or power,<br />
- with the Convention against Transnational <strong>Organized</strong> <strong>Crime</strong> (the<br />
Palermo Convention) having a similar definition:<br />
<br />
<br />
<br />
organized criminal: structured group, three or more people, one or more serious<br />
crimes, in order to obtain financial or other material benefit;<br />
serious crime: offense punishable by at least four years in prison; and,<br />
structured group: Not randomly formed but doesn’t need formal structure,<br />
Others stress the importance of power, profit and perpetuity, defining organized criminal<br />
behavior as:<br />
<br />
<br />
<br />
<br />
nonideological: i.e., profit driven;<br />
hierarchical: few elites and many operatives;<br />
limited or exclusive membership: maintain secrecy and loyalty of members;<br />
perpetuating itself: Recruitment process and policy;<br />
Page 42 of 372
willing to use illegal violence and bribery;<br />
specialized division of labor: to achieve organization goal;<br />
monopolistic: Market control to maximize profits; and,<br />
has explicit rules and regulations: Codes of honor.<br />
Definitions need to bring together its legal and social elements. OC has widespread<br />
social, political and economic effects. It uses violence and corruption to achieve its<br />
ends: "OC when group primarily focused on illegal profits systematically commit crimes<br />
that adversely affect society and are capable of successfully shielding their activities, in<br />
particular by being willing to use physical violence or eliminate individuals by way of<br />
corruption."<br />
It is a mistake to use the term "OC" as though it denotes a clear and well-defined<br />
phenomenon. <strong>The</strong> evidence regarding OC "shows a less well-organized, very diversified<br />
landscape of organizing criminals…the economic activities of these organizing criminals<br />
can be better described from the viewpoint of 'crime enterprises' than from a<br />
conceptually unclear frameworks such as 'OC'." Many of the definitions emphasize the<br />
‘group nature’ of OC, the ‘organization’ of its members, its use of violence or corruption<br />
to achieve its goals, and its extra-jurisdictional character….OC may appear in many<br />
forms at different times and in different places. Due to the variety of definitions, there is<br />
“evident danger” in asking “what is OC?” and expecting a simple answer.<br />
<strong>The</strong> Locus of Power and <strong>Organized</strong> <strong>Crime</strong><br />
Some espouse that all organized crime operates at an international level, though there<br />
is currently no international court capable of trying offenses resulting from such activities<br />
Page 43 of 372
(the <strong>In</strong>ternational Criminal Court’s remit extends only to dealing with people accused of<br />
offenses against humanity, e.g., genocide). If a network operates primarily from one<br />
jurisdiction and carries out its illicit operations there and in some other jurisdictions it is<br />
‘international,' though it may be appropriate to use the term ‘transnational’ only to label<br />
the activities of a major crime group that is centered in no one jurisdiction but operating<br />
in many. <strong>The</strong> understanding of organized crime has therefore progressed to combined<br />
internationalization and an understanding of social conflict into one of power, control,<br />
efficiency risk and utility, all within the context of organizational theory. <strong>The</strong><br />
accumulation of social, economic and political power have sustained themselves as a<br />
core concerns of all criminal organizations:<br />
<br />
<br />
<br />
social: criminal groups seek to develop social control in relation to particular<br />
communities;<br />
economic: seek to exert influence by means of corruption and by coercion of<br />
legitimate and illegitimate praxis; and,<br />
political: criminal groups use corruption and violence to attain power and status.<br />
Contemporary organized crime may be very different from traditional Mafia style,<br />
particularly in terms of the distribution and centralization of power, authority structures<br />
and the concept of 'control' over one's territory and organization. <strong>The</strong>re is a tendency<br />
away from centralization of power and reliance upon family ties towards a fragmentation<br />
of structures and informality of relationships in crime groups. <strong>Organized</strong> crime most<br />
typically flourishes when a central government and civil society is disorganized, weak,<br />
absent or untrusted.<br />
This may occur in a society facing periods of political, economic or social turmoil or<br />
transition, such as a change of government or a period of rapid economic development,<br />
particularly if the society lacks strong and established institutions and the rule of law.<br />
<strong>The</strong> dissolution of the Soviet Union and the Revolutions of 1989 in Eastern Europe that<br />
saw the downfall of the Communist Bloc created a breeding ground for criminal<br />
organizations.<br />
<strong>The</strong> newest growth sectors for organized crime are identity theft and online extortion.<br />
<strong>The</strong>se activities are troubling because they discourage consumers from using the<br />
<strong>In</strong>ternet for e-commerce. E-commerce was supposed to level the playing ground<br />
between small and large businesses, but the growth of online organized crime is leading<br />
to the opposite effect; large businesses are able to afford more bandwidth (to resist<br />
denial-of-service attacks) and superior security. Furthermore, organized crime using the<br />
<strong>In</strong>ternet is much harder to trace down for the police (even though they increasingly<br />
deploy cybercops) since most police forces and law enforcement agencies operate<br />
within a local or national jurisdiction while the <strong>In</strong>ternet makes it easier for criminal<br />
organizations to operate across such boundaries without detection.<br />
<strong>In</strong> the past criminal organizations have naturally limited themselves by their need to<br />
expand, putting them in competition with each other. This competition, often leading to<br />
violence, uses valuable resources such as manpower (either killed or sent to prison),<br />
Page 44 of 372
equipment and finances. <strong>In</strong> the United States, James "Whitey" Bulger, the Irish Mob<br />
boss of the Winter Hill Gang in Boston turned informant for the Federal Bureau of<br />
<strong>In</strong>vestigation (FBI). He used this position to eliminate competition and consolidate<br />
power within the city of Boston which led to the imprisonment of several senior<br />
organized crime figures including Gennaro Angiulo, underboss of the Patriarca crime<br />
family. <strong>In</strong>fighting sometimes occurs within an organization, such as the Castellamarese<br />
war of 1930–31 and the Boston Irish Mob Wars of the 1960s and 1970s.<br />
Today criminal organizations are increasingly working together, realizing that it is better<br />
to work in cooperation rather than in competition with each other (once again,<br />
consolidating power). This has led to the rise of global criminal organizations such as<br />
Mara Salvatrucha, 18th Street gang, and Barrio Azteca. <strong>The</strong> American Mafia, in addition<br />
to having links with organized crime groups in Italy such as the Camorra, the<br />
'Ndrangheta, Sacra Corona Unita, and Sicilian Mafia, has at various times done<br />
business with the Irish Mob, Jewish-American organized crime, the Japanese Yakuza,<br />
<strong>In</strong>dian Mafia, the Russian Mafia, Thief in law, and Post-Soviet <strong>Organized</strong> crime groups,<br />
the Chinese Triads, Chinese Tongs, and Asian street gangs, Motorcycle Gangs, and<br />
numerous White, Black, and Hispanic prison and street gangs. <strong>The</strong> United Nations<br />
Office on Drugs and <strong>Crime</strong> estimated that organized crime groups held $322 billion in<br />
assets in 2005.<br />
This rise in cooperation between criminal organizations has meant that law enforcement<br />
agencies are increasingly having to work together. <strong>The</strong> FBI operates an organized<br />
crime section from its headquarters in Washington, D.C. and is known to work with<br />
other national (e.g., Polizia di Stato, Russian Federal Security Service (FSB), and the<br />
Royal Canadian Mounted Police), federal (e.g., Bureau of Alcohol, Tobacco, Firearms,<br />
Page 45 of 372
and Explosives, Drug Enforcement Administration, United States Marshals Service,<br />
Immigration and Customs Enforcement, United States Secret Service, US Diplomatic<br />
Security Service, United States Postal <strong>In</strong>spection Service, U.S. Customs and Border<br />
Protection, United States Border Patrol, and the United States Coast Guard), state (e.g.,<br />
Massachusetts State Police Special <strong>In</strong>vestigation Unit, <strong>New</strong> Jersey State Police<br />
organized crime unit, Pennsylvania State Police organized crime unit, and the <strong>New</strong> York<br />
State Police Bureau of Criminal <strong>In</strong>vestigation) and city (e.g., <strong>New</strong> York City Police<br />
Department <strong>Organized</strong> <strong>Crime</strong> Unit, Philadelphia Police Department <strong>Organized</strong> crime<br />
unit, Chicago Police <strong>Organized</strong> <strong>Crime</strong> Unit, and the Los Angeles Police Department<br />
Special Operations Division) law enforcement agencies.<br />
Rational Choice<br />
<strong>The</strong>oretical Background<br />
Criminal Psychology<br />
This theory treats all individuals as rational operators, committing criminal acts after<br />
consideration of all associated risks (detection and punishment) compared with the<br />
rewards of crimes (personal, financial etc.). Little emphasis is placed on the offenders’<br />
emotional state. <strong>The</strong> role of criminal organizations in lowering the perceptions of risk<br />
and increasing the likelihood of personal benefit is prioritized by this approach, with the<br />
organizations structure, purpose, and activity being indicative of the rational choices<br />
made by criminals and their organizers.<br />
Deterrence<br />
This theory sees criminal behavior as reflective of an individual, internal calculation by<br />
the criminal that the benefits associated with offending (whether financial or otherwise)<br />
outweigh the perceived risks. <strong>The</strong> perceived strength, importance or infallibility of the<br />
criminal organization is directly proportional to the types of crime committed, their<br />
intensity and arguably the level of community response. <strong>The</strong> benefits of participating in<br />
organized crime (higher financial rewards, greater socioeconomic control and influence,<br />
protection of the family or significant others, perceived freedoms from 'oppressive' laws<br />
or norms) contribute greatly to the psychology behind highly organized group offending.<br />
Social Learning<br />
Criminals learn through associations with one another. <strong>The</strong> success of organized crime<br />
groups is therefore dependent upon the strength of their communication and the<br />
enforcement of their value systems, the recruitment and training processes employed to<br />
sustain, build or fill gaps in criminal operations. An understanding of this theory sees<br />
close associations between criminals, imitation of superiors, and understanding of value<br />
systems, processes and authority as the main drivers behind organized crime.<br />
<strong>In</strong>terpersonal relationships define the motivations the individual develops, with the effect<br />
of family or peer criminal activity being a strong predictor of inter-generational offending.<br />
Page 46 of 372
This theory also developed to include the strengths and weaknesses of reinforcement,<br />
which in the context of continuing criminal enterprises may be used to help understand<br />
propensities for certain crimes or victims, level of integration into the mainstream culture<br />
and likelihood of recidivism / success in rehabilitation.<br />
Enterprise<br />
Under this theory, organized crime exists because legitimate markets leave many<br />
customers and potential customers unsatisfied. High demand for a particular good or<br />
service (e.g., drugs, prostitution, arms, slaves), low levels of risk detection and high<br />
profits lead to a conducive environment for entrepreneurial criminal groups to enter the<br />
market and profit by supplying those goods and services. For success, there must be:<br />
<br />
<br />
an identified market; and,<br />
a certain rate of consumption (demand) to maintain profit and outweigh perceived<br />
risks.<br />
Under these conditions competition is discouraged, ensuring criminal monopolies<br />
sustain profits. Legal substitution of goods or services may (by increasing competition)<br />
force the dynamic of organized criminal operations to adjust, as will deterrence<br />
measures (reducing demand), and the restriction of resources (controlling the ability to<br />
supply or produce to supply).<br />
Page 47 of 372
Differential Association<br />
Sutherland goes further to say that deviancy is contingent on conflicting groups within<br />
society, and that such groups struggle over the means to define what is criminal or<br />
deviant within society. Criminal organizations therefore gravitate around illegal avenues<br />
of production, profit-making, protectionism or social control and attempt (by increasing<br />
their operations or membership) to make these acceptable. This also explains the<br />
propensity of criminal organizations to develop protection rackets, to coerce through the<br />
use of violence, aggression and threatening behavior (at times termed 'terrorism').<br />
Preoccupation with methods of accumulating profit highlight the lack of legitimate<br />
means to achieve economic or social advantage, as does the organization of whitecollar<br />
crime or political corruption (though it is debatable whether these are based on<br />
wealth, power or both). <strong>The</strong> ability to effect social norms and practices through political<br />
and economic influence (and the enforcement or normalization of criminogenic needs)<br />
may be defined by differential association theory.<br />
Social Disorganization<br />
Critical Criminology and Sociology<br />
Social disorganization theory is intended to be applied to neighborhood level street<br />
crime, thus the context of gang activity, loosely formed criminal associations or<br />
networks, socioeconomic demographic impacts, legitimate access to public resources,<br />
employment or education, and mobility give it relevance to organized crime. Where the<br />
upper- and lower-classes live in close proximity this can result in feelings of anger,<br />
hostility, social injustice and frustration. Criminals experience poverty; and witness<br />
affluence they are deprived of and which is virtually impossible for them to attain<br />
through conventional means. <strong>The</strong> concept of neighborhood is central to this theory, as it<br />
defines the social learning, locus of control, cultural influences and access to social<br />
opportunity experienced by criminals and the groups they form. Fear of or lack of trust in<br />
mainstream authority may also be a key contributor to social disorganization; organized<br />
crime groups replicate such figures and thus ensure control over the counter-culture.<br />
This theory has tended to view violent or anti-social behavior by gangs as reflective of<br />
their social disorganization rather than as a product or tool of their organization.<br />
Anomie<br />
Sociologist Robert K. Merton believed deviance depended on society’s definition of<br />
success, and the desires of individuals to achieve success through socially defined<br />
avenues. Criminality becomes attractive when expectations of being able to fulfill goals<br />
(therefore achieving success) by legitimate means cannot be fulfilled. Criminal<br />
organizations capitalize on states of normlessness by imposing criminogenic needs and<br />
illicit avenues to achieve them. This has been used as the basis for numerous metatheories<br />
of organized crime through its integration of social learning, cultural deviance,<br />
and criminogenic motivations. If crime is seen as a function of anomie, organized<br />
Page 48 of 372
ehavior produces stability, increases protection or security, and may be directly<br />
proportional to market forces as expressed by entrepreneurship- or risk-based<br />
approaches. It is the inadequate supply of legitimate opportunities that constrains the<br />
ability for the individual to pursue valued societal goals and reduces the likelihood that<br />
using legitimate opportunities will enable them to satisfy such goals (due to their<br />
position in society).<br />
Cultural Deviance<br />
Criminals violate the law because they belong to a unique subculture - the counterculture<br />
- their values and norms conflicting with those of the working-, middle- or upperclasses<br />
upon which criminal laws are based. This subculture shares an alternative<br />
lifestyle, language and culture, and is generally typified by being tough, taking care of<br />
their own affairs and rejecting government authority. Role models include drug dealers,<br />
thieves and pimps, as they have achieved success and wealth not otherwise available<br />
through socially-provided opportunities. It is through modeling organized crime as a<br />
counter-cultural avenue to success that such organizations are sustained.<br />
Alien Conspiracy/Queer Ladder of Mobility<br />
<strong>The</strong> alien conspiracy theory and queer ladder of mobility theories state that ethnicity and<br />
'outsider' status (immigrants, or those not within the dominant ethnocentric groups) and<br />
their influences are thought to dictate the prevalence of organized crime in society. <strong>The</strong><br />
alien theory posits that the contemporary structures of organized crime gained<br />
prominence during the 1860s in Sicily and that elements of the Sicilian population are<br />
responsible for the foundation of most European and North American organized crime,<br />
made up of Italian-dominated crime families. Bell's theory of the 'queer ladder of<br />
mobility' hypothesized that 'ethnic succession' (the attainment of power and control by<br />
one more marginalized ethnic group over other less marginalized groups) occurs by<br />
Page 49 of 372
promoting the perpetration of criminal activities within a disenfranchised or oppressed<br />
demographic. Whilst early organized crime was dominated by the Irish Mob (early<br />
1800s), they were relatively substituted by the Sicilian Mafia and Italian-American Mafia,<br />
the Aryan Brotherhood (1960s onwards), Colombian Medellin cartel and Cali cartel<br />
(mid-1970s - 1990s), and more recently the Mexican Tijuana Cartel (late 1980s<br />
onwards), Mexican Los Zetas (late 1990s to onwards), the Russian Mafia (1988<br />
onwards), terrorism-related organized crime Al-Qaeda (1988 onwards), the Taliban<br />
(1994 onwards), and Islamic State of Iraq and the Levant (ISIL) (2010s to onwards).<br />
Many argue this misinterprets and overstates the role of ethnicity in organized crime. A<br />
contradiction of this theory is that syndicates had developed long before large-scale<br />
Sicilian immigration in 1860s, with these immigrants merely joining a widespread<br />
phenomenon of crime and corruption.<br />
Legislative Frameworks and Policing Measures<br />
<strong>In</strong>ternational<br />
Convention against Transnational <strong>Organized</strong> <strong>Crime</strong> (the 'Palermo Convention') -<br />
the international treaty against organized crime; includes the Protocol to Prevent,<br />
Suppress and Punish Trafficking in Persons, especially Women and Children and<br />
the Protocol against the Smuggling of Migrants by Land, Sea and Air<br />
Canada<br />
<strong>In</strong>dia<br />
Criminal Code, RSC 1985, c C-46, ss 467.1 to 467.2.<br />
<br />
Maharashtra Control of Organised <strong>Crime</strong> Act<br />
Republic of Ireland<br />
<br />
Criminal Assets Bureau<br />
Italy<br />
<br />
Article 41-bis prison regime<br />
United Kingdom<br />
Serious <strong>Organized</strong> <strong>Crime</strong> and Police Act 2005<br />
United States<br />
Federal Anti-Racketeering Act (the 'Hobbs Act') 1946<br />
Federal Wire Act 1961<br />
Page 50 of 372
Bank Secrecy Act 1970<br />
<strong>Organized</strong> <strong>Crime</strong> Control Act 1970<br />
Title 21 of the United States Code 1970<br />
Continuing Criminal Enterprise (contemporary)<br />
Racketeer <strong>In</strong>fluenced and Corrupt Organizations Act (the 'RICO Act') 1970<br />
Money Laundering Control Act 1986<br />
United States Patriot Act 2001<br />
Fraud Enforcement and Recovery Act of 2009<br />
By nation<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
List of criminal enterprises, gangs and syndicates<br />
<strong>Organized</strong> crime in Afghanistan<br />
<strong>Organized</strong> crime in Albania<br />
<strong>Organized</strong> crime in Australia<br />
<strong>Organized</strong> crime in Brazil<br />
<strong>Organized</strong> crime in Bulgaria<br />
Category: <strong>Organized</strong> crime in Canada<br />
<strong>Organized</strong> crime in China<br />
<strong>Organized</strong> crime in France<br />
<strong>Organized</strong> crime in Greece<br />
<strong>Organized</strong> crime in <strong>In</strong>dia<br />
<strong>Organized</strong> crime in Ireland<br />
<strong>Organized</strong> crime in Italy<br />
<strong>Organized</strong> crime in Japan<br />
<strong>Organized</strong> crime in Kenya<br />
<strong>Organized</strong> crime in Kyrgyzstan<br />
<strong>Organized</strong> crime in Lebanon<br />
<strong>Organized</strong> crime in the Netherlands<br />
<strong>Organized</strong> crime in Nigeria<br />
<strong>Organized</strong> crime in Pakistan<br />
<strong>Organized</strong> crime in Russia<br />
<strong>Organized</strong> crime in South Korea<br />
<strong>Organized</strong> crime in Sweden<br />
<strong>Organized</strong> crime in Turkey<br />
<strong>Organized</strong> crime in Ukraine<br />
<strong>Organized</strong> crime in the United Kingdom<br />
Category: <strong>Organized</strong> crime in the United States<br />
<strong>Organized</strong> crime in Vietnam<br />
________<br />
Page 51 of 372
White Collar <strong>Crime</strong><br />
White-Collar <strong>Crime</strong> (or corporate crime, more correctly) refers to financially motivated,<br />
nonviolent crime committed by businesses and government professionals. It was first<br />
defined by sociologist Edwin Sutherland in 1939 as "a crime committed by a person of<br />
respectability and high social status in the course of their occupation". Typical whitecollar<br />
crimes could include wage theft, fraud, bribery, Ponzi schemes, insider<br />
trading, labor racketeering, embezzlement, cybercrime, copyright infringement, money<br />
laundering, identity theft, and forgery. Lawyers can specialize in white-collar crime.<br />
Definitional Issues<br />
Modern criminology generally rejects a limitation of the term by reference, rather it<br />
classifies the type of crime and the topic:<br />
<br />
<br />
<br />
By the type of offense, e.g., property crime, economic crime, and other corporate<br />
crimes like environmental and health and safety law violations. Some crime is<br />
only possible because of the identity of the offender, e.g., transnational money<br />
laundering requires the participation of senior officers employed in banks. But<br />
the FBI has adopted the narrow approach, defining white-collar crime as "those<br />
illegal acts which are characterized by deceit, concealment, or violation of trust<br />
and which are not dependent upon the application or threat of physical force or<br />
violence" (1989, 3). While the true extent and cost of white-collar crime are<br />
unknown, the FBI and the Association of Certified Fraud Examiners estimate the<br />
annual cost to the United States to fall between $300 and $660 billion.<br />
By the type of offender, e.g., by social class or high socioeconomic status, the<br />
occupation of positions of trust or profession, or academic qualification,<br />
researching the motivations for criminal MAFIA behavior, e.g., greed or fear of<br />
loss of face if economic difficulties become obvious. Shover and Wright point to<br />
the essential neutrality of a crime as enacted in a statute. It almost inevitably<br />
describes conduct in the abstract, not by reference to the character of the<br />
persons performing it. Thus, the only way that one crime differs from another is in<br />
the backgrounds and characteristics of its perpetrators.<br />
By organizational culture rather than the offender or offense which overlaps<br />
with organized crime. Appelbaum and Chambliss offer a twofold definition:<br />
<br />
<br />
Occupational crime which occurs when crimes are committed to promote<br />
personal interests, say, by altering records and overcharging, or by the<br />
cheating of clients by professionals.<br />
Organizational or corporate crime which occurs when corporate<br />
executives commit criminal acts to benefit their company by overcharging<br />
or price fixing, false advertising, etc.<br />
Page 52 of 372
Relationship to Other Types of <strong>Crime</strong><br />
Blue-Collar <strong>Crime</strong><br />
<strong>The</strong> types of crime committed are a function of what is available to the potential<br />
offender. Thus, those employed in relatively unskilled environments have fewer<br />
opportunities to exploit than those who work in situations where large financial<br />
transactions occur. Blue-collar crime tends to be more obvious and thus attracts more<br />
active police attention such as vandalism or shoplifting. <strong>In</strong> contrast, white-collar<br />
employees can incorporate legitimate and criminal behavior, thus making themselves<br />
less obvious when committing the crime. <strong>The</strong>refore, blue-collar crime will more often<br />
use physical force, whereas in the corporate world, the identification of a victim is less<br />
obvious and the issue of reporting is complicated by a culture of commercial<br />
confidentiality to protect shareholder value. It is estimated that a great deal of whitecollar<br />
crime is undetected or, if detected, it is not reported.<br />
Corporate<br />
<strong>Crime</strong><br />
Corporate<br />
crime deals<br />
with the<br />
company as<br />
a whole. <strong>The</strong><br />
crime<br />
benefits the<br />
investors or<br />
the individuals who are in high positions in the company or corporation. White-collar<br />
crime and corporate crime are similar because they take place within the business<br />
world. <strong>The</strong> difference is that white-collar crime benefits the individual(s) involved, and<br />
corporate crime benefits the company or the corporation.<br />
One well-known insider trading case in the United States is the ImClone stock trading<br />
case. <strong>In</strong> December 2001, top-level executives sold their shares in ImClone Systems, a<br />
pharmaceutical company that manufactured an anti-cancer drug.<br />
<strong>The</strong> U.S. Securities and Exchange Commission (SEC) investigated numerous top-level<br />
executives, as well as Martha Stewart, a friend of ImClone's former chief executive who<br />
had also sold her shares at the same time. <strong>The</strong> SEC reached a settlement in 2005.<br />
State-Corporate <strong>Crime</strong><br />
<strong>The</strong> negotiation of agreements between a state and a corporation will be at a relatively<br />
senior level on both sides, this is almost exclusively a white-collar "situation" which<br />
offers the opportunity for crime. Although law enforcement claims to have prioritized<br />
white-collar crime, evidence shows that it continues to be a low priority.<br />
Page 53 of 372
When senior levels of a corporation engage in criminal activity using the company this is<br />
sometimes called control fraud.<br />
<strong>Organized</strong> Transnational <strong>Crime</strong><br />
<strong>Organized</strong> transnational crime is organized criminal activity that takes place across<br />
national jurisdictions, and with advances in transportation and information technology,<br />
law enforcement officials and policymakers have needed to respond to this form of<br />
crime on a global scale. Some examples include human trafficking, money<br />
laundering, drug smuggling, illegal arms dealing, terrorism, and cybercrime. Although it<br />
is impossible to precisely gauge transnational crime, the <strong>Millennium</strong> Project, an<br />
international think tank, assembled statistics on several aspects of transnational crime<br />
in 2009:<br />
<br />
<br />
<br />
World illicit trade of almost $780 billion<br />
Counterfeiting and piracy of $300 billion to $1 trillion<br />
Global drug trade of $321 billion<br />
Occupational <strong>Crime</strong><br />
<strong>In</strong>dividuals may commit crime during employment or unemployment. <strong>The</strong> two most<br />
common forms are theft and fraud. <strong>The</strong>ft can be of varying degrees, from a pencil to<br />
furnishings to a car. <strong>In</strong>sider trading, the trading of stock by someone with access to<br />
publicly unavailable information, is a type of fraud.<br />
<strong>Crime</strong>s Related To National <strong>In</strong>terests<br />
<strong>In</strong> the modern world, there are a lot of nations which divide the crimes into some laws.<br />
"<strong>Crime</strong>s Related to <strong>In</strong>ducement of Foreign Aggression" is the crime of communicating<br />
with aliens secretly to cause foreign aggression or menace.<br />
"<strong>Crime</strong>s Related to Foreign Aggression" is the treason of cooperating with foreign<br />
aggression positively regardless of the national inside and outside. "<strong>Crime</strong>s Related to<br />
<strong>In</strong>surrection" is the internal treason. Depending on a country, conspiracy is added to<br />
these. One example is Jho Low, a mega thief and traitor who stole billions in USA<br />
currency from a Malaysian government fund and is now on a run as a fugitive.<br />
Demographics<br />
According to a 2016 study,<br />
A considerable percentage of white-collar offenders are gainfully employed middle-aged<br />
Caucasian men who usually commit their first whitecollar offense sometime between their late<br />
thirties through their mid-forties and appear to have middle-class backgrounds. Most have some<br />
higher education, are married, and have moderate to strong ties to community, family, and<br />
religious organizations. White collar offenders usually have a criminal history, including infractions<br />
Page 54 of 372
that span the spectrum of illegality, but many do not overindulge in vice. Recent research<br />
examining the five-factor personality trait model determined that white-collar offenders tend to be<br />
more neurotic and less agreeable and conscientious than their non-criminal counterparts.<br />
Punishment<br />
<strong>In</strong> the United States, sentences for white-collar crimes may include a combination<br />
of imprisonment, fines, restitution, community service, disgorgement, probation, or other<br />
alternative punishment. <strong>The</strong>se punishments grew harsher after the Jeffrey<br />
Skilling and Enronscandal, when the Sarbanes–Oxley Act of 2002 was passed by<br />
the United States Congress and signed into law by President George W. Bush, defining<br />
new crimes and<br />
increasing the<br />
penalties for crimes<br />
such as mail and wire<br />
fraud. <strong>In</strong> other<br />
countries, such<br />
as China, white-collar<br />
criminals can be given<br />
the death penalty, yet<br />
some countries have a<br />
maximum of 10–25<br />
years imprisonment.<br />
Certain countries<br />
like Canada consider<br />
the relationship<br />
between the parties to<br />
be a significant feature<br />
on sentence when<br />
there is a breach of<br />
trust component<br />
involved. Questions<br />
about sentencing<br />
disparity in white-collar crime continue to be debated.<br />
Although, white-collar crime poses a serious threat in today's society, it becomes<br />
extremely difficult to identify. <strong>The</strong> FBI, concerned with identifying this type of offense,<br />
collects annual statistical information on only three categories: fraud,<br />
counterfeiting/forgery, and embezzlement. All other types of white-collar crime are listed<br />
in an, "miscellaneous" category.<br />
<strong>In</strong> the United States, the longest sentences for white-collar crimes have been for the<br />
following: Sholam Weiss (845 years for racketeering, wire fraud and money laundering<br />
in connection with the collapse of National Heritage Life <strong>In</strong>surance Company); Norman<br />
Schmidt and Charles Lewis (330 years and 30 years, respectively, for "high-yield<br />
investment" scheme); Bernard Madoff (150 years for $65 billion fraud scheme);<br />
Page 55 of 372
Frederick Brandau (55 years for $117 million Ponzi scheme); Eduardo Masferrer (30<br />
years for accounting fraud); Chalana McFarland (30 years for mortgage fraud scheme);<br />
Lance Poulsen (30 years for $2.9 billion fraud).<br />
Page 56 of 372
II. Arms Trafficking<br />
Arms Trafficking, also known as gunrunning, is the trafficking of contraband weapons<br />
and ammunition. What constitutes legal trade in firearms varies widely, depending on<br />
local and national laws.<br />
<strong>The</strong> 1999 Report of the UN Panel of Governmental Experts on Small Arms provides a<br />
more refined and precise definition, which has become internationally accepted. This<br />
Page 57 of 372
distinguishes between small arms (revolvers and self-loading pistols, rifles and<br />
carbines, submachine guns, assault rifles, and light machine guns), which are weapons<br />
designed for personal use, and light weapons (heavy machine guns, hand-held underbarrel<br />
and mounted grenade launchers, portable anti-aircraft guns, portable anti-tanks<br />
guns, recoilless rifles, portable launchers of anti-aircraft missile systems, and mortars of<br />
calibres less than 100 mm), which are designed for use by several persons serving as a<br />
unit. Ammunition and explosives also form an integral part of small arms and light<br />
weapons used in conflict.<br />
Areas<br />
Impact<br />
Although arms trafficking is widespread in regions of political turmoil, it is not limited to<br />
such areas, and for example, in South Asia, an estimated 63 million guns have been<br />
trafficked into <strong>In</strong>dia and Pakistan.<br />
<strong>The</strong> suppression of gunrunning is one of the areas of increasing interest in the context<br />
of international law. Examples of past and current gunrunning include:<br />
<br />
<br />
<br />
Iran–Contra affair<br />
Larne gun-running<br />
Provisional Irish Republican Army arms importation<br />
<strong>In</strong> the United States, the term "Iron Pipeline" is sometimes used to describe <strong>In</strong>terstate<br />
Highway 95 and its connector highways as a corridor for arms trafficking into <strong>New</strong> York<br />
City.<br />
Africa<br />
Liberia and Sierra Leone Conflict<br />
<strong>The</strong> civil war in Sierra Leone lasted from 1991-2002, and left 75,000 people dead. Arms<br />
Trafficking played a significant role in this conflict. Both small and large arms were<br />
shipped to all sides in both Sierra Leone, and Liberia from outside actors. Small arms<br />
being any handheld gun (pistol, assault rifle, sub machine gun, shotgun,) and other<br />
items such as grenades, claymores, knives, machetes, etc. Large arms indicates large<br />
amounts of explosives, missiles, light machine guns, mortars, anti tank missiles, tanks,<br />
planes, etc. During this time a civil war was occurring in nearby Liberia. <strong>The</strong> Liberian<br />
Civil War took place from 1989 through 1997. <strong>The</strong> war was between the existing<br />
government and the National Patriotic Front. Leader of the National Patriotic front of<br />
Liberia, Charles Taylor, helped to create the Revolutionary United Front (RUF) in Sierra<br />
Leone. Taylor was the recipient of thousands of illegally trafficked arms from easter<br />
Europe (mostly the Ukraine). Taylor then sold some of these weapons to the RUF in<br />
exchange for diamonds. President of Burkina Faso, Blaise Compaore, “directly<br />
facilitated Liberia’s arms-for-diamonds trade” with Liberia and Sierra Leone. Compaore<br />
Page 58 of 372
would give guns to Taylor, who would then sell them to the RUF in exchange for<br />
diamonds. <strong>The</strong>se blood diamonds would then be sold back to Compaore for more<br />
guns. <strong>The</strong> cyclical exchange allowed Compaore the ability to deny directly sending arms<br />
to Sierra Leone.<br />
<strong>The</strong> Liberian government received arms through an elaborate from company in<br />
Guinea. <strong>The</strong> arms were intended to be shipped (legally) from Uganda to Slovakia,<br />
however, the arms were diverted to Guinea as a par of “an elaborate bait and switch.”<br />
Additionally the British government “encouraged Sandline <strong>In</strong>ternational, a private<br />
security firm and non state entity, to supply arms and ammunitions to the loyal forces of<br />
the exiled government of President Kabbah.” Sandline proceeded 35 tons of arms from<br />
Bulgaria, to Kabbah’s forces.<br />
Why Traffickers Choose Africa<br />
Kimberly Thachuk and Karen<br />
Saunders argue that arms<br />
trafficking is no different from any<br />
other illegal business in their<br />
work Under the Radar: Airborne<br />
Arms Trafficking Operations in<br />
Africa. Traffickers first need a<br />
headquarters, or somewhere to<br />
base their operations. A<br />
headquarters needs several<br />
aspects to make it an ideal place<br />
to traffic weapons. First, the<br />
headquarters should have<br />
appropriate infrastructure. For a<br />
weapons trafficking this would<br />
include a landing strip for both<br />
importation and exportation.<br />
Additionally, warehouses are<br />
needed to “store product<br />
awaiting delivery." Once the<br />
product has arrived and been<br />
stored it needs to be delivered to<br />
the customer, thus, the<br />
headquarters should be in<br />
somewhat of a central location<br />
near each customer. This is not<br />
the primary reason many<br />
traffickers choose Africa certainly<br />
has multitudes of unoccupied land that can be used by traffickers, as is asserted by<br />
Thachuk and Saunders.<br />
Page 59 of 372
Physical space is important but the rules and regulations of said space are also<br />
relevant. Traffickers look for places with corrupt, supply side, officials that can either be<br />
bribed, or blackmailed. This allows the trafficker to “circumvent the regulatory and<br />
oversight systems” put in place by the government. Furthermore, a “lax financial<br />
system” is key so the large amounts of money moved by the trafficker are not seen as<br />
suspicious.<br />
Thachuk and Saunders finish their argument, a stable, and highly centralized<br />
government, is important. <strong>The</strong>y then point out that 10 different African countries have<br />
leaders that have been in power for more than 20 years, which they argue meets the<br />
criteria a highly centralized and stable government.<br />
Market Value<br />
<strong>The</strong> total value of the global arms market is estimated around $60 billion a year, with<br />
around $8 billion attributed to pistols, rifles, machine guns, and bullets. <strong>The</strong> total illegal<br />
arms trade is harder to estimate, but the illicit small arms market has been estimated at<br />
10–20% of the total global arms trade.<br />
Notable Arms Dealers<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Ali Fayad<br />
Monzer al-Kassar<br />
Pierre Beaumarchais<br />
Viktor Bout<br />
Samuel Cummings<br />
Arcadi Gaydamak<br />
Adnan Khashoggi<br />
Leonid Minin<br />
Sarkis Soghanalian<br />
Dale Stoffel<br />
Gerhard Mertins<br />
John Nardi<br />
Basil Zaharoff<br />
Efraim Diveroli<br />
<strong>In</strong> Popular Culture<br />
Film<br />
<br />
Lord of War (2005), a fictional crime war film in which Nicolas Cage plays an<br />
illegal arms dealer similar to the post-Soviet arms dealer Viktor Bout; the film was<br />
endorsed by Amnesty <strong>In</strong>ternational for highlighting the arms trafficking by the<br />
international arms industry<br />
Page 60 of 372
Making a Killing: <strong>In</strong>side the <strong>In</strong>ternational Arms Trade (2006), a 15-minute<br />
documentary included in the two-Disc Special Edition DVD of Lord of War (2005).<br />
Numerous other documentaries about arms trafficking are linked on this film's<br />
YouTube page.<br />
Iron Man (2008), a superhero film in which based on the Marvel Comics<br />
character of the same name, centering inventor Tony Stark (Robert Downey Jr.)<br />
discovers his company has been arms trafficking weapons of his own designs to<br />
criminals worldwide, and seeks to stop his corrupt executives and other<br />
employees by becoming the technologically advanced superhero Iron Man.<br />
<br />
<br />
War Dogs (2016), a black<br />
comedy-drama biographical<br />
film based on the true story<br />
of two young men, David<br />
Packouz and Efraim Diveroli,<br />
who won a $300 million<br />
contract from the Pentagon<br />
to arm America's allies in<br />
Afghanistan who later<br />
became involved in arms<br />
trafficking.<br />
Shot Caller (2017), a crime<br />
thriller in which recently<br />
paroled felon Jacob "Money"<br />
Harlon, is forced by his gang<br />
shot caller to orchestrate a<br />
major arms deal with an<br />
allied Sureno gang.<br />
<br />
<strong>The</strong> Chosen (1981), in one scene, Reuven, an Orthodox Jew in 1940's <strong>New</strong><br />
York, and some classmates are seen smuggling into the docks at <strong>New</strong> York<br />
Harbor and placing crates full of rifles labeled "Farm Equipment" on a ship bound<br />
for Haifa for the Israeli guerrilla fighters in the Arab-Israeli War. This scene also<br />
occurs in the book on which the movie is based.<br />
Television<br />
<br />
<br />
Sons of Anarchy, a FX-TV series about a fictional outlaw motorcycle club whose<br />
main source of income is trafficking arms to a variety of criminal enterprises<br />
domestically and internationally.<br />
Death in Paradise Series 3, Episode 5, features Simon Shepherd as Jacob<br />
Doran, Saint Marie's Minister for Commerce, who is later found out by Humphrey<br />
Goodman to be a gunrunner.<br />
Page 61 of 372
Jormungand, an anime television series based on the manga series by Keitarō<br />
Takahashi, produced by White Fox, which addresses the issue of arms trafficking<br />
in the Middle East and throughout the European continent.<br />
<strong>The</strong> Night Manager, a BBC miniseries where a former British soldier who is<br />
currently a night manager in hotels infiltrates the inner circle of an arms dealer.<br />
Video Games<br />
<br />
<br />
Grand <strong>The</strong>ft Auto V's multiplayer platform, GTA Online, has a downloadable<br />
content pack revolving around manufacturing and distributing illegal arms<br />
through smuggling operations and missions included in "Gunrunning".<br />
Mafia III, one of Lincoln Clay's underbosses, Haitian crime lord Cassandra, runs<br />
gun rackets.<br />
Page 62 of 372
III. Bribery<br />
Bribery is the act of giving or receiving something of value in exchange for some kind of<br />
influence or action in return, that the recipient would otherwise not offer. Bribery is<br />
defined by Black's Law Dictionary as the offering, giving, receiving, or soliciting of any<br />
item of value to influence the actions of an official or other person in charge of a public<br />
or legal duty. Essentially, bribery is offering to do something for someone for the<br />
expressed purpose of receiving something in exchange. Gifts of money or other items of<br />
value which are otherwise available to everyone on an equivalent basis, and not for<br />
dishonest purposes, is not bribery. Offering a discount or a refund to all purchasers is a<br />
legal rebate and is not bribery. For example, it is legal for an employee of a Public<br />
Utilities Commission involved in electric rate regulation to accept a rebate on electric<br />
service that reduces their cost for electricity, when the rebate is available to other<br />
residential electric customers. Giving the rebate to influence them to look favorably on<br />
the electric utility's rate increase applications, however, would be considered bribery.<br />
A bribe is the gift bestowed to influence the recipient's conduct. It may be money,<br />
goods, rights in action, property, preferment, privilege, emolument, objects of value,<br />
advantage, or merely a promise to induce or influence the action, vote, or influence of a<br />
person in an official or public capacity.<br />
Page 63 of 372
Forms<br />
Many types of payments or favors can constitute bribes: tip, gift, sop, perk, skim, favor,<br />
discount, waived fee/ticket, free food, free ad, free trip, free tickets, sweetheart deal,<br />
kickback/payback, funding, inflated sale of an object or property, lucrative contract,<br />
donation, campaign contribution, fundraiser, sponsorship/backing, higher paying job,<br />
stock options, secret commission, or promotion (rise of position/rank).<br />
One must be careful of differing social and cultural norms when examining bribery.<br />
Expectations of when a monetary transaction is appropriate can differ from place to<br />
place. Political campaign contributions in the form of cash, for example, are considered<br />
criminal acts of bribery in some countries, while in the United States, provided they<br />
adhere to election law, are legal. Tipping, for example, is considered bribery in some<br />
societies, while in others the two concepts may not be interchangeable.<br />
<strong>In</strong> some Spanish-speaking countries, bribes are referred to as "mordida" (literally,<br />
"bite"). <strong>In</strong> Arab countries, bribes may be called baksheesh (a tip, gift, or gratuity) or<br />
"shay" (literally, "tea"). French-speaking countries often use the expressions "dessousde-table"<br />
("under-the-table" commissions), "pot-de-vin" (literally, "wine-pot"), or<br />
"commission occulte" ("secret commission" or "kickback"). While the last two<br />
expressions contain inherently a negative connotation, the expression "dessous-detable"<br />
can be often understood as a commonly accepted business practice. <strong>In</strong> German,<br />
the common term is Schmiergeld ("smoothing money").<br />
<strong>The</strong> offence may be divided into two great classes: the one, where a person invested<br />
with power is induced by payment to use it unjustly; the other, where power is obtained<br />
by purchasing the suffrages of those who can impart it. Likewise, the briber might hold a<br />
powerful role and control the transaction; or in other cases, a bribe may be effectively<br />
extracted from the person paying it, although this is better known as extortion.<br />
<strong>The</strong> forms that bribery take are numerous. For example, a motorist might bribe a police<br />
officer not to issue a ticket for speeding, a citizen seeking paperwork or utility line<br />
connections might bribe a functionary for faster service.<br />
Bribery may also take the form of a secret commission, a profit made by an agent, in the<br />
course of his employment, without the knowledge of his principal. Euphemisms abound<br />
for this (commission, sweetener, kick-back etc.) Bribers and recipients of bribery are<br />
likewise numerous although bribers have one common denominator and that is the<br />
financial ability to bribe.<br />
According to BBC news U.K, "bribery around the world is estimated at about $1 trillion<br />
(£494bn)".<br />
As indicated on the pages devoted to political corruption, efforts have been made in<br />
recent years by the international community to encourage countries to dissociate and<br />
incriminate as separate offences, active and passive bribery. From a legal point of view,<br />
Page 64 of 372
active bribery can be defined for instance as the promising, offering or giving by any<br />
person, directly or indirectly, of any undue advantage [to any public official], for himself<br />
or herself or for anyone else, for him or her to act or refrain from acting in the exercise<br />
of his or her functions. (article 2 of the Criminal Law Convention on Corruption (ETS<br />
173) of the Council of Europe). Passive bribery can be defined as the request or receipt<br />
[by any public official], directly or indirectly, of any undue advantage, for himself or<br />
herself or for anyone else, or the acceptance of an offer or a promise of such an<br />
advantage, to act or refrain from acting in the exercise of his or her functions (article 3 of<br />
the Criminal Law Convention on Corruption (ETS 173)).<br />
<strong>The</strong> reason for this dissociation is to make<br />
the early steps (offering, promising,<br />
requesting an advantage) of a corrupt deal<br />
already an offence and, thus, to give a clear<br />
signal (from a criminal policy point of view)<br />
that bribery is not acceptable. Besides, such<br />
a dissociation makes the prosecution of<br />
bribery offences easier since it can be very<br />
difficult to prove that two parties (the bribegiver<br />
and the bribe-taker) have formally<br />
agreed upon a corrupt deal. Besides, there<br />
is often no such formal deal but only a<br />
mutual understanding, for instance when it is<br />
common knowledge in a municipality that to<br />
obtain a building permit one has to pay a<br />
"fee" to the decision maker to obtain a<br />
favorable decision.<br />
Government<br />
Article II, Section 4 of the United States<br />
Constitution<br />
A grey area may exist when payments to smooth transactions are made. United States<br />
law is particularly strict in limiting the ability of businesses to pay for the awarding of<br />
contracts by foreign governments; however, the Foreign Corrupt Practices Act contains<br />
an exception for "grease payments"; very basically, this allows payments to officials in<br />
order to obtain the performance of ministerial acts which they are legally required to do,<br />
but may delay in the absence of such payment. <strong>In</strong> some countries, this practice is the<br />
norm, often resulting from a developing nation not having the tax structure to pay civil<br />
servants an adequate salary. Nevertheless, most economists regard bribery as a bad<br />
thing because it encourages rent seeking behaviour. A state where bribery has become<br />
a way of life is a kleptocracy.<br />
Page 65 of 372
Recent evidence suggests that the act of bribery can have political consequences- with<br />
citizens being asked for bribes becoming less likely to identify with their country, region<br />
and/or tribal unit.<br />
Tax Treatment<br />
<strong>The</strong> tax status of bribes is an issue for governments since the bribery of government<br />
officials impedes the democratic process and may interfere with good government. <strong>In</strong><br />
some countries, such bribes are considered tax-deductible payments. However, in<br />
1996, in an effort to discourage bribery, the OECD Council recommended that member<br />
countries cease to allow the tax-deductibility of bribes to foreign officials. This was<br />
followed by the signing of the Anti-Bribery Convention [7] . Since that time, the majority of<br />
the OECD countries which are signatories of the convention have revised their tax<br />
policies according to this recommendation and some have extended the measures to<br />
bribes paid to any official, sending the message that bribery will no longer be tolerated<br />
in the operations of the government.<br />
As any monetary benefit received from an illegal activity such as bribery is generally<br />
considered part of one's taxable income, however, as its criminal, some governments<br />
may refuse to accept it as income as it may mean they are a party to the activity.<br />
Medicine<br />
Pharmaceutical corporations may seek to entice doctors to favor prescribing their drugs<br />
over others of comparable effectiveness. If the medicine is prescribed heavily, they may<br />
seek to reward the individual through gifts. <strong>The</strong> American Medical Association has<br />
published ethical guidelines for gifts from industry which include the tenet that<br />
physicians should not accept gifts if they are given in relation to the physician's<br />
prescribing practices. Doubtful cases include grants for traveling to medical conventions<br />
that double as tourist trips.<br />
Dentists often receive samples of home dental care products such as toothpaste, which<br />
are of negligible value; somewhat ironically, dentists in a television commercial will often<br />
state that they get these samples but pay to use the sponsor's product.<br />
<strong>In</strong> countries offering state-subsidized or nationally funded healthcare where medical<br />
professionals are underpaid, patients may use bribery to solicit the standard expected<br />
level of medical care. For example, in many formerly Communist countries from what<br />
used to be the Eastern Bloc it may be customary to offer expensive gifts to doctors and<br />
nurses for the delivery of service at any level of medical care in the non-private health<br />
sector.<br />
Politics<br />
Politicians receive campaign contributions and other payoffs from powerful corporations,<br />
organizations or individuals in return for making choices in the interests of those parties,<br />
Page 66 of 372
or in anticipation of favorable policy, also referred to as lobbying. This is not illegal in the<br />
United States and forms a major part of campaign finance, though it is sometimes<br />
referred to as the money loop. However, in many European countries, a politician<br />
accepting money from a corporation whose activities fall under the sector they currently<br />
(or are campaigning to be elected to) regulate would be considered a criminal offence,<br />
for instance the "Cash-for-questions affair" and "Cash for Honors" in the United<br />
Kingdom. A grey area in these democracies is the so-called "revolving door", whereby<br />
politicians are offered highly-paid, often consultancy jobs upon their retirement from<br />
politics by the corporations they regulate while in office, in return for enacting legislation<br />
favorable to the corporation whilst in office – a conflict of interest. Convictions for this<br />
form of bribery are easier to obtain with hard evidence, that is a specific amount of<br />
money linked to a specific action by the recipient of the bribe. Such evidence is<br />
frequently obtained using undercover agents, since evidence of a quid pro quo relation<br />
can often be difficult to prove. See also influence peddling and political corruption.<br />
Recent evidence suggests that demands for bribes can adversely impact citizen level of<br />
trust and engagement with the political process.<br />
Business<br />
Employees, managers, or salespeople of a business may offer money or gifts to a<br />
potential client in exchange for business.<br />
Page 67 of 372
For example, in 2006, German prosecutors conducted a wide-ranging investigation of<br />
Siemens AG to determine if Siemens employees paid bribes in exchange for business.<br />
<strong>In</strong> some cases where the system of law is not well-implemented, bribes may be a way<br />
for companies to continue their businesses. <strong>In</strong> the case, for example, custom officials<br />
may harass a certain firm or production plant, officially stating they are checking for<br />
irregularities, halting production or stalling other normal activities of a firm. <strong>The</strong><br />
disruption may cause losses to the firm that exceed the amount of money to pay off the<br />
official. Bribing the officials is a common way to deal with this issue in countries where<br />
there exists no firm system of reporting these semi-illegal activities. A third party, known<br />
as a White Glove, may be involved to act as a clean middleman.<br />
Specialist consultancies have been set up to help multinational companies and small<br />
and medium enterprises with a commitment to anti-corruption to trade more ethically<br />
and benefit from compliance with the law.<br />
Contracts based on or involving the payment or transfer of bribes ("corruption money",<br />
"secret commissions", "pots-de-vin", "kickbacks") are void.<br />
<strong>In</strong> 2012, <strong>The</strong> Economist noted:<br />
Bribery would be less of a problem if it wasn't also a solid investment. A new paper by<br />
Raghavendra Rau of Cambridge University and Yan Leung Cheung and Aris Stouraitis<br />
of the Hong Kong Baptist University examines 166 high-profile cases of bribery since<br />
1971, covering payments made in 52 countries by firms listed on 20 different stock<br />
markets. Bribery offered an average return of 10 to 11 times the value of the bung paid<br />
out to win a contract, measured by the jump in stock market value when the contract<br />
was won. America's Department of Justice found similarly high returns in cases it has<br />
prosecuted.<br />
<strong>In</strong> addition, a survey conducted by auditing firm Ernst & Young (EY) in 2012 found that<br />
15 percent of top financial executives are willing to pay bribes in order to keep or win<br />
business. Another 4 percent said they would be willing to misstate financial<br />
performance. This alarming indifference represents a huge risk to their business, given<br />
their responsibility.<br />
Sport Corruption<br />
Referees and scoring judges may be offered money, gifts, or other compensation to<br />
guarantee a specific outcome in an athletic or other sports competition. A well-known<br />
example of this manner of bribery in the sport would be the 2002 Olympic Winter<br />
Games figure skating scandal, where the French judge in the pairs competition voted for<br />
the Russian skaters in order to secure an advantage for the French skaters in the ice<br />
dancing competition.<br />
Page 68 of 372
Additionally, bribes may be offered by cities in order to secure athletic franchises, or<br />
even competitions, as happened with the 2002 Winter Olympics. It is common practice<br />
for cities to "bid" against each other with stadiums, tax benefits, and licensing deals.<br />
Legislation<br />
Prevention<br />
<strong>The</strong> U.S. introduced the Foreign Corrupt Practices Act in 1977 to address bribery of<br />
foreign officials. <strong>The</strong> Foreign Corrupt Practices Act, or FCPA, was introduced to prevent<br />
the influencing of foreign officials by companies through rewards or payments. This<br />
legislation dominated international anti-corruption enforcement until around 2010 when<br />
other countries began introducing broader and more robust legislation, notably the<br />
United Kingdom Bribery Act 2010. <strong>The</strong> <strong>In</strong>ternational Organization for Standardization<br />
introduced an international anti-bribery management system standard in 2016. <strong>In</strong> recent<br />
years, cooperation in enforcement action between countries has increased.<br />
Under 18 U.S. Code § 201 – Bribery of public officials and witnesses, the law strictly<br />
prohibits any type of promising, giving, or offering of value to a public official. A public<br />
official is further defined as anyone who holds public or elected office. Another<br />
stipulation of the law in place condemns the same kind of offering, giving, or coercing a<br />
Page 69 of 372
witness in a legal case to changing their story. <strong>The</strong> minimum penalty for either of these<br />
offenses is 10 years, and a potential fine.<br />
Businesses<br />
Programs of prevention need to be properly designed and meet with international<br />
standards of best practice. To ensure respect for a program, whether it be on the part of<br />
employees or business partners, external verification is necessary. <strong>In</strong>ternational best<br />
practices such as the Council for Further Combating Bribery of Foreign Public Officials<br />
in <strong>In</strong>ternational Business Transactions, Annex 2; the ISO 26000 norm (section 6.6.3) or<br />
TI Business Principles for Countering Bribery are used in external verification processes<br />
to measure and ensure that a program of bribery prevention works and is consistent<br />
with international standards. Another reason for businesses to undergo external<br />
verification of their bribery prevention programs is that it means evidence can be<br />
provided to assert that all that was possible was done to prevent corruption. Companies<br />
are unable to guarantee corruption has never occurred; what they can do is provide<br />
evidence that they did their best to prevent it.<br />
<strong>The</strong>re is no federal statute under the U.S Law that prohibits or regulates any type of<br />
private or commercial bribery. <strong>The</strong>re is a way for prosecutors to try people for bribery by<br />
using existing laws. Section 1346 of Title 18 can be used by prosecutors, to try people<br />
for ‘a scheme or artifice to deprive another of the intangible right to honest services,’<br />
under the mail and wire fraud statutes. Prosecutors have always successfully<br />
prosecuted private company employees for breaching a fiduciary duty and taking bribes,<br />
under Honest services fraud.<br />
<strong>The</strong>re are also cases of successful prosecution of bribery in the case of international<br />
business. <strong>The</strong> DOJ has used the Travel Act, 18 USC Section 1952 to prosecute bribery.<br />
Under the Travel Act, it is against the law, domestically and internationally, to utilize‘the<br />
mail or any facility in interstate or foreign commerce’ with intent to ‘promote, manage,<br />
establish, carry on, or facilitate the promotion, management, establishment or carrying<br />
on, of any unlawful activity’.<br />
Notable <strong>In</strong>stances<br />
<br />
<br />
<br />
Spiro Agnew, American Vice President who resigned from office in the aftermath<br />
of discovery that he took bribes while serving as Governor of Maryland.<br />
Duke Cunningham, United States Navy veteran and former Republican member<br />
of the United States House of Representatives from California's 50th<br />
Congressional District resigned after pleading guilty to accepting at least<br />
$2.4 million in bribes and under-reporting his income for 2004.<br />
Gerald Garson, former <strong>New</strong> York Supreme Court Justice, convicted of accepting<br />
bribes to manipulate outcomes of divorce proceedings.<br />
Page 70 of 372
Andrew J. Hinshaw, Republican, former congressman from California's 40th<br />
district, convicted of accepting bribes.<br />
John Jenrette, Democrat, former congressman from South Carolina's 6th district,<br />
convicted of accepting a bribe in the FBI's Abscam operation.<br />
Donald "Buz" Lukens, Republican, former congressman from Ohio's 8th district,<br />
charged with delinquency of a minor and convicted of bribery and conspiracy.<br />
Martin Thomas Manton, former U.S. federal judge convicted of accepting bribes.<br />
Rick Renzi, Republican, former congressman from Arizona's 1st district, found<br />
guilty of 17 counts including wire fraud, conspiracy, extortion, racketeering, and<br />
money laundering.<br />
Dianne Wilkerson, Democrat, former Massachusetts state senator pleaded guilty<br />
to eight counts of attempted extortion.<br />
Lee Myung-Bak, former South Korean president was found guilty of accepting<br />
nearly $6 million bribes from Samsung in exchange for a presidential pardon for<br />
Samsung Chairman Lee Kun-hee.<br />
Pakistan cricket spot-fixing controversy, Mohammad Asif, Mohammad Amir and<br />
Salman Butt, Pakistani cricketers found guilty of accepting bribes to bowl no-balls<br />
against England at certain times.<br />
Tangentopoli (Italian for "city of bribes") was a huge bribery scandal in early<br />
1990s Italy, which brought down the whole system of political parties, when it<br />
was uncovered by the Mani pulite investigations. At one point roughly half of<br />
members of parliament were under investigation.<br />
Ralph Lauren, clothing retailer, was found guilty of making illegal payments and<br />
giving gifts to foreign officials in an attempt to circumvent custom' inspections and<br />
paperwork.<br />
Page 71 of 372
Page 72 of 372
IV. Cybercrime<br />
Cybercrime, or computer-oriented crime, is the crime that involves a computer and a<br />
network. <strong>The</strong> computer may have been used in the commission of a crime, or it may be<br />
the target. Cybercrimes can be defined as: "Offences that are committed against<br />
individuals or groups of individuals with a criminal motive to intentionally harm the<br />
reputation of the victim or cause physical or mental harm, or loss, to the victim directly<br />
or indirectly, using modern telecommunication networks such as <strong>In</strong>ternet (networks<br />
including chat rooms, emails, notice boards and groups) and mobile phones<br />
(Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security and<br />
financial health. Issues surrounding these types of crimes have become high-profile,<br />
particularly those surrounding hacking, copyright infringement, unwarranted masssurveillance,<br />
sextortion, child pornography, and child grooming. <strong>The</strong>re are also<br />
problems of privacy when confidential information is intercepted or disclosed, lawfully or<br />
otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the<br />
perspective of gender and defined 'cybercrime against women' as "<strong>Crime</strong>s targeted<br />
against women with a motive to intentionally harm the victim psychologically and<br />
physically, using modern telecommunication networks such as internet and mobile<br />
phones". <strong>In</strong>ternationally, both governmental and non-state actors engage in<br />
cybercrimes, including espionage, financial theft, and other cross-border crimes.<br />
Cybercrimes crossing international borders and involving the actions of at least one<br />
nation state is sometimes referred to as cyberwarfare.<br />
A report (sponsored by McAfee), published in 2014, estimated that the annual damage<br />
to the global economy was $445 billion. Approximately $1.5 billion was lost in 2012 to<br />
online credit and debit card fraud in the US. <strong>In</strong> 2018, a study by Center for Strategic and<br />
Page 73 of 372
<strong>In</strong>ternational Studies (CSIS), in partnership with McAfee, concludes that close to $600<br />
billion, nearly one percent of global GDP, is lost to cybercrime each year.<br />
Classifications<br />
Computer crime encompasses a broad range of activities.<br />
Financial Fraud <strong>Crime</strong>s<br />
Computer fraud is any dishonest misrepresentation of fact intended to let another to do<br />
or refrain from doing something which causes loss. <strong>In</strong> this context, the fraud will result in<br />
obtaining a benefit by:<br />
<br />
<br />
<br />
Altering in an unauthorized way. This requires little technical expertise and is<br />
common form of theft by employees altering the data before entry or entering<br />
false data, or by entering unauthorized instructions or using unauthorized<br />
processes;<br />
Altering, destroying, suppressing, or stealing output, usually to conceal<br />
unauthorized transactions. This is difficult to detect;<br />
Altering or deleting stored data;<br />
Other forms of fraud may be facilitated using computer systems, including bank fraud,<br />
carding, identity theft, extortion, and theft of classified information.<br />
Cyber-terrorism<br />
Government officials and information technology security specialists have documented<br />
a significant increase in <strong>In</strong>ternet problems and server scans since early 2001. But there<br />
is a growing concern among government agencies such as the Federal Bureau of<br />
<strong>In</strong>vestigations (FBI) and the Central <strong>In</strong>telligence Agency (CIA) that such intrusions are<br />
part of an organized effort by cyberterrorists, foreign intelligence services, or other<br />
groups to map potential security holes in critical systems.<br />
A cyberterrorist is someone who intimidates or coerces a government or an organization<br />
to advance his or her political or social objectives by launching a computer-based attack<br />
against computers, networks, or the information stored on them.<br />
Cyberterrorism in general can be defined as an act of terrorism committed through the<br />
use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda<br />
piece in the <strong>In</strong>ternet that there will be bomb attacks during the holidays can be<br />
considered cyberterrorism. <strong>The</strong>re are also hacking activities directed towards<br />
individuals, families, organized by groups within networks, tending to cause fear among<br />
people, demonstrate power, collecting information relevant for ruining peoples' lives,<br />
robberies, blackmailing etc.<br />
Page 74 of 372
Cyber-Extortion<br />
Cyber-extortion occurs when a website, e-mail server, or computer system is subjected<br />
to or threatened with repeated denial of service or other attacks by malicious hackers.<br />
<strong>The</strong>se hackers demand money in return for promising to stop the attacks and to offer<br />
"protection". According to the Federal Bureau of <strong>In</strong>vestigation, cybercrime extortionists<br />
are increasingly attacking corporate websites and networks, crippling their ability to<br />
operate and demanding payments to restore their service. More than 20 cases are<br />
reported each month to the FBI and many go unreported in order to keep the victim's<br />
name out of the public domain. Perpetrators typically use a distributed denial-of-service<br />
attack. However, other cyber-extortion techniques exist such as doxing extortion and<br />
bug poaching.<br />
An example of cyber-extortion was the attack on Sony Pictures of 2014.<br />
Cyberwarfare<br />
<strong>The</strong> U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a<br />
national-level concern through several recent events of geostrategic significance.<br />
Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by<br />
Russian hackers. "<strong>In</strong> August 2008, Russia again allegedly conducted cyberattacks, this<br />
time in a coordinated and synchronized kinetic and non-kinetic campaign against the<br />
Page 75 of 372
country of Georgia. <strong>The</strong> December 2015 Ukraine power grid cyberattack has also been<br />
attributed to Russia and is considered the first successful cyberattack on a power grid.<br />
Fearing that such attacks may become the norm in future warfare among nation-states,<br />
the concept of cyberspace operations impacts and will be adapted by warfighting<br />
military commanders in the future.<br />
Computer As a Target<br />
<strong>The</strong>se crimes are committed by a selected group of criminals. Unlike crimes using the<br />
computer as a tool, these crimes require the technical knowledge of the perpetrators. As<br />
such, as technology evolves, so too does the nature of the crime. <strong>The</strong>se crimes are<br />
relatively new, having been in existence for only as long as computers have—which<br />
explains how unprepared society and the world in general is towards combating these<br />
crimes. <strong>The</strong>re are numerous crimes of this nature committed daily on the internet.<br />
<strong>Crime</strong>s that primarily target computer networks or devices include:<br />
<br />
<br />
<br />
Computer viruses<br />
Denial-of-service attacks<br />
Malware (malicious code)<br />
Computer as A Tool<br />
When the individual is the main target of cybercrime, the computer can be considered<br />
as the tool rather than the target. <strong>The</strong>se crimes generally involve less technical<br />
expertise. Human weaknesses are generally exploited. <strong>The</strong> damage dealt is largely<br />
psychological and intangible, making legal action against the variants more difficult.<br />
<strong>The</strong>se are the crimes which have existed for centuries in the offline world. Scams, theft,<br />
and the likes have existed even before the development in high-tech equipment. <strong>The</strong><br />
same criminal has simply been given a tool which increases their potential pool of<br />
victims and makes them all the harder to trace and apprehend.<br />
<strong>Crime</strong>s that use computer networks or devices to advance other ends include:<br />
<br />
<br />
<br />
<br />
<br />
Fraud and identity theft (although this increasingly uses malware, hacking or<br />
phishing, making it an example of both "computer as target" and "computer as<br />
tool" crime)<br />
<strong>In</strong>formation warfare<br />
Phishing scams<br />
Spam<br />
Propagation of illegal obscene or offensive content, including harassment and<br />
threats<br />
<strong>The</strong> unsolicited sending of bulk email for commercial purposes (spam) is unlawful in<br />
some jurisdictions.<br />
Page 76 of 372
Phishing is mostly propagated via email. Phishing emails may contain links to other<br />
websites that are affected by malware. Or, they may contain links to fake online banking<br />
or other websites used to steal private account information.<br />
Obscene or Offensive Content<br />
<strong>The</strong> content of websites and other electronic communications may be distasteful,<br />
obscene or offensive for a variety of reasons. <strong>In</strong> some instances these communications<br />
may be illegal.<br />
<strong>The</strong> extent to which these communications are unlawful varies greatly between<br />
countries, and even within nations. It is a sensitive area in which the courts can become<br />
involved in arbitrating between groups with strong beliefs.<br />
One area of <strong>In</strong>ternet pornography that has been the target of the strongest efforts at<br />
curtailment is child pornography, which is illegal in most jurisdictions in the world.<br />
Online Harassment<br />
Whereas content may be offensive in a non-specific way, harassment directs<br />
obscenities and derogatory comments at specific individuals focusing for example on<br />
gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms,<br />
through newsgroups, and by sending hate e-mail to interested parties. Harassment on<br />
the internet also includes revenge porn.<br />
<strong>The</strong>re are instances where committing a crime using a computer can lead to an<br />
enhanced sentence. For example, in the case of United States v. Neil Scott Kramer,<br />
Kramer was served an enhanced sentence according to the U.S. Sentencing Guidelines<br />
Page 77 of 372
Manual §2G1.3(b)(3) for his use of a cell phone to "persuade, induce, entice, coerce, or<br />
facilitate the travel of, the minor to engage in prohibited sexual conduct." Kramer argued<br />
that this claim was insufficient because his charge included persuading through a<br />
computer device and his cellular phone technically is not a computer. Although Kramer<br />
tried to argue this point, U.S. Sentencing Guidelines Manual states that the term<br />
computer "means an electronic, magnetic, optical, electrochemically, or other highspeed<br />
data processing device performing logical, arithmetic, or storage functions, and<br />
includes any data storage facility or communications facility directly related to or<br />
operating in conjunction with such device."<br />
Connecticut was the U.S. state to pass a statute making it a criminal offense to harass<br />
someone by computer. Michigan, Arizona, and Virginia and South Carolina have also<br />
passed laws banning harassment by electronic means.<br />
Harassment as defined in the U.S. computer statutes is typically distinct from<br />
cyberbullying, in that the former usually relates to a person's "use a computer or<br />
computer network to communicate obscene, vulgar, profane, lewd, lascivious, or<br />
indecent language, or make any suggestion or proposal of an obscene nature, or<br />
threaten any illegal or immoral act," while the latter need not involve anything of a<br />
sexual nature.<br />
Although freedom of speech is protected by law in most democratic societies (in the US<br />
this is done by the First Amendment), it does not include all types of speech. <strong>In</strong> fact<br />
spoken or written "true threat" speech/text is criminalized because of "intent to harm or<br />
intimidate", that also applies for online or any type of network related threats in written<br />
text or speech. <strong>The</strong> US Supreme Court definition of "true threat" is "statements where<br />
the speaker means to communicate a serious expression of an intent to commit an act<br />
of unlawful violence to a particular individual or group".<br />
Drug Trafficking<br />
Darknet markets are used to buy and sell recreational drugs online. Some drug<br />
traffickers use encrypted messaging tools to communicate with drug mules. <strong>The</strong> dark<br />
web site Silk Road was a major online marketplace for drugs before it was shut down by<br />
law enforcement (then reopened under new management, and then shut down by law<br />
enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged.<br />
However, it was just an older marketplace named Diabolus Market, that used the name<br />
for more exposure from the brand's previous success.<br />
Documented Cases<br />
<br />
One of the highest profiled banking computer crime occurred during a course of<br />
three years beginning in 1970. <strong>The</strong> chief teller at the Park Avenue branch of <strong>New</strong><br />
York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of<br />
accounts.<br />
Page 78 of 372
A hacking group called MOD (Masters of Deception), allegedly stole passwords<br />
and technical data from Pacific Bell, Nynex, and other telephone companies as<br />
well as several big credit agencies and two major universities. <strong>The</strong> damage<br />
caused was extensive, one company, Southwestern Bell suffered losses of<br />
$370,000 alone.<br />
<strong>In</strong> 1983, a 19-year-old UCLA student used his PC to break into a Defense<br />
Department <strong>In</strong>ternational Communications system.<br />
Between 1995 and 1998 the <strong>New</strong>scorp satellite pay to view encrypted SKY-TV<br />
service was hacked several times during an ongoing technological arms race<br />
between a pan-European hacking group and <strong>New</strong>scorp. <strong>The</strong> original motivation<br />
of the hackers was to watch Star Trek reruns in Germany; which was something<br />
which <strong>New</strong>scorp did not have the copyright to allow.<br />
<br />
<br />
<br />
On 26 March 1999, the Melissa worm infected a document on a victim's<br />
computer, then automatically sent that document and a copy of the virus spread<br />
via e-mail to other people.<br />
<strong>In</strong> February 2000, an individual going by the alias of MafiaBoy began a series<br />
denial-of-service attacks against high-profile websites, including Yahoo!, Dell,<br />
<strong>In</strong>c., E*TRADE, eBay, and CNN. About 50 computers at Stanford University, and<br />
also computers at the University of California at Santa Barbara, were amongst<br />
the zombie computers sending pings in DDoS attacks. On 3 August 2000,<br />
Canadian federal prosecutors charged MafiaBoy with 54 counts of illegal access<br />
to computers, plus a total of ten counts of mischief to data for his attacks.<br />
<strong>The</strong> Stuxnet worm corrupted SCADA microprocessors, particularly of the types<br />
used in Siemens centrifuge controllers.<br />
<strong>The</strong> Russian Business Network (RBN) was registered as an internet site in 2006.<br />
<strong>In</strong>itially, much of its activity was legitimate. But apparently, the founders soon<br />
discovered that it was more profitable to host illegitimate activities and started<br />
Page 79 of 372
hiring its services to criminals. <strong>The</strong> RBN has been described by VeriSign as "the<br />
baddest of the bad". It offers web hosting services and internet access to all<br />
kinds of criminal and objectionable activities, with individual activities earning up<br />
to $150 million in one year. It specialized in and in some cases monopolized<br />
personal identity theft for resale. It is the originator of MPack and an alleged<br />
operator of the now defunct Storm botnet.<br />
<br />
<br />
On 2 March 2010, Spanish investigators arrested 3 in infection of over 13 million<br />
computers around the world. <strong>The</strong> "botnet" of infected computers included PCs<br />
inside more than half of the Fortune 1000 companies and more than 40 major<br />
banks, according to investigators.<br />
<strong>In</strong> August 2010 the international investigation Operation Delego, operating under<br />
the aegis of the Department of Homeland Security, shut down the international<br />
pedophile ring Dreamboard. <strong>The</strong> website had approximately 600 members and<br />
may have distributed up to 123 terabytes of child pornography (roughly<br />
equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of<br />
an international child pornography ring; 52 arrests were made worldwide.<br />
<strong>In</strong> January 2012 Zappos.com experienced a security breach after as many as 24<br />
million customers' credit card numbers, personal information, billing and shipping<br />
addresses had been compromised.<br />
<br />
<br />
<br />
<br />
<br />
<strong>In</strong> June 2012 Linked<strong>In</strong> and eHarmony were attacked, compromising 65 million<br />
password hashes. 30,000 passwords were cracked and 1.5 million EHarmony<br />
passwords were posted online.<br />
December 2012 Wells Fargo website experienced a denial of service attack.<br />
Potentially compromising 70 million customers and 8.5 million active viewers.<br />
Other banks thought to be compromised: Bank of America, J. P. Morgan U.S.<br />
Bank, and PNC Financial Services.<br />
April 23, 2013 saw the Associated Press' Twitter account's hacked - the hacker<br />
posted a hoax tweet about fictitious attacks in the White House that they claimed<br />
left President Obama injured. This hoax tweet resulted in a brief plunge of 130<br />
points from the Dow Jones <strong>In</strong>dustrial Average, removal of $136 billion from S&P<br />
500 index, and the temporary suspension of AP's Twitter account. <strong>The</strong> Dow<br />
Jones later restored its session gains.<br />
<strong>In</strong> May 2017, 74 countries logged a ransomware cybercrime, called "WannaCry"<br />
Illicit access to camera sensors, microphone sensors, phonebook contacts, all<br />
internet-enabled apps, and metadata of mobile telephones running Android and<br />
IOS were reportedly made accessible by Israeli spyware, found to be being in<br />
operation in at least 46 nation-states around the world. Journalists, Royalty and<br />
government officials were amongst the targets. Previous accusations of cases of<br />
Page 80 of 372
Israeli-weapons companies meddling in international telephony and smartphones<br />
have been eclipsed in the 2018 reported case.<br />
Diffusion of Cybercrime<br />
Combating Computer <strong>Crime</strong><br />
<strong>The</strong> broad diffusion of cybercriminal activities is an issue in computer crimes detection<br />
and prosecution. According to Jean-Loup Richet (Research Fellow at ESSEC ISIS),<br />
technical expertise and accessibility no longer act as barriers to entry into cybercrime.<br />
<strong>In</strong>deed, hacking is much less complex than it was a few years ago, as hacking<br />
communities have greatly diffused their knowledge through the <strong>In</strong>ternet. Blogs and<br />
communities have hugely contributed to information sharing: beginners could benefit<br />
from older hackers' knowledge and advice. Furthermore, hacking is cheaper than ever:<br />
before the cloud computing era, in order to spam or scam one needed a dedicated<br />
server, skills in server management, network configuration, and maintenance,<br />
knowledge of <strong>In</strong>ternet service provider standards, etc. By comparison, a mail softwareas-a-service<br />
is a scalable, inexpensive, bulk, and transactional e-mail-sending service<br />
for marketing purposes and could be easily set up for spam. Jean-Loup Richet explains<br />
that cloud computing could be helpful for a cybercriminal as a way to leverage his attack<br />
– brute-forcing a password, improve the reach of a botnet, or facilitating a spamming<br />
campaign.<br />
<strong>In</strong>vestigation<br />
A computer can be a source of evidence (see digital forensics). Even where a computer<br />
is not directly used for criminal purposes, it may contain records of value to criminal<br />
investigators in the form of a logfile. <strong>In</strong> most countries <strong>In</strong>ternet Service Providers are<br />
required, by law, to keep their logfiles for a predetermined amount of time. For example;<br />
Page 81 of 372
a European wide Data Retention Directive (applicable to all EU member states) states<br />
that all e-mail traffic should be retained for a minimum of 12 months.<br />
Methodology of Cybercrime <strong>In</strong>vestigation<br />
<strong>The</strong>re are many ways for cybercrime to take place, and investigations tend to start with<br />
an IP Address trace, however that is not necessarily a factual basis upon which<br />
detectives can solve a case. Different types of high-tech crime may also include<br />
elements of low-tech crime, and vice versa, making cybercrime investigators an<br />
indispensable part of modern law-enforcement. Methodology of cybercrime detective<br />
work is dynamic and is constantly improving, whether in closed police units, or in<br />
international cooperation framework.<br />
Legislation<br />
Due to easily exploitable laws, cybercriminals use developing countries in order to<br />
evade detection and prosecution from law enforcement. <strong>In</strong> developing countries, such<br />
as the Philippines, laws against cybercrime are weak or sometimes nonexistent.<br />
<strong>The</strong>se weak laws allow cybercriminals to strike from international borders and remain<br />
undetected. Even when identified, these criminals avoid being punished or extradited to<br />
a country, such as the United States, that has developed laws that allow for<br />
prosecution. While this proves difficult in some cases, agencies, such as the FBI, have<br />
used deception and subterfuge to catch criminals. For example, two Russian hackers<br />
had been evading the FBI for some time.<br />
<strong>The</strong> FBI set up a fake computing company based in Seattle, Washington. <strong>The</strong>y<br />
proceeded to lure the two Russian men into the United States by offering them work<br />
with this company. Upon completion of the interview, the suspects were arrested<br />
outside of the building. Clever tricks like this are sometimes a necessary part of<br />
catching cybercriminals when weak legislation makes it impossible otherwise.<br />
President Barack Obama released in an executive order in April 2015 to combat<br />
cybercrime. <strong>The</strong> executive order allows the United States to freeze assets of convicted<br />
cybercriminals and block their economic activity within the United States. This is some<br />
of the first solid legislation that combats cybercrime in this way.<br />
<strong>The</strong> European Union adopted directive 2013/40/EU. All offences of the directive, and<br />
other definitions and procedural institutions are also in the Council of Europe's<br />
Convention on Cybercrime..<br />
It is not only the USA and the European Union who are introducing new measures<br />
against cybercrime. ON 31 May 2017 China announced that its new cybersecurity law<br />
takes effect on this date.<br />
Page 82 of 372
Penalties<br />
Penalties for computer-related crimes in <strong>New</strong> York State can range from a fine and a<br />
short period of jail time for a Class A misdemeanor such as unauthorized use of a<br />
computer up to computer tampering in the first degree which is a Class C felony and<br />
can carry 3 to 15 years in prison.<br />
However, some hackers have been hired as information security experts by private<br />
companies due to their inside knowledge of computer crime, a phenomenon which<br />
theoretically could create perverse incentives. A possible counter to this is for courts to<br />
ban convicted hackers from using the <strong>In</strong>ternet or computers, even after they have been<br />
released from prison – though as computers and the <strong>In</strong>ternet become more and more<br />
central to everyday life, this type of punishment may be viewed as more and more harsh<br />
and draconian. However, nuanced approaches have been developed that manage<br />
cyber offenders' behavior without resorting to total computer or <strong>In</strong>ternet bans. <strong>The</strong>se<br />
approaches involve restricting individuals to specific devices which are subject to<br />
computer monitoring or computer searches by probation or parole officers.<br />
Awareness<br />
As technology advances and more people rely on the internet to store sensitive<br />
information such as banking or credit card information, criminals increasingly attempt to<br />
steal that information. Cybercrime is becoming more of a threat to people across the<br />
world. Raising awareness about how information is being protected and the tactics<br />
criminals use to steal that information continues to grow in importance. According to the<br />
FBI's <strong>In</strong>ternet <strong>Crime</strong> Complaint Center in 2014, there were 269,422 complaints filed.<br />
With all the claims combined there was a reported total loss of $800,492,073. But<br />
cybercrime does yet seem to be on the average person's radar. <strong>The</strong>re are 1.5 million<br />
Page 83 of 372
cyber-attacks annually, that means that there are over 4,000 attacks a day, 170 attacks<br />
every hour, or nearly three attacks every minute, with studies showing us that only 16%<br />
of victims had asked the people who were carrying out the attacks to stop. Anybody<br />
who uses the internet for any reason can be a victim, which is why it is important to be<br />
aware of how one is being protected while online.<br />
<strong>In</strong>telligence<br />
As cybercrime has proliferated, a professional ecosystem has evolved to support<br />
individuals and groups seeking to profit from cybercriminal activities. <strong>The</strong> ecosystem<br />
has become quite specialized, including malware developers, botnet operators,<br />
professional cybercrime groups, groups specializing in the sale of stolen content, and so<br />
forth. A few of the leading cybersecurity companies have the skills, resources and<br />
visibility to follow the activities of these individuals and group. A wide variety of<br />
information is available from these sources which can be used for defensive purposes,<br />
including technical indicators such as hashes of infected files or malicious IPs/URLs, as<br />
well as strategic information profiling the goals, techniques and campaigns of the<br />
profiled groups. Some of it is freely published, but consistent, on-going access typically<br />
requires subscribing to an adversary intelligence subscription service. At the level of an<br />
individual threat actor, threat intelligence is often referred to that actor's "TTP", or<br />
"tactics, techniques, and procedures," as the infrastructure, tools, and other technical<br />
indicators are often trivial for attackers to change. Corporate sectors are considering<br />
crucial role of artificial intelligence cyber security.<br />
Agencies<br />
ASEAN<br />
Australian High Tech <strong>Crime</strong> Centre<br />
Cyber <strong>Crime</strong> <strong>In</strong>vestigation Cell, a wing of Mumbai Police, <strong>In</strong>dia<br />
Cyber <strong>Crime</strong> Unit (Hellenic Police), formed in Greece in 1995<br />
National White Collar <strong>Crime</strong> Center, in the United States<br />
National Cyber <strong>Crime</strong> Unit, in the United Kingdom<br />
Page 84 of 372
V. Drug Trafficking<br />
<strong>The</strong> Illegal Drug Trade or Drug Trafficking is a global black market dedicated to the<br />
cultivation, manufacture, distribution and sale of drugs that are subject to drug<br />
prohibition laws. Most jurisdictions prohibit trade, except under license, of many types of<br />
drugs through the use of drug prohibition laws.<br />
<strong>The</strong> United Nations Office on Drugs and <strong>Crime</strong>'s World Drug Report 2005 estimates the<br />
size of the global illicit drug market at US$321.6 billion in 2003 alone. With a world GDP<br />
of US$36 trillion in the same year, the illegal drug trade may be estimated as nearly 1%<br />
of total global trade. Consumption of illegal drugs is widespread globally and remains<br />
very difficult for local authorities to thwart its popularity.<br />
Page 85 of 372
History<br />
Chinese authorities issued edicts against opium smoking in 1729, 1796 and 1800. <strong>The</strong><br />
West prohibited addictive drugs throughout the late 19th and early 20th centuries.<br />
<strong>In</strong> the early 19th century, an illegal drug trade in China emerged. As a result, by 1838<br />
the number of Chinese opium-addicts had grown to between four and twelve million.<br />
<strong>The</strong> Chinese government responded by enforcing a ban on the import of opium; this led<br />
to the First Opium War (1839-1842) between the United Kingdom and Qing-dynasty<br />
China. <strong>The</strong> United Kingdom won and forced China to allow British merchants to sell<br />
<strong>In</strong>dian-grown opium. Trading in opium was lucrative, and smoking opium had become<br />
common in the 19th century, so British merchants increased trade with the Chinese.<br />
<strong>The</strong> Second Opium War broke out in 1856, with the British joined this time by the<br />
French. After the two Opium Wars, the British Crown, via the treaties of Nanking (1842),<br />
and Tianjin (1858), obligated the Chinese government to pay large sums of money for<br />
opium they had seized and destroyed, which were referred to as "reparations".<br />
<strong>In</strong> 1868, as a result of the increased use of opium, the UK restricted the sale of opium in<br />
Britain by implementing the 1868 Pharmacy Act. <strong>In</strong> the United States, control of opium<br />
remained under the control of individual US states until the introduction of the Harrison<br />
Act in 1914, after 12 international powers signed the <strong>In</strong>ternational Opium Convention in<br />
1912.<br />
Between 1920 and 1933 the Eighteenth Amendment to the United States Constitution<br />
banned alcohol in the United States. Prohibition proved almost impossible to enforce<br />
and resulted in the rise of organized crime, including the modern American Mafia, which<br />
identified enormous business opportunities in the manufacturing, smuggling and sale of<br />
illicit liquor.<br />
<strong>The</strong> beginning of the 21st century saw drug use increase in North America and Europe,<br />
with a particularly increased demand for marijuana and cocaine. As a result,<br />
international organized crime syndicates such as the Sinaloa Cartel and 'Ndrangheta<br />
have increased cooperation among each other in order to facilitate trans-Atlantic drugtrafficking.<br />
Use of another illicit drug, hashish, has also increased in Europe.<br />
Drug trafficking is widely regarded by lawmakers as a serious offense around the world.<br />
Penalties often depend on the type of drug (and its classification in the country into<br />
which it is being trafficked), the quantity trafficked, where the drugs are sold and how<br />
they are distributed. If the drugs are sold to underage people, then the penalties for<br />
trafficking may be harsher than in other circumstances.<br />
Drug smuggling carries severe penalties in many countries. Sentencing may include<br />
lengthy periods of incarceration, flogging and even the death penalty (in Singapore,<br />
Malaysia, <strong>In</strong>donesia and elsewhere). <strong>In</strong> December 2005, Van Tuong Nguyen, a 25-<br />
year-old Australian drug smuggler, was hanged in Singapore after being convicted in<br />
March 2004. <strong>In</strong> 2010, two people were sentenced to death in Malaysia for trafficking 1<br />
Page 86 of 372
kilogram (2.2 lb) of cannabis into the country. Execution is mostly used as a deterrent,<br />
and many have called upon much more effective measures to be taken by countries to<br />
tackle drug trafficking; for example, targeting specific criminal organisations (which are<br />
often also active in the smuggling of other goods (i.e. wildlife) and even people <strong>In</strong> some<br />
cases, even links between politicians and the criminal organisations have been proven<br />
to exist.<br />
Effects of <strong>The</strong> Illegal Drug Trade on Societies<br />
<strong>The</strong> countries of drug production and transit are some of the most affected by the drug<br />
trade, though countries receiving the illegally imported substances are also adversely<br />
affected. For example, Ecuador has absorbed up to 300,000 refugees from Colombia<br />
who are running from guerrillas, paramilitaries and drug lords. While some applied for<br />
asylum, others are still illegal immigrants. <strong>The</strong> drugs that pass from Colombia through<br />
Ecuador to other parts of South America create economic and social problems.<br />
Honduras, through which an estimated 79% of cocaine passes on its way to the United<br />
States, has the highest murder rate in the world. According to the <strong>In</strong>ternational Crisis<br />
Group, the most violent regions in Central America, particularly along the Guatemala–<br />
Honduras border, are highly correlated with an abundance of drug trafficking activity.<br />
Page 87 of 372
Violent <strong>Crime</strong><br />
<strong>In</strong> many countries worldwide, the illegal drug trade is thought to be directly linked to<br />
violent crimes such as murder. This is especially true in all developing countries, such<br />
as Honduras, but is also an issue for many developed countries worldwide. <strong>In</strong> the late<br />
1990s in the United States the Federal Bureau of <strong>In</strong>vestigation estimated that 5% of<br />
murders were drug-related. <strong>In</strong> Colombia, Drug violence can be caused by factors such<br />
as, the economy, poor governments, and no authority within the law enforcement.<br />
After a crackdown by US and Mexican authorities in the first decade of the 21st century<br />
as part of tightened border security in the wake of the September 11 attacks, border<br />
violence inside Mexico surged. <strong>The</strong> Mexican government estimates that 90% of the<br />
killings are drug-related.<br />
A report by the UK government's Drug Strategy Unit that was leaked to the press, stated<br />
that due to the expensive price of highly addictive drugs heroin and cocaine, drug use<br />
was responsible for the great majority of crime, including 85% of shoplifting, 70-80% of<br />
burglaries and 54% of robberies. It concluded that "[t]he cost of crime committed to<br />
support illegal cocaine and heroin habits amounts to £16 billion a year in the UK"<br />
South America<br />
Drug Trafficking Routes<br />
Venezuela has been a path to the United States and Europe for illegal drugs originating<br />
in Colombia, through Central America, Mexico and Caribbean countries such as Haiti,<br />
the Dominican Republic, and Puerto Rico.<br />
According to the United Nations, there was an increase of cocaine trafficking through<br />
Venezuela since 2002. <strong>In</strong> 2005 Venezuela severed ties with the United States Drug<br />
Enforcement Administration (DEA), accusing its representatives of spying. Following the<br />
departure of the DEA from Venezuela and the expansion of DEA's partnership with<br />
Colombia in 2005, Venezuela became more attractive to drug traffickers. Between 2008<br />
and 2012, Venezuela's cocaine seizure ranking among other countries declined, going<br />
from being ranked fourth in the world for cocaine seizures in 2008 to sixth in the world in<br />
2012.<br />
On 18 November 2016, following what was known as the Narcosobrinos incident,<br />
Venezuelan President Nicolás Maduro's two nephews were found guilty of trying to ship<br />
drugs into the United States so they could "obtain a large amount of cash to help their<br />
family stay in power".<br />
West Africa<br />
Cocaine produced in Colombia and Bolivia increasingly has been shipped via West<br />
Africa (especially in Cape Verde, Mali, Benin, Togo, Nigeria, Cameroon, Guinea-Bissau<br />
Page 88 of 372
and Ghana). <strong>The</strong> money is often laundered in countries such as Nigeria, Ghana and<br />
Senegal.<br />
According to the Africa Economic <strong>In</strong>stitute, the value of illicit drug smuggling in Guinea-<br />
Bissau is almost twice the value of the country's GDP. Police officers are often bribed. A<br />
police officer's normal monthly wage of $93 is less than 2% of the value of 1 kilogram<br />
(2.2 lb) of cocaine (€7000 or $8750). <strong>The</strong> money can also be laundered using real<br />
estate. A house is built using illegal funds, and when the house is sold, legal money is<br />
earned. When drugs are sent over land, through the Sahara, the drug traders have<br />
been forced to cooperate with terrorist organizations, such as Al Qaida in Islamic<br />
Maghreb.<br />
Eastern and Southern Africa<br />
Heroin is increasingly trafficked from Afghanistan to Europe and America through<br />
eastern and southern African countries. This path is known as the “southern route” or<br />
“smack track.” Repercussions of this trade include burgeoning heroin use and political<br />
corruption among intermediary African nations.<br />
Asia<br />
Drugs in Asia traditionally traveled the southern routes - the main caravan axes of<br />
Southeast Asia and Southern China - and include the former opium-producing countries<br />
of Thailand, Iran, and Pakistan. After the 1990s, particularly after the Cold War ended,<br />
Page 89 of 372
orders were opened and trading and customs agreements were signed so that the<br />
routes expanded to include China, Central Asia, and Russia. <strong>The</strong>re is, therefore, a<br />
diversified drug trafficking routes available today, particularly in the heroin trade and<br />
these thrive due to the continuous development of new markets. A large amount of<br />
drugs are smuggled into Europe from Asia. <strong>The</strong> main sources of these drugs are<br />
Afghanistan, along with countries that constituted the so-called Golden Crescent. From<br />
these producers, drugs are smuggled into the West and Central Asia to its destinations<br />
in Europe and the United States. Iran is now the route for smugglers, having been<br />
previously a primary trading route, due to its large-scale and costly war against drug<br />
trafficking. <strong>The</strong> Border Police Chief of Iran said that his country "is a strong barrier<br />
against the trafficking of illegal drugs to Caucasus, especially the Republic of<br />
Azerbaijan." <strong>The</strong> drugs produced by the Golden Triangle of Myanmar, Laos, and<br />
Thailand, on the other hand, pass through the southern routes to feed the Australian,<br />
U.S., and Asian markets.<br />
Online<br />
Drugs are increasingly traded online on the dark web on darknet markets.<br />
Profits<br />
Statistics about profits from the drug trade are largely unknown due to its illicit nature. <strong>In</strong><br />
its 1997 World Drugs Report the United Nations Office on Drugs and <strong>Crime</strong> estimated<br />
the value of the market at $4 trillion, ranking drugs alongside arms and oil among the<br />
world's largest traded goods. An online report published by the UK Home Office in 2007<br />
estimated the illicit drug market in the UK at £4–6.6 billion a year<br />
<strong>In</strong> December 2009 United Nations Office on Drugs and <strong>Crime</strong> Executive Director<br />
Antonio Maria Costa claimed illegal drug money saved the banking industry from<br />
collapse. He claimed he had seen evidence that the proceeds of organized crime were<br />
"the only liquid investment capital" available to some banks on the brink of collapse<br />
during 2008. He said that a majority of the $352 billion (£216bn) of drug profits was<br />
absorbed into the economic system as a result:<br />
"<strong>In</strong> many instances, the money from drugs was the only liquid investment capital. <strong>In</strong> the<br />
second half of 2008, liquidity was the banking system's main problem and hence liquid<br />
capital became an important factor...<strong>In</strong>ter-bank loans were funded by money that<br />
originated from the drugs trade and other illegal activities...there were signs that some<br />
banks were rescued that way".<br />
Costa declined to identify countries or banks that may have received any drug money,<br />
saying that would be inappropriate because his office is supposed to address the<br />
problem, not apportion blame.<br />
Though street-level drug sales are widely viewed as lucrative, a study by Sudhir<br />
Venkatesh suggested that many low-level employees receive low wages. <strong>In</strong> a study he<br />
Page 90 of 372
made in the 1990s working closely with members of the Black Gangster Disciple Nation<br />
in Chicago, he found that one gang (essentially a franchise) consisted of a leader (a<br />
college graduate named J.T.), three senior officers, and 25 to 75 street level salesmen<br />
('foot soldiers') depending on season. Selling crack cocaine, they took in approximately<br />
$32,000 per month over a six-year period. This was spent as follows: $5,000 to the<br />
board of twenty directors of the Black Gangster Disciple Nation, who oversaw 100 such<br />
gangs for approximately $500,000 in monthly income. Another $5,000 monthly was paid<br />
for cocaine, and $4,000 for other non-wage expenses. J.T. took $8,500 monthly for his<br />
own salary. <strong>The</strong> remaining $9,500 monthly went to pay the employees a $7 per hour<br />
wage for officers and a $3.30 per hour wage for foot soldiers. Contrary to a popular<br />
image of drug sales as a lucrative profession, many of the employees were living with<br />
their mothers by necessity. Despite this, the gang had four times as many unpaid<br />
members who dreamed of becoming foot soldiers.<br />
Free Trade Link<br />
<strong>The</strong>re are several arguments on whether or not free trade has a correlation to an<br />
increased activity in the illicit drug trade. Currently, the structure and operation of the<br />
illicit drug industry is described mainly in terms of an international division of labor. Free<br />
trade can open new markets to domestic producers who would otherwise resort to<br />
exporting illicit drugs. Additionally, extensive free trade among states increases crossborder<br />
drug enforcement and coordination between law enforcement agencies in<br />
different countries. However, free trade also increases the sheer volume of legal crossborder<br />
trade and provides cover for drug smuggling—by providing ample opportunity to<br />
conceal illicit cargo in legal trade. While international free trade continues to expand the<br />
volume of legal trade, the ability to detect and interdict drug trafficking is severely<br />
diminished. Towards the late 1990s, the top ten seaports in the world processed 33.6<br />
million containers. Free trade has fostered integration of financial markets and has<br />
provided drug traffickers with more opportunities to launder money and invest in other<br />
activities. This strengthens the drug industry while weakening the efforts of law<br />
enforcement to monitor the flow of drug money into the legitimate economy.<br />
Page 91 of 372
Cooperation among cartels expands their scope to distant markets and strengthens<br />
their abilities to evade detection by local law enforcement. Additionally, criminal<br />
organizations work together to coordinate money-laundering activities by having<br />
separate organizations handle specific stages of laundering process. One organization<br />
structures the process of how financial transactions will be laundered, while another<br />
criminal group provides the “dirty” money to be cleaned. By fostering expansion of trade<br />
and global transportation networks, free trade encourages cooperation and formation of<br />
alliances among criminal organizations across different countries. <strong>The</strong> drug trade in<br />
Latin America emerged in the early 1930s. It saw significant growth in the Andean<br />
countries, including Peru, Bolivia, Chile, Ecuador, Colombia and Venezuela. <strong>The</strong><br />
underground market in the early half of the 20th century mainly had ties to Europe. After<br />
World War II, the Andean countries saw an expansion of trade, specifically with cocaine.<br />
Background<br />
Drug Trafficking by Country<br />
United States<br />
<strong>The</strong> effects of the illegal drug trade in the United States can be seen in a range of<br />
political, economic and social aspects. <strong>In</strong>creasing drug related violence can be tied to<br />
the racial tension that arose during the late 20th century along with the political<br />
upheaval prevalent throughout the 1960s and 70s. <strong>The</strong> second half of the 20th century<br />
was a period when increased wealth, and increased discretionary spending, increased<br />
the demand for illicit drugs in certain areas of the United States. Large-scale drug<br />
trafficking is one of the few capital crimes, and may result in a death sentence<br />
prescribed at the federal level.<br />
Political Impact<br />
A large generation, the baby boomers, came of age in the 1960s. <strong>The</strong>ir social tendency<br />
to confront the law on specific issues, including illegal drugs, overwhelmed the<br />
understaffed judicial system. <strong>The</strong> federal government attempted to enforce the law, but<br />
with meager effect.<br />
Marijuana was a popular drug seen through the Latin American trade route in the<br />
1960s. Cocaine became a major drug product in the later decades. Much of the cocaine<br />
is smuggled from Colombia and Mexico via Jamaica. This led to several administrations<br />
combating the popularity of these drugs. Due to the influence of this development on the<br />
U.S. economy, the Reagan administration began "certifying" countries for their attempts<br />
at controlling drug trafficking. This allowed the United States to intervene in activities<br />
related to illegal drug transport in Latin America. Continuing into the 1980s, the United<br />
States instated stricter policy pertaining to drug transit through sea. As a result, there<br />
was an influx in drug-trafficking across the Mexico–U.S. border. This increased the drug<br />
cartel activity in Mexico. By the early 1990s, so much as 50% of the cocaine available in<br />
the United States market originated from Mexico, and by the 2000s, over 90% of the<br />
Page 92 of 372
cocaine in the United States was imported from Mexico. <strong>In</strong> Colombia, however, there<br />
was a fall of the major drug cartels in the mid-1990s. Visible shifts occurred in the drug<br />
market in the United States. Between the 1996 and 2000, U.S. cocaine consumption<br />
dropped by 11%.<br />
<strong>In</strong> 2008, the U.S. government initiated another program, known as the Merida <strong>In</strong>itiative,<br />
to help combat drug trafficking in Mexico. This program increased U.S. security<br />
assistance to $1.4 billion over several years, which helped supply Mexican forces with<br />
"high-end equipment from helicopters to surveillance technology". Despite U.S. aid,<br />
Mexican "narcogangs" continue to outnumber and outgun the Mexican Army, allowing<br />
for continued activities of drug cartels across the U.S.–Mexico border.<br />
Social Impacts<br />
Although narcotics are illegal in the US, they have become integrated into the nation's<br />
culture and are seen as a recreational activity by sections of the population. Illicit drugs<br />
are considered to be a commodity with strong demand, as they are typically sold at a<br />
high value. This high price is caused by a combination of factors that include the<br />
potential legal ramifications that exist for suppliers of illicit drugs and their high demand.<br />
Despite the constant effort by politicians to win the war on drugs, the US is still the<br />
world's largest importer of illegal drugs.<br />
Throughout the 20th century, narcotics other than cocaine also crossed the Mexican<br />
border, meeting the US demand for alcohol during the 1920s Prohibition, opiates in the<br />
1940s, marijuana in the 1960s, and heroin in the 1970s. Most of the U.S. imports of<br />
drugs come from Mexican drug cartels. <strong>In</strong> the United States, around 195 cities have<br />
Page 93 of 372
een infiltrated by drug trafficking that originated in Mexico. An estimated $10bn of the<br />
Mexican drug cartel's profits come from the United States, not only supplying the<br />
Mexican drug cartels with the profit necessary for survival, but also furthering America's<br />
economic dependence on drugs.<br />
Demographics<br />
With a large wave of immigrants in the 1960s and onwards, the United States saw an<br />
increased heterogeneity in its public. <strong>In</strong> the 1980s and 90s, drug related homicide was<br />
at a record high. This increase in drug violence became increasingly tied to these ethnic<br />
minorities. Though the rate of violence varied tremendously among cities in America, it<br />
was a common anxiety in communities across urban America. An example of this could<br />
be seen in Miami, a city with a host of ethnic enclaves. Between 1985 and 1995, the<br />
homicide rate in Miami was one of the highest in the nation—four times the national<br />
homicide average. This crime rate was correlated with regions with low employment and<br />
was not entirely dependent on ethnicity.<br />
<strong>The</strong> baby boomer generation also felt the effects of the drug trade in their increased<br />
drug use from the 1960s to 80s. Along with substance abuse, criminal involvement,<br />
suicide and murder were also on the rise. Due to the large amount of baby boomers,<br />
commercial marijuana use was on the rise. This increased the supply and demand for<br />
marijuana during this time period.<br />
Mexico<br />
Political <strong>In</strong>fluences<br />
Corruption in Mexico has contributed to the domination of Mexican cartels in the illicit<br />
drug trade. Since the beginning of the 20th century, Mexico's political environment<br />
allowed the growth of drug-related activity. <strong>The</strong> loose regulation over the transportation<br />
of illegal drugs and the failure to prosecute known drug traffickers and gangs increased<br />
the growth of the drug industry. Toleration of drug trafficking has undermined the<br />
authority of the Mexican government and has decreased the power of law enforcement<br />
officers in regulation over such activities. <strong>The</strong>se policies of tolerance fostered the<br />
growing power of drug cartels in the Mexican economy and have made drug traders<br />
wealthier. Many states in Mexico lack policies that establish stability in governance.<br />
<strong>The</strong>re also is a lack of local stability, as mayors cannot be re-elected. This requires<br />
electing a new mayor each term. Drug gangs have manipulated this, using vacuums in<br />
local leadership to their own advantage.<br />
<strong>In</strong> 1929, the <strong>In</strong>stitutional Revolutionary Party (PRI) was formed to resolve the chaos<br />
resulting from the Mexican Revolution. Over time, this party gained political influence<br />
and had a major impact on Mexico's social and economic policies. <strong>The</strong> party created<br />
ties with various groups as a power play in order to gain influence, and as a result<br />
created more corruption in the government. One such power play was an alliance with<br />
drug traffickers. This political corruption obscured justice, making it difficult to identify<br />
violence when it related to drugs. By the 1940s, the tie between the drug cartels and the<br />
Page 94 of 372
PRI had solidified. This arrangement created immunity for the leaders of the drug<br />
cartels and allowed drug trafficking to grow under the protection of the government<br />
officials. During the 1990s, the PRI lost some elections to the new National Action<br />
Party(PAN). Chaos again emerged as elected government in Mexico changed<br />
drastically. As the PAN party took control, drug cartel leaders took advantage of the<br />
ensuing confusion and used their existing influence to further gain power. <strong>In</strong>stead of<br />
negotiating with the central government as was done with the PRI party, drug cartels<br />
utilized new ways to distribute their supply and continued operating through force and<br />
intimidation. As Mexico became more democratized, the corruption fell from a<br />
centralized power to the local authorities. [61] Cartels began to bribe local authorities,<br />
thus eliminating the structure and rules placed by the government—giving cartels more<br />
freedom. As a response, Mexico saw an increase in violence caused by drug trafficking.<br />
<strong>The</strong> corruption cartels created resulted in distrust of government by the Mexican public.<br />
This distrust became more prominent after the collapse of the PRI party. <strong>In</strong> response,<br />
the presidents of Mexico, in the late twentieth century and early twenty-first century,<br />
implemented several different programs relating to law enforcement and regulation. <strong>In</strong><br />
1993, President Salinas created the National <strong>In</strong>stitute for the Combat of Drugs in<br />
Mexico. From 1995–1998, President Zedillo established policies regarding increased<br />
punishment of organized crime, allowing "[wire taps], protected witnesses, covert agents<br />
and seizures of goods", and increasing the quality of law enforcement at the federal<br />
level. From 2001–2005, President Vicente Fox created the Federal Agency of<br />
<strong>In</strong>vestigation. <strong>The</strong>se policies resulted in the arrests of major drug-trafficking bosses:<br />
Mexico's Economy<br />
Arrested Drug Traffickers<br />
Year Person Cartel<br />
1989 Miguel Angel Felix Gallardo Sinaloa Cartel<br />
1993 Joaquín Guzmán Loera Sinaloa Cartel<br />
1995 Héctor Luis Palma<br />
1996 Juan Garcia Abrego Gulf Cartel<br />
2002 Ismael Higuera Guerrero Tijuana Cartel<br />
Jesus Labra<br />
Tijuana Cartel<br />
Adan Amezcua<br />
Colima Cartel<br />
Benjamin Arellano Felix Tijuana Cartel<br />
2003 Osiel Cardenas Gulf Cartel<br />
Over the past few decades drug cartels have become integrated into Mexico's<br />
economy. Approximately 500 cities are directly engaged in drug trafficking and nearly<br />
450,000 people are employed by drug cartels. Additionally, the livelihood of 3.2 million<br />
people is dependent on the drug cartels. Between local and international sales, such as<br />
to Europe and the United States, drug cartels in Mexico see a $25–30bn yearly profit, a<br />
great deal of which circulates through international banks such as HSBC. Drug cartels<br />
are fundamental in local economics. A percentage of the profits seen from the trade are<br />
invested in the local community. Such profits contribute to the education and healthcare<br />
of the community. While these cartels bring violence and hazards into communities,<br />
they create jobs and provide income for its many members.<br />
Page 95 of 372
Culture of Drug Cartels<br />
Major cartels saw growth due to a prominent set culture of Mexican society that created<br />
the means for drug capital. One of the sites of origin for drug trafficking within Mexico,<br />
was the state of Michoacán. <strong>In</strong> the past, Michoacán was mainly an agricultural society.<br />
This provided an initial growth of trade. <strong>In</strong>dustrialization of rural areas of Mexico<br />
facilitated a greater distribution of drugs, expanding the drug market into different<br />
provinces. Once towns became industrialized, cartels such as the Sinaloa Cartel started<br />
to form and expand. <strong>The</strong> proliferation of drug cartel culture largely stemmed from the<br />
ranchero culture seen in Michoacán. Ranchero culture values the individual as opposed<br />
to the society as a whole. This culture fostered the drug culture of valuing the family that<br />
is formed within the cartel. This ideal allowed for greater organization within the cartels.<br />
Gangs play a major role in the activity of drug cartels. MS-13 and the 18th Street gang<br />
are notorious for their contributions and influence over drug trafficking throughout Latin<br />
America. MS-13 has controlled much of the activity in the drug trade spanning from<br />
Mexico to Panama Female involvement is present in the Mexican drug culture. Although<br />
females are not treated as equals to males, they typically hold more power than their<br />
culture allows and acquire some independence. <strong>The</strong> increase in power has attracted<br />
females from higher social classes. Financial gain has also prompted women to become<br />
involved in the illegal drug market. Many women in the lower levels of major drug cartels<br />
belong to a low economic class. Drug trafficking offers women an accessible way to<br />
earn income. Females from all social classes have become involved in the trade due to<br />
outside pressure from their social and economic environments.<br />
Political Ties<br />
Colombia<br />
It was common for smugglers in Colombia to import liquor, alcohol, cigarettes and<br />
textiles, while exporting cocaine. Personnel with knowledge of the terrain were able to<br />
supply the local market while also exporting a large amount of product. <strong>The</strong> established<br />
trade that began in the 1960s involved Peru, Bolivia, Colombia, Venezuela and Cuba.<br />
Peasant farmers produced coca paste in Peru and Bolivia, while Colombian smugglers<br />
would process the coca paste into cocaine in Colombia, and trafficked product through<br />
Cuba. This trade route established ties between Cuban and Colombian organized<br />
crime. From Cuba, cocaine would be transported to Miami, Florida; and Union City, <strong>New</strong><br />
Jersey. Quantities of the drug were then smuggled throughout the US. <strong>The</strong> international<br />
drug trade created political ties between the involved countries, encouraging the<br />
governments of the countries involved to collaborate and instate common policies to<br />
eradicate drug cartels. Cuba stopped being a center for transport of cocaine following<br />
the establishment of a communist government in 1959. As a result, Miami and Union<br />
City became the sole locations for trafficking. <strong>The</strong> relations between Cuban and<br />
Colombian organized crime remained strong until the 1970s, when Colombian cartels<br />
began to vie for power. <strong>In</strong> the 1980s and 90s, Colombia emerged as a key contributor of<br />
the drug trade industry in the Western Hemisphere. While the smuggling of drugs such<br />
Page 96 of 372
as marijuana, poppy, opium and heroin became more ubiquitous during this time period,<br />
the activity of cocaine cartels drove the development of the Latin American drug trade.<br />
<strong>The</strong> trade emerged as a multinational effort as supplies (i.e. coca plant substances)<br />
were imported from countries such as Bolivia and Peru, were refined in Colombian<br />
cocaine labs and smuggled through Colombia, and exported to countries such as the<br />
US.<br />
Colombia's Economy<br />
Colombia has had a significant role in the illegal drug trade in Latin America. While<br />
active in the drug trade since the 1930s, Colombia's role in the drug trade did not truly<br />
become dominant until the 1970s. When Mexico eradicated marijuana plantations,<br />
demand stayed the same. Colombia met much of the demand by growing more<br />
marijuana. Grown in the strategic northeast region of Colombia, marijuana soon<br />
became the leading cash crop in Colombia. This success was short-lived due to antimarijuana<br />
campaigns that were enforced by the US military throughout the Caribbean.<br />
<strong>In</strong>stead, drug traffickers in Colombia continued their focus on the exportation of cocaine.<br />
Having been an export of Colombia since the early 1950s, cocaine remained popular for<br />
a host of reasons. Colombia's location facilitated its transportation from South America<br />
into Central America, and then to its destination of North America. This continued into<br />
the 1990s, when Colombia remained the chief exporter of cocaine. <strong>The</strong> business of<br />
drug trafficking can be seen in several stages in Colombia towards the latter half of the<br />
20th century. Colombia served as the dominant force in the distribution and sale of<br />
cocaine by the 1980s. As drug producers gained more power, they became more<br />
centralized and organized into what became drug cartels. Cartels controlled the major<br />
aspects of each stage in the traffic of their product. <strong>The</strong>ir organization allowed cocaine<br />
Page 97 of 372
to be distributed in great amounts throughout the United States. By the late 1980s, intraindustry<br />
strife arose within the cartels. This stage was marked by increased violence as<br />
different cartels fought for control of export markets. Despite this strife, this power<br />
struggle led to then having multiple producers of coca leaf farms. This in turn caused an<br />
improvement in quality control and reduction of police interdiction in the distribution of<br />
cocaine. This also led to cartels attempting to repatriate their earnings which would<br />
eventually make up 5.5% of Colombia's GDP. This drive to repatriate earnings led to the<br />
pressure of legitimizing their wealth, causing an increase in violence throughout<br />
Colombia.<br />
Throughout the 1980s, estimates of illegal drug value in Colombia ranged from $2bn to<br />
$4bn. This made up about 7-10% of the $36bn estimated GNP of Colombia during this<br />
decade. <strong>In</strong> the 1990s, the estimates of the illegal drug value remained roughly within the<br />
same range (~$2.5bn). As the Colombian GNP rose throughout the 90's ($68.5bn in<br />
1994 and $96.3bn in 1997), illegal drug values began to comprise a decreasing fraction<br />
of the national economy. By the early 1990s, although Colombia led in the exportation<br />
of cocaine, it found increasing confrontations within its state. <strong>The</strong>se confrontations were<br />
primarily between cartels and government institutions. This led to a decrease in the drug<br />
trade's contribution to the GDP of Colombia; dropping from 5.5% to 2.6%. Though a<br />
contributor of wealth, the distribution of cocaine has had negative effects on the sociopolitical<br />
situation of Colombia and has weakened its economy as well.<br />
Social Impacts<br />
By the 1980s, Colombian cartels became the dominant cocaine distributors in the US.<br />
This led to the spread of increased violence throughout both Latin America and Miami.<br />
<strong>In</strong> the 1980s, two major drug cartels emerged in Colombia: the Medellin and Cali<br />
groups. Throughout the 90's however, several factors led to the decline of these major<br />
cartels and to the rise of smaller Colombian cartels. <strong>The</strong> U.S. demand for cocaine<br />
dropped while Colombian production rose, pressuring traffickers to find new drugs and<br />
markets. <strong>In</strong> this time period, there was an increase in activity of Caribbean cartels that<br />
led to the rise of an alternate route of smuggling through Mexico. This led to the<br />
increased collaboration between major Colombian and Mexican drug traffickers. Such<br />
drastic changes in the execution of drug trade in Colombia paired with the political<br />
instabilities and rise of drug wars in Medellin and Cali, gave way for the rise of the<br />
smaller Colombian drug trafficking organizations (and the rise of heroin trade). As the<br />
drug trade's influence over the economy increased, drug lords and their networks grew<br />
in their power and influence in society. <strong>The</strong> occurrences in drug-related violence<br />
increased during this time period as drug lords fought to maintain their control in the<br />
economy. Typically a drug cartel had support networks that consisted of a number of<br />
individuals. <strong>The</strong>se people individuals ranged from those directly involved in the trade<br />
(such as suppliers, chemists, transporters, smugglers, etc.) as well as those involved<br />
indirectly in the trade (such as politicians, bankers, police, etc.). As these smaller<br />
Colombian drug cartels grew in prevalence, several notable aspects of the Colombian<br />
society gave way for further development of the Colombian drug industry. For example,<br />
until the late 1980s, the long-term effects of the drug industry were not realized by much<br />
Page 98 of 372
of society. Additionally, there was a lack of regulation in prisons where captured<br />
traffickers were sent. <strong>The</strong>se prisons were under-regulated, under-funded, and understaffed,<br />
which allowed for the formation of prison gangs, for the smuggling of<br />
arms/weapons/etc., for feasible escapes, and even for captured drug lords to continue<br />
running their businesses from prison.<br />
Cannabis<br />
Trade <strong>In</strong> Specific Drugs<br />
While the recreational use of (and consequently the distribution of) cannabis is illegal in<br />
most countries throughout the world, it is available by prescription or recommendation in<br />
many places, including Canada and 10 of the 50 US states (although importation and<br />
distribution is still federally prohibited). Beginning in 2014, Uruguay became the first<br />
country to legalize cultivation, sale, and consumption of cannabis for recreational use<br />
for adult residents. <strong>In</strong> 2018, Canada became the only second country to legalize use,<br />
sale and cultivation of cannabis. <strong>The</strong> first few weeks were met with extremely high<br />
demand, most shops being out of stock after operating for only four days.<br />
Cannabis use is tolerated in some areas, most notably the Netherlands which has<br />
legalized the possession and licensed sale (but not cultivation) of the drug. Many<br />
nations have decriminalized the possession of small amounts of marijuana. Due to the<br />
Page 99 of 372
hardy nature of the cannabis plant, marijuana is grown all across the world and is today<br />
the world's most popular illegal drug with the highest level of availability. Cannabis is<br />
grown legally in many countries for industrial, non-drug use (known as hemp) as well.<br />
Cannabis-hemp may also be planted for other non-drug domestic purposes, such as<br />
seasoning that occurs in Aceh.<br />
<strong>The</strong> demand for cannabis around the world, coupled with the drug's relative ease of<br />
cultivation, makes the illicit cannabis trade one of the primary ways in which organized<br />
criminal groups finance many of their activities. <strong>In</strong> Mexico, for example, the illicit<br />
trafficking of cannabis is thought to constitute the majority of many of the cartels'<br />
earnings, and the main way in which the cartels finance many other illegal activities;<br />
including the purchase of other illegal drugs for trafficking, and for acquiring weapons<br />
that are ultimately used to commit murders (causing a burgeoning in the homicide rates<br />
of many areas of the world, but particularly Latin America).<br />
Some studies show that the increased legalization of cannabis in the United States<br />
(beginning in 2012 with Washington <strong>In</strong>itiative 502 and Colorado Amendment 64) has led<br />
Mexican cartels to smuggle less cannabis in exchange for more heroin.<br />
Alcohol<br />
Alcohol, in the context of alcoholic beverages rather than denatured alcohol, is illegal in<br />
a number of Muslim countries, such as Saudi Arabia, and this has resulted in a thriving<br />
illegal trade in alcohol. <strong>The</strong> manufacture, sale, transportation, importation and<br />
exportation of alcoholic beverage were illegal in the United States during the time<br />
known as the Prohibition in the 1920s and early 1930s.<br />
Heroin<br />
Heroin woven into a hand-made knotted carpet seized at<br />
Manchester Airport, 2012<br />
Up until around 2004 the majority of the world's heroin<br />
was produced in an area known as the Golden<br />
Triangle. However, by 2007, 93% of the opiates on the<br />
world market originated in Afghanistan. This amounted<br />
to an export value of about US$64 billion, with a<br />
quarter being earned by opium farmers and the rest<br />
going to district officials, insurgents, warlords and drug traffickers. Another significant<br />
area where poppy fields are grown for the manufacture of heroin is Mexico.<br />
According to the United States Drug Enforcement Administration, the price of heroin is<br />
typically valued 8 to 10 times that of cocaine on American streets, making it a high-profit<br />
substance for smugglers and dealers. <strong>In</strong> Europe (except the transit countries Portugal<br />
and the Netherlands), for example, a purported gram of street heroin, usually consisting<br />
of 700–800 mg of a light to dark brown powder containing 5-10% heroin base, costs<br />
Page 100 of 372
€30-70, making the effective value per gram of pure heroin €300-700. Heroin is<br />
generally a preferred product for smuggling and distribution—over unrefined opium due<br />
to the cost-effectiveness and increased efficacy of heroin.<br />
Because of the high cost per volume, heroin is easily smuggled. A US quarter-sized<br />
(2.5 cm) cylindrical vial can contain hundreds of doses. From the 1930s to the early<br />
1970s, the so-called French Connection supplied the majority of US demand. Allegedly,<br />
during the Vietnam War, drug lords such as Ike Atkinson used to smuggle hundreds of<br />
kilograms of heroin to the US in coffins of dead American soldiers (see Cadaver<br />
Connection). Since that time it has become more difficult for drugs to be imported into<br />
the US than it had been in previous decades, but that does not stop the heroin<br />
smugglers from getting their product across US borders. Purity levels vary greatly by<br />
region with Northeastern cities having the most pure heroin in the United States. On 17<br />
October 2018 police in Genoa Italy, discovered 270 kg of heroin hidden in a ship<br />
coming from the Iranian southern port of Bandar Abbas. <strong>The</strong> ship had already passed<br />
and stopped at Hamburg in Germany and Valencia in Spain.<br />
Penalties for smuggling heroin or morphine are often harsh in most countries. Some<br />
Page 101 of 372
countries will readily hand down a death sentence (e.g. Singapore) or life in prison for<br />
the illegal smuggling of heroin or morphine, which are both internationally Schedule I<br />
drugs under the Single Convention on Narcotic Drugs.<br />
Methamphetamine<br />
Methamphetamine is another popular drug among distributors. Three common street<br />
names are "crystal meth", "meth", and "ice".<br />
According to the Community Epidemiology Work Group, the number of clandestine<br />
methamphetamine laboratory incidents reported to the National Clandestine Laboratory<br />
Database decreased from 1999 to 2009. During this period, methamphetamine lab<br />
incidents increased in mid-western States (Illinois, Michigan, Missouri, and Ohio), and in<br />
Pennsylvania. <strong>In</strong> 2004, more lab incidents were reported in Missouri (2,788) and Illinois<br />
(1,058) than in California (764). <strong>In</strong> 2003, methamphetamine lab incidents reached new<br />
highs in Georgia (250), Minnesota (309), and Texas (677). <strong>The</strong>re were only seven<br />
methamphetamine lab incidents reported in Hawaii in 2004, though nearly 59 percent of<br />
substance abuse treatment admissions (excluding alcohol) were for primary<br />
methamphetamine abuse during the first six months of 2004. As of 2007, Missouri leads<br />
the United States in drug-lab seizures, with 1,268 incidents reported. Often canine units<br />
are used for detecting rolling meth labs which can be concealed on large vehicles, or<br />
transported on something as small as a motorcycle. <strong>The</strong>se labs are more difficult to<br />
detect than stationary ones, and can often be obscured among legal cargo in big trucks.<br />
Methamphetamine is sometimes used intraveneously, placing users and their partners<br />
at risk for transmission of HIV and hepatitis C. "Meth" can also be inhaled, most<br />
commonly vaporized on aluminum foil or in a glass pipe. This method is reported to give<br />
"an unnatural high" and a "brief intense rush".<br />
<strong>In</strong> South Africa methamphetamine is called "tik" or "tik-tik"."Known locally as "tik," the<br />
drug was virtually unknown as late as 2003. Now, it is the country's main drug of abuse,<br />
even when alcohol is included. " Children as young as eight are abusing the substance,<br />
smoking it in crude glass vials made from light bulbs. Since methamphetamine is easy<br />
to produce, the substance is manufactured locally in staggering quantities.<br />
<strong>The</strong> government of North Korea currently operates methamphetamine production<br />
facilities. <strong>The</strong>re, the drug is used as medicine because no alternatives are available; it<br />
also is smuggled across the Chinese border.<br />
<strong>The</strong> Australian <strong>Crime</strong> Commission's illicit drug data report for 2011–2012 stated that the<br />
average strength of crystal methamphetamine doubled in most Australian jurisdictions<br />
within a 12-month period, and the majority of domestic laboratory closures involved<br />
small "addict-based" operations.<br />
Temazepam<br />
Page 102 of 372
Temazepam, a strong hypnotic benzodiazepine, is illicitly manufactured in clandestine<br />
laboratories (called jellie labs) to supply the increasingly high demand for the drug<br />
internationally. Many clandestine temazepam labs are in Eastern Europe. <strong>The</strong> labs<br />
manufacture temazepam by chemically altering diazepam, oxazepam or lorazepam.<br />
"Jellie labs" have been identified and shut down in Russia, the Ukraine, Czech<br />
Republic, Latvia and Belarus.<br />
Surveys in many countries show that temazepam, MDMA, nimetazepam, and<br />
methamphetamine rank among the top illegal drugs most frequently abused.<br />
Page 103 of 372
Page 104 of 372
VI. Embezzlement<br />
Embezzlement is the act of withholding assets for the purpose of conversion (theft) of<br />
such assets, by one or more persons to whom the assets were entrusted, either to be<br />
held or to be used for specific purposes. Embezzlement is a type of financial fraud. For<br />
example, a lawyer might embezzle funds from the trust accounts of their clients; a<br />
financial advisor might embezzle the funds of investors; and a husband or a wife might<br />
embezzle funds from a bank account jointly held with the spouse.<br />
Embezzlement usually is a premeditated crime, performed methodically, with<br />
precautions that conceal the criminal conversion of the property, which occurs without<br />
the knowledge or consent of the affected person. Often it involves the trusted individual<br />
embezzling only a small proportion of the total of the funds or resources they receive or<br />
control, in an attempt to minimize the risk of the detection of the misallocation of the<br />
funds or resources. When successful, embezzlements may continue for many years<br />
without detection. <strong>The</strong> victims often realize that the funds, savings, assets, or other<br />
resources, are missing and that they have been duped by the embezzler, only when a<br />
relatively large proportion of the funds are needed at one time; or the funds are called<br />
upon for another use; or when a major institutional reorganization (the closing or moving<br />
of a plant or business office, or a merger/acquisition of a firm) requires the complete and<br />
independent accounting of all real and liquid assets, prior to or concurrent with the<br />
reorganization.<br />
<strong>In</strong> the United States, embezzlement is a statutory offence that, depending on the<br />
circumstances, may be a crime under state law, federal law, or both; therefore, the<br />
definition of the crime of embezzlement varies according to the given statute. Typically,<br />
Page 105 of 372
the criminal elements of embezzlement are the fraudulent conversion of the property of<br />
another person by the person who has lawful possession of the property.<br />
i. Fraudulence: <strong>The</strong> requirement that the conversion be fraudulent requires that<br />
the embezzler willfully, and without claim of right or mistake, converted the<br />
entrusted property to their own use.<br />
ii.<br />
iii.<br />
iv.<br />
Criminal conversion: Embezzlement is a crime against ownership, that is,<br />
voiding the right of the owner to control the disposition and use of the property<br />
entrusted to the embezzler. <strong>The</strong> element of criminal conversion requires<br />
substantial interference with the property rights of the owner (unlike larceny,<br />
wherein the slightest movement of the property, when accompanied by the intent<br />
to permanently deprive the owner of possession of the property is sufficient<br />
cause).<br />
Property: Embezzlement statutes do not limit the scope of the crime to<br />
conversions of personal property. Statutes generally include conversion of<br />
tangible personal property, intangible personal property, and choses in action.<br />
Real property is not typically included.<br />
of another: A person cannot embezzle his or her own property.<br />
v. Lawful possession: <strong>The</strong> critical element is that the embezzler must have been<br />
in lawful possession of the property at the time of the fraudulent conversion, and<br />
not merely have custody of the property. If the thief had lawful possession of the<br />
property, the crime is embezzlement; if the thief merely had custody, the crime at<br />
common law is larceny.<br />
Embezzlement v. Larceny<br />
Embezzlement differs from larceny in three ways. First, in embezzlement, an actual<br />
conversion must occur; second, the original taking must not be trespassory, and three,<br />
in penalties. To say that the taking was not trespassory is to say that the persons<br />
performing the embezzlement had the right to possess, use or access the assets in<br />
question, and that such persons subsequently secreted and converted the assets for an<br />
unintended or unsanctioned use. Conversion requires that the secretion interfere with<br />
the property, rather than just relocate it. As in larceny, the measure is not the gain to the<br />
embezzler, but the loss to the asset stakeholders. An example of conversion is when a<br />
person logs checks in a check register or transaction log as being used for one specific<br />
purpose and then explicitly uses the funds from the checking account for another and<br />
completely different purpose.<br />
It is important to make clear that embezzlement is not always a form of theft or an act of<br />
stealing, since those definitions specifically deal with taking something that does not<br />
belong to the perpetrators. <strong>In</strong>stead, embezzlement is, more generically, an act of<br />
deceitfully secreting assets by one or more persons that have been entrusted with such<br />
Page 106 of 372
assets. <strong>The</strong> persons entrusted with such assets may or may not have an ownership<br />
stake in such assets.<br />
<strong>In</strong> the case where it is a form of theft, distinguishing between embezzlement and<br />
larceny can be tricky. Making the distinction is particularly difficult when dealing with<br />
misappropriations of property by employees. To prove embezzlement, the state must<br />
show that the employee had possession of the goods "by virtue of his or her<br />
employment"; that is, that the employee had formally delegated authority to exercise<br />
substantial control over the goods. Typically, in determining whether the employee had<br />
sufficient control the courts will look at factors such as the job title, job description and<br />
the particular operational practices of the firm or organization. For example, the<br />
manager of a shoe department at a department store would likely have sufficient control<br />
over the store's inventory (as head of the shoe department) of shoes; that if they<br />
converted the goods to their own use they would be guilty of embezzlement. On the<br />
other hand, if the same employee were to steal cosmetics from the cosmetics<br />
Page 107 of 372
department of the store, the crime would not be embezzlement but larceny. For a case<br />
that exemplifies the difficulty of distinguishing larceny and embezzlement see State v.<br />
Weaver, 359 N.C. 246; 607 S.E.2d 599 (2005).<br />
North Carolina appellate courts have compounded this confusion by misinterpreting a<br />
statute based on an act passed by parliament in 1528. <strong>The</strong> North Carolina courts<br />
interpreted this statute as creating an offence called "larceny by employee"; an offence<br />
that was separate and distinct from common law larceny. However, as Perkins notes,<br />
the purpose of the statute was not to create a new offence but was merely to confirm<br />
that the acts described in the statute met the elements of common law larceny.<br />
<strong>The</strong> statute served the purpose of the then North Carolina colony as an indentured<br />
servant– and slave-based political economy. It ensured that an indentured servant (or<br />
anyone bound to service of labor to a master, e.g., a slave), would owe to their master<br />
their labor; and, if they left their indentured service or bound labor unlawfully, the labor<br />
they produced, either for themselves (i.e., self-employed), or for anyone else, would be<br />
the converted goods that they unlawfully took, from the rightful owner, their master.<br />
Crucially (and this can be seen as the purpose of the statute), any subsequent employer<br />
of such an indentured servant or slave, who was in fact bound to service of labor to a<br />
pre-existing master, would be chargeable with misprision-of-a-felony (if it was proved in<br />
they knew that the employee was still indentured to a master, or owned as a slave); and<br />
chargeable as an accessory-after-the-fact, in the felony, with the servant or slave; in<br />
helping them, by employing them, in the unlawfully taking that which was lawfully bound<br />
(through the master servant relationship) in exclusive right, to the master of the<br />
indentured servant or slave.<br />
Methods of embezzlement<br />
Embezzlement sometimes involves falsification of records in order to conceal the<br />
activity. Embezzlers commonly secrete relatively small amounts repeatedly, in a<br />
systematic or methodical manner, over a long period of time, although some<br />
embezzlers secrete one large sum at once. Some very successful embezzlement<br />
schemes have continued for many years before being detected due to the skill of the<br />
embezzler in concealing the nature of the transactions or their skill in gaining the trust<br />
and confidence of investors or clients, who are then reluctant to "test" the embezzler's<br />
trustworthiness by forcing a withdrawal of funds.<br />
Embezzling should not be confused with skimming, which is under-reporting income<br />
and pocketing the difference. For example, in 2005, several managers of the service<br />
provider Aramark were found to be under-reporting profits from a string of vending<br />
machine locations in the eastern United States. While the amount stolen from each<br />
machine was relatively small, the total amount taken from many machines over a length<br />
of time was very large. A smart technique employed by many small-time embezzlers<br />
can be covered by falsifying the records. (Example, by removing a small amount of<br />
money and falsifying the record the register would be technically correct, while the<br />
Page 108 of 372
manager would remove the profit and leave the float in, this method would effectively<br />
make the register short for the next user and throw the blame onto them)<br />
Another method is to create a false vendor account and supply false bills to the<br />
company being embezzled so that the checks that are cut appear completely legitimate.<br />
Yet another method is to create phantom employees, who are then paid with payroll<br />
checks.<br />
<strong>The</strong> latter two methods should be uncovered by routine audits, but often aren't if the<br />
audit is not sufficiently in-depth, because the paperwork appears to be in order. A<br />
publicly traded company must change auditors and audit companies every five years.<br />
<strong>The</strong> first method is easier to detect if all transactions are by cheque or other instrument,<br />
but if many transactions are in cash, it is much more difficult to identify. Employers have<br />
developed a number of strategies to deal with this problem. <strong>In</strong> fact, cash registers were<br />
invented just for this reason.<br />
Some of the most complex (and potentially most lucrative) forms of embezzlement<br />
involve Ponzi-like financial schemes where high returns to early investors are paid out<br />
of funds received from later investors duped into believing they are themselves<br />
receiving entry into a high-return investment scheme. <strong>The</strong> Madoff investment scandal is<br />
an example of this kind of high-level embezzlement scheme, where it is alleged that<br />
$65 billion was siphoned off from gullible investors and financial institutions.<br />
Page 109 of 372
Safeguards Against Embezzlement<br />
<strong>In</strong>ternal controls such as separation of duties are common defences against<br />
embezzlement. For example, at a movie theatre (cinema), the task of accepting money<br />
and admitting customers into the theatre is typically broken up into two jobs. One<br />
employee sells the ticket, and another employee takes the ticket and lets the customer<br />
into the theatre. Because a ticket cannot be printed without entering the sale into the<br />
computer (or, in earlier times, without using up a serial-numbered printed ticket), and<br />
the customer cannot enter the theatre without a ticket, both of these employees would<br />
have to collude in order for embezzlement to go undetected. This significantly reduces<br />
the chance of theft, because of the added difficulty in arranging such a conspiracy and<br />
the likely need to split the proceeds between the two employees, which reduces the<br />
payoff for each.<br />
Another obvious method to deter embezzlement is to regularly and unexpectedly move<br />
funds from one advisor or entrusted person to another when the funds are supposed to<br />
be available for withdrawal or use, to ensure that the full amount of the funds is<br />
available and no fraction of the savings has been embezzled by the person to whom the<br />
funds or savings have been entrusted.<br />
England and Wales<br />
Offences of embezzlement were formerly created by sections 18 and 19 of the Larceny<br />
Act 1916.<br />
<strong>The</strong> former offences of embezzlement are replaced by the new offence of theft, contrary<br />
to section 1 of the <strong>The</strong>ft Act 1968.<br />
Page 110 of 372
VII. Extortion<br />
Extortion (also called shakedown, outwrestling and exaction) is a criminal offense of<br />
obtaining money, property, or services from an individual or institution, through<br />
coercion. It is sometimes euphemistically referred to as a "protection racket" since the<br />
racketeers often phrase their demands as payment for "protection" from (real or<br />
hypothetical) threats from unspecified other parties; though often, and almost always,<br />
such "protection" is simply abstinence of harm from the same party, and such is implied<br />
in the "protection" offer. Extortion is commonly practiced by organized crime groups.<br />
<strong>The</strong> actual obtainment of money or property is not required to commit the offense.<br />
Making a threat of violence which refers to a requirement of a payment of money or<br />
property to halt future violence is sufficient to commit the offense. Exaction refers not<br />
only to extortion or the demanding and obtaining of something through force, [1] but<br />
additionally, in its formal definition, means the infliction of something such as pain and<br />
suffering or making somebody endure something unpleasant.<br />
<strong>The</strong> term extortion is often used metaphorically to<br />
refer to usury or to price-gouging, though neither<br />
is legally considered extortion. It is also often<br />
used loosely to refer to everyday situations where<br />
one person feels indebted against their will, to<br />
another, in order to receive an essential service<br />
or avoid legal consequences. Neither extortion<br />
nor blackmail requires a threat of a criminal act,<br />
such as violence, merely a threat used to elicit<br />
actions, money, or property from the object of the<br />
extortion. Such threats include the filing of reports<br />
(true or not) of criminal behavior to the police, revelation of damaging facts (such as<br />
pictures of the object of the extortion in a compromising position), etc.<br />
<strong>In</strong> law, the word extortion can refer to political corruption, such as selling one's office or<br />
influence peddling, but in general vocabulary the word usually first brings to mind<br />
blackmail or protection rackets. <strong>The</strong> logical connection between the corruption sense of<br />
the word and the other senses is that to demand bribes in one's official capacity is<br />
blackmail or racketeering in essence (that is, "you need access to this resource, the<br />
government restricts access to it through my office, and I will charge you unfairly and<br />
unlawfully for such access").<br />
United States<br />
Extortion is distinguished from robbery. <strong>In</strong> robbery, whether armed or not, the offender<br />
takes property from the victim by the immediate use of force or fear that force will be<br />
immediately used (as in the classic line, "Your money or your life"). Extortion, which is<br />
not limited to the taking of property, involves the verbal or written instillation of fear that<br />
something will happen to the victim if they do not comply with the extortionist's will.<br />
Page 111 of 372
Another key distinction is that extortion always involves a verbal or written threat,<br />
whereas robbery does not. <strong>In</strong> United States federal law, extortion can be committed with<br />
or without the use of force and with or without the use of a weapon.<br />
<strong>In</strong> blackmail, which always involves extortion, the extortionist threatens to reveal<br />
information about a victim or their family members that is potentially embarrassing,<br />
socially damaging, or incriminating unless a demand for money, property, or services is<br />
met.<br />
<strong>In</strong> the United States, extortion may also be committed as a federal crime across a<br />
computer system, phone, by mail, or in using any instrument of interstate commerce.<br />
Extortion requires that the individual sent the message willingly and knowingly as<br />
elements of the crime. <strong>The</strong> message only has to be sent (but does not have to reach the<br />
intended recipient) to commit the crime of extortion.<br />
England and Wales<br />
United Kingdom<br />
<strong>In</strong> England and Wales extorting property and money by coercion is the offence of<br />
Blackmail which covers any "unwarranted demand with menaces" including physical<br />
threats. See section 21 of the <strong>The</strong>ft Act 1968 plus sections 29 and 30 of the Larceny Act<br />
1916. A group of people may also be committing conspiracy.<br />
Scotland<br />
Extortion is a common law offence in Scotland of using threat of harm to demand<br />
money, property or some advantage from another person. It does not matter whether<br />
the demand itself is legitimate (such as for money owed) as the offence can still be<br />
committed when illegitimate threats of harm are used.<br />
Cyberextortion<br />
Cyberextortion is when an individual or group uses the internet as an offensive force.<br />
<strong>The</strong> group or individual usually sends a company a threatening email stating that they<br />
have received confidential information about their company and will exploit a security<br />
leak or launch an attack that will harm the company's network. <strong>The</strong> message sent<br />
through the email usually demands money in exchange for the prevention of the attack.<br />
Cases<br />
<strong>In</strong> March 2008, Anthony Digati was arrested on federal charges of extortion through<br />
interstate communication. Digati put $50,000 into a variable life insurance policy by <strong>New</strong><br />
York Life <strong>In</strong>surance Company and wanted a return of $198,303.88. When the firm didn't<br />
comply, he threatened to send out 6 million spam emails. He registered a domain in<br />
February 2008 that contained <strong>New</strong> York Life's name in the URL to display false public<br />
Page 112 of 372
statements about the company and increased his demand to $3 million. According to<br />
prosecutors, Digati's intent was not to inform or educate but he wanted to "damage the<br />
reputation of <strong>New</strong> York Life and cost the company millions of dollars in revenue,”. <strong>New</strong><br />
York Life contacted the Federal Bureau of <strong>In</strong>vestigation and Digati was apprehended.<br />
from Nintendo.<br />
On February 15, 2011, Spanish police<br />
apprehended a man who attempted to<br />
blackmail Nintendo over customer<br />
information he had stolen. <strong>The</strong> man stole<br />
personal information about 4,000 users and<br />
emailed Nintendo Ibérica, Nintendo's Spanish<br />
division, and accused the company of data<br />
negligence. He threatened the company that<br />
he would make the information public and<br />
complain to the Spanish Data Agency if his<br />
demands were not met. After Nintendo<br />
ignored his demands, he published some of<br />
the information on an <strong>In</strong>ternet forum.<br />
Nintendo notified authorities and the man<br />
was arrested in Málaga. No information has<br />
been revealed as to what the man demanded<br />
On February 7, 2019, Jeffrey P. Bezos, owner of Amazon and <strong>The</strong> Washington Post,<br />
accused the National Enquirer and its parent company American Media, <strong>In</strong>c., of<br />
attempting to extort him by threatening to reveal nude pictures of him unless he publicly<br />
stated that he “[has] no knowledge or basis for suggesting that AMI’s coverage was<br />
politically motivated or influenced by political forces.” This threat was in response to Mr.<br />
Bezos investigating the tabloid for publishing details about his relationship with Lauren<br />
Sanchez, which led to Mr. Bezos and his wife Mackenzie announcing their divorce on<br />
January 9 of that year. Mr. Bezos, the richest man in the world at the time, refused, and<br />
posted the threat on Medium.<br />
Similar <strong>Crime</strong>s<br />
<br />
<br />
<br />
Badger Game: <strong>The</strong> victim or "mark"—for example, such as a married person—is<br />
tricked into a compromising position to make them vulnerable to blackmail.<br />
Clip Joint: A clip joint or fleshpot is an establishment, usually a strip club or<br />
entertainment bar, typically one claiming to offer adult entertainment or bottle<br />
service, in which customers are tricked into paying money and receive poor<br />
goods or services, or none, in return. An example of this is portrayed in the<br />
comedy film Porky's<br />
Coercion: the practice of compelling a person or manipulating them to behave in<br />
an involuntary way (whether through action or inaction) by use of threats,<br />
Page 113 of 372
intimidation, trickery, or some other form of pressure or force. <strong>The</strong>se are used as<br />
leverage, to force the victim to act in the desired way.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Confidence Trick (also known as a bunko, con, flim flam, gaffle, grift, hustle,<br />
scam, scheme, swindle, bamboozle or finnese): an attempt to defraud a person<br />
or group by gaining their confidence.<br />
Cryptovirology: a software scam in which a public key cryptography system<br />
crafts fake keys which encrypt the user's data, but cannot decrypt them unless<br />
the user pays for the real key.<br />
Dognapping: <strong>The</strong> crime of taking a dog from its owner, which usually occurs in<br />
purebred dogs, the profit from which can run up to thousands of dollars.<br />
Loan Sharking: A loan shark is a person or body that offers unsecured loans at<br />
high interest rates to individuals, often backed by blackmail or threats of violence.<br />
Price Gouging: a pejorative term for a seller pricing much higher than is<br />
considered reasonable or fair. <strong>In</strong> precise, legal usage, it is the name of a felony<br />
that applies in some of the United States only during civil emergencies.<br />
Racket: A service that is fraudulently offered to solve a problem, such as for a<br />
problem that does not actually exist, will not be affected, or would not otherwise<br />
exist.<br />
Sextortion: Forcing individuals to send sexual images or perform sexual<br />
services<br />
Terrorism: most simply, policy intended to intimidate or cause terror. It is more<br />
commonly understood as an act which is intended to create fear (terror), is<br />
perpetrated for an ideological goal (as opposed to a materialistic goal or a lone<br />
attack), and deliberately target or disregard the safety of non-combatants. Some<br />
definitions also include acts of unlawful violence or unconventional warfare, but<br />
at present, the international community has been unable to formulate a<br />
universally agreed, legally binding, criminal law definition of terrorism.<br />
Tiger Kidnapping: the taking of an innocent hostage to make a loved one or<br />
associate of the victim do something, e.g. a child is taken hostage to force the<br />
shopkeeper to open the safe; the term originates from the prior observation of the<br />
victim, like a tiger does with its prey. Ransoms are often used alongside these.<br />
Page 114 of 372
VIII. Fencing Stolen Goods<br />
A fence, also known as a receiver, mover, or moving man, is an individual who<br />
knowingly buys stolen goods in order to later resell them for profit. <strong>The</strong> fence acts as a<br />
middleman between thieves and the eventual buyers of stolen goods who may not be<br />
aware that the goods are stolen. As a verb, the word describes the behavior of the thief<br />
in the transaction: <strong>The</strong> burglar fenced the stolen radio. This sense of the term came<br />
from thieves' slang, first attested c. 1700, from the notion of such transactions providing<br />
a defense against being caught. <strong>The</strong> term remains in common use in all major dialects<br />
of modern English, all of which spell it with a "c" even though the source word in some<br />
dialects (particularly American English) is now spelled defense.<br />
<strong>The</strong> fence is able<br />
to make a profit<br />
with stolen<br />
merchandise<br />
because he/she is<br />
able to secretly<br />
pay thieves a very<br />
low price for "hot"<br />
goods that cannot<br />
be easily sold on<br />
the open markets.<br />
<strong>The</strong> thieves who<br />
patronize the<br />
fence are willing<br />
to accept a low<br />
profit margin in<br />
order to reduce<br />
their risks by<br />
instantly "washing their hands" of the black market loot and disassociating themselves<br />
from the criminal act that procured it. After the sale, the fence recoups their investment<br />
by disguising the stolen nature of the goods (via methods such as repackaging and<br />
altering/effacing serial numbers) and reselling the goods as near to the white market<br />
price as possible without drawing suspicion. This process often relies on a legal<br />
business (such as a pawnshop, flea market or street vendor) in order to "launder" the<br />
stolen goods by intermixing them with legally-purchased items of the same type.<br />
Fencing is illegal in all countries, but legally proving a violation of anti-fencing laws can<br />
be difficult.<br />
Approach<br />
<strong>The</strong> fence is able to make a profit with stolen merchandise because he is able to pay<br />
thieves a very low price for stolen goods. Thieves agree to this because their<br />
alternatives may present a greater risk of the thief being caught. As well, selling stolen<br />
Page 115 of 372
goods takes a great deal of time and effort (transaction costs), as the thief would have<br />
to try to contact a number of potential buyers and show them the merchandise. Some<br />
habitual thieves are so well known to police that if the thief were to attempt to sell any<br />
used goods, this would quickly draw the attention of law enforcement.<br />
<strong>The</strong> fence then disguises the stolen nature of the goods, if possible, so that he or she<br />
can sell them closer to the market price. Depending on the stolen item, the fence may<br />
attempt to remove, deface, or replace serial numbers on the stolen item before reselling<br />
it. <strong>In</strong> some cases, fences will transport the stolen items to a different city to sell them,<br />
because this lessens the likelihood that the items will be recognized. For some types of<br />
stolen goods, fences disassemble the good and sell the individual parts, because the<br />
sale of parts is less risky. For example, a stolen car or bicycle may be disassembled so<br />
that the parts can be sold individually. Another tactic used by some fences is to retain<br />
stolen items for some time before selling them, which lessens the likelihood that the<br />
burglary victims or police will be actively looking for the items in auctions and<br />
pawnshops.<br />
Fencing is often conducted through legal businesses. Some fences maintain a<br />
legitimate-seeming "front" through which they can sell stolen merchandise. Depending<br />
on the type of stolen merchandise a fence deals in, "front" businesses might be discount<br />
stores, used goods stores, a coin and gem store, auction house, flea market, or auto<br />
salvage yards. <strong>The</strong> degree of illicit activity in each "front" business may differ from fence<br />
to fence. While one fence's salvage yard may consist mainly of stolen auto parts,<br />
another fence's used goods store might consist mainly of legitimately purchased used<br />
goods, with the stolen merchandise acting as a minor, but profitable, sideline.<br />
<strong>The</strong> prices fences pay thieves typically depend both on norms and on legitimate market<br />
rates for the items in question. Vulnerable sellers, such as drug addicts or casual<br />
thieves, may receive less than 20% of an item's value. Higher prices, sometimes as<br />
high as 50% of an item's value in a legal market, can be commanded by a professional<br />
thief, especially one who concentrates on valuable items. At the same time, fences will<br />
often take advantage of thieves by deceiving them about the value of an individual item<br />
and the relevant market conditions. For example, a fence may falsely tell a petty thief<br />
that the market for the type of good which the thief is selling is flooded with this type of<br />
merchandise, to justify paying out a lower price.<br />
Research on fences shows that they view themselves as entrepreneurs, relying on<br />
networking with and patronage by prominent criminals to become successful in their<br />
word-of-mouth-based "wheeling and dealing". <strong>The</strong>y occupy the middle ground between<br />
the criminal world (thieves, burglars and shoplifters) and the legitimate world (e.g.,<br />
everyday people who purchase used goods). Some active fences go farther in their<br />
business, maintaining longstanding contacts and even teaching thieves how to practice<br />
their craft, whether by identifying specific products or by teaching them tools of the<br />
trade.<br />
Page 116 of 372
<strong>The</strong>re are a number of different types of fences. One way of categorizing fences is by<br />
the type of good in which they trade, such as jewels, power tools, or electronics.<br />
Another way of categorizing fences is by their level of involvement in buying and selling<br />
stolen goods; for some, fencing is an occasional "sideline" activity, while it is an<br />
economic mainstay for others.<br />
At the lowest level, a hustler or drug dealer may occasionally accept stolen goods. At<br />
the highest level would be a fence whose main criminal income comes from buying and<br />
selling stolen items. At the broadest level, two tiers of fences can be distinguished. <strong>The</strong><br />
lower level of fences are those who directly buy stolen goods from thieves and burglars.<br />
At a higher level are the "master fences", who do not deal with street-level thieves, but<br />
only with other fences.<br />
<strong>The</strong> degree to which the purchasers of the stolen goods know or suspect that the items<br />
are stolen varies. If a purchaser buys a high-quality item for a low price, in cash, from a<br />
stranger at a bar or from the back of a van, there is a higher likelihood that the items<br />
may be stolen.<br />
On the other hand, if a purchaser buys the same high-quality item for the standard retail<br />
price from a used goods store, and obtains a proper receipt, the purchaser may<br />
reasonably believe that the item is not stolen (even if, in fact, it is a stolen item).<br />
History of Receiving<br />
<strong>The</strong> fence, or receiver, is an old kind of criminal, historically attested in many countries<br />
and with deep and complex dynamics within society.<br />
Page 117 of 372
Early Modern England<br />
Receiving was a widespread crime in Modern England and an increasingly crucial<br />
concern for the English government of that period. It involved many other kinds of<br />
activities and crimes, and it saw its peak in the early 18th century with the notorious<br />
Jonathan Wild. Receiving is intrinsically connected to theft, as receivers, by definition,<br />
buy previously stolen goods in order to make profit out of them later. When organized<br />
theft grew increasingly important in London thanks to largely supportive receivers, the<br />
establishment started to fight it off with new laws, often aimed at receivers: receiving<br />
was acknowledged as the very core of property crime.<br />
Receiving was not considered as a felony (crime) in common law until 1691, when<br />
fences became potential targets of charges as accessories to theft. This meant that in<br />
order to judge a suspected receiver, it was necessary to condemn the related thief first.<br />
Later laws further focused on receivers, especially the 1718 Transportation Act, which,<br />
together with other measures, made fences main felons and not simply accessories to<br />
other felonies. Nonetheless, it was not easy to prove that a dealer knowingly accepted<br />
stolen goods, especially without the related theft event being fully cleared out.<br />
Proceedings stored in the Old Bailey Online archive where the offence category is<br />
receiving are 5664. Of these, 1973 have a verdict category of guilty.<br />
<strong>The</strong> 1718 Transportation Act also made a felony of returning goods for a fee, revealing<br />
that by then, receiving had already been widely taken to the next stage: returning goods<br />
to their owner, for a fee, instead of selling them in the second-hand market. Thieves<br />
could act as go-betweens themselves, but go-betweens could raise some suspicions,<br />
while relying on receivers added a safety layer against effective prosecution. A victim of<br />
theft was often willing to pay in order to get his goods back, in order to spare himself<br />
further troubles and/or if the items taken had the potential to reveal unflattering details<br />
about his personal affairs. <strong>In</strong> addition to that, for many centuries, prosecution in England<br />
was entirely at the expense (of personal money, time and effort) of the prosecutor.<br />
<strong>The</strong>refore, also considering the difficulty of actually proving receiving in courts, common<br />
people, especially shopkeepers, often preferred compounding, feeling that prosecuting<br />
was not worth it. This gave a considerable advantage to receivers.<br />
<strong>In</strong> order to effectively act as go-betweens for compounding, or brokers, fences needed<br />
to personally know thieves or have ways to easily interact and bargain with them for a<br />
common benefit about compounding: nobody was in a better position to do so than<br />
thief-takers. Thief-takers grew increasingly notorious in England as a reward was<br />
introduced by the Crown for each successfully condemned criminal. Some of them,<br />
such as Anthony Dunn, publicly referred to as "pretended Thiefe-taker" in a 1707<br />
document, used their social power as thief-takers as an advantage for receiving. Thieftakers<br />
were usually so involved with thieves and gangs of thieves that they could easily<br />
condemn them for the reward, or use this power to intimidate and command thieves to<br />
do their biddings: in exchange of clemency or protection from capture or condemnation,<br />
they could have thieves to steal under their command. <strong>In</strong>deed, thief-takers could act as<br />
direct instigators, supporting their thieves with intelligence or offering them shelter at<br />
Page 118 of 372
need (when convenient), and then act as receivers with the stolen goods. Through<br />
parallel occupations, receivers could feed their own business.<br />
Confirmation of how thief-taking and receiving were tightly connected could be seen in<br />
the career of Charles Hitchen, who was known as a thief-taker. He bought off the<br />
position of Under City Marshal through his wife's money in order to have one of the best<br />
positions amongst the thief-takers of the City. However, a vast part of his income<br />
actually came from the receiving activity related to the network of connections with<br />
London's underworld. Hitchen controlled this network through his official (that is to say,<br />
legal) position as a thief-taker.<br />
<strong>The</strong> synergy between receiving, theft and corruption, as well as official activities such as<br />
thief-taking or pawnbroking was a huge dynamic bond where each element enhanced<br />
the others in a vicious circle.<br />
<strong>The</strong> master of this powerful synergy of London underworld was Jonathan Wild, who<br />
rapidly replaced his previous master, Charles Hitchen, in 1713, and rapidly gained<br />
control of London's crime and the title of "thief-taker general". His power was due to his<br />
ruthless thief-taking and intimidation activities as well as a complex web of intelligence<br />
also built around the diffusion of newspapers. However, overly bold receiving was his<br />
undoing, as it grew so large and complex a matter to prompt the English government to<br />
promote further laws against receiving and related activities, such as the Transportation<br />
Act in 1718, also known as "Jonathan Wild Act", and its extension in 1720, which made<br />
returning goods for a fee a felony of the same importance and punishment as the crime<br />
(theft) related to the goods returned (which meant a capital offence in most cases, with<br />
raised potential reward for definitive evidence, from £40 to £140). Eventually, the<br />
Page 119 of 372
government decided to directly take action against Wild through lawyers, succeeding in<br />
condemning and executing him in 1725.<br />
Women and Receiving<br />
<strong>The</strong>re is no registered case of female fences of the same fame of Wild or Hitchen.<br />
However, women had active roles in both receiving and theft. Elizabeth Hitchen,<br />
Hitchen's wife, gave her inheritance money to her husband in order to buy the Under<br />
City Marshal office for his plans. Moreover, women could also be active fences. For<br />
example, Elizabeth Fisher managed her own receiving business in her husband's<br />
alehouse. Proceedings stored in the Old Bailey Online archive where the offence<br />
category is receiving are 5664. Of these, 1858 have a defendant gender category of<br />
female.<br />
Early Modern English Literature<br />
Receiving grew increasingly important in Early Modern society, and combined with the<br />
increasing interest of society on reading, it became the source for many writers, such as<br />
Daniel Defoe, with Moll Flanders and John Gay, with <strong>The</strong> Beggar's Opera. <strong>The</strong>se works<br />
reflect how receiving was conceived and portrayed by authors.<br />
Moll Flanders<br />
Moll Flanders is a novel intended to narrate the whole life of its protagonist, referred to<br />
as Moll Flanders, but a relevant part of it is about her becoming a master thief. Moll's<br />
activity as a thief largely relied on the protection and support of her governess, who<br />
acted also as a receiver for the goods stolen by her affiliates. She is the one who buys<br />
Moll's stolen goods the first time, as Moll narrates "I was now at a loss for a market for<br />
my goods,[...] At last I resolved to go to my old governess." <strong>The</strong>refore, the governess<br />
character sealed Moll's fate as a thief, and eventually taught her the basics of thievery<br />
redirecting Moll to work with other senior thieves. With these events, Defoe shows how<br />
crucial as well as subtle receiving was in building the whole of crime activity in London.<br />
<strong>The</strong> Governess is officially a pawnbroker, and she uses this legal business to recycle<br />
stolen goods into the secondary market. Sometimes, such as in the case of a silver<br />
inscribed mug stolen by Moll, she smelts metals, in order to avoid getting caught while<br />
re-selling. Along with receiving activity, she actively protects and support many criminals<br />
and thieves in order to secure a steady income to her activity.<br />
<strong>The</strong> same governess goes on in protecting and offering refuge to her affiliates whenever<br />
possible, or recruiting thieves into small groups, always via middlemen, in order to<br />
protect their thieves' identities in case some of them were caught and willing to confess.<br />
She is also a main intelligence source and often a direct instigator to theft such as in a<br />
case of fire in a well-off house in the neighborhood (more vulnerable to theft because of<br />
the sudden emergency), and finally becomes a broker for goods stolen by Moll to a<br />
drunken gentleman. <strong>In</strong> that case, the amount gained is allegedly greater than what she<br />
would have gained by standard re-selling in the secondary market.<br />
Page 120 of 372
<strong>The</strong> Governess embodies female social cunning in London's underworld, from Defoe's<br />
point of view. She is a typical receiver of her time, and whereas many male receivers<br />
used thief-taking as an official business, she relies on pawnbroking.<br />
Legal Aspects<br />
Fencing is illegal almost everywhere, usually under a similar rationale as in the United<br />
States, where receipt of stolen property is a crime in every state, as well as a federal<br />
crime if the property crossed a state line. Occasionally federal agents will temporarily<br />
set up a false fence sting operation. Fencing is a common source of income for<br />
organized crime. <strong>In</strong> England and Wales, as in many U.S. states, the crime requires<br />
three elements: stolen property, the receiver's act of receiving or hiding it, and his<br />
knowledge of its stolen status.<br />
Pawnbrokers have often been associated with fencing, though in many jurisdictions,<br />
government identification must be shown in order to pawn an item and police regularly<br />
check pawnshops for stolen goods and repossess any stolen items.<br />
While pawnbrokers do not like this characterization of their business, police efforts have<br />
indicated that some pawnbrokers are involved in fencing.<br />
Page 121 of 372
E-fencing<br />
E-fencing is the sale of items on the <strong>In</strong>ternet that have been obtained illegally. It is an<br />
activity that criminals often mix with sales to pawnbrokers. <strong>The</strong> auction website eBay,<br />
being easy to reach for the average thief, is a popular location for e-fencing; customers<br />
reported more than eight thousand crimes from the website in 2008, many of which<br />
involved the sale of stolen property. Classified websites like Craigslist, AutoTrader.com,<br />
Pennysaver online, etc. are some of the <strong>In</strong>ternet sources used for fencing goods online<br />
and circumventing the middleman fencer, in addition to a number of illegal darknet<br />
markets.<br />
E-fenced items may be shoplifted or otherwise stolen, alternatively they may be<br />
purchased using stolen credit cards or similar banking information. <strong>The</strong> latter practice is<br />
often intertwined with carding, which is the trafficking of thousands or even millions of<br />
stolen credit card numbers. <strong>The</strong> sale of stolen credit cards, which usually takes place on<br />
the darknet markets, is generally considered to be a form of e-fencing in its own right,<br />
and often plays a role in supplying the data used to purchase physical goods that may<br />
be either e-fenced themselves or fenced through more traditional means.<br />
<strong>Crime</strong> rings steal and/or use stolen financial information to pay for in-demand items<br />
from retailers and then sell them online, relying on the <strong>In</strong>ternet's ability to reach buyers<br />
around the world and its anonymity; some theft rings even take pre-orders, confident<br />
that they can steal and/or fraudulently pay for whatever is currently in demand. <strong>In</strong> the<br />
United States, major retailers such as Wal-Mart and Target have advocated for federal<br />
legislation to combat <strong>In</strong>ternet fencing. Proposals for such legislation have often<br />
proposed requiring major sales websites (e.g. eBay and Amazon.com) to retain some<br />
items' serial numbers and to release information to retailers about major sellers whom<br />
the retailers believe to be relying on stolen property. Such proposals have been<br />
opposed by the online retailers who would be required to maintain these records and<br />
take these actions.<br />
An eBay spokesman has stated, "Perhaps the dumbest place to try to fence stolen<br />
materials is on eBay," and news agencies have reported incidents of the police<br />
purchasing stolen property directly from thieves, leading to their capture. By early 2007,<br />
e-fencing had become a $37 billion business.<br />
Page 122 of 372
IX. Fraud<br />
<strong>In</strong> law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a<br />
victim of a legal right. Fraud itself can be a civil wrong (i.e., a fraud victim may sue the<br />
fraud perpetrator to avoid the fraud or recover monetary compensation), a criminal<br />
wrong (i.e., a fraud perpetrator may be prosecuted and imprisoned by governmental<br />
authorities), or it may cause no loss of money, property or legal right but still be an<br />
element of another civil or criminal wrong. <strong>The</strong> purpose of fraud may be monetary gain<br />
or other benefits, such as obtaining a passport or travel document, driver's license or<br />
qualifying for a mortgage by way of false statements.<br />
A hoax is a distinct concept that involves deliberate deception without the intention of<br />
gain or of materially damaging or depriving a victim.<br />
As a Civil Wrong<br />
<strong>In</strong> common law jurisdictions, as a civil wrong, fraud is a tort. While the precise<br />
definitions and requirements of proof vary among jurisdictions, the requisite elements of<br />
fraud as a tort generally are the intentional misrepresentation or concealment of an<br />
important fact upon which the victim is meant to rely, and in fact does rely, to the harm<br />
of the victim. Proving fraud in a court of law is often said to be difficult. That difficulty is<br />
found, for instance, in that each and every one of the elements of fraud must be proven,<br />
that the elements include proving the states of mind of the perpetrator and the victim,<br />
and that some jurisdictions require the victim to prove fraud by clear and convincing<br />
evidence.<br />
Page 123 of 372
<strong>The</strong> remedies for fraud may include rescission (i.e., reversal) of a fraudulently obtained<br />
agreement or transaction, the recovery of a monetary award to compensate for the<br />
harm caused, punitive damages to punish or deter the misconduct, and possibly others.<br />
<strong>In</strong> cases of a fraudulently induced contract, fraud may serve as a defense in a civil<br />
action for breach of contract or specific performance of contract.<br />
Fraud may serve as a basis for a court to invoke its equitable jurisdiction.<br />
As a Criminal Offence<br />
<strong>In</strong> common law jurisdictions, as a criminal offence, fraud takes many different forms,<br />
some general (e.g., theft by false pretense) and some specific to particular categories of<br />
victims or misconduct (e.g., bank fraud, insurance fraud, forgery). <strong>The</strong> elements of fraud<br />
as a crime similarly vary. <strong>The</strong> requisite elements of perhaps the most general form of<br />
criminal fraud, theft by false pretense, are the intentional deception of a victim by false<br />
representation or pretense with the intent of persuading the victim to part with property<br />
and with the victim parting with property in reliance on the representation or pretense<br />
and with the perpetrator intending to keep the property from the victim.<br />
Canada<br />
By Region<br />
North America<br />
Section 380(1) of the Criminal Code provides the general definition for fraud in Canada:<br />
380. (1) Every one who, by deceit, falsehood or other fraudulent means, whether or not<br />
it is a false pretense within the meaning of this Act, defrauds the public or any person,<br />
whether ascertained or not, of any property, money or valuable security or any service,<br />
(a) is guilty of an indictable offence and liable to a term of imprisonment not<br />
exceeding fourteen years, where the subject-matter of the offence is a<br />
testamentary instrument or the value of the subject-matter of the offence exceeds<br />
five thousand dollars; or<br />
(b) is guilty<br />
(i) of an indictable offence and is liable to imprisonment for a term not<br />
exceeding two years, or<br />
(ii) of an offence punishable on summary conviction, where the value of<br />
the subject-matter of the offence does not exceed five thousand dollars.<br />
Page 124 of 372
<strong>In</strong> addition to the penalties outlined above, the court can also issue a prohibition order<br />
under s. 380.2 (preventing a person from "seeking, obtaining or continuing any<br />
employment, or becoming or being a volunteer in any capacity, that involves having<br />
authority over the real property, money or valuable security of another person"). It can<br />
also make a restitution order under s. 380.3.<br />
<strong>The</strong> Canadian courts have held that the offence consists of two distinct elements:<br />
<br />
<br />
A prohibited act of deceit, falsehood or other fraudulent means. <strong>In</strong> the absence of<br />
deceit or falsehood, the courts will look objectively for a "dishonest act"; and<br />
<strong>The</strong> deprivation must be caused by the prohibited act, and deprivation must<br />
relate to property, money, valuable security, or any service.<br />
<strong>The</strong> Supreme Court of Canada has held that deprivation is satisfied on proof of<br />
detriment, prejudice or risk of prejudice; it is not essential that there be actual loss.<br />
Deprivation of confidential information, in the nature of a trade secret or copyrighted<br />
material that has commercial value, has also been held to fall within the scope of the<br />
offence.<br />
Criminal Fraud<br />
United States<br />
<strong>The</strong> proof requirements for criminal fraud charges in the United States are essentially<br />
the same as the requirements for other crimes: guilt must be proved beyond a<br />
reasonable doubt. Throughout the United States fraud charges can be misdemeanors<br />
or felonies depending on the amount of loss involved. High value frauds can also<br />
include additional penalties. For example, in California losses of $500,000 or more will<br />
result in an extra two, three, or five years in prison in addition to the regular penalty for<br />
the fraud.<br />
<strong>The</strong> U.S. government's 2006 fraud review concluded that fraud is a significantly underreported<br />
crime, and while various agencies and organizations were attempting to tackle<br />
the issue, greater co-operation was needed to achieve a real impact in the public sector.<br />
Page 125 of 372
<strong>The</strong> scale of the problem pointed to the need for a small but high-powered body to bring<br />
together the numerous counter-fraud initiatives that existed.<br />
According to Bloomberg, auto loan application fraud rates in the United States has been<br />
steadily rising over the past few years. This type of fraud expected to double from about<br />
$2–3 billion in 2015 to $4–6 billion in 2017.<br />
Civil Fraud<br />
Although elements may vary by jurisdiction and the specific allegations made by a<br />
plaintiff who files a lawsuit that alleged fraud, typical elements of a fraud case in the<br />
United States are that:<br />
1. Somebody misrepresents a material fact in order to obtain action or forbearance<br />
by another person;<br />
2. <strong>The</strong> other person relies upon the misrepresentation; and<br />
3. <strong>The</strong> other person suffers injury as a result of the act or forbearance taken in<br />
reliance upon the misrepresentation.<br />
To establish a civil claim of fraud, most jurisdictions in the United States require that<br />
each element of a fraud claim be pleaded with particularity and be proved by a<br />
preponderance of the evidence, meaning that it is more likely than not that the fraud<br />
occurred.<br />
Some jurisdictions impose a higher evidentiary standard, such as Washington State's<br />
requirement that the elements of fraud be proved with clear, cogent, and convincing<br />
evidence (very probable evidence), or Pennsylvania's requirement that common law<br />
fraud be proved by clear and convincing evidence.<br />
<strong>The</strong> measure of damages in fraud cases is normally computed using one of two rules:<br />
1. <strong>The</strong> "benefit of bargain" rule, which allows for recovery of damages in the amount<br />
of the difference between the value of the property had it been as represented<br />
and its actual value;<br />
2. Out-of-pocket loss, which allows for the recovery of damages in the amount of<br />
the difference between the value of what was given and the value of what was<br />
received.<br />
Special damages may be allowed if shown to have been proximately caused by<br />
defendant's fraud and the damage amounts are proved with specificity.<br />
Many jurisdictions permit a plaintiff in a fraud case to seek punitive or exemplary<br />
damages.<br />
Page 126 of 372
Pacific Asia<br />
China<br />
Zhang Yingyu's story collection <strong>The</strong> Book of Swindles (available here; ca. 1617) testifies<br />
to rampant commercial fraud, especially involving itinerant businessmen, in late Ming<br />
China. <strong>The</strong> journal Science reported in 2017 that fraud is rife in Chinese academia,<br />
resulting in numerous article retractions and harm to China's international prestige. <strong>The</strong><br />
Economist, CNN, and other media outlets regularly report on incidents of fraud or bad<br />
faith in Chinese business and trade practices. Forbes cites cybercrime as a persistent<br />
and growing threat to Chinese consumers.<br />
United Kingdom<br />
Europe<br />
<strong>In</strong> 2016 the estimated value lost through fraud in the UK was £193 billion a year.<br />
<strong>In</strong> January 2018 the Financial Times reported that the value of UK fraud hit a 15-year<br />
high of £2.11bn in 2017 according to a study. <strong>The</strong> article said that the accountancy firm<br />
BDO examined reported fraud cases worth more than £50,000 and found that the total<br />
Page 127 of 372
number rose to 577 in 2017, compared with 212 in 2003. <strong>The</strong> study found that the<br />
average amount stolen in each incident rose to £3.66m, up from £1.5m in 2003.<br />
As at November 2017 Fraud is the most common criminal offence in the UK according<br />
to a study by Crowe Clark Whitehill, Experian and the Centre for Counter Fraud Studies.<br />
<strong>The</strong> study suggests the UK loses over £190 billion per year to fraud. £190 billion is more<br />
than 9% of the UK’s projected GDP for 2017 ($2,496 (£2,080) billion according to<br />
Statistics Times). <strong>The</strong> estimate for fraud in the UK figure is more than the entire GDP of<br />
countries such as Romania, Qatar and Hungary.<br />
According to another review by the UK anti-fraud charity Fraud Advisory Panel (FAP),<br />
business fraud accounted for £144bn, while fraud against individuals was estimated at<br />
£9.7bn. <strong>The</strong> FAP has been particularly critical of the support available from the police to<br />
victims of fraud in the UK outside of London. Although victims of fraud are generally<br />
referred to the UK's national fraud and cyber crime reporting centre, Action Fraud, the<br />
FAP found that there was "little chance" that these crime reports would be followed up<br />
with any kind of substantive law enforcement action by UK authorities, according to the<br />
report.<br />
<strong>In</strong> July 2016 it was reported that fraudulent activity levels in the UK increased in the 10<br />
years to 2016 from £52 billion to £193bn. This figure would be a conservative estimate,<br />
since as the former commissioner of the City of London Police, Adrian Leppard, has<br />
said, only 1 in 12 such crimes are actually reported. Donald Toon, director of the NCA's<br />
economic crime command, stated in July 2016: "<strong>The</strong> annual losses to the UK from fraud<br />
are estimated to be more than £190bn". Figures released in October 2015 from the<br />
<strong>Crime</strong> Survey of England and Wales found that there had been 5.1 million incidents of<br />
fraud in England and Wales in the previous year, affecting an estimated one in 12 adults<br />
and making it the most common form of crime.<br />
Also in July 2016, the Office for National Statistics (ONS) stated "Almost six million<br />
fraud and cyber crimes were committed last year in England and Wales and estimated<br />
there were two million computer misuse offences and 3.8 million fraud offences in the<br />
12 months to the end of March 2016." Fraud affects one in ten people in the UK.<br />
According to the ONS most frauds relate to bank account fraud. <strong>The</strong>se figures are<br />
separate from the headline estimate that another 6.3 million crimes (distinct from frauds)<br />
were perpetrated in the UK against adults in the year to March 2016.<br />
Fraud was not included in a "<strong>Crime</strong> Harm <strong>In</strong>dex" published by the Office for National<br />
Statistics in 2016. Michael Levi, professor of criminology at Cardiff University, remarked<br />
in August 2016 that it was ‘deeply regrettable’ fraud is being left out of the first index<br />
despite being the most common crime reported to police in the UK. Levi said ‘If you’ve<br />
got some categories that are excluded, they are automatically left out of the police’s<br />
priorities.’. <strong>The</strong> Chief of the National Audit Office (NAO), Sir Anyas Morse has also said<br />
“For too long, as a low-value but high-volume crime, online fraud has been overlooked<br />
by government, law enforcement and industry. It is now the most commonly<br />
experienced crime in England and Wales and demands an urgent response.”<br />
Page 128 of 372
England, Wales, and Northern Ireland<br />
Since 2007, fraud in England and Wales and Northern Ireland has been covered by the<br />
Fraud Act 2006. <strong>The</strong> Act was given Royal Assent on 8 November 2006, and came into<br />
effect on 15 January 2007.<br />
<strong>The</strong> Act gives a statutory definition of the criminal offence of fraud, defining it in three<br />
classes—fraud by false representation, fraud by failing to disclose information, and<br />
fraud by abuse of position. It provides that a person found guilty of fraud is liable to a<br />
fine or imprisonment for up to twelve months on summary conviction (six months in<br />
Northern Ireland), or a fine or<br />
imprisonment for up to ten years<br />
on conviction on indictment.<br />
This Act largely replaces the<br />
laws relating to obtaining<br />
property by deception, obtaining<br />
a pecuniary advantage and<br />
other offences that were created<br />
under the <strong>The</strong>ft Act 1978.<br />
Serious Fraud Office<br />
Scotland<br />
<strong>In</strong> Scots law, fraud is covered<br />
under the common law and a<br />
number of statutory offences.<br />
<strong>The</strong> main fraud offences are<br />
common law fraud, uttering,<br />
embezzlement and statutory<br />
frauds. <strong>The</strong> Fraud Act 2006<br />
does not apply in Scotland.<br />
<strong>The</strong> Serious Fraud Office (United Kingdom) is an arm of the Government of the United<br />
Kingdom, accountable to the Attorney-General.<br />
National Fraud Authority<br />
<strong>The</strong> National Fraud Authority (NFA) was, until 2014, a government agency co-ordinating<br />
the counter-fraud response in the UK.<br />
Cifas<br />
Cifas is a British fraud prevention service, a not-for-profit membership organization for<br />
all sectors that enables organizations to share and access fraud data using their<br />
Page 129 of 372
databases. Cifas is dedicated to the prevention of fraud, including internal fraud by staff,<br />
and the identification of financial and related crime.<br />
Cost<br />
<strong>The</strong> typical organization loses five percent of its annual revenue to fraud, with a median<br />
loss of $160,000. Frauds committed by owners and executives were more than nine<br />
times as costly as employee fraud. <strong>The</strong> industries most commonly affected are banking,<br />
manufacturing, and government.<br />
Types of Fraudulent Acts<br />
<strong>The</strong> falsification of documents, forgery or counterfeiting are types of fraud. <strong>The</strong> theft of<br />
one's personal information, like Social Security number, or identity is type of fraud.<br />
Fraud can be committed through many media, including mail, wire, phone, and the<br />
<strong>In</strong>ternet (computer crime and <strong>In</strong>ternet fraud). <strong>In</strong>ternational dimensions of the web and<br />
ease with which users can hide their location, the difficulty of checking identity and<br />
legitimacy online, and the simplicity with which hackers can divert browsers to dishonest<br />
sites and steal credit card details have all contributed to the very rapid growth of <strong>In</strong>ternet<br />
fraud. <strong>In</strong> some countries, tax fraud is also prosecuted under false billing or tax forgery.<br />
<strong>The</strong>re have also been fraudulent "discoveries", e.g., in science, to gain prestige rather<br />
than immediate monetary gain.<br />
Anti-Fraud Movements<br />
Beyond laws that aim at prevention of fraud, there are also governmental and nongovernmental<br />
organizations that aim to fight fraud. Between 1911 and 1933, 47 states<br />
adopted the so-called Blue Sky Laws status. <strong>The</strong>se laws were enacted and enforced at<br />
the state level and regulated the offering and sale of securities to protect the public from<br />
fraud. Though the specific provisions of these laws varied among states, they all<br />
required the registration of all securities offerings and sales, as well as of every U.S.<br />
stockbroker and brokerage firm. However, these Blue Sky laws were generally found to<br />
be ineffective. To increase public trust in the capital markets the President of the United<br />
States, Franklin D. Roosevelt, established the U.S. Securities and Exchange<br />
Commission (SEC). <strong>The</strong> main reason for the creation of the SEC was to regulate the<br />
stock market and prevent corporate abuses relating to the offering and sale of securities<br />
and corporate reporting. <strong>The</strong> SEC was given the power to license and regulate stock<br />
exchanges, the companies whose securities traded on them, and the brokers and<br />
dealers who conducted the trading.<br />
Detection<br />
For detection of fraudulent activities on the large scale, massive use of (online) data<br />
analysis is required, in particular predictive analytics or forensic analytics. Forensic<br />
analytics is the use of electronic data to reconstruct or detect financial fraud. <strong>The</strong> steps<br />
in the process are data collection, data preparation, data analysis, and the preparation<br />
of a report and possibly a presentation of the results. Using computer-based analytic<br />
Page 130 of 372
methods Nigrini's wider goal is the detection of fraud, errors, anomalies, inefficiencies,<br />
and biases which refer to people gravitating to certain dollar amounts to get past<br />
internal control thresholds.<br />
<strong>The</strong> analytic tests usually start with high-level data overview tests to spot highly<br />
significant irregularities. <strong>In</strong> a recent purchasing card application these tests identified a<br />
purchasing card transaction for 3,000,000 Costa Rica Colons. This was neither a fraud<br />
nor an error, but it was a highly unusual amount for a purchasing card transaction.<br />
<strong>The</strong>se high-level tests include tests related to Benford's Law and possibly also those<br />
statistics known as descriptive statistics. <strong>The</strong>se high-tests are always followed by more<br />
focused tests to look for small samples of highly irregular transactions. <strong>The</strong> familiar<br />
methods of correlation and time-series analysis can also be used to detect fraud and<br />
other irregularities. Forensic analytics also includes the use of a fraud risk-scoring<br />
model to identify high risk forensic units (customers, employees, locations, insurance<br />
claims and so on). Forensic analytics also includes suggested tests to identify financial<br />
statement irregularities, but the general rule is that analytic methods alone are not too<br />
successful at detecting financial statement fraud.<br />
Related<br />
Apart from fraud, there are several related categories of intentional deceptions that may<br />
or may not include the elements of personal gain or damage to another individual:<br />
<br />
<br />
Obstruction of justice<br />
18 U.S.C. § 704 which criminalizes false representation of having been awarded<br />
any decoration or medal authorized by Congress for the Armed Forces of the<br />
United States<br />
Page 131 of 372
Page 132 of 372
X. Identity <strong>The</strong>ft<br />
Identity theft is the deliberate use of someone else's identity, usually as a method to<br />
gain a financial advantage or obtain credit and other benefits in the other person's<br />
name, and perhaps to the other person's disadvantage or loss. <strong>The</strong> person whose<br />
identity has been assumed may suffer adverse consequences, especially if they are<br />
held responsible for the perpetrator's actions. Identity theft occurs when someone uses<br />
another's personally identifying information, like their name, identifying number, or credit<br />
card number, without their permission, to commit fraud or other crimes. <strong>The</strong> term<br />
identity theft was coined in 1964. Since that time, the definition of identity theft has been<br />
statutorily prescribed throughout both the U.K. and the United States as the theft of<br />
personally identifying information, generally including a person’s name, date of birth,<br />
social security number, driver’s license number, bank account or credit card numbers,<br />
PIN numbers, electronic signatures, fingerprints, passwords, or any other information<br />
that can be used to access a person’s financial resources.<br />
Determining the link between data breaches and identity theft is challenging, primarily<br />
because identity theft victims often do not know how their personal information was<br />
obtained, and identity theft is not always detectable by the individual victims, according<br />
to a report done for the FTC. Identity fraud is often but not necessarily the consequence<br />
Page 133 of 372
of identity theft. Someone can steal or misappropriate personal information without then<br />
committing identity theft using the information about every person, such as when a<br />
major data breach occurs. A US Government Accountability Office study determined<br />
that "most breaches have not resulted in detected incidents of identity theft". <strong>The</strong> report<br />
also warned that "the full extent is unknown". A later unpublished study by Carnegie<br />
Mellon University noted that "Most often, the causes of identity theft is not known", but<br />
reported that someone else concluded that "the probability of becoming a victim to<br />
identity theft as a result of a data breach is ... around only 2%". More recently, an<br />
association of consumer data companies noted that one of the largest data breaches<br />
ever, accounting for over four million records, resulted in only about 1,800 instances of<br />
identity theft, according to the company whose systems were breached.<br />
An October 2010 article entitled "Cyber <strong>Crime</strong> Made Easy" explained the level to which<br />
hackers are using malicious software. As Gunter Ollmann, Chief Technology Officer of<br />
security at Microsoft, said, "<strong>In</strong>terested in credit card theft? <strong>The</strong>re's an app for that." This<br />
statement summed up the ease with which these hackers are accessing all kinds of<br />
information online. <strong>The</strong> new program for infecting users' computers was called Zeus;<br />
and the program is so hacker-friendly that even an inexperienced hacker can operate it.<br />
Although the hacking program is easy to use, that fact does not diminish the devastating<br />
effects that Zeus (or other software like Zeus) can do to a computer and the user. For<br />
example, the article stated that programs like Zeus can steal credit card information,<br />
important documents, and even documents necessary for homeland security. If the<br />
hacker were to gain this information, it would mean identity theft or even a possible<br />
terrorist attack. <strong>The</strong> ITAC says that about 15 million Americans are having their identity<br />
stolen, in 2012.<br />
Types<br />
Sources such as the non-profit Identity <strong>The</strong>ft Resource Center sub-divide identity theft<br />
into five categories:<br />
<br />
<br />
<br />
<br />
<br />
Criminal identity theft (posing as another person when apprehended for a crime)<br />
Financial identity theft (using another's identity to obtain credit, goods and<br />
services)<br />
Identity cloning (using another's information to assume his or her identity in daily<br />
life)<br />
Medical identity theft (using another's identity to obtain medical care or drugs)<br />
Child identity theft.<br />
Identity theft may be used to facilitate or fund other crimes including illegal immigration,<br />
terrorism, phishing and espionage. <strong>The</strong>re are cases of identity cloning to attack<br />
payment systems, including online credit card processing and medical insurance. [12]<br />
Page 134 of 372
Identity Cloning and Concealment<br />
<strong>In</strong> this situation the identity thief impersonates someone else in order to conceal their<br />
own true identity. Examples are illegal immigrants hiding their illegal status, people<br />
hiding from creditors or other individuals, and those who simply want to become<br />
"anonymous" for personal reasons. Another example is posers, a label given to people<br />
who use someone else's photos and information on social networking sites. Posers<br />
mostly create believable stories involving friends of the real person they are imitating.<br />
Unlike identity theft used to obtain credit which usually comes to light when the debts<br />
mount, concealment may continue indefinitely without being detected, particularly if the<br />
identity thief is able to obtain false credentials in order to pass various authentication<br />
tests in everyday life.<br />
Criminal Identity <strong>The</strong>ft<br />
When a criminal fraudulently identifies themselves to police as another individual at the<br />
point of arrest, it is sometimes referred to as "Criminal Identity <strong>The</strong>ft." <strong>In</strong> some cases,<br />
criminals have previously obtained state-issued identity documents using credentials<br />
stolen from others, or have simply presented a fake ID. Provided the subterfuge works,<br />
charges may be placed under the victim's name, letting the criminal off the hook.<br />
Victims might only learn of such incidents by chance, for example by receiving a court<br />
summons, discovering their drivers licenses are suspended when stopped for minor<br />
traffic violations, or through background checks performed for employment purposes.<br />
It can be difficult for the victim of a criminal identity theft to clear their record. <strong>The</strong> steps<br />
required to clear the victim's incorrect criminal record depend in which jurisdiction the<br />
crime occurred and whether the true identity of the criminal can be determined. <strong>The</strong><br />
victim might need to locate the original arresting officers and prove their own identity by<br />
some reliable means such as fingerprinting or DNA testing, and may need to go to a<br />
Page 135 of 372
court hearing to be cleared of the charges. Obtaining an expungement of court records<br />
may also be required. Authorities might permanently maintain the victim's name as an<br />
alias for the criminal's true identity in their criminal records databases. One problem that<br />
victims of criminal identity theft may encounter is that various data aggregators might<br />
still have the incorrect criminal records in their databases even after court and police<br />
records are corrected. Thus it is possible that a future background check will return the<br />
incorrect criminal records. This is just one example of the kinds of impact that may<br />
continue to affect the victims of identity theft for some months or even years after the<br />
crime, aside from the psychological trauma that being 'cloned' typically engenders.<br />
Synthetic Identity <strong>The</strong>ft<br />
A variation of identity theft which has recently become more common is synthetic<br />
identity theft, in which identities are completely or partially fabricated. <strong>The</strong> most common<br />
technique involves combining a real social security number with a name and birthdate<br />
other than the ones associated with the number. Synthetic identity theft is more difficult<br />
to track as it doesn't show on either person's credit report directly but may appear as an<br />
entirely new file in the credit bureau or as a subfile on one of the victim's credit reports.<br />
Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters<br />
credit. <strong>In</strong>dividual victims can be affected if their names become confused with the<br />
synthetic identities, or if negative information in their subfiles impacts their credit ratings.<br />
Medical Identity <strong>The</strong>ft<br />
Privacy researcher Pam Dixon, the founder of the World Privacy Forum, coined the term<br />
medical identity theft and released the first major report about this issue in 2006. <strong>In</strong> the<br />
report, she defined the crime for the first time and made the plight of victims public. <strong>The</strong><br />
report's definition of the crime is that medical identity theft occurs when someone seeks<br />
medical care under the identity of another person. <strong>In</strong>surance theft is also very common,<br />
if a thief has your insurance information and or your insurance card, they can seek<br />
medical attention posing as yourself. <strong>In</strong> addition to risks of financial harm common to all<br />
forms of identity theft, the thief's medical history may be added to the victim's medical<br />
records. <strong>In</strong>accurate information in the victim's records is difficult to correct and may<br />
affect future insurability or cause doctors relying on the misinformation to deliver<br />
inappropriate care. After the publication of the report, which contained a<br />
recommendation that consumers receive notifications of medical data breach incidents,<br />
California passed a law requiring this, and then finally HIPAA was expanded to also<br />
require medical breach notification when breaches affect 500 or more people. Data<br />
collected and stored by hospitals and other organizations such as medical aid schemes<br />
is up to 10 times more valuable to cybercriminals than credit card information.<br />
Child Identity <strong>The</strong>ft<br />
Child identity theft occurs when a minor's identity is used by another person for the<br />
impostor's personal gain. <strong>The</strong> impostor can be a family member, a friend, or even a<br />
stranger who targets children. <strong>The</strong> Social Security numbers of children are valued<br />
Page 136 of 372
ecause they do not have any information associated with them. Thieves can establish<br />
lines of credit, obtain driver's licenses, or even buy a house using a child's identity. This<br />
fraud can go undetected for years, as most children do not discover the problem until<br />
years later. Child identity theft is fairly common, and studies have shown that the<br />
problem is growing. <strong>The</strong> largest study on child identity theft, as reported by Richard<br />
Power of the Carnegie Mellon Cylab with data supplied by AllClear ID, found that of<br />
40,000 children, 10.2% were victims of identity theft.<br />
<strong>The</strong> Federal Trade<br />
Commission (FTC)<br />
estimates that about nine<br />
million people will be<br />
victims of identity theft in<br />
the United States per<br />
year. It was also<br />
estimated that in 2008<br />
630,000 people under the<br />
age of 19 were victims of<br />
theft. This then gave<br />
them a debt of about<br />
$12,799 which was not<br />
theirs.<br />
Not only are children in<br />
general big targets of<br />
identity theft but children<br />
who are in foster care are<br />
even bigger targets. This is because they are most likely moved around quite frequently<br />
and their SSN is being shared with multiple people and agencies. Foster children are<br />
even more victims of identity theft within their own family and other relatives. Young<br />
people in foster care who are victims of this crime are usually left alone to struggle and<br />
figure out how to fix their newly formed bad credit.<br />
Financial Identity <strong>The</strong>ft<br />
<strong>The</strong> most common type is financial identity theft, where someone wants to gain<br />
economical benefits in someone else's name. This includes getting credits, loans, goods<br />
and services, claiming to be someone else.<br />
Tax Identity <strong>The</strong>ft<br />
One of the major identity theft categories is Tax Identity <strong>The</strong>ft. Tax Identity theft occurs<br />
when someone gains another persons information and uses that to receive a tax refund.<br />
<strong>The</strong> thief in this case can also try to get a job and then their employer will report the<br />
income of the real taxpayer, this then results in the taxpayer getting in trouble with the<br />
IRS.<br />
Page 137 of 372
<strong>The</strong> 14039 Form to the IRSis a form that will help one fight against a theft like tax theft.<br />
This form will put the IRS on alert and someone who believed they have been a victim<br />
of tax related theft will be given a Identity Protection Personal Identification Number (IP<br />
PIN), which is a 6 digit code used in replace of a SSN for filing tax returns.<br />
Techniques for Obtaining and Exploiting Personal <strong>In</strong>formation for Identity <strong>The</strong>ft<br />
Identity thieves typically obtain and exploit personally identifiable information about<br />
individuals, or various credentials they use to authenticate themselves, in order to<br />
impersonate them. Examples include:<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Rummaging through rubbish for personal information (dumpster diving)<br />
Retrieving personal data from redundant IT equipment and storage media<br />
including PCs, servers, PDAs, mobile phones, USB memory sticks and hard<br />
drives that have been disposed of carelessly at public dump sites, given away or<br />
sold on without having been properly sanitized<br />
Using public records about individual citizens, published in official registers such<br />
as electoral rolls [23]<br />
Stealing bank or credit cards, identification cards, passports, authentication<br />
tokens ... typically by pickpocketing, housebreaking or mail theft<br />
Common-knowledge questioning schemes that offer account verification and<br />
compromise: "What's your mother's maiden name?", "what was your first car<br />
model?", or "What was your first pet's name?", etc.<br />
Skimming information from bank or credit cards using compromised or hand-held<br />
card readers, and creating clone cards<br />
Using 'contactless' credit card readers to acquire data wirelessly from RFIDenabled<br />
passports<br />
Shoulder-Surfing, involves an individual who discreetly watches or hears others<br />
providing valuable personal information. This is particularly done in crowded<br />
places because it is relatively easy to observe someone as they fill out forms,<br />
enter PIN numbers on ATMs or even type passwords on smartphones.<br />
Stealing personal information from computers using breaches in browser security<br />
or malware such as Trojan horse keystroke logging programs or other forms of<br />
spyware<br />
Hacking computer networks, systems and databases to obtain personal data,<br />
often in large quantities<br />
Page 138 of 372
Exploiting breaches that result in the publication or more limited disclosure of<br />
personal information such as names, addresses, Social Security number or credit<br />
card numbers<br />
Advertising bogus job offers in order to accumulate resumes and applications<br />
typically disclosing applicants' names, home and email addresses, telephone<br />
numbers and sometimes their banking details<br />
Exploiting insider access and abusing the rights of privileged IT users to access<br />
personal data on their employers' systems<br />
<br />
<strong>In</strong>filtrating organizations that store<br />
and process large amounts or<br />
particularly valuable personal<br />
information<br />
Impersonating trusted organizations<br />
in emails, SMS text messages,<br />
phone calls or other forms of<br />
communication in order to dupe<br />
victims into disclosing their personal<br />
information or login credentials,<br />
typically on a fake corporate website or data collection form (phishing)<br />
<br />
<br />
<br />
<br />
<br />
<br />
Brute-force attacking weak passwords and using inspired guesswork to<br />
compromise weak password reset questions<br />
Obtaining castings of fingers for falsifying fingerprint identification.<br />
Browsing social networking websites for personal details published by users,<br />
often using this information to appear more credible in subsequent social<br />
engineering activities<br />
Diverting victims' email or post in order to obtain personal information and<br />
credentials such as credit cards, billing and bank/credit card statements, or to<br />
delay the discovery of new accounts and credit agreements opened by the<br />
identity thieves in the victims' names<br />
Using false pretenses to trick individuals, customer service representatives and<br />
help desk workers into disclosing personal information and login details or<br />
changing user passwords/access rights (pretexting)<br />
Stealing cheques (checks) to acquire banking information, including account<br />
numbers and bank codes<br />
Page 139 of 372
Guessing Social Security numbers by using information found on <strong>In</strong>ternet social<br />
networks such as Facebook and MySpace [25]<br />
Low security/privacy protection on photos that are easily clickable and<br />
downloaded on social networking sites.<br />
Befriending strangers on social networks and taking advantage of their trust until<br />
private information is given.<br />
<strong>In</strong>dicators That You May Be a Victim of Identity <strong>The</strong>ft<br />
<strong>The</strong> majority of identity theft victims do not realize that they are a victim until it has<br />
negatively impacted their lives. Many people do not find out that their identities have<br />
been stolen until they are contacted by financial institutions or discover suspicious<br />
activities on their bank accounts. According to an article by Herb Weisbaum, everyone<br />
in the US should assume that their personal information has been compromised at one<br />
point. It is therefore of great importance to watch out for warning signs that your identity<br />
has been compromised. <strong>The</strong> following are eleven indicators that someone else might be<br />
using your identity.<br />
1. Credit or debit card charges for goods or services you are not aware of, including<br />
unauthorized withdrawals from your account<br />
2. Receiving calls from credit or debit card fraud control department warning of<br />
possible suspicious activity on your credit card account<br />
3. Receiving credit cards that you did not apply for<br />
4. Receiving information that a credit scoring investigation was done. <strong>The</strong>y are<br />
often done when a loan or phone subscription was applied for.<br />
5. Checks bouncing for lack of enough money in your account to cover the amount.<br />
This might be as a result of unauthorized withdrawals from your account<br />
6. Identity theft criminals may commit crimes with your personal information. You<br />
may not realize this until you see the police on your door arresting you for crimes<br />
that you did not commit<br />
7. Sudden changes to your credit score may indicate that someone else is using<br />
your credit cards<br />
8. Bills for services like gas, water, electricity not arriving in time. This can be an<br />
indication that your mail was stolen or redirected<br />
9. Being not approved for loans because your credit report indicates that you are<br />
not credit worthy<br />
Page 140 of 372
10. Receiving notification from your post office informing you that your mails are<br />
being forwarded to another unknown address<br />
11. Your yearly tax returns indicating that you have earned more than you have<br />
actually earned. This might indicate that someone is using your national<br />
identification number e.g. SSN to report their earnings to the tax authorities<br />
<strong>In</strong>dividual Identity Protection<br />
<strong>The</strong> acquisition of personal identifiers is made possible through serious breaches of<br />
privacy. For consumers, this is usually a result of them naively providing their personal<br />
information or login credentials to the identity thieves as a result of being duped but<br />
identity-related documents such as credit cards, bank statements, utility bills,<br />
checkbooks etc. may also be physically stolen from vehicles, homes, offices, and not<br />
the least letterboxes, or directly from victims by pickpockets and bag snatchers.<br />
Guardianship of personal identifiers by consumers is the most common intervention<br />
strategy recommended by the US Federal Trade Commission, Canadian Phone Busters<br />
and most sites that address identity theft. Such organizations offer recommendations on<br />
how individuals can prevent their information falling into the wrong hands.<br />
Page 141 of 372
Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form<br />
of information security control known as risk avoidance). This implies that organizations,<br />
IT systems and procedures should not demand excessive amounts of personal<br />
information or credentials for identification and authentication. Requiring, storing and<br />
processing personal identifiers (such as Social Security number, national identification<br />
number, driver's license number, credit card number, etc.) increases the risks of identity<br />
theft unless this valuable personal information is adequately secured at all times.<br />
Committing personal identifiers to memory is a sound practice that can reduce the risks<br />
of a would-be identity thief from obtaining these records. To help in remembering<br />
numbers such as social security numbers and credit card numbers, it is helpful to<br />
consider using mnemonic techniques or memory aids such as the mnemonic Major<br />
System.<br />
Identity thieves sometimes impersonate dead people, using personal information<br />
obtained from death notices, gravestones and other sources to exploit delays between<br />
the death and the closure of the person's accounts, the inattentiveness of grieving<br />
families and weaknesses in the processes for credit-checking. Such crimes may<br />
continue for some time until the deceased's families or the authorities notice and react<br />
to anomalies.<br />
<strong>In</strong> recent years, commercial identity theft protection/insurance services have become<br />
available in many countries. <strong>The</strong>se services purport to help protect the individual from<br />
identity theft or help detect that identity theft has occurred in exchange for a monthly or<br />
annual membership fee or premium. <strong>The</strong> services typically work either by setting fraud<br />
alerts on the individual's credit files with the three major credit bureaus or by setting up<br />
credit report monitoring with the credit bureaux. While identity theft protection/insurance<br />
services have been heavily marketed, their value has been called into question.<br />
Identity <strong>The</strong>ft and Potential Outcomes<br />
This picture is relevant to the article in which it provides images to represent the<br />
process of giving personal information to a higher power. It also represents the<br />
techniques used by the people receiving the information.<br />
Identity theft is one of the leading problems in the United States that sometimes results<br />
in unfortunate circumstances. <strong>In</strong> a 2018 study, it was reported that 60 million Americans<br />
identities were wrongfully acquired. <strong>The</strong> number of people this has happened to has<br />
revealed there is a wrongful epidemic in our country with how easily our identity is not<br />
truly protected among every account that we have, even our birth certificates. With this<br />
continuing problem, some new bills have been implemented which are thoroughly<br />
described in Identity <strong>The</strong>ft, to provide more security for people such as electronic<br />
signatures and social security verification for more authentication to further prove it is<br />
the true person. <strong>The</strong>re are several types of identity theft that are used to gather<br />
information, one of the most common types occurs when consumers make online<br />
purchases. A study was conducted with 190 people to determine the relationship<br />
between the constructs of fear of financial losses and reputational damages. <strong>The</strong><br />
Page 142 of 372
conclusions of this study revealed that identity theft was a positive correlation with<br />
reputable damages. <strong>The</strong> relationship between perceived risk and online purchase<br />
intention were negative. <strong>The</strong> significance of this study reveals that online companies are<br />
more aware of the potential harm that can be done to their consumers, therefore they<br />
are searching for ways to reduce the perceived risk of consumers and not lose out on<br />
business. Although the idea of identity theft can be frightening to some, the aftermath of<br />
how people move forward is a pretty intense process. Some may face a year or<br />
consecutive years to prove to the legal system that they are the true person. With this<br />
potential long process can lead to emotional strain and financial losses; most theft that<br />
is done was by the victim's family members, some may not be able to obtain new credit<br />
cards or open new bank accounts and sometimes even loans. This is severely<br />
important to provide information about the significance of identity theft and the lasting<br />
impacts it could hold on the victim's life.<br />
Identity Protection by Organizations<br />
<strong>In</strong> their May 1998 testimony before the United States Senate, the Federal Trade<br />
Commission (FTC) discussed the sale of Social Security numbers and other personal<br />
identifiers by credit-raters and data miners. <strong>The</strong> FTC agreed to the industry's selfregulating<br />
principles restricting access to information on credit reports. According to the<br />
industry, the restrictions vary according to the category of customer. Credit reporting<br />
agencies gather and disclose personal and credit information to a wide business client<br />
base.<br />
Poor stewardship of personal data by organizations, resulting in unauthorized access to<br />
sensitive data, can expose individuals to the risk of identity theft. <strong>The</strong> Privacy Rights<br />
Clearinghouse have documented over 900 individual data breaches by US companies<br />
and government agencies since January 2005, which together have involved over 200<br />
Page 143 of 372
million total records containing sensitive personal information, many containing social<br />
security numbers. Poor corporate diligence standards which can result in data breaches<br />
include:<br />
<br />
<br />
<br />
<br />
<br />
<br />
Failure to shred confidential information before throwing it into dumpsters<br />
Failure to ensure adequate network security<br />
Credit card numbers stolen by call center agents and people with access to call<br />
recordings<br />
<strong>The</strong> theft of laptop computers or portable media being carried off-site containing<br />
vast amounts of personal information. <strong>The</strong> use of strong encryption on these<br />
devices can reduce the chance of data being misused should a criminal obtain<br />
them.<br />
<strong>The</strong> brokerage of personal information to other businesses without ensuring that<br />
the purchaser maintains adequate security controls<br />
Failure of governments, when registering sole proprietorships, partnerships, and<br />
corporations, to determine if the officers listed in the articles of incorporation are<br />
who they say they are. This potentially allows criminals access to personal<br />
information through credit rating and data mining services.<br />
<strong>The</strong> failure of corporate or government organizations to protect consumer privacy, client<br />
confidentiality and political privacy has been criticized for facilitating the acquisition of<br />
personal identifiers by criminals.<br />
Using various types of biometric information, such as fingerprints, for identification and<br />
authentication has been cited as a way to thwart identity thieves, however there are<br />
technological limitations and privacy concerns associated with these methods as well.<br />
Market<br />
<strong>The</strong>re is an active market for buying and selling stolen personal information, which<br />
occurs mostly in darknet markets but also in other black markets. People increase the<br />
value of the stolen data by aggregating it with publicly available data, and sell it again<br />
for a profit, increasing the damage that can be done to the people whose data was<br />
stolen.<br />
<strong>In</strong>ternational<br />
Legal Responses<br />
<strong>In</strong> March 2014, after it was learned two passengers with stolen passports were on board<br />
Malaysia Airlines Flight 370 which went missing on March 8, 2014, it came to light that<br />
Page 144 of 372
<strong>In</strong>terpol maintains a database of 40 million lost and stolen travel documents from 157<br />
countries which it makes available to governments and the public, including airlines and<br />
hotels. <strong>The</strong> Stolen and Lost Travel Documents (SLTD) database however is little used.<br />
Big <strong>New</strong>s Network which is based in the UAE, observed that <strong>In</strong>terpol Secretary General<br />
Ronald K. Noble told a forum in Abu Dhabi the previous month this was the case. "<strong>The</strong><br />
bad news is that, despite being incredibly cost effective and deployable to virtually<br />
anywhere in the world, only a handful of countries are systematically using SLTD to<br />
screen travelers. <strong>The</strong> result is a major gap in our global security apparatus that is left<br />
vulnerable to exploitation by criminals and terrorists," Noble is quoted as saying.<br />
Australia<br />
<strong>In</strong> Australia, each state has enacted laws that deal with different aspects of identity or<br />
fraud issues. Some states have now amended relevant criminal laws to reflect crimes of<br />
identity theft, such as the Criminal Law Consolidation Act 1935 (SA), <strong>Crime</strong>s<br />
Amendment (Fraud, Identity and Forgery Offences) Act 2009 and also in Queensland<br />
under the Criminal Code 1899 (QLD). Other states and territories are in states of<br />
development in respect of regulatory frameworks relating to identity theft such as<br />
Western Australia in respect of Criminal Code Amendment (Identity <strong>Crime</strong>) Bill 2009.<br />
At the Commonwealth level, under the Criminal Code Amendment (<strong>The</strong>ft, Fraud,<br />
Bribery & Related Offences) Act 2000 which amended certain provisions within the<br />
Criminal Code Act 1995,<br />
Between 2014 and 2015, in Australia there were 133,921 fraud and deception offences,<br />
an increase of 6% from previous year. <strong>The</strong> total cost reported by the Attorney General<br />
Department was:<br />
Total Costs<br />
Fraud Category Cost Per <strong>In</strong>cident Total Direct Cost<br />
Commonwealth fraud $2,111 $353,866,740<br />
Personal fraud $400 $656,550,506<br />
Police recorded fraud $4,412 per unrecorded incident<br />
$27,981 per recorded incident<br />
$3,260,141,049<br />
<strong>The</strong>re are also high indirect costs associated as a direct result of an incident. For<br />
example, the total indirect costs for police recorded fraud is $5,774,081.<br />
135.1 General Dishonesty<br />
(3) A person is guilty of an offence if a) the person does anything with the<br />
intention of dishonestly causing a loss to another person; and b) the other person<br />
is a Commonwealth entity. Penalty: Imprisonment for 5 years.<br />
Likewise, each state has enacted their own privacy laws to prevent misuse of personal<br />
information and data. <strong>The</strong> Commonwealth Privacy Act is applicable only to<br />
Page 145 of 372
Commonwealth and territory agencies, and to certain private sector bodies (where for<br />
example they deal with sensitive records, such as medical records, or they have more<br />
than $3 million turnover PA).<br />
Canada<br />
Under section 402.2 of the Criminal Code,<br />
Everyone commits an offence who knowingly obtains or possesses another<br />
person's identity information in circumstances giving rise to a reasonable<br />
inference that the information is intended to be used to commit an indictable<br />
offence that includes fraud, deceit or falsehood as an element of the offence.<br />
is guilty of an indictable offence and liable to imprisonment for a term of<br />
not more than five years; or is guilty of an offence punishable on summary<br />
conviction.<br />
Under section 403 of the Criminal Code,<br />
(1) Everyone commits an offence who fraudulently personates another person, living or<br />
dead,<br />
(a) with intent to gain advantage for themselves or another person; (b) with intent<br />
to obtain any property or an interest in any property; (c) with intent to cause<br />
disadvantage to the person being personated or another person; or (d) with intent<br />
to avoid arrest or prosecution or to obstruct, pervert or defeat the course of<br />
justice. is guilty of an indictable offence and liable to imprisonment for a term of<br />
not more than 10 years; or guilty of an offence punishable on summary<br />
conviction.<br />
<strong>In</strong> Canada, Privacy Act (federal legislation) covers only federal government, agencies<br />
and crown corporations. Each province and territory has its own privacy law and privacy<br />
commissioners to limit the storage and use of personal data. For the private sector, the<br />
purpose of the Personal <strong>In</strong>formation Protection and Electronic Documents Act ( 2000, c.<br />
5 ) (known as PIPEDA) is to establish rules to govern the collection, use and disclosure<br />
of personal information; except for the provinces of Quebec, Ontario, Alberta and British<br />
Columbia where provincial laws have been deemed substantially similar.<br />
France<br />
<strong>In</strong> France, a person convicted of identity theft can be sentenced up to five years in<br />
prison and fined up to €75,000.<br />
Hong Kong<br />
Under HK Laws. Chap 210 <strong>The</strong>ft Ordinance, sec. 16A Fraud<br />
Page 146 of 372
(1) If any person by any deceit (whether or not the deceit is the sole or main<br />
inducement) and with intent to defraud induces another person to commit an<br />
act or make an omission, which results either-<br />
(a) in benefit to any person other than the second-mentioned person; or<br />
(b) in prejudice or a substantial risk of prejudice to any person other than<br />
the first-mentioned person, the first-mentioned person commits the<br />
offense of fraud and is liable on conviction upon indictment to<br />
imprisonment for 14 years.<br />
Under the Personal Data (Privacy) Ordinance, it established the post of Privacy<br />
Commissioner for Personal Data and mandate how much personal information one can<br />
collect, retain and destruction. This legislation also provides citizens the right to request<br />
information held by businesses and government to the extent provided by this law.<br />
<strong>In</strong>dia<br />
Under the <strong>In</strong>formation Technology Act 2000 Chapter IX Sec 66C<br />
SECTION 66C<br />
PUNISHMENT FOR IDENTITY THEFT Whoever, fraudulently or dishonestly makes use<br />
of the electronic signature, password or any other unique identification feature of any<br />
other person, shall be punished with imprisonment of either description for a term which<br />
Page 147 of 372
may extend to three years and shall also be liable to fine which may extend to rupees<br />
one lakh.<br />
Philippines<br />
Social networking sites are one of the most famous spreaders of posers in the online<br />
community, giving the users freedom to place any information they want without any<br />
verification that the account is being used by the real person.<br />
Philippines, which ranks eighth in the numbers of users of Facebook and other social<br />
networking sites such as Twitter, Multiply and Tumblr, has been known as source of<br />
various identity theft problems. Identities of those people who carelessly put personal<br />
information on their profiles can easily be stolen just by simple browsing. <strong>The</strong>re are<br />
people who meet online, get to know each other through the free Facebook chat and<br />
exchange of messages that then leads to sharing of private information. Others get<br />
romantically involved with their online friends that they tend to give too much information<br />
such as their social security number, bank account and even personal basic information<br />
such as home address and company address.<br />
This phenomenon lead to the creation of Senate Bill 52: Cybercrime Prevention Act of<br />
2010. Section 2 of this bill states that it recognizes the importance of communication<br />
and multimedia for the development, exploitation and dissemination of information but<br />
violators will be punished by the law through imprisonment or a fine upwards of<br />
Php200,000, but not exceeding 1 million, or depending on the damage caused, or both<br />
(Section 7).<br />
Sweden<br />
Sweden has had relatively few problems with identity theft. This is because only<br />
Swedish identity documents have been accepted for identity verification. Stolen<br />
documents are traceable by banks and some other institutions. <strong>The</strong> banks have the<br />
duty to check the identity of people withdrawing money or getting loans. If a bank gives<br />
money to someone using an identity document reported as stolen, the bank must take<br />
the loss. Since 2008, any EU passport is valid in Sweden for identity check, and<br />
Swedish passports are valid all over the EU. This makes it harder to detect stolen<br />
documents, but still banks in Sweden must ensure that stolen documents are not<br />
accepted.<br />
Other types of identity theft have become more common in Sweden. One common<br />
example is ordering a credit card to someone who has an unlocked letterbox and is not<br />
home in the daytime. <strong>The</strong> thief steals the letter with the credit card and then the letter<br />
with the code which typically arrives a few days later. Usage of a stolen credit card is<br />
hard in Sweden, since an identity document or a PIN code it is normally demanded. If<br />
the shop does not demand that, it must take the loss from stolen credit cards. <strong>The</strong><br />
method of observing someone using the credit card PIN code, stealing the card or<br />
skimming it, and then using the card, has become more common.<br />
Page 148 of 372
Legally, Sweden is an open society. <strong>The</strong> Principle of Public Access says that all<br />
information kept by public authorities must be available for anyone except in certain<br />
cases. Specifically, anyone's address, income, taxes etc. are available to anyone. This<br />
makes fraud easier (the address is restricted only for people who needs to hide).<br />
<strong>The</strong>re was until 2016 no legal<br />
ban specifically against using<br />
someone's identity, only on<br />
the indirect damage caused.<br />
To impersonate someone<br />
else for financial gain is a<br />
kind of fraud, which is<br />
described in the Criminal<br />
Code<br />
(Swedish:<br />
brottsbalken).<br />
To<br />
impersonate someone else to<br />
discredit someone by breaking into social media accounts and provoke, is libel, but that<br />
is hard to sentence someone for. A new law was introduced late 2016 which partially<br />
banned unpermitted identity usage.<br />
United Kingdom<br />
<strong>In</strong> the United Kingdom personal data is protected by the Data Protection Act 1998. <strong>The</strong><br />
Act covers all personal data which an organization may hold, including names, birthday<br />
and anniversary dates, addresses, telephone numbers, etc.<br />
Under English law (which extends to Wales but not to Northern Ireland or Scotland), the<br />
deception offences under the <strong>The</strong>ft Act 1968 increasingly contend with identity theft<br />
situations. <strong>In</strong> R v Seward (2005) EWCA Crim 1941 the defendant was acting as the<br />
"front man" in the use of stolen credit cards and other documents to obtain goods. He<br />
obtained goods to the value of £10,000 for others who are unlikely ever to be identified.<br />
<strong>The</strong> Court of Appeal considered a sentencing policy for deception offenses involving<br />
"identity theft" and concluded that a prison sentence was required. Henriques J. said at<br />
para 14:"Identity fraud is a particularly pernicious and prevalent form of dishonesty<br />
calling for, in our judgment, deterrent sentences."<br />
Statistics released by CIFAS - <strong>The</strong> UK's Fraud Prevention Service show that there were<br />
89,000 victims of identity theft in the UK 2010. This compared with 2009 where there<br />
were 85,000 victims. Men in their 30s and 40s are the most common UK victims and<br />
identity fraud now accounts for nearly half of all frauds recorded.<br />
United States<br />
<strong>The</strong> increase in crimes of identity theft led to the drafting of the Identity <strong>The</strong>ft and<br />
Assumption Deterrence Act. <strong>In</strong> 1998, <strong>The</strong> Federal Trade Commission appeared before<br />
Page 149 of 372
the United States Senate. <strong>The</strong> FTC discussed crimes which exploit consumer credit to<br />
commit loan fraud, mortgage fraud, lines-of-credit fraud, credit card fraud, commodities<br />
and services frauds. <strong>The</strong> Identity <strong>The</strong>ft Deterrence Act (2003)[ITADA] amended U.S.<br />
Code Title 18, § 1028 ("Fraud related to activity in connection with identification<br />
documents, authentication features, and information"). <strong>The</strong> statute now makes the<br />
possession of any "means of identification" to "knowingly transfer, possess, or use<br />
without lawful authority" a federal crime, alongside unlawful possession of identification<br />
documents. However, for federal jurisdiction to prosecute, the crime must include an<br />
"identification document" that either: (a) is purportedly issued by the United States, (b) is<br />
used or intended to defraud the United States, (c) is sent through the mail, or (d) is used<br />
in a manner that affects interstate or foreign commerce. See 18 U.S.C. § 1028(c).<br />
Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending<br />
on the underlying crime per 18 U.S.C. § 1028(b). <strong>In</strong> addition, punishments for the<br />
unlawful use of a "means of identification" were strengthened in § 1028A ("Aggravated<br />
Identity <strong>The</strong>ft"), allowing for a consecutive sentence under specific enumerated felony<br />
violations as defined in § 1028A(c)(1) through (11).<br />
<strong>The</strong> Act also provides the Federal Trade Commission with authority to track the number<br />
of incidents and the dollar value of losses. <strong>The</strong>ir figures relate mainly to consumer<br />
financial crimes and not the broader range of all identification-based crimes.<br />
If charges are brought by state or local law enforcement agencies, different penalties<br />
apply depending on the state.<br />
Six Federal agencies conducted a joint task force to increase the ability to detect<br />
identity theft. <strong>The</strong>ir joint recommendation on "red flag" guidelines is a set of<br />
requirements on financial institutions and other entities which furnish credit data to<br />
credit reporting services to develop written plans for detecting identity theft. <strong>The</strong> FTC<br />
has determined that most medical practices are considered creditors and are subject to<br />
requirements to develop a plan to prevent and respond to patient identity theft. <strong>The</strong>se<br />
plans must be adopted by each organization's Board of Directors and monitored by<br />
senior executives.<br />
Identity theft complaints as a percentage of all fraud complaints decreased from 2004-<br />
2006. <strong>The</strong> Federal Trade Commission reported that fraud complaints in general were<br />
growing faster than ID theft complaints. <strong>The</strong> findings were similar in two other FTC<br />
studies done in 2003 and 2005. <strong>In</strong> 2003, 4.6 percent of the US population said they<br />
were a victim of ID theft. <strong>In</strong> 2005, that number had dropped to 3.7 percent of the<br />
population. <strong>The</strong> Commission's 2003 estimate was that identity theft accounted for some<br />
$52.6 billion of losses in the preceding year alone and affected more than 9.91 million<br />
Americans; the figure comprises $47.6 billion lost by businesses and $5 billion lost by<br />
consumers.<br />
According to the U.S. Bureau of Justice Statistics, in 2010, 7% of US households<br />
experienced identity theft - up from 5.5% in 2005 when the figures were first assembled,<br />
but broadly flat since 2007. <strong>In</strong> 2012, approximately 16.6 million persons, or 7% of all<br />
Page 150 of 372
U.S. residents age 16 or older, reported being victims of one or more incidents of<br />
identity theft.<br />
At least two states, California and Wisconsin have created an Office of Privacy<br />
Protection to assist their citizens in avoiding and recovering from identity theft.<br />
<strong>In</strong> 2009, <strong>In</strong>diana created an Identity <strong>The</strong>ft Unit within their Office of Attorney General to<br />
educate and assist consumers in avoiding and recovering from identity theft as well as<br />
assist law enforcement in investigating and prosecuting identity theft crimes.<br />
<strong>In</strong> Massachusetts in 2009-2010, Governor Deval Patrick made a commitment to<br />
balance consumer protection with the needs of small business owners. His Office of<br />
Consumer Affairs and Business Regulation announced certain adjustments to<br />
Massachusetts' identity theft regulations that maintain protections and also allows<br />
flexibility in compliance. <strong>The</strong>se updated regulations went into effect on March 1, 2010.<br />
<strong>The</strong> regulations are clear that their approach to data security is a risk-based approach<br />
important to small businesses and might not handle a lot of personal information about<br />
customers.<br />
<strong>The</strong> IRS has created the IRS Identity Protection Specialized Unit to help taxpayers' who<br />
are victims of federal tax-related identity theft. Generally, the identity thief will use a<br />
Page 151 of 372
stolen SSN to file a forged tax return and attempt to get a fraudulent refund early in the<br />
filing season. A taxpayer will need to fill out Form 14039, Identity <strong>The</strong>ft Affidavit.<br />
As for the future of medical care and Medicaid, people are mostly concerned about<br />
cloud computing. <strong>The</strong> addition of using cloud information within United States medicare<br />
system would institute easily accessible health information for individuals, but that also<br />
makes it easier for identity theft. Currently, new technology is being produced to help<br />
encrypt and protect files, which will create a smooth transition to cloud technology in the<br />
healthcare system.<br />
Notification<br />
Many states followed California's lead and enacted mandatory data breach notification<br />
laws. As a result, companies that report a data breach typically report it to all their<br />
customers.<br />
Spread and Impact<br />
Surveys in the USA from 2003 to 2006 showed a decrease in the total number of<br />
victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to<br />
$15.6 billion in 2006. <strong>The</strong> average fraud per person decreased from $4,789 in 2003 to<br />
$1,882 in 2006. A Microsoft report shows that this drop is due to statistical problems<br />
with the methodology, that such survey-based estimates are "hopelessly flawed" and<br />
exaggerate the true losses by orders of magnitude.<br />
<strong>The</strong> 2003 survey from the Identity <strong>The</strong>ft Resource Center found that:<br />
<br />
<br />
Only 15% of victims find out about the theft through proactive action taken by a<br />
business<br />
<strong>The</strong> average time spent by victims resolving the problem is about 330 hours<br />
73% of respondents indicated the crime involved the thief acquiring a credit card<br />
<strong>In</strong> a widely publicized account, Michelle Brown, a victim of identity fraud, testified before<br />
a U.S. Senate Committee Hearing on Identity <strong>The</strong>ft. Ms. Brown testified that: "over a<br />
year and a half from January 1998 through July 1999, one individual impersonated me<br />
to procure over $50,000 in goods and services. Not only did she damage my credit, but<br />
she escalated her crimes to a level that I never truly expected: she engaged in drug<br />
trafficking. <strong>The</strong> crime resulted in my erroneous arrest record, a warrant out for my<br />
arrest, and eventually, a prison record when she was booked under my name as an<br />
inmate in the Chicago Federal Prison."<br />
<strong>In</strong> Australia, identity theft was estimated to be worth between A$1billion and A$4 billion<br />
per annum in 2001.<br />
Page 152 of 372
<strong>In</strong> the United Kingdom, the Home Office reported that identity fraud costs the UK<br />
economy £1.2 billion annually (experts believe that the real figure could be much higher)<br />
although privacy groups object to the validity of these numbers, arguing that they are<br />
being used by the government to push for introduction of national ID cards. Confusion<br />
over exactly what constitutes identity theft has led to claims that statistics may be<br />
exaggerated. An extensively reported study from Microsoft Research in 2011 finds that<br />
estimates of identity theft losses contain enormous exaggerations, writing that surveys<br />
"are so compromised and biased that no faith whatever can be placed in their findings."<br />
Page 153 of 372
Page 154 of 372
XI. Kidnapping<br />
<strong>In</strong> criminal law, kidnapping is the unlawful carrying away (asportation) and confinement<br />
of a person against his or her will. Thus, it is a composite crime. It can also be defined<br />
as false imprisonment by means of abduction, both of which are separate crimes that<br />
when committed simultaneously upon the same person merge as the single crime of<br />
kidnapping. <strong>The</strong> asportation/abduction element is typically but not necessarily<br />
conducted by means of force or fear. That is, the perpetrator may use a weapon to force<br />
the victim into a vehicle, but it is still kidnapping if the victim is enticed to enter the<br />
vehicle willingly, e.g., in the belief it is a taxicab.<br />
Kidnapping may be done to demand for ransom in exchange for releasing the victim, or<br />
for other illegal purposes. Kidnapping can be accompanied by bodily injury which<br />
elevates the crime to aggravated kidnapping.<br />
Kidnapping of a child is also known as child abduction, and these are sometimes<br />
separate legal categories.<br />
Motivations<br />
Kidnapping of children is usually by one parent against the wishes of a parent or<br />
guardian. Kidnapping of adults is often for ransom or to force someone to withdraw<br />
money from an ATM, but may also be for the purpose of sexual assault.<br />
<strong>In</strong> the past, and presently in some parts of the world (such as southern Sudan),<br />
kidnapping is a common means used to obtain slaves and money through ransom. <strong>In</strong><br />
less recent times, kidnapping in the form of shanghaiing (or "pressganging") men was<br />
used to supply merchant ships in the 19th century with sailors, whom the law<br />
considered unfree labor.<br />
Page 155 of 372
Criminal gangs are estimated to make up to $500 million a year in ransom payments<br />
from kidnapping.<br />
Kidnapping has been identified as one source by which terrorist organizations have<br />
been known to obtain funding. <strong>The</strong> Perri, Lichtenwald and MacKenzie article identified<br />
"tiger" kidnapping as a specific method used by either the Real Irish Republican Army or<br />
Continuity Irish Republican Army, in which a kidnapped family member is used to force<br />
someone to steal from their employer.<br />
<br />
<br />
<br />
Bride kidnapping is a term often applied loosely, to include any bride "abducted"<br />
against the will of her parents, even if she is willing to marry the "abductor". It still<br />
is traditional amongst certain nomadic peoples of Central Asia. It has seen a<br />
resurgence in Kyrgyzstan since the fall of the Soviet Union and the subsequent<br />
erosion of women's rights.<br />
Express kidnapping is a method of abduction used in some countries, mainly<br />
from Latin America, where a small ransom, that a company or family can easily<br />
pay, is demanded.<br />
Tiger kidnapping is taking a hostage to make a loved one or associate of the<br />
victim do something: e.g. a child is taken hostage to force the shopkeeper to<br />
open the safe. <strong>The</strong> term originates from the usually long preceding observation,<br />
like a tiger does on the prowl.<br />
By Jurisdiction<br />
Canada<br />
Kidnapping that does not result in a homicide is a hybrid offence that comes with a<br />
maximum possible penalty of life imprisonment (18 months if tried summarily). A murder<br />
that results from kidnapping is classified as 1st-degree, with a sentence of life<br />
imprisonment that results from conviction (the mandatory penalty for murder under<br />
Canadian law).<br />
Netherlands<br />
Article 282 prohibits hostaging (and 'kidnapping' is a kind of 'hostaging'). Part 1 of Article<br />
282 allows sentencing kidnappers to maximum imprisonment of 8 years or a fine of the<br />
fifth category. Part 2 allows maximum imprisonment of 9 years or a fine of the fifth<br />
category if there are serious injuries.<br />
Part 3 allows maximum imprisonment of 12 years or a fine of the fifth category if the<br />
victim has been killed. Part 4 allows sentencing people that collaborate with kidnapping<br />
(such as proposing or make available a location where the victim hostaged). Part 1, 2<br />
and 3 will apply also to them.<br />
Page 156 of 372
United Kingdom<br />
Kidnapping is an offence under the common law of England and Wales. Lord Brandon<br />
said in 1984 R v D:<br />
First, the nature of the offence is an attack on, and infringement of, the personal liberty<br />
of an individual. Secondly, the offence contains four ingredients as follows: (1) the<br />
taking or carrying away of one person by another; (2) by force or fraud; (3) without the<br />
consent of the person so taken or carried away; and (4) without lawful excuse.<br />
<strong>In</strong> all cases of kidnapping of children, where it is alleged that a child has been<br />
kidnapped, it is the absence of the consent of that child which is material. This is the<br />
case regardless of the age of the child. A very small child will not have the<br />
understanding or intelligence to consent. This means that absence of consent will be a<br />
necessary inference from the age of the child. It is a question of fact for the jury whether<br />
an older child has sufficient understanding and intelligence to consent. Lord Brandon<br />
said: "I should not expect a jury to find at all frequently that a child under fourteen had<br />
sufficient understanding and intelligence to give its consent." If the child (being capable<br />
of doing so) did consent to being taken or carried away, the fact that the person having<br />
custody or care and control of that child did not consent to that child being taken or<br />
carried away is immaterial. If, on the other hand, the child did not consent, the consent<br />
Page 157 of 372
of the person having custody or care and control of the child may support a defense of<br />
lawful excuse. It is known as Gillick competence.<br />
Regarding Restriction on prosecution, no prosecution may be instituted, except by or<br />
with the consent of the Director of Public Prosecutions, for an offence of kidnapping if it<br />
was committed against a child under the age of sixteen and by a person connected with<br />
the child, within the meaning of section 1 of the Child Abduction Act 1984. Kidnapping is<br />
an indictable-only offence. Kidnapping is punishable with imprisonment or fine at the<br />
discretion of the court. <strong>The</strong>re is no limit on the fine or the term of imprisonment that may<br />
be imposed provided the sentence is not inordinate.<br />
A parent should only be prosecuted for kidnapping their own child "in exceptional cases,<br />
where the conduct of the parent concerned is so bad that an ordinary right-thinking<br />
person would immediately and without hesitation regard it as criminal in nature".<br />
United States<br />
Law in the United States follows from English common law. Following the highly<br />
publicized 1932 Lindbergh kidnapping, Congress passed the Federal Kidnapping Act,<br />
which authorized the FBI to investigate kidnapping at a time when the Bureau was<br />
expanding in size and authority. <strong>The</strong> fact that a kidnapped victim may have been taken<br />
across state lines brings the crime within the ambit of federal criminal law.<br />
Most states recognize different types of kidnapping and punish accordingly. E.g. <strong>New</strong><br />
York bases its definition of first-degree kidnapping on the duration and purpose. <strong>The</strong>re<br />
are several deterrents to kidnapping in the United States of America. Among these are:<br />
1. <strong>The</strong> extreme logistical challenges involved in successfully exchanging the money<br />
for the return of the victim without being apprehended or surveiled.<br />
2. Harsh punishment. Convicted kidnappers face lengthy prison terms. If a victim is<br />
brought across state lines, federal charges can be laid as well.<br />
3. Good cooperation and information sharing between law enforcement agencies,<br />
and tools for spreading information to the public (such as the AMBER Alert<br />
system).<br />
One notorious failed example of kidnap for ransom was the 1976 Chowchilla bus<br />
kidnapping, in which 26 children were abducted with the intention of bringing in a $5-<br />
million ransom. <strong>The</strong> children and driver escaped from an underground van without the<br />
aid of law enforcement. According to the Department of Justice, kidnapping makes up<br />
2% of all reported violent crimes against juveniles.<br />
From the 1990s on, a gang operating in <strong>New</strong> York City and <strong>New</strong> Jersey was involved in<br />
the kidnapping and torture of Jewish husbands for the purpose of forcing them to grant<br />
Page 158 of 372
eligious divorces to their wives. <strong>The</strong>y were finally apprehended on October 9, 2013, in<br />
connection with the 2013 <strong>New</strong> York divorce torture plot.<br />
According to a 2003 Domestic Violence Report in Colorado, out of a survey of 189<br />
incidents, most people (usually white females) are taken from their homes or residence<br />
by a present or former spouse or significant other. <strong>The</strong>y are usually taken by force, not<br />
by weapon, and usually the victims are not injured when they are freed.<br />
<strong>In</strong> 2009, Phoenix, Arizona reported over 300 cases of kidnapping, although subsequent<br />
investigation found that the Phoenix police falsified data "Phoenix Kidnappings:<br />
Uncovering the Truth". Archived from the original on 2013-04-13.. If true, this would<br />
have been the highest rate of any US city and second in the world only to Mexico City.<br />
A rise in kidnappings in the southwestern United States in general has been attributed<br />
to misclassification by local police, lack of a unified standard, desire for Federal grants,<br />
or the Mexican Drug War.<br />
<strong>In</strong> 2010 the United States was ranked sixth in the world (by absolute numbers, not per<br />
capita) for kidnapping for ransom, according to the available statistics (after Colombia,<br />
Italy, Lebanon, Peru, and the Philippines).<br />
<strong>In</strong> 2009, the Los Angeles Times named Phoenix, Arizona, as America's kidnapping<br />
capital, reporting that every year hundreds of ransom kidnappings occur there, virtually<br />
all within the underworld associated with human and drug smuggling from Mexico, and<br />
often done as a way of collecting unpaid debts. However, a later audit by the U.S.<br />
Department of Justice <strong>In</strong>spector General found only 59 federally reportable kidnappings<br />
in 2008, compared to the over 300 claimed on grant applications.<br />
During the year 1999 in the United States, 203,900 children were reported as the<br />
victims of family abductions and 58,200 of non-family abductions. However, only 115<br />
Page 159 of 372
were the result of "stereotypical" kidnaps (by someone unknown or of slight<br />
acquaintance to the child, held permanently or for ransom).<br />
Statistics<br />
Global Kidnapping Hotspots<br />
1999 2006 2014<br />
1 Colombia Mexico Mexico<br />
2 Mexico Iraq <strong>In</strong>dia<br />
3 Brazil <strong>In</strong>dia Pakistan<br />
4 Philippines South Africa Iraq<br />
5 Venezuela Brazil Nigeria<br />
6 Ecuador Pakistan Libya<br />
7 Russia and CIS Ecuador Afghanistan<br />
8 Nigeria Venezuela Bangladesh<br />
9 <strong>In</strong>dia Colombia Sudan<br />
10 South Africa Bangladesh Lebanon<br />
Countries with <strong>The</strong> Highest Rates<br />
Kidnapping for ransom is a common occurrence in various parts of the world today, and<br />
certain cities and countries are often described as the "Kidnapping Capital of the<br />
World". As of 2007, that title belongs to Iraq with possibly 1,500 foreigners kidnapped. <strong>In</strong><br />
2004, it was Mexico, and in 2001, it was Colombia. Statistics are harder to come by.<br />
Reports suggest a world total of 12,500-25,500/year with 3,600/year in Colombia and<br />
3,000/year in Mexico around the year 2000. However, by 2016, the number of<br />
kidnappings in Colombia had declined to 205 and it continues to decline. Mexican<br />
numbers are hard to confirm because of fears of police involvement in kidnapping.<br />
"Kidnapping seems to flourish particularly in fragile states and conflict countries, as<br />
politically motivated militias, organized crime and the drugs mafia fill the vacuum left by<br />
government".<br />
Pirates<br />
Kidnapping on the high seas in connection with piracy has been increasing. It was<br />
reported that 661 crewmembers were taken hostage and 12 kidnapped in the first 9<br />
months of 2009.<br />
Page 160 of 372
XII. Loan Sharking<br />
A loan shark is a person who offers loans at extremely high interest rates, has strict<br />
terms of collection upon failure, and operates outside off the street (outside of local<br />
authority). <strong>The</strong> term usually refers to illegal activity, but may also refer to predatory<br />
lending with extremely high interest rates such as payday or title loans.<br />
An unintended consequence of poverty alleviation initiatives can be that loan sharks<br />
borrow from formal microfinance lenders and lend on to poor borrowers. Loan sharks<br />
sometimes enforce repayment by blackmail or threats of violence. Historically, many<br />
moneylenders skirted between legal and criminal activity. <strong>In</strong> the recent western world,<br />
loan sharks have been a feature of the criminal underworld.<br />
19th-Century Salary Lenders<br />
United States<br />
<strong>In</strong> the late 19th-century US, the low legal interest rates made small loans unprofitable,<br />
and small-time lending was viewed as irresponsible by society. Banks and other major<br />
Page 161 of 372
financial institutions thus stayed away from small-time lending. <strong>The</strong>re were, however,<br />
plenty of small lenders offering loans at profitable but illegally high interest rates. <strong>The</strong>y<br />
presented themselves as legitimate and operated openly out of offices. <strong>The</strong>y only<br />
sought customers who had a steady and respectable job, a regular income and a<br />
reputation to protect. This made them less likely to leave the area before they paid their<br />
debt and more likely to have a legitimate reason for borrowing money. Gamblers,<br />
criminals, and other disreputable, unreliable types were avoided. <strong>The</strong>y made the<br />
borrower fill out and sign seemingly legitimate contracts. Though these contracts were<br />
not legally enforceable, they at least were proof of the loan, which the lender could use<br />
to blackmail a defaulter.<br />
To force a defaulter into paying, the lender might threaten legal action. This was a bluff,<br />
since the loan was illegal. <strong>The</strong> lender preyed on the borrower's ignorance of the law.<br />
Alternatively, the lender resorted to public shaming, exploiting the social stigma of being<br />
in debt to a loan shark. <strong>The</strong>y were able to complain to the defaulter's employer, because<br />
many employers would fire employees who were mired in debt, because of the risk of<br />
them stealing from the employer to repay debts. <strong>The</strong>y were able to send agents to stand<br />
outside the defaulter's home, loudly denouncing him, perhaps vandalizing his home with<br />
graffiti or notices. Whether out of gullibility or embarrassment, the borrower usually<br />
succumbed and paid.<br />
Many customers were employees of large firms, such as railways or public works.<br />
Larger organizations were more likely to fire employees for being in debt, as their rules<br />
were more impersonal, which made blackmail easier. It was easier for lenders to learn<br />
which large organizations did this as opposed to collecting information on the multitude<br />
of smaller firms. Larger firms had more job security and the greater possibility of<br />
promotion, so employees sacrificed more to ensure they were not fired. <strong>The</strong> loan shark<br />
could also bribe a large firm's paymaster to provide information on its many employees.<br />
Regular salaries and paydays made negotiating repayment plans simpler.<br />
<strong>The</strong> size of the loan and the repayment plan were often tailored to suit the borrower's<br />
means. <strong>The</strong> smaller the loan, the higher the interest rate was, as the costs of tracking<br />
and pursuing a defaulter (the overhead) were the same whatever the size of the loan.<br />
<strong>The</strong> attitudes of lenders to defaulters also varied: some were lenient and reasonable,<br />
readily granting extensions and slow to harass, while others unscrupulously tried to milk<br />
all they could from the borrower (e.g. imposing late fees).<br />
Because salary lending was a disreputable trade, the owners of these firms often hid<br />
from public view, hiring managers to run their offices indirectly. To further avoid<br />
attracting attention, when expanding his trade to other cities, an owner would often<br />
found new firms with different names rather than expanding his existing firm into a very<br />
noticeable leviathan.<br />
<strong>The</strong> penalties for being an illegal lender were mild. Illegal lending was a misdemeanor,<br />
and the penalty was forfeiture of the interest and perhaps the principal as well. But<br />
Page 162 of 372
these were only ever imposed if the borrower sued, which he typically could not afford<br />
to do.<br />
Opposition to salary lenders was spearheaded by social elites, such as businessmen<br />
and charity organizations. Businessmen were encouraged not to fire employees who<br />
were indebted to loan sharks, as they unwittingly supported the industry by providing<br />
lenders with a means of blackmailing their customers ("pay up or we'll tell your boss and<br />
you'll be fired"). Charities provided legal support to troubled borrowers. This fight<br />
culminated in the drafting of the Uniform Small Loan Law, which brought into existence<br />
a new class of licensed lender. <strong>The</strong> law was enacted, first in several states in 1917, and<br />
was adopted by all but a handful of states by the middle of the 20th century. <strong>The</strong> model<br />
statute mandated consumer protections and capped the interest rate on loans of $300<br />
or less at 3.5% a month (42% a year), a profitable level for small loans. Lenders had to<br />
give the customer copies of all signed documents.<br />
Additional charges such as late fees were banned. <strong>The</strong> lender could no longer receive<br />
power of attorney or confession of judgment over a customer. <strong>The</strong>se licensing laws<br />
made it impossible for usurious lenders to pass themselves off as legal. Small loans<br />
also started becoming more socially acceptable, and banks and other larger institutions<br />
started offering them as well.<br />
Page 163 of 372
20th-Century Gangsters<br />
<strong>In</strong> the 1920s and 1930s, American prosecutors began to notice the emergence of a new<br />
breed of illegal lender that used violence to enforce debts. <strong>The</strong> new small lender laws<br />
had made it almost impossible to intimidate customers with a veneer of legality, and<br />
many customers were less vulnerable to shaming because they were either selfemployed<br />
or already disreputable. Thus, violence was an important tool, though not<br />
their only one. <strong>The</strong>se loan sharks operated more informally than salary lenders, which<br />
meant more discretion for the lender and less paperwork and bureaucracy for the<br />
customer. <strong>The</strong>y were also willing to serve high-risk borrowers that legal lenders wouldn't<br />
touch.<br />
Threats of violence were rarely followed through, however. One possible reason is that<br />
injuring a borrower could have meant he couldn't work and thus could never pay off his<br />
debt. Many regular borrowers realized the threats were mostly bluffs and that they could<br />
get away with delinquent payments. A more certain consequence was that the<br />
delinquent borrower would be cut off from future loans, which was serious for those who<br />
regularly relied on loan sharks.<br />
One important market for violent loan sharks was illegal gambling operators, who<br />
couldn't expose themselves to the law to collect debts legally. <strong>The</strong>y cooperated with<br />
loan sharks to supply credit and collect payments from their punters. Thieves and other<br />
criminals, whose fortunes were frequently in flux, were also served, and these<br />
connections also allowed the loan sharks to operate as fences. Another type of high-risk<br />
customer was the small businessman in dire financial straits who couldn't qualify for a<br />
legal loan.<br />
Violent loansharking was typically run by criminal syndicates, such as the Mafia. Many<br />
of these were former bootleggers who needed a new line of work after the end of<br />
Prohibition. Towards the 1960s, loan sharks grew ever more coordinated, and could<br />
pool information on borrowers to better size up risks and ensure a borrower did not try<br />
to pay off one loan by borrowing from another loan shark. <strong>The</strong> fearsome reputation of<br />
the Mafia or similar large gang made the loan shark's threat of violence more credible.<br />
Mafia Links<br />
Origins <strong>In</strong> "Salary Buying", 1920-Criminalization<br />
Although the reform law was intended to starve the loan sharks into extinction, this<br />
species of predatory lender thrived and evolved. After high-rate salary lending was<br />
outlawed, some bootleg vendors recast the product as "salary buying". <strong>The</strong>y claimed<br />
they were not making loans but were purchasing future wages at a discount. This form<br />
of loansharking proliferated through the 1920s and into the 1930s until a new draft of<br />
the Uniform Small Loan Law closed the loophole through which the salary buyers had<br />
slipped. Salary-buying loan sharks continued to operate in some southern states after<br />
Page 164 of 372
World War II because the usury rate was set so low that licensed personal finance<br />
companies could not do business there.<br />
Post-Criminalization<br />
<strong>Organized</strong> crime began to enter the cash advance business in the 1930s, after high-rate<br />
lending was criminalized by the Uniform Small Loan Law. <strong>The</strong> first reports of mob<br />
loansharking surfaced in <strong>New</strong> York City in 1935, and for 15 years, underworld money<br />
lending was apparently restricted to that city. <strong>The</strong>re is no record of syndicate "juice"<br />
operations in Chicago, for instance, until the 1950s.<br />
<strong>In</strong> the beginning, underworld<br />
loansharking was a small<br />
loan business, catering to the<br />
same populations served by<br />
the salary lenders and<br />
buyers.<br />
Those who turned to the<br />
bootleg lenders could not get<br />
credit at the licensed<br />
companies because their<br />
incomes were too low or they<br />
were deemed poor risks. <strong>The</strong><br />
firms operating within the<br />
usury cap turned away<br />
roughly half of all applicants<br />
and tended to make larger<br />
loans to married men with<br />
steady jobs and decent<br />
incomes.<br />
Those who could not get a<br />
legal loan at 36% or 42% a year could secure a cash advance from a mobster at the<br />
going rate of 10% or 20% a week for small loans. Since the mob loans were not usually<br />
secured with legal instruments, debtors pledged their bodies as collateral.<br />
<strong>In</strong> its early phase, a large fraction of mob loansharking consisted of payday lending.<br />
Many of the customers were office clerks and factory hands. <strong>The</strong> loan fund for these<br />
operations came from the proceeds of the numbers racket and was distributed by the<br />
top bosses to the lower echelon loan sharks at the rate of 1% or 2% a week.<br />
<strong>The</strong> 1952 B-flick Loan Shark, starring George Raft, offers a glimpse of mob payday<br />
lending. <strong>The</strong> waterfront in Brooklyn was another site of extensive underworld payday<br />
advance operations around mid-century.<br />
Page 165 of 372
1960s Heyday–Present<br />
Over time, mob loan sharks moved away from such labor intensive rackets. By the<br />
1960s, the preferred clientele was small and medium-sized businesses. Business<br />
customers had the advantage of possessing assets that could be seized in case of<br />
default, or used to engage in fraud or to launder money. Gamblers were another<br />
lucrative market, as were other criminals who needed financing for their operations. By<br />
the 1970s, mob salary lending operations seemed to have withered away in the United<br />
States.<br />
At its height in the 1960s, underworld loansharking was estimated to be the second<br />
most lucrative franchise of organized crime in the United States after illegal gambling.<br />
<strong>New</strong>spapers in the 1960s were filled with sensational stories of debtors beaten,<br />
harassed, and sometimes murdered by mob loan sharks.<br />
Yet careful studies of the business have raised doubts about the frequency with which<br />
violence was employed in practice. Relations between creditor and debtor could be<br />
amicable, even when the "vig" or "juice" was exorbitant, because each needed the<br />
other. FBI agents in one city interviewed 115 customers of a mob loan business but<br />
turned up only one debtor who had been threatened. None had been beaten.<br />
Non-Mafia Sharks<br />
<strong>Organized</strong> crime has never had a monopoly on black market lending. Plenty of vestpocket<br />
lenders operated outside the jurisdiction of organized crime, charging usurious<br />
rates of interest for cash advances. <strong>The</strong>se informal networks of credit rarely came to the<br />
attention of the authorities but flourished in populations not served by licensed lenders.<br />
Even today, after the rise of corporate payday lending in the United States, unlicensed<br />
loan sharks continue to operate in immigrant enclaves and low-income neighborhoods.<br />
<strong>The</strong>y lend money to people who work in the informal sector or who are deemed to be<br />
too risky even by the check-cashing creditors. Some beat delinquents while others seize<br />
assets instead. <strong>The</strong>ir rates run from 10% to 20% a week, just like the mob loan sharks<br />
of days gone by.<br />
UK Loan Sharks<br />
<strong>The</strong> research by the government and other agencies estimates that 165,000 to 200,000<br />
people are indebted to loan sharks in the United Kingdom. Illicit loan sharking is treated<br />
as a high-level crime (felony) by law enforcement, due to its links to organized crime<br />
and the serious violence involved. Payday loans with high interest rates are legal in<br />
many cases, and have been described as "legal loan sharking" (in that the creditor is<br />
legally registered, pays taxes and contributions, and can reclaim remittance if taking the<br />
case to adjudication; likewise there is no threat of harm to the debtor).<br />
Page 166 of 372
Loan Sharks <strong>In</strong> Ireland<br />
<strong>The</strong> Central Bank of Ireland were criticized for doing nothing to protect those on low<br />
incomes, the vulnerable or have low levels of financial literacy from loan sharks when it<br />
emerged that up to 100,000 of the 360,000 loans given by moneylenders broke the law.<br />
Non-Standard Lenders <strong>In</strong> <strong>The</strong><br />
United States<br />
<strong>In</strong> the United States, there are lenders<br />
licensed to serve borrowers who<br />
cannot qualify for standard loans from<br />
mainstream sources. <strong>The</strong>se smaller,<br />
non-standard lenders often operate in<br />
cash, whereas mainstream lenders<br />
increasingly operate only<br />
electronically and will not serve<br />
borrowers who do not have bank<br />
accounts. Terms such as sub-prime<br />
lending, "non-standard consumer<br />
credit", and payday loans are often<br />
used in connection with this type of consumer finance. <strong>The</strong> availability of these services<br />
has made illegal, exploitative loan sharks rarer, but these legal lenders have also been<br />
accused of behaving in an exploitative manner. For example, payday loan operations<br />
have come under fire for charging inflated "service charges" for their services of cashing<br />
a "payday advance", effectively a short-term (no more than one or two weeks) loan for<br />
which charges may run 3–5% of the principal amount. By claiming to be charging for the<br />
"service" of cashing a paycheck, instead of merely charging interest for a short-term<br />
loan, laws that strictly regulate moneylending costs can be effectively bypassed.<br />
Payday Lending<br />
Licensed payday advance businesses, which lend money at high rates of interest on the<br />
security of a postdated check, are often described as loan sharks by their critics due to<br />
high interest rates that trap debtors, stopping short of illegal lending and violent<br />
collection practices. Today's payday loan is a close cousin of the early 20th century<br />
salary loan, the product to which the "shark" epithet was originally applied, but they are<br />
now legalized in some states.<br />
A 2001 comparison of short-term lending rates charged by the Chicago Outfit organized<br />
crime syndicate and payday lenders in California revealed that, depending on when a<br />
payday loan was paid back by a borrower (generally 1–14 days), the interest rate<br />
charged for a payday loan could be considerably higher than the interest rate of a<br />
similar loan made by the organized crime syndicate.<br />
Yamikinyu in Japan<br />
Page 167 of 372
<strong>The</strong> regulation of moneylenders is typically much looser than that of banks. <strong>In</strong> Japan,<br />
the Moneylending Control Law requires only registration in each prefecture. <strong>In</strong> Japan,<br />
as the decades-long depression lingers, banks are reluctant to spare money and<br />
regulation becomes tighter, illegal moneylending has become a social issue. Illegal<br />
moneylenders typically charge an interest of 30 or 50% in 10 days (in Japanese, these<br />
are called "to-san" ('to' meaning ten and 'san' meaning three, or 10-3) or "to-go" ('to'<br />
meaning ten and 'go' meaning five, or 10-5), which is about 1.442 million % or<br />
267.5 million % per annum. This is against the law that sets the maximum interest rate<br />
at 20%. <strong>The</strong>y usually do business with those who cannot get more money from banks,<br />
legitimate consumer loans, or credit cards.<br />
Ah Long in Malaysia and Singapore<br />
Ah Long (derived from the Cantonese phrase ' 大 耳 窿 ' ("big ear hole")) is a colloquial<br />
term for illegal loan sharks in Malaysia and Singapore. <strong>The</strong>y lend money to people who<br />
are unable to obtain loans from banks or other legal sources, mostly targeting habitual<br />
gamblers. Often, they discreetly advertise by sticking notices, mostly on lamp posts and<br />
utility boxes around a neighborhood, thus vandalizing public property, as authorities<br />
must remove such advertisements. <strong>The</strong>y charge high interest rates (generally about<br />
40% per month/fortnight) according to Anti-<strong>Crime</strong>, Drug and Social Development<br />
Voluntary Organization and frequently threaten violence (and administer it) towards<br />
those who fail to pay on time.<br />
Ah Long Tactics<br />
When a person fails to pay on time, the Ah Long will set fire, spray paint, splash, or<br />
write threats in paint or markers on the walls of the property of that person as a threat of<br />
violence and to scare, and perhaps shame, the borrower into repaying the loan. A<br />
common use of painting includes the characters "O$P$" meaning "owe money, pay<br />
money", as well as the debtors' unit number. According to local police authorities, there<br />
have been cases where borrowers and their family members were beaten or had their<br />
property damaged or destroyed, and some victims have committed suicide.<br />
Page 168 of 372
XIII. Money Laundering<br />
Money Laundering is the process of concealing the origins of money obtained illegally<br />
by passing it through a complex sequence of banking transfers or commercial<br />
transactions.<br />
One problem of criminal activities is accounting for the proceeds without raising the<br />
suspicion of law enforcement agencies. Considerable time and effort may be put into<br />
strategies which enable the safe use of those proceeds without raising unwanted<br />
suspicion. Implementing such strategies is generally called money laundering. After<br />
money has been laundered it can be used for legitimate purposes. Law enforcement<br />
agencies of many jurisdictions have set up sophisticated systems in an effort to detect<br />
suspicious transactions or activities, and many have set up international cooperative<br />
arrangements to assist each other in these endeavors.<br />
<strong>In</strong> a number of legal and regulatory systems, the term "money laundering" has become<br />
conflated with other forms of financial and business crime, and is sometimes used more<br />
generally to include misuse of the financial system (involving things such as securities,<br />
digital currencies, credit cards, and traditional currency), including terrorism financing<br />
Page 169 of 372
and evasion of international sanctions. Most anti-money laundering laws openly conflate<br />
money laundering (which is concerned with source of funds) with terrorism financing<br />
(which is concerned with destination of funds) when regulating the financial system.<br />
Some countries treat obfuscation of sources of money as also constituting money<br />
laundering, whether it is intentional or by merely using financial systems or services that<br />
do not identify or track sources or destinations. Other countries define money<br />
laundering in such a way as to include money from activity that would have been a<br />
crime in that country, even if the activity was legal where the actual conduct occurred.<br />
History<br />
Laws against money laundering were created to use against organized crime during the<br />
period of Prohibition in the United States during the 1930s. <strong>Organized</strong> crime received a<br />
major boost from Prohibition and a large source of new funds that were obtained from<br />
illegal sales of alcohol. <strong>The</strong> successful prosecution of Al Capone on tax evasion brought<br />
in a new emphasis by the state and law enforcement agencies to track and confiscate<br />
money, but existing laws against tax evasion could not be used once gangsters started<br />
paying their taxes.<br />
<strong>In</strong> the 1980s, the war on drugs led governments again to turn to money-laundering rules<br />
in an attempt to seize proceeds of drug crimes in order to catch the organizers and<br />
individuals running drug empires. It also had the benefit from a law enforcement point of<br />
view of turning rules of evidence upside down. Law enforcers normally have to prove an<br />
individual is guilty to get a conviction. But with money laundering laws, money can be<br />
confiscated and it is up to the individual to prove that the source of funds is legitimate if<br />
they want the funds back. This makes it much easier for law enforcement agencies and<br />
provides for much lower burdens of proof.<br />
<strong>The</strong> September 11 attacks in 2001, which led to the Patriot Act in the U.S. and similar<br />
legislation worldwide, led to a new emphasis on money laundering laws to combat<br />
terrorism financing. [5] <strong>The</strong> Group of Seven (G7) nations used the Financial Action Task<br />
Force on Money Laundering to put pressure on governments around the world to<br />
increase surveillance and monitoring of financial transactions and share this information<br />
between countries. Starting in 2002, governments around the world upgraded money<br />
laundering laws and surveillance and monitoring systems of financial transactions. Antimoney<br />
laundering regulations have become a much larger burden for financial<br />
institutions and enforcement has stepped up significantly. During 2011–2015 a number<br />
of major banks faced ever-increasing fines for breaches of money laundering<br />
regulations. This included HSBC, which was fined $1.9 billion in December 2012, and<br />
BNP Paribas, which was fined $8.9 billion in July 2014 by the U.S. government. Many<br />
countries introduced or strengthened border controls on the amount of cash that can be<br />
carried and introduced central transaction reporting systems where all financial<br />
institutions have to report all financial transactions electronically. For example, in 2006,<br />
Australia set up the AUSTRAC system and required the reporting of all financial<br />
transactions.<br />
Page 170 of 372
Definition<br />
Placing "dirty" money in a service company, where it is layered<br />
with legitimate income and then integrated into the flow of money,<br />
is a common form of money laundering.<br />
<strong>The</strong> conversion or transfer of property, the concealment<br />
or disguising of the nature of the proceeds, the<br />
acquisition, possession or use of property, knowing that<br />
these are derived from criminal activity and participate<br />
or assist the movement of funds to make the proceeds<br />
appear legitimate is money laundering.<br />
Money obtained from certain crimes, such as extortion, insider trading, drug trafficking,<br />
and illegal gambling is "dirty" and needs to be "cleaned" to appear to have been derived<br />
from legal activities, so that banks and other financial institutions will deal with it without<br />
suspicion. Money can be laundered by many methods which vary in complexity and<br />
sophistication.<br />
Money laundering involves three steps: <strong>The</strong> first involves introducing cash into the<br />
financial system by some means ("placement"); the second involves carrying out<br />
complex financial transactions to camouflage the illegal source of the cash ("layering");<br />
and finally, acquiring wealth generated from the transactions of the illicit funds<br />
("integration"). Some of these steps may be omitted, depending upon the<br />
circumstances. For example, non-cash proceeds that are already in the financial system<br />
would not need to be placed.<br />
According to the United States Treasury Department:<br />
Money laundering is the process of making illegally-gained proceeds (i.e., "dirty<br />
money") appear legal (i.e., "clean"). Typically, it involves three steps: placement,<br />
layering, and integration. First, the illegitimate funds are furtively introduced into the<br />
legitimate financial system. <strong>The</strong>n, the money is moved around to create confusion,<br />
sometimes by wiring or transferring through numerous accounts. Finally, it is integrated<br />
into the financial system through additional transactions until the "dirty money" appears<br />
"clean".<br />
Methods<br />
Money laundering can take several forms, although most methods can be categorized<br />
into one of a few types. <strong>The</strong>se include "bank methods, smurfing [also known as<br />
structuring], currency exchanges, and double-invoicing".<br />
<br />
Structuring: Often known as smurfing, this is a method of placement whereby<br />
cash is broken into smaller deposits of money, used to defeat suspicion of money<br />
laundering and to avoid anti-money laundering reporting requirements. A subcomponent<br />
of this is to use smaller amounts of cash to purchase bearer<br />
Page 171 of 372
instruments, such as money orders, and then ultimately deposit those, again in<br />
small amounts.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Bulk cash smuggling: This involves physically smuggling cash to another<br />
jurisdiction and depositing it in a financial institution, such as an offshore bank,<br />
with greater bank secrecy or less rigorous money laundering enforcement.<br />
Cash-intensive businesses: <strong>In</strong> this method, a business typically expected to<br />
receive a large proportion of its revenue as cash uses its accounts to deposit<br />
criminally derived cash. Such enterprises often operate openly and in doing so<br />
generate cash revenue from incidental legitimate business in addition to the illicit<br />
cash – in such cases the business will usually claim all cash received as<br />
legitimate earnings. Service businesses are best suited to this method, as such<br />
enterprises have little or no variable costs and/or a large ratio between revenue<br />
and variable costs, which makes it difficult to detect discrepancies between<br />
revenues and costs. Examples are parking structures, strip clubs, tanning salons,<br />
car washes, arcades, bars, restaurants, and casinos.<br />
Trade-based laundering: This involves under- or over-valuing invoices to disguise<br />
the movement of money. For example, the art market has been accused of being<br />
an ideal vehicle for money laundering due to several unique aspects of art such<br />
as the subjective value of artworks as well as the secrecy of auction houses<br />
about the identity of the buyer and seller.<br />
Shell companies and trusts: Trusts and shell companies disguise the true owners<br />
of money. Trusts and corporate vehicles, depending on the jurisdiction, need not<br />
disclose their true owner. Sometimes referred to by the slang term rathole,<br />
though that term usually refers to a person acting as the fictitious owner rather<br />
than the business entity.<br />
Round-tripping: Here, money is deposited in a controlled foreign corporation<br />
offshore, preferably in a tax haven where minimal records are kept, and then<br />
shipped back as a foreign direct investment, exempt from taxation. A variant on<br />
this is to transfer money to a law firm or similar organization as funds on account<br />
of fees, then to cancel the retainer and, when the money is remitted, represent<br />
the sums received from the lawyers as a legacy under a will or proceeds of<br />
litigation.<br />
Bank capture: <strong>In</strong> this case, money launderers or criminals buy a controlling<br />
interest in a bank, preferably in a jurisdiction with weak money laundering<br />
controls, and then move money through the bank without scrutiny.<br />
Casinos: <strong>In</strong> this method, an individual walks into a casino and buys chips with<br />
illicit cash. <strong>The</strong> individual will then play for a relatively short time. When the<br />
person cashes in the chips, they will expect to take payment in a check, or at<br />
least get a receipt so they can claim the proceeds as gambling winnings.<br />
Page 172 of 372
Other gambling: Money is spent on gambling, preferably on high odds games.<br />
One way to minimize risk with this method is to bet on every possible outcome of<br />
some event that has many possible outcomes, so no outcome(s) have short<br />
odds, and the bettor will lose only the vigorish and will have one or more winning<br />
bets that can be shown as the source of money. <strong>The</strong> losing bets will remain<br />
hidden.<br />
Black salaries: A company may have unregistered employees without written<br />
contracts and pay them cash salaries. Dirty money might be used to pay them.<br />
Tax amnesties: For example, those that legalize unreported assets and cash in<br />
tax havens.<br />
Transaction Laundering: When a merchant unknowingly processes illicit credit<br />
card transactions for another business. It is a growing problem and recognized<br />
as distinct from traditional money laundering in using the payments ecosystem to<br />
hide that the transaction even occurred (e.g. the use of fake front websites). Also<br />
known as "undisclosed aggregation" or "factoring".<br />
Page 173 of 372
By Region<br />
Latin America<br />
<strong>In</strong> Latin America, money laundering is mainly linked to drug trafficking activities and to<br />
having connections with criminal activity, such as crimes that have to do with arms<br />
trafficking, human trafficking, extortion, blackmail, smuggling, and acts of corruption of<br />
people linked to governments, such as bribery, which are more common in Latin<br />
American countries. <strong>The</strong>re is a relationship between corruption and money laundering in<br />
developing countries. <strong>The</strong> economic power of Latin America increases rapidly and<br />
without support, these fortunes being of illicit origin have the appearance of legally<br />
acquired profits. With regard to money laundering, the ultimate goal of the process is to<br />
integrate illicit capital into the general economy and transform it into licit goods and<br />
services.<br />
<strong>The</strong> money laundering practice uses various channels to legalize everything achieved<br />
through illegal practices. As such, it has different techniques depending on the country<br />
where this illegal operation is going to be carried out:<br />
<br />
<br />
<br />
<br />
<strong>In</strong> Colombia, the laundering of billions of dollars, which come from drug<br />
trafficking, is carried out through imports of contraband from the parallel<br />
exchange market.<br />
<strong>In</strong> Central America in countries such as Guatemala and Honduras, money<br />
laundering continues to increase in the absence of adequate legislation and<br />
regulations in these countries. Money laundering activities in Costa Rica have<br />
experienced substantial growth, especially using large-scale currency smuggling<br />
and investments of drug cartels in real estate, within the tourism sector.<br />
Furthermore, the Colon Free Zone, in Panama, continues to be the area of<br />
operations for money laundering where cash is exchanged for products of<br />
different nature that are then put up for sale at prices below those of production<br />
for a return fast of the capital.<br />
<strong>In</strong> Mexico, the preferred techniques continue to be the smuggling of currency<br />
abroad, in addition to electronic transfers, bank drafts with Mexican banks and<br />
operations in the parallel exchange market.<br />
Money Laundering in the Caribbean countries continues to be a serious problem<br />
that seems to be very dangerous. Specifically, in Antigua, the Dominican<br />
Republic, Jamaica, Saint Vincent and the Grenadines. Citizens of the Dominican<br />
Republic who have been involved in money laundering in the United States, use<br />
companies that are dedicated to transferring funds sent to the Dominican<br />
Republic in amounts of less than $10,000 under the use of false names.<br />
Moreover, in Jamaica, multimillion-dollar asset laundering cases were discovered<br />
through telephone betting operations abroad. Thousands of suspicious<br />
transactions have been detected in French overseas territories. Free trade zones<br />
Page 174 of 372
such as Aruba, meanwhile, remain the preferred areas for money laundering.<br />
<strong>The</strong> offshore banking centers, the secret bank accounts and the tourist<br />
complexes are the channels through which the launderers whiten the proceeds of<br />
the illicit money.<br />
Casinos continue to attract organizations that deal with money laundering. Aruba and<br />
the Netherlands Antilles, the Cayman Islands, Colombia, Mexico, Panama and<br />
Venezuela are considered high priority countries in the region, due to the strategies<br />
used by the washers.<br />
Economic Impact <strong>In</strong> <strong>The</strong> Region<br />
<strong>The</strong> practice of money laundering, among other economic and financial crimes have<br />
been better in infiltrating into the economic and political structures of most developing<br />
countries therefore resulting to political instability and economic digression.<br />
Money laundering is still a great concern for the financial services industry. About 50%<br />
of the money laundering incidents in Latin America were reported by organizations in<br />
the financial sector. According to PwC's 2014 global economic crime survey in Latin<br />
Page 175 of 372
America only 2.8% of respondents in Latin America claimed suffering Anti-<br />
Trust/Competition Law incidents, compared to 5.2% of respondents globally.<br />
It has been shown that money laundering has an impact on the financial behavior and<br />
macroeconomic performance of the industrialized countries. <strong>In</strong> these countries the<br />
macroeconomic consequences of money laundering are transmitted through several<br />
channels. Thus, money laundering complicates the formulation of economic policies. It<br />
is assumed that the proceeds of criminal activities are laundered by means of the notes<br />
and coins in circulation of the monetary substitutes.<br />
<strong>The</strong> laundering causes disproportionate changes in the relative prices of assets which<br />
implies that resources are allocated inefficiently; and, therefore may have negative<br />
implications for economic growth, apparently money laundering is associated with a<br />
lower economic growth.<br />
<strong>The</strong> Office of National Drug Control Policy of the United States estimates that only in<br />
that country, sales of narcotic drugs represent about 57,000 millions of dollars annually<br />
and most of these transactions are made in cash.<br />
Jurisprudence<br />
Money laundering has been increasing. A key factor behind the growing money<br />
laundering is ineffective enforcement of money laundering laws locally. Perhaps<br />
because of the lack of importance that has been given to the subject, since the 21st<br />
century started, there was not jurisprudence regarding the laundering of money or<br />
assets, or the conversion or transfer of goods. Which is even worse, the laws of the<br />
Latin American countries have really not dealt with their study in a profound way, as it is<br />
an issue that concerns the whole world and is the subject of seminars, conferences and<br />
academic analysis in different regions of the planet. Now a new figure that is being<br />
called the Economic Criminal Law is being implemented, which should be implemented<br />
in modern societies, which has been inflicted enormous damage to the point of affecting<br />
the general economy of the states. Even though, developing countries have responded<br />
and continue to respond, through legislative measures, to the problem of money<br />
laundering, at national level, however, money launderers, have taken advantage of the<br />
lax regulatory environment, vulnerable financial systems along with the continued civil<br />
and political unrest of most the developing countries.<br />
Magnitude<br />
Many regulatory and governmental authorities issue estimates each year for the amount<br />
of money laundered, either worldwide or within their national economy. <strong>In</strong> 1996, a<br />
spokesperson for the IMF estimated that 2–5% of the worldwide global economy<br />
involved laundered money. <strong>The</strong> Financial Action Task Force on Money Laundering<br />
(FATF), an intergovernmental body set up to combat money laundering, stated, "Due to<br />
the illegal nature of the transactions, precise statistics are not available and it is<br />
therefore impossible to produce a definitive estimate of the amount of money that is<br />
Page 176 of 372
globally laundered every year. <strong>The</strong> FATF therefore does not publish any figures in this<br />
regard." Academic commentators have likewise been unable to estimate the volume of<br />
money with any degree of assurance. Various estimates of the scale of global money<br />
laundering are sometimes repeated often enough to make some people regard them as<br />
factual—but no researcher has overcome the inherent difficulty of measuring an actively<br />
concealed practice.<br />
Regardless of the difficulty in measurement, the amount of money laundered each year<br />
is in the billions of US dollars and poses a significant policy concern for governments.<br />
As a result, governments and international bodies have undertaken efforts to deter,<br />
prevent, and apprehend money launderers. Financial institutions have likewise<br />
undertaken efforts to prevent and detect transactions involving dirty money, both as a<br />
result of government requirements and to avoid the reputational risk involved. Issues<br />
relating to money laundering have existed as long as there have been large scale<br />
criminal enterprises. Modern anti-money laundering laws have developed along with the<br />
modern War on Drugs. <strong>In</strong> more recent times anti-money laundering legislation is seen<br />
as adjunct to the financial crime of terrorist financing in that both crimes usually involve<br />
the transmission of funds through the financial system (although money laundering<br />
relates to where the money has come from, and terrorist financing relating to where the<br />
money is going to).<br />
Page 177 of 372
Transaction laundering is a massive and growing problem. Finextra estimated that<br />
transaction laundering accounted for over $200 billion in the US in 2017 alone, with over<br />
$6 billion of these sales involving illicit goods or services, sold by nearly 335,000<br />
unregistered merchants.<br />
Electronic Money<br />
<strong>In</strong> theory, electronic money should provide as easy a method of transferring value<br />
without revealing identity as untracked banknotes, especially wire transfers involving<br />
anonymity-protecting numbered bank accounts. <strong>In</strong> practice, however, the recordkeeping<br />
capabilities of <strong>In</strong>ternet service providers and other network resource<br />
maintainers tend to frustrate that intention. While some cryptocurrencies under recent<br />
development have aimed to provide for more possibilities of transaction anonymity for<br />
various reasons, the degree to which they succeed—and, in consequence, the degree<br />
to which they offer benefits for money laundering efforts—is controversial. Solutions<br />
such as ZCash and Monero are examples of cryptocurrencies that provide unlinkable<br />
anonymity via proofs and/or obfuscation of information (ring signatures). Such<br />
currencies could find use in online illicit services.<br />
<strong>In</strong> 2013, Jean-Loup Richet, a research fellow at ESSEC ISIS, surveyed new techniques<br />
that cybercriminals were using in a report written for the United Nations Office on Drugs<br />
and <strong>Crime</strong>. [33] A common approach was to use a digital currency exchanger service<br />
which converted dollars into a digital currency called Liberty Reserve, and could be sent<br />
and received anonymously. <strong>The</strong> receiver could convert the Liberty Reserve currency<br />
back into cash for a small fee. <strong>In</strong> May 2013, the US authorities shut down Liberty<br />
Reserve charging its founder and various others with money laundering.<br />
Another increasingly common way of laundering money is to use online gaming. <strong>In</strong> a<br />
growing number of online games, such as Second Life and World of Warcraft, it is<br />
possible to convert money into virtual goods, services, or virtual cash that can later be<br />
converted back into money.<br />
Reverse Money Laundering<br />
Reverse money laundering is a process that disguises a legitimate source of funds that<br />
are to be used for illegal purposes. It is usually perpetrated for the purpose of financing<br />
terrorism but can be also used by criminal organizations that have invested in legal<br />
businesses and would like to withdraw legitimate funds from official circulation.<br />
Unaccounted cash received via disguising financial transactions is not included in<br />
official financial reporting and could be used to evade taxes, hand in bribes and pay<br />
"under-the-table" salaries. For example, in an affidavit filed on 24 March 2014 in United<br />
States District Court, Northern California, San Francisco Division, FBI special agent<br />
Emmanuel V. Pascau alleged that several people associated with the Chee Kung Tong<br />
organization, and California State Senator Leland Yee, engaged in reverse money<br />
laundering activities.<br />
Page 178 of 372
<strong>The</strong> problem of such fraudulent encashment practices (obnalichka in Russian) has<br />
become acute in Russia and other countries of the former Soviet Union. <strong>The</strong> Eurasian<br />
Group on Combating Money Laundering and Financing of Terrorism (EAG) reported<br />
that the Russian Federation, Ukraine, Turkey, Serbia, Kyrgyzstan, Uzbekistan, Armenia<br />
and Kazakhstan have encountered a substantial shrinkage of tax base and shifting<br />
money supply balance in favor of cash. <strong>The</strong>se processes have complicated planning<br />
and management of the economy and contributed to the growth of the shadow<br />
economy.<br />
Combating<br />
Anti-money laundering (AML) is a term mainly used in the financial and legal industries<br />
to describe the legal controls that require financial institutions and other regulated<br />
entities to prevent, detect, and report money laundering activities. Anti-money<br />
laundering guidelines came into prominence globally as a result of the formation of the<br />
Financial Action Task Force (FATF) and the promulgation of an international framework<br />
of anti-money laundering standards. <strong>The</strong>se standards began to have more relevance in<br />
2000 and 2001, after FATF began a process to publicly identify countries that were<br />
deficient in their anti-money laundering laws and international cooperation, a process<br />
colloquially known as "name and shame".<br />
An effective AML program requires a jurisdiction to criminalize money laundering, giving<br />
the relevant regulators and police the powers and tools to investigate; be able to share<br />
information with other countries as appropriate; and require financial institutions to<br />
identify their customers, establish risk-based controls, keep records, and report<br />
suspicious activities.<br />
Page 179 of 372
Strict background checks are necessary to combat as many money launderers escape<br />
by investing through complex ownership and company structures. Banks can do that but<br />
a proper surveillance is required but on the Government side to reduce this.<br />
Criminalization<br />
<strong>The</strong> elements of the crime of money laundering are set forth in the United Nations<br />
Convention Against Illicit Traffic in Narcotic Drugs and Psychotropic Substances and<br />
Convention against Transnational <strong>Organized</strong> <strong>Crime</strong>. It is defined as knowingly engaging<br />
in a financial transaction with the proceeds of a crime for the purpose of concealing or<br />
disguising the illicit origin of the property from governments.<br />
<strong>The</strong> Role of Financial <strong>In</strong>stitutions<br />
While banks operating in the same country generally have to follow the same antimoney<br />
laundering laws and regulations, financial institutions all structure their antimoney<br />
laundering efforts slightly differently. Today, most financial institutions globally,<br />
and many non-financial institutions, are required to identify and report transactions of a<br />
suspicious nature to the financial intelligence unit in the respective country. For<br />
example, a bank must verify a customer's identity and, if necessary, monitor<br />
transactions for suspicious activity. This is often termed as "know your customer". This<br />
means knowing the identity of the customer and understanding the kinds of transactions<br />
in which the customer is likely to engage. By knowing one's customers, financial<br />
institutions can often identify unusual or suspicious behavior, termed anomalies, which<br />
may be an indication of money laundering.<br />
Bank employees, such as tellers and customer account representatives, are trained in<br />
anti-money laundering and are instructed to report activities that they deem suspicious.<br />
Additionally, anti-money laundering software filters customer data, classifies it according<br />
to level of suspicion, and inspects it for anomalies. Such anomalies include any sudden<br />
and substantial increase in funds, a large withdrawal, or moving money to a bank<br />
secrecy jurisdiction. Smaller transactions that meet certain criteria may also be flagged<br />
as suspicious. For example, structuring can lead to flagged transactions. <strong>The</strong> software<br />
also flags names on government "blacklists" and transactions that involve countries<br />
hostile to the host nation. Once the software has mined data and flagged suspect<br />
transactions, it alerts bank management, who must then determine whether to file a<br />
report with the government.<br />
Value of Enforcement Costs and Associated Privacy Concerns<br />
<strong>The</strong> financial services industry has become more vocal about the rising costs of antimoney<br />
laundering regulation and the limited benefits that they claim it brings. One<br />
commentator wrote that "[w]ithout facts, [anti-money laundering] legislation has been<br />
driven on rhetoric, driving by ill-guided activism responding to the need to be "seen to<br />
be doing something" rather than by an objective understanding of its effects on<br />
predicate crime. <strong>The</strong> social panic approach is justified by the language used—we talk of<br />
Page 180 of 372
the battle against terrorism or the war on drugs". <strong>The</strong> Economist magazine has become<br />
increasingly vocal in its criticism of such regulation, particularly with reference to<br />
countering terrorist financing, referring to it as a "costly failure", although it concedes<br />
that other efforts (like reducing identity and credit card fraud) may still be effective at<br />
combating money laundering.<br />
<strong>The</strong>re is no precise measurement of the costs of regulation balanced against the harms<br />
associated with money laundering, and given the evaluation problems involved in<br />
assessing such an issue, it is unlikely that the effectiveness of terror finance and money<br />
laundering laws could be determined with any degree of accuracy. <strong>The</strong> Economist<br />
estimated the annual costs of anti-money laundering efforts in Europe and North<br />
America at US$5 billion in 2003, an increase from US$700 million in 2000. Governmentlinked<br />
economists have noted the significant negative effects of money laundering on<br />
economic development, including undermining domestic capital formation, depressing<br />
growth, and diverting capital away from development. Because of the intrinsic<br />
uncertainties of the amount of money laundered, changes in the amount of money<br />
laundered, and the cost of anti-money laundering systems, it is almost impossible to tell<br />
which anti-money laundering systems work and which are more or less cost effective.<br />
Besides economic costs to implement anti-money-laundering laws, improper attention to<br />
data protection practices may entail disproportionate costs to individual privacy rights. <strong>In</strong><br />
June 2011, the data-protection advisory committee to the European Union issued a<br />
Page 181 of 372
eport on data protection issues related to the prevention of money laundering and<br />
terrorist financing, which identified numerous transgressions against the established<br />
legal framework on privacy and data protection. <strong>The</strong> report made recommendations on<br />
how to address money laundering and terrorist financing in ways that safeguard<br />
personal privacy rights and data protection laws. <strong>In</strong> the United States, groups such as<br />
the American Civil Liberties Union have expressed concern that money laundering rules<br />
require banks to report on their own customers, essentially conscripting private<br />
businesses "into agents of the surveillance state".<br />
Many countries are obligated by various international instruments and standards, such<br />
as the 1988 United Nations Convention Against Illicit Traffic in Narcotic Drugs and<br />
Psychotropic Substances, the 2000 Convention against Transnational <strong>Organized</strong> <strong>Crime</strong>,<br />
the 2003 United Nations Convention against Corruption, and the recommendations of<br />
the 1989 Financial Action Task Force on Money Laundering (FATF) to enact and<br />
enforce money laundering laws in an effort to stop narcotics trafficking, international<br />
organized crime, and corruption. Mexico, which has faced a significant increase in<br />
violent crime, established anti-money laundering controls in 2013 to curb the underlying<br />
crime issue.<br />
Global Organizations<br />
Formed in 1989 by the G7 countries, the Financial Action Task Force on Money<br />
Laundering (FATF) is an intergovernmental body whose purpose is to develop and<br />
promote an international response to combat money laundering. <strong>The</strong> FATF Secretariat<br />
is housed at the headquarters of the OECD in Paris. <strong>In</strong> October 2001, FATF expanded<br />
its mission to include combating the financing of terrorism. FATF is a policy-making<br />
body that brings together legal, financial, and law enforcement experts to achieve<br />
national legislation and regulatory AML and CFT reforms. As of 2014 its membership<br />
consists of 36 countries and territories and two regional organizations. FATF works in<br />
collaboration with a number of international bodies and organizations. <strong>The</strong>se entities<br />
have observer status with FATF, which does not entitle them to vote, but permits them<br />
full participation in plenary sessions and working groups.<br />
FATF has developed 40 recommendations on money laundering and 9 special<br />
recommendations regarding terrorist financing. FATF assesses each member country<br />
against these recommendations in published reports. Countries seen as not being<br />
sufficiently compliant with such recommendations are subjected to financial sanctions.<br />
FATF's three primary functions with regard to money laundering are:<br />
1. Monitoring members’ progress in implementing anti-money laundering measures,<br />
2. Reviewing and reporting on laundering trends, techniques, and<br />
countermeasures, and<br />
Page 182 of 372
3. Promoting the adoption and implementation of FATF anti-money laundering<br />
standards globally.<br />
<strong>The</strong> FATF currently comprises 34 member jurisdictions and 2 regional organizations,<br />
representing most major financial centers in all parts of the globe.<br />
<strong>The</strong> United Nations Office on Drugs and <strong>Crime</strong> maintains the <strong>In</strong>ternational Money<br />
Laundering <strong>In</strong>formation Network, a website that provides information and software for<br />
anti-money laundering data collection and analysis. <strong>The</strong> World Bank has a website that<br />
provides policy advice and best practices to governments and the private sector on antimoney<br />
laundering issues. <strong>The</strong> Basel AML <strong>In</strong>dex is an independent annual ranking that<br />
assesses the risk of money laundering and terrorist financing around the world.<br />
Anti-Money-Laundering Measures by Region<br />
Many jurisdictions adopt a list of specific predicate crimes for money laundering<br />
prosecutions, while others criminalize the proceeds of any serious crimes.<br />
Afghanistan<br />
<strong>The</strong> Financial Transactions and Reports Analysis Center of Afghanistan (FinTRACA)<br />
was established as a Financial <strong>In</strong>telligence Unit (FIU) under the Anti Money Laundering<br />
Page 183 of 372
and Proceeds of <strong>Crime</strong> Law passed by decree late in 2004. <strong>The</strong> main purpose of this<br />
law is to protect the integrity of the Afghan financial system and to gain compliance with<br />
international treaties and conventions. <strong>The</strong> Financial <strong>In</strong>telligence Unit is a semiindependent<br />
body that is administratively housed within the Central Bank of Afghanistan<br />
(Da Afghanistan Bank). <strong>The</strong> main objective of FinTRACA is to deny the use of the<br />
Afghan financial system to those who obtained funds as the result of illegal activity, and<br />
to those who would use it to support terrorist activities.<br />
To meet its objectives, the FinTRACA collects and analyzes information from a variety<br />
of sources. <strong>The</strong>se sources include entities with legal obligations to submit reports to the<br />
FinTRACA when a suspicious activity is detected, as well as reports of cash<br />
transactions above a threshold amount specified by regulation. Also, FinTRACA has<br />
access to all related Afghan government information and databases. When the analysis<br />
of this information supports the supposition of illegal use of the financial system, the<br />
FinTRACA works closely with law enforcement to investigate and prosecute the illegal<br />
activity. FinTRACA also cooperates internationally in support of its own analyses and<br />
investigations and to support the analyses and investigations of foreign counterparts, to<br />
the extent allowed by law. Other functions include training of those entities with legal<br />
obligations to report information, development of laws and regulations to support<br />
national-level AML objectives, and international and regional cooperation in the<br />
development of AML typologies and countermeasures.<br />
Australia<br />
Australia has adopted a number of strategies to combat money laundering, which mirror<br />
those of a majority of western countries. <strong>The</strong> Australian Transaction Reports and<br />
Analysis Centre (AUSTRAC) is Australia's financial intelligence unit to combat money<br />
laundering and terrorism financing, which requires financial institutions and other 'cash<br />
dealers' in Australia to report to it suspicious cash or other transactions and other<br />
specific information. <strong>The</strong> Attorney-General's Department maintains a list of outlawed<br />
terror organizations. It is an offense to materially support or be supported by such<br />
organizations. It is an offence to open a bank account in Australia in a false name, and<br />
rigorous procedures must be followed when new bank accounts are opened.<br />
<strong>The</strong> Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) (AML/CTF<br />
Act) is the principal legislative instrument, although there are also offence provisions<br />
contained in Division 400 of the Criminal Code Act 1995 (Cth). Upon its introduction, it<br />
was intended that the AML/CTF Act would be further amended by a second tranche of<br />
reforms extending to designated non-financial businesses and professions (DNFBPs)<br />
including, inter alia, lawyers, accountants, jewellers and real estate agents; however,<br />
those further reforms have yet to be progressed.<br />
<strong>The</strong> Proceeds of <strong>Crime</strong> Act 1987 (Cth) imposes criminal penalties on a person who<br />
engages in money laundering, and allows for confiscation of property. <strong>The</strong> principal<br />
objects of the Act are set out in s.3(1):<br />
Page 184 of 372
to deprive persons of the proceeds of, and benefits derived from the commission<br />
of offences,<br />
to provide for the forfeiture of property used in or in connection with the<br />
commission of such offences, and<br />
to enable law enforcement authorities to effectively trace such proceeds, benefits<br />
and property.<br />
Bangladesh<br />
<strong>The</strong> first anti-money laundering legislation in Bangladesh was the Money Laundering<br />
Prevention Act, 2002. It was replaced by the Money Laundering Prevention Ordinance<br />
2008. Subsequently, the ordinance was repealed by the Money Laundering Prevention<br />
Act, 2009. <strong>In</strong> 2012, government again replace it with the Money Laundering Prevention<br />
Act, 2012<br />
<strong>In</strong> terms of section 2, "Money Laundering means – (i) knowingly moving, converting, or<br />
transferring proceeds of crime or property involved in an offence for the following<br />
purposes:- (1) concealing or disguising the illicit nature, source, location, ownership or<br />
control of the proceeds of crime; or (2) assisting any person involved in the commission<br />
of the predicate offence to evade the legal consequences of such offence; (ii) smuggling<br />
Page 185 of 372
money or property earned through legal or illegal means to a foreign country; (iii)<br />
knowingly transferring or remitting the proceeds of crime to a foreign country or<br />
remitting or bringing them into Bangladesh from a foreign country with the intention of<br />
hiding or disguising its illegal source; or (iv) concluding or attempting to conclude<br />
financial transactions in such a manner so as to reporting requirement under this Act<br />
may be avoided; (v) converting or moving or transferring property with the intention to<br />
instigate or assist for committing a predicate offence; (vi) acquiring, possessing or using<br />
any property, knowing that such property is the proceeds of a predicate offence; (vii)<br />
performing such activities so as to the illegal source of the proceeds of crime may be<br />
concealed or disguised; (viii) participating in, associating with, conspiring, attempting,<br />
abetting, instigate or counsel to commit any offences mentioned above."<br />
To prevent these Illegal uses of money, the Bangladesh government has introduced the<br />
Money Laundering Prevention Act. <strong>The</strong> Act was last amended in the year 2009 and all<br />
the financial institutes are following this act.<br />
Till today there are 26 circulars issued by Bangladesh Bank under this act. To prevent<br />
money laundering, a banker must do the following:<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
While opening a new account, the account opening form should be duly filled up<br />
by all the information of the customer.<br />
<strong>The</strong> KYC must be properly filled.<br />
<strong>The</strong> Transaction Profile (TP) is mandatory for a client to understand his/her<br />
transactions. If needed, the TP must be updated at the client's consent.<br />
All other necessary papers should be properly collected along with the National<br />
ID card.<br />
If any suspicious transaction is noticed, the Branch Anti Money Laundering<br />
Compliance Officer (BAMLCO) must be notified and accordingly the Suspicious<br />
Transaction Report (STR) must be filled out.<br />
<strong>The</strong> cash department should be aware of the transactions. It must be noted if<br />
suddenly a big amount of money is deposited in any account. Proper documents<br />
are required if any client does this type of transaction.<br />
Structuring, over/ under invoicing is another way to do money laundering. <strong>The</strong><br />
foreign exchange department should look into this matter cautiously.<br />
If any account has a transaction over 1 million taka in a single day, it must be<br />
reported in a cash transaction report (CTR).<br />
All bank officials must go through all the 26 circulars and use them.<br />
Page 186 of 372
Canada<br />
<strong>In</strong> 1991, the Proceeds of <strong>Crime</strong> (Money Laundering) Act was brought into force in<br />
Canada to give legal effect to the former FATF Forty Recommendations by establishing<br />
record keeping and client identification requirements in the financial sector to facilitate<br />
the investigation and prosecution of money laundering offences under the Criminal<br />
Code and the Controlled Drugs and Substances Act.<br />
<strong>In</strong> 2000, the Proceeds of <strong>Crime</strong> (Money Laundering) Act was amended to expand the<br />
scope of its application and to establish a financial intelligence unit with national control<br />
over money laundering, namely FINTRAC.<br />
<strong>In</strong> December 2001, the scope of the Proceeds of <strong>Crime</strong> (Money Laundering) Act was<br />
again expanded by amendments enacted under the Anti-Terrorism Act with the<br />
objective of deterring terrorist activity by cutting off sources and channels of funding<br />
used by terrorists in response to 9/11. <strong>The</strong> Proceeds of <strong>Crime</strong> (Money Laundering) Act<br />
was renamed the Proceeds of <strong>Crime</strong> (Money Laundering) and Terrorist Financing Act.<br />
<strong>In</strong> December 2006, the Proceeds of <strong>Crime</strong> (Money Laundering) and Terrorist Financing<br />
Act was further amended, in part, in response to pressure from the FATF for Canada to<br />
Page 187 of 372
tighten its money laundering and financing of terrorism legislation. <strong>The</strong> amendments<br />
expanded the client identification, record-keeping and reporting requirements for certain<br />
organizations and included new obligations to report attempted suspicious transactions<br />
and outgoing and incoming international electronic fund transfers, undertake risk<br />
assessments and implement written compliance procedures in respect of those risks.<br />
<strong>The</strong> amendments also enabled greater money laundering and terrorist financing<br />
intelligence-sharing among enforcement agencies.<br />
<strong>In</strong> Canada, casinos, money service businesses, notaries, accountants, banks, securities<br />
brokers, life insurance agencies, real estate salespeople and dealers in precious metals<br />
and stones are subject to the reporting and record keeping obligations under the<br />
Proceeds of <strong>Crime</strong> (Money Laundering) and Terrorist Financing Act. However in recent<br />
years, casinos and realtors have been embroiled in scandal for aiding and abetting<br />
money launderers, especially in Vancouver. Some have speculated that approximately<br />
$1 Billion is laundered in Vancouver per year.<br />
European Union<br />
<strong>The</strong> fourth iteration of the EU's anti-money laundering directive (AMLD IV) was<br />
published on 5 June 2015, after clearing its last legislative stop at the European<br />
Parliament. This directive brought the EU's money laundering laws more in line with the<br />
US's, which is advantageous for financial institutions operating in both jurisdictions. <strong>The</strong><br />
Fifth Money Laundering Directive (5MLD) comes into force on 10 January 2020,<br />
addressing a number of weaknesses in the European Union's AML/CFT regime that<br />
came to light after the enactment of the Fourth Money Laundering Directive AMLD IV).<br />
Lack of harmonization in AML requirements between the US and EU has complicated<br />
the compliance efforts of global institutions that are looking to standardize the Know<br />
Your Customer (KYC) component of their AML programs across key jurisdictions.<br />
AMLD IV promises to better align the AML regimes by adopting a more risk-based<br />
approach compared to its predecessor, AMLD III.<br />
Certain components of the directive, however, go beyond current requirements in both<br />
the EU and US, imposing new implementation challenges on banks. For instance, more<br />
public officials are brought within the scope of the directive, and EU member states are<br />
required to establish new registries of "beneficial owners" (i.e., those who ultimately own<br />
or control each company) which will impact banks. AMLD IV became effective 25 June<br />
2015.<br />
On 24 January 2019, the European Commission sent official warnings to ten member<br />
states as part of a crackdown on lax application of money laundering regulations. <strong>The</strong><br />
Commission sent Germany a letter of formal notice, the first step of the EU legal<br />
procedure against states. Belgium, Finland, France, Lithuania and Portugal were sent<br />
reasoned opinions, the second step of the procedure which could lead to fines. A<br />
second round of reasoned opinions was sent to Bulgaria, Cyprus, Poland, and Slovakia.<br />
<strong>The</strong> ten countries have two months to respond or face court action. <strong>The</strong> Commission<br />
Page 188 of 372
had set a 26 June 2017 deadline for EU countries to apply new rules against money<br />
laundering and terrorist financing.<br />
On 13 February 2019, the Commission added Saudi Arabia, Panama, Nigeria and other<br />
jurisdictions to a blacklist of nations that pose a threat because of lax controls on<br />
terrorism financing and money laundering. This is a more expansive list than that of<br />
FATF.<br />
<strong>In</strong>dia<br />
<strong>In</strong> 2002, the Parliament of <strong>In</strong>dia passed an act called the Prevention of Money<br />
Laundering Act, 2002. <strong>The</strong> main objectives of this act are to prevent money-laundering<br />
as well as to provide for confiscation of property either derived from or involved in,<br />
money-laundering.<br />
Section 12 (1) describes the obligations that banks, other financial institutions, and<br />
intermediaries have to:<br />
(a) Maintain records that detail the nature and value of transactions, whether<br />
such transactions comprise a single transaction or a series of connected<br />
transactions, and where these transactions take place within a month.<br />
(b) Furnish information on transactions referred to in clause (a) to the Director<br />
within the time prescribed, including records of the identity of all its clients.<br />
Section 12 (2) prescribes that the records referred to in sub-section (1) as<br />
mentioned above, must be maintained for ten years after the transactions<br />
finished. It is handled by the <strong>In</strong>dian <strong>In</strong>come Tax Department.<br />
<strong>The</strong> provisions of the Act are frequently reviewed and various amendments have been<br />
passed from time to time.<br />
Most money laundering activities in <strong>In</strong>dia are through political parties, corporate<br />
companies and the shares market. <strong>The</strong>se are investigated by the Enforcement<br />
Directorate and <strong>In</strong>dian <strong>In</strong>come Tax Department. According to Government of <strong>In</strong>dia, out<br />
Page 189 of 372
of the total tax arrears of ₹2,480 billion (US$35 billion) about ₹1,300 billion<br />
(US$18 billion) pertain to money laundering and securities scam cases.<br />
Bank accountants must record all transactions over Rs. 1 million and maintain such<br />
records for 10 years.<br />
Banks must also make cash transaction reports (CTRs) and suspicious transaction<br />
reports over Rs. 1 million within 7 days of initial suspicion. <strong>The</strong>y must submit their<br />
reports to the Enforcement Directorate and <strong>In</strong>come Tax Department.<br />
Singapore<br />
Singapore’s legal framework for combating money laundering is contained in a<br />
patchwork of legal instruments, the main elements of which are:<br />
<br />
<br />
<br />
<strong>The</strong> Corruption, Drug Trafficking and Other Serious <strong>Crime</strong>s (Confiscation of<br />
Benefits) Act (CDSA). This statute criminalizes money laundering and imposes<br />
the requirement for persons to file suspicious transaction reports (STRs) and<br />
make a disclosure whenever physical currency or goods exceeding S$20,000 are<br />
carried into or out of Singapore.<br />
<strong>The</strong> Mutual Assistance in Criminal Matters Act (MACMA). This statute sets out<br />
the framework for mutual legal assistance in criminal matters.<br />
Legal instruments issued by regulatory agencies (such as the Monetary Authority<br />
of Singapore (MAS), in relation to financial institutions (FIs)) imposing<br />
requirements to conduct customer due diligence (CDD).<br />
<strong>The</strong> term ‘money laundering’ is not used as such within the CDSA. Part VI of the CDSA<br />
criminalizes the laundering of proceeds generated by criminal conduct and drug tracking<br />
via the following offences:<br />
<br />
<br />
<br />
<br />
<strong>The</strong> assistance of another person in retaining, controlling or using the benefits of<br />
drug dealing or criminal conduct under an arrangement (whether by<br />
concealment, removal from jurisdiction, transfer to nominees or otherwise)<br />
[section 43(1)/44(1)].<br />
<strong>The</strong> concealment, conversion, transfer or removal from the jurisdiction, or the<br />
acquisition, possession or use of benefits of drug dealing or criminal conduct<br />
[section 46(1)/47(1)].<br />
<strong>The</strong> concealment, conversion, transfer or removal from the jurisdiction of another<br />
person's benefits of drug dealing or criminal conduct [section 46(2)/47(2)].<br />
<strong>The</strong> acquirement, possession or use of another person's benefits of drug dealing<br />
or criminal conduct [section 46(3)/47(3)].<br />
Page 190 of 372
Thailand<br />
United Kingdom<br />
Money laundering and terrorist funding legislation in the UK is governed by five Acts of<br />
primary legislation:-<br />
Terrorism Act 2000<br />
Anti-terrorism, <strong>Crime</strong> and Security Act 2001<br />
Proceeds of <strong>Crime</strong> Act 2002<br />
Serious <strong>Organized</strong> <strong>Crime</strong> and Police Act 2005<br />
Sanctions and Anti-Money Laundering Act 2018<br />
Money Laundering Regulations are designed to protect the UK financial system, as well<br />
as preventing and detecting crime. If a business is covered by these regulations then<br />
controls are put in place to prevent it being used for money laundering.<br />
<strong>The</strong> Proceeds of <strong>Crime</strong> Act 2002 contains the primary UK anti-money laundering<br />
legislation, including provisions requiring businesses within the "regulated sector"<br />
(banking, investment, money transmission, certain professions, etc.) to report to the<br />
authorities suspicions of money laundering by customers or others.<br />
Money laundering is broadly defined in the UK. <strong>In</strong> effect any handling or involvement<br />
with any proceeds of any crime (or monies or assets representing the proceeds of<br />
crime) can be a money laundering offence. An offender's possession of the proceeds of<br />
his own crime falls within the UK definition of money laundering. <strong>The</strong> definition also<br />
covers activities within the traditional definition of money laundering, as a process that<br />
conceals or disguises the proceeds of crime to make them appear legitimate.<br />
Page 191 of 372
Unlike certain other jurisdictions (notably the US and much of Europe), UK money<br />
laundering offences are not limited to the proceeds of serious crimes, nor are there any<br />
monetary limits. Financial transactions need no money laundering design or purpose for<br />
UK laws to consider them a money laundering offence. A money laundering offence<br />
under UK legislation need not even involve money, since the money laundering<br />
legislation covers assets of any description. <strong>In</strong> consequence, any person who commits<br />
an acquisitive crime (i.e., one that produces some benefit in the form of money or an<br />
asset of any description) in the UK inevitably also commits a money laundering offence<br />
under UK legislation.<br />
This applies also to a person who, by criminal conduct, evades a liability (such as a<br />
taxation liability)—which lawyers call "obtaining a pecuniary advantage"—as he is<br />
deemed thereby to obtain a sum of money equal in value to the liability evaded.<br />
<strong>The</strong> principal money laundering offences carry a maximum penalty of 14 years'<br />
imprisonment.<br />
Secondary regulation is provided by the Money Laundering Regulations 2003, which<br />
was replaced by the Money Laundering Regulations 2007. <strong>The</strong>y are directly based on<br />
the EU directives 91/308/EEC, 2001/97/EC and 2005/60/EC.<br />
One consequence of the Act is that solicitors, accountants, tax advisers, and insolvency<br />
practitioners who suspect (as a consequence of information received in the course of<br />
their work) that their clients (or others) have engaged in tax evasion or other criminal<br />
conduct that produced a benefit, now must report their suspicions to the authorities<br />
(since these entail suspicions of money laundering). <strong>In</strong> most circumstances it would be<br />
an offence, "tipping-off", for the reporter to inform the subject of his report that a report<br />
has been made. <strong>The</strong>se provisions do not however require disclosure to the authorities<br />
of information received by certain professionals in privileged circumstances or where<br />
the information is subject to legal professional privilege. Others that are subject to these<br />
regulations include financial institutions, credit institutions, estate agents (which includes<br />
chartered surveyors), trust and company service providers, high value dealers (who<br />
accept cash equivalent to €15,000 or more for goods sold), and casinos.<br />
Professional guidance (which is submitted to and approved by the UK Treasury) is<br />
provided by industry groups including the Joint Money Laundering Steering Group, the<br />
Law Society. and the Consultative Committee of Accountancy Bodies (CCAB).<br />
However, there is no obligation on banking institutions to routinely report monetary<br />
deposits or transfers above a specified value. <strong>In</strong>stead reports must be made of all<br />
suspicious deposits or transfers, irrespective of their value.<br />
<strong>The</strong> reporting obligations include reporting suspicious gains from conduct in other<br />
countries that would be criminal if it took place in the UK. Exceptions were later added<br />
for certain activities legal where they took place, such as bullfighting in Spain.<br />
Page 192 of 372
More than 200,000 reports of suspected money laundering are submitted annually to<br />
authorities in the UK (there were 240,582 reports in the year ended 30 September 2010.<br />
This was an increase from the 228,834 reports submitted in the previous year). Most of<br />
these reports are submitted by banks and similar financial institutions (there were<br />
186,897 reports from the banking sector in the year ended 30 September 2010).<br />
Although 5,108 different organizations submitted suspicious activity reports to the<br />
authorities in the year ended 30 September 2010, just four organizations submitted<br />
approximately half of all reports, and the top 20 reporting organizations accounted for<br />
three-quarters of all reports.<br />
<strong>The</strong> offence of failing to report a suspicion of money laundering by another person<br />
carries a maximum penalty of 5 years' imprisonment.<br />
On 1 May 2018, the UK House of Commons, without opposition, passed the Sanctions<br />
and Anti-Money Laundering Bill, which will set out the UK government's intended<br />
approach to exceptions and licenses when the nation becomes responsible for<br />
implementing its own sanctions and will also require notorious overseas British territory<br />
tax havens such as the Cayman Islands and the British Virgin Islands to establish public<br />
registers of the beneficial ownership of firms in their jurisdictions by the end of 2020.<br />
<strong>The</strong> legislation was passed by the House of Lords on 21 May and received Royal Asset<br />
on 23 May. However, the Act's public register provision is facing legal challenges from<br />
local governments in the Cayman Islands and British Virgin Islands, who argue that it<br />
violates their Constitutional sovereignty.<br />
Page 193 of 372
Bureaux de Change<br />
All UK Bureaux de change are registered with Her Majesty's Revenue and Customs,<br />
which issues a trading license for each location. Bureaux de change and money<br />
transmitters, such as Western Union outlets, in the UK fall within the "regulated sector"<br />
and are required to comply with the Money Laundering Regulations 2007. Checks can<br />
be carried out by HMRC on all Money Service Businesses.<br />
South Africa<br />
<strong>In</strong> South Africa, the Financial <strong>In</strong>telligence Centre Act (2001) and subsequent<br />
amendments have added responsibilities to the FSB to combat money laundering.<br />
United States<br />
<strong>The</strong> approach in the United States to stopping money laundering is usually broken into<br />
two areas: preventive (regulatory) measures and criminal measures.<br />
Preventive<br />
<strong>In</strong> an attempt to prevent dirty money from entering the U.S. financial system in the first<br />
place, the United States Congress passed a series of laws, starting in 1970, collectively<br />
known as the Bank Secrecy Act (BSA). <strong>The</strong>se laws, contained in sections 5311 through<br />
5332 of Title 31 of the United States Code, require financial institutions, which under the<br />
current definition include a broad array of entities, including banks, credit card<br />
companies, life insurers, money service businesses and broker-dealers in securities, to<br />
report certain transactions to the United States Department of the Treasury. Cash<br />
transactions in excess of a certain amount must be reported on a currency transaction<br />
report (CTR), identifying the individual making the transaction as well as the source of<br />
the cash. <strong>The</strong> law originally required all transactions of US$5,000 or more to be<br />
reported, but due to excessively high levels of reporting the threshold was raised to<br />
US$10,000. <strong>The</strong> U.S. is one of the few countries in the world to require reporting of all<br />
cash transactions over a certain limit, although certain businesses can be exempt from<br />
the requirement. Additionally, financial institutions must report transaction on a<br />
Suspicious Activity Report (SAR) that they deem "suspicious", defined as a knowing or<br />
suspecting that the funds come from illegal activity or disguise funds from illegal activity,<br />
that it is structured to evade BSA requirements or appears to serve no known business<br />
or apparent lawful purpose; or that the institution is being used to facilitate criminal<br />
activity. Attempts by customers to circumvent the BSA, generally by structuring cash<br />
deposits to amounts lower than US$10,000 by breaking them up and depositing them<br />
on different days or at different locations also violates the law.<br />
<strong>The</strong> financial database created by these reports is administered by the U.S.'s Financial<br />
<strong>In</strong>telligence Unit (FIU), called the Financial <strong>Crime</strong>s Enforcement Network (FinCEN),<br />
located in Vienna, Virginia. <strong>The</strong> reports are made available to U.S. criminal<br />
Page 194 of 372
investigators, as well as other FIU's around the globe, and FinCEN conducts computer<br />
assisted analyses of these reports to determine trends and refer investigations.<br />
<strong>The</strong> BSA requires financial institutions to engage in customer due diligence, or KYC,<br />
which is sometimes known in the parlance as know your customer. This includes<br />
obtaining satisfactory identification to give assurance that the account is in the<br />
customer's true name, and having an understanding of the expected nature and source<br />
of the money that flows through the customer's accounts. Other classes of customers,<br />
such as those with private banking accounts and those of foreign government officials,<br />
are subjected to enhanced due diligence because the law deems that those types of<br />
accounts are a higher risk for money laundering. All accounts are subject to ongoing<br />
monitoring, in which internal bank software scrutinizes transactions and flags for manual<br />
inspection those that fall outside certain parameters. If a manual inspection reveals that<br />
the transaction is suspicious, the institution should file a Suspicious Activity Report.<br />
<strong>The</strong> regulators of the industries involved are responsible to ensure that the financial<br />
institutions comply with the BSA. For example, the Federal Reserve and the Office of<br />
the Comptroller of the Currency regularly inspect banks, and may impose civil fines or<br />
refer matters for criminal prosecution for non-compliance. A number of banks have been<br />
fined and prosecuted for failure to comply with the BSA. Most famously, Riggs Bank, in<br />
Page 195 of 372
Washington D.C., was prosecuted and functionally driven out of business as a result of<br />
its failure to apply proper money laundering controls, particularly as it related to foreign<br />
political figures.<br />
<strong>In</strong> addition to the BSA, the U.S. imposes controls on the movement of currency across<br />
its borders, requiring individuals to report the transportation of cash in excess of<br />
US$10,000 on a form called Report of <strong>In</strong>ternational Transportation of Currency or<br />
Monetary <strong>In</strong>struments (known as a CMIR). Likewise, businesses, such as automobile<br />
dealerships, that receive cash in excess of US$10,000 must file a Form 8300 with the<br />
<strong>In</strong>ternal Revenue Service, identifying the source of the cash.<br />
On 1 September 2010, the Financial <strong>Crime</strong>s Enforcement Network issued an advisory<br />
on "informal value transfer systems" referencing United States v. Banki.<br />
<strong>In</strong> the United States, there are perceived consequences of anti-money laundering (AML)<br />
regulations. <strong>The</strong>se unintended consequences include FinCEN's publishing of a list of<br />
"risky businesses," which many believe unfairly targeted money service businesses.<br />
<strong>The</strong> publishing of this list and the subsequent fall-out, banks indiscriminately de-risking<br />
MSBs, is referred to as Operation Choke Point. <strong>The</strong> Financial <strong>Crime</strong>s Enforcement<br />
Network issued a Geographic Targeting Order to combat against illegal money<br />
laundering in the United States. This means that title insurance companies in the U.S.<br />
are required to identify the natural persons behind companies that pay all cash in<br />
residential real estate purchases over a particular amount in certain U.S. cities.<br />
Criminal Sanctions<br />
Money laundering has been criminalized in the United States since the Money<br />
Laundering Control Act of 1986. <strong>The</strong> law, contained at section 1956 of Title 18 of the<br />
United States Code, prohibits individuals from engaging in a financial transaction with<br />
proceeds that were generated from certain specific crimes, known as "specified unlawful<br />
activities" (SUAs). <strong>The</strong> law requires that an individual specifically intend in making the<br />
transaction to conceal the source, ownership or control of the funds. <strong>The</strong>re is no<br />
minimum threshold of money, and no requirement that the transaction succeeded in<br />
actually disguising the money. A "financial transaction" has been broadly defined, and<br />
need not involve a financial institution, or even a business. Merely passing money from<br />
one person to another, with the intent to disguise the source, ownership, location or<br />
control of the money, has been deemed a financial transaction under the law. <strong>The</strong><br />
possession of money without either a financial transaction or an intent to conceal is not<br />
a crime in the United States. Besides money laundering, the law contained in section<br />
1957 of Title 18 of the United States Code, prohibits spending more than US$10,000<br />
derived from an SUA, regardless of whether the individual wishes to disguise it. It<br />
carries a lesser penalty than money laundering, and unlike the money laundering<br />
statute, requires that the money pass through a financial institution.<br />
According to the records compiled by the United States Sentencing Commission, in<br />
2009, the United States Department of Justice typically convicted a little over 81,000<br />
Page 196 of 372
people; of this, approximately 800 are convicted of money laundering as the primary or<br />
most serious charge. <strong>The</strong> Anti-Drug Abuse Act of 1988 expanded the definition of<br />
financial institution to include businesses such as car dealers and real estate closing<br />
personnel and required them to file reports on large currency transaction. It required<br />
verification of identity of those who purchase monetary instruments over $3,000. <strong>The</strong><br />
Annunzio-Wylie Anti-Money Laundering Act of 1992 strengthened sanctions for BSA<br />
violations, required so called "Suspicious Activity Reports" and eliminated previously<br />
used "Criminal Referral Forms", required verification and recordkeeping for wire<br />
transfers and established the Bank Secrecy Act Advisory Group (BSAAG). <strong>The</strong> Money<br />
Laundering Suppression Act from 1994 required banking agencies to review and<br />
enhance training, develop anti-money laundering examination procedures, review and<br />
enhance procedures for referring cases to law enforcement agencies, streamlined the<br />
Currency transaction report exemption process, required each Money services business<br />
(MSB) to be registered by an owner or controlling person, required every MSB to<br />
maintain a list of businesses authorized to act as agents in connection with the financial<br />
services offered by the MSB, made operating an unregistered MSB a federal crime, and<br />
recommended that states adopt uniform laws applicable to MSBs. <strong>The</strong> Money<br />
Laundering and Financial <strong>Crime</strong>s Strategy Act of 1998 required banking agencies to<br />
develop anti-money laundering training for examiners, required the Department of the<br />
Treasury and other agencies to develop a "National Money Laundering Strategy",<br />
created the "High <strong>In</strong>tensity Money Laundering and Related Financial <strong>Crime</strong> Area"<br />
(HIFCA) Task Forces to concentrate law enforcement efforts at the federal, state and<br />
local levels in zones where money laundering is prevalent. HIFCA zones may be<br />
defined geographically or can be created to address money laundering in an industry<br />
sector, a financial institution, or group of financial institutions.<br />
Page 197 of 372
<strong>The</strong> <strong>In</strong>telligence Reform & Terrorism Prevention Act of 2004 amended the Bank<br />
Secrecy Act to require the Secretary of the Treasury to prescribe regulations requiring<br />
certain financial institutions to report cross-border electronic transmittals of funds, if the<br />
Secretary determines that reporting is "reasonably necessary" in "anti-money laundering<br />
/combatting financing of terrorists (Anti-Money Laundering/Combating the Financing of<br />
Terrorism AML/CFT)."<br />
Notable Cases<br />
1998 investigation, United States Senate, Contribution Laundering/Third-Party<br />
Transfers. <strong>In</strong>cludes investigation of Gandhi Memorial <strong>In</strong>ternational Foundation.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Bank of Credit and Commerce <strong>In</strong>ternational: Unknown amount, estimated in<br />
billions, of criminal proceeds, including drug trafficking money, laundered during<br />
the mid-1980s.<br />
BTA Bank: $6 billion of bank funds embezzled or fraudulently loaned to shell<br />
companies and offshore holdings by the banks former chairman and CEO<br />
Mukhtar Ablyazov.<br />
Bank of <strong>New</strong> York: US$7 billion of Russian capital flight laundered through<br />
accounts controlled by bank executives, late 1990s.<br />
Charter House Bank: Charter House Bank in Kenya was placed under statutory<br />
management in 2006 by the Central Bank of Kenya after it was discovered the<br />
bank was being used for money laundering activities by multiple accounts<br />
containing missing customer information. More than $1.5 billion had been<br />
laundered before the scam was uncovered.<br />
Danske Bank + Swedbank: $30 billion - $230 billion US dollars laundered<br />
through its Estonian branch. This was revealed on 19 September 2018.<br />
<strong>In</strong>vestigations by Denmark, Estonia, the U.K. and the U.S. were joined by France<br />
in February 2019. On 19 February 2019, Danske Bank announced that it would<br />
cease operating in Russia and the Baltic States. This statement came shortly<br />
after Estonia's banking regulator Finantsinspektsioon announced that they would<br />
close the Estonian branch of Danske Bank. <strong>The</strong> investigation has grown to<br />
include Swedbank, which may have laundered $4.3 billion. More at Danske Bank<br />
money laundering scandal.<br />
Ferdinand Marcos: Unknown amount, estimated at US$10 billion of government<br />
assets laundered through banks and financial institutions in the United States,<br />
Liechtenstein, Austria, Panama, Netherlands Antilles, Cayman Islands, Vanuatu,<br />
Hong Kong, Singapore, Monaco, the Bahamas, the Vatican and Switzerland.<br />
HSBC, in December 2012, paid a record $1.9 Billion fines for money-laundering<br />
hundreds of millions of dollars for drug traffickers, terrorists and sanctioned<br />
Page 198 of 372
governments such as Iran. <strong>The</strong> money-laundering occurred throughout the<br />
2000s.<br />
<br />
<br />
<strong>In</strong>stitute for the Works of Religion: Italian authorities investigated suspected<br />
money laundering transactions amounting to US$218 million made by the IOR to<br />
several Italian banks.<br />
Liberty Reserve, in May 2013, was seized by United States federal authorities for<br />
laundering $6 billion.<br />
<br />
<br />
<br />
Nauru: US$70 billion of Russian capital flight laundered through unregulated<br />
Nauru offshore shell banks, late 1990s<br />
Sani Abacha: US$2–5 billion of government assets laundered through banks in<br />
the UK, Luxembourg, Jersey (Channel Islands), and Switzerland, by the<br />
president of Nigeria.<br />
Standard Chartered: paid $330 million in fines for money-laundering hundreds of<br />
billions of dollars for Iran. <strong>The</strong> money-laundering took place in the 2000s and<br />
occurred for "nearly a decade to hide 60,000 transactions worth $250 billion".<br />
Page 199 of 372
Standard Bank: Standard Bank South Africa London Branch – <strong>The</strong> Financial<br />
Conduct Authority (FCA) has fined Standard Bank PLC (Standard Bank)<br />
£7,640,400 for failings relating to its anti-money laundering (AML) policies and<br />
procedures over corporate and private bank customers connected to politically<br />
exposed persons (PEPs).<br />
BNP Paribas, in June 2014, pleaded guilty to falsifying business records and<br />
conspiracy, having violated U.S. sanctions against Cuba, Iran, and Sudan. It<br />
agreed to pay an $8.9 billion fine, the largest ever for violating U.S. sanctions.<br />
BSI Bank, in May 2017, was shut down by the Monetary Authority of Singapore<br />
for serious breaches of anti-money laundering requirements, poor management<br />
oversight of the bank's operations, and gross misconduct of some of the bank's<br />
staff.<br />
Jose Franklin Jurado-Rodriguez, a Harvard College and Columbia University<br />
Graduate School of Arts and Sciences Economics Department alumnus, was<br />
convicted in Luxembourg in June 1990 "in what was one of the largest drug<br />
money laundering cases ever brought in Europe" and the US in 1996 of money<br />
laundering for the Cali Cartel kingpin Jose Santacruz Londono. Jurado-<br />
Rodriguez specialized in "smurfing".<br />
Fortnite. <strong>In</strong> 2018 Cybersecurity firm Sixgill posed as customers and discovered<br />
that stolen credit card details may have used to purchase Fortnite's in-game<br />
currency (V-Bucks) then in-game purchases, to be sold for "clean"<br />
money. [155][156][157] Epic Games, the makers of Fortnite, responded by urging<br />
customers to secure their accounts.<br />
Digital Money and Money Laundering<br />
To prevent the usage of decentralized digital money such as Bitcoin for the profit of<br />
crime and corruption, Australia is planning to strengthen the nation's anti-money<br />
laundering laws. <strong>The</strong> characteristics of Bitcoin—it is completely deterministic, protocol<br />
based and cannot be censored—make it possible to circumvent national laws using<br />
services like Tor to obfuscate transaction origins. Bitcoin relies completely on<br />
cryptography, not on a central entity running under a KYC framework. <strong>The</strong>re are several<br />
cases in which criminals have cashed out a significant amount of Bitcoin after<br />
ransomware attacks, drug dealings, cyber fraud and gunrunning.<br />
Additional cases, such as <strong>The</strong> DAO being drained of Ether, cannot be classified as<br />
money laundering under any legal definition, as decentralized virtual environments are<br />
legally stateless and cannot be intervened with by a governing body. <strong>The</strong> DAO incident<br />
initiated debate regarding the definition of money laundering in a stateless environment,<br />
leading to the formation of Ethereum Classic.<br />
Page 200 of 372
XIV. Murder<br />
Murder is the unlawful killing of another human without justification or valid excuse,<br />
especially the unlawful killing of another human being with malice aforethought. [1][2][3]<br />
This state of mind may, depending upon the jurisdiction, distinguish murder from other<br />
forms of unlawful homicide, such as manslaughter. Manslaughter is a killing committed<br />
in the absence of malice, brought about by reasonable provocation, or diminished<br />
capacity. <strong>In</strong>voluntary manslaughter, where it is recognized, is a killing that lacks all but<br />
the most attenuated guilty intent, recklessness.<br />
Most societies consider murder to be an extremely serious crime, and thus believe that<br />
the person charged should receive harsh punishments for the purposes of retribution,<br />
deterrence, rehabilitation, or incapacitation.<br />
<strong>In</strong> most countries, a person convicted of murder generally faces a long-term prison<br />
sentence, possibly a life sentence; and in a few, the death penalty may be imposed.<br />
Etymology<br />
<strong>The</strong> modern English word "murder" descends from the Proto-<strong>In</strong>do-European "mrtró"<br />
which meant "to die". <strong>The</strong> Middle English mordre is a noun from Anglo-Saxon morðor<br />
and Old French murdre. Middle English mordre is a verb from Anglo-Saxon myrdrian<br />
and the Middle English noun.<br />
Page 201 of 372
Definition<br />
<strong>The</strong> eighteenth-century English jurist William Blackstone (citing Edward Coke), in his<br />
Commentaries on the Laws of England set out the common law definition of murder,<br />
which by this definition occurs when a person, of sound memory and discretion,<br />
unlawfully kills any reasonable creature in being and under the king's peace, with malice<br />
aforethought, either express or implied.<br />
<strong>The</strong> elements of common law murder are:<br />
1. Unlawful<br />
2. Killing<br />
3. Through Criminal Act or Omission<br />
4. of a Human<br />
5. by another Human<br />
6. with Malice Aforethought.<br />
<strong>The</strong> Unlawful – This distinguishes murder from killings that are done within the boundaries of law,<br />
such as capital punishment, justified self-defense, or the killing of enemy combatants by lawful<br />
combatants as well as causing collateral damage to non-combatants during a war.<br />
Killing – At common law life ended with cardiopulmonary arrest – the total and irreversible cessation<br />
of blood circulation and respiration. With advances in medical technology courts have adopted<br />
irreversible cessation of all brain function as marking the end of life.<br />
Сriminal Act or Omission – Killing can be committed by an act or an omission.<br />
of a Human – This element presents the issue of when life begins. At common law, a fetus was not a<br />
human being. Life began when the fetus passed through the vagina and took its first breath.<br />
by another Human – <strong>In</strong> early common law, suicide was considered murder. <strong>The</strong> requirement that the<br />
person killed be someone other than the perpetrator excluded suicide from the definition of murder.<br />
with Malice Aforethought – Originally malice aforethought carried its everyday meaning – a<br />
deliberate and premeditated (prior intent) killing of another motivated by ill will. Murder necessarily<br />
required that an appreciable time pass between the formation and execution of the intent to kill. <strong>The</strong><br />
courts broadened the scope of murder by eliminating the requirement of actual premeditation and<br />
deliberation as well as true malice. All that was required for malice aforethought to exist is that the<br />
perpetrator act with one of the four states of mind that constitutes "malice".<br />
<strong>The</strong> four states of mind recognized as constituting "malice" are:<br />
i. <strong>In</strong>tent to kill,<br />
ii. <strong>In</strong>tent to inflict grievous bodily harm short of death,<br />
iii. Reckless indifference to an unjustifiably high risk to human life (sometimes<br />
described as an "abandoned and malignant heart"), or<br />
iv. <strong>In</strong>tent to commit a dangerous felony (the "felony murder" doctrine).<br />
Under state of mind (i), intent to kill, the deadly weapon rule applies. Thus, if the<br />
defendant intentionally uses a deadly weapon or instrument against the victim, such use<br />
Page 202 of 372
authorizes a permissive inference of intent to kill. <strong>In</strong> other words, "intent follows the<br />
bullet". Examples of deadly weapons and instruments include but are not limited to<br />
guns, knives, deadly toxins or chemicals or gases and even vehicles when intentionally<br />
used to harm one or more victims.<br />
Under state of mind (iii), an "abandoned and malignant heart", the killing must result<br />
from the defendant's conduct involving a reckless indifference to human life and a<br />
conscious disregard of an unreasonable risk of death or serious bodily injury. <strong>In</strong><br />
Australian jurisdictions, the unreasonable risk must amount to a foreseen probability of<br />
death (or grievous bodily harm in most states), as opposed to possibility.<br />
Under state of mind (iv), the felony-murder doctrine, the felony committed must be an<br />
inherently dangerous felony, such as burglary, arson, rape, robbery or kidnapping.<br />
Importantly, the underlying felony cannot be a lesser included offense such as assault,<br />
otherwise all criminal homicides would be murder as all are felonies.<br />
As with most legal terms, the precise definition of murder varies between jurisdictions<br />
and is usually codified in some form of legislation. Even when the legal distinction<br />
between murder and manslaughter is clear, it is not unknown for a jury to find a murder<br />
defendant guilty of the lesser offence.<br />
<strong>The</strong> jury might sympathize with the defendant (e.g. in a crime of passion, or in the case<br />
of a bullied victim who kills their tormentor), and the jury may wish to protect the<br />
defendant from a sentence of life imprisonment or execution.<br />
Page 203 of 372
Degrees of Murder<br />
"Murder in the second degree" redirects here. For the 2016 album, see Murder in the<br />
Second Degree.<br />
Many jurisdictions divide murder by degrees. <strong>The</strong> distinction between first- and seconddegree<br />
murder exists, for example, in Canadian murder law and U.S. murder law.<br />
<strong>The</strong> most common division is between first- and second-degree murder. Generally,<br />
second-degree murder is common law murder, and first-degree is an aggravated form.<br />
<strong>The</strong> aggravating factors of first-degree murder depend on the jurisdiction, but may<br />
include a specific intent to kill, premeditation, or deliberation. <strong>In</strong> some, murder<br />
committed by acts such as strangulation, poisoning, or lying in wait are also treated as<br />
first-degree murder. A few states in the U.S. further distinguish third-degree murder, but<br />
they differ significantly in which kinds of murders they classify as second-degree versus<br />
third-degree. For example, Minnesota defines third-degree murder as depraved-heart<br />
murder, whereas Florida defines third-degree murder as felony murder (except when<br />
the underlying felony is specifically listed in the definition of first-degree murder).<br />
Some jurisdictions also distinguish premeditated murder. This is the crime of wrongfully<br />
and intentionally causing the death of another human being (also known as murder)<br />
after rationally considering the timing or method of doing so, in order to either increase<br />
the likelihood of success, or to evade detection or apprehension. State laws in the<br />
United States vary as to definitions of "premeditation". <strong>In</strong> some states, premeditation<br />
may be construed as taking place mere seconds before the murder. Premeditated<br />
murder is one of the most serious forms of homicide, and is punished more severely<br />
than manslaughter or other types of murder, often with a life sentence without the<br />
possibility of parole, or in some countries, the death penalty. <strong>In</strong> the U.S, federal law (18<br />
U.S.C. § 1111(a)) criminalizes premeditated murder, felony murder and second-degree<br />
murder committed under situations where federal jurisdiction applies. <strong>In</strong> Canada, the<br />
Criminal Code classifies murder as either 1st- or 2nd-degree. <strong>The</strong> former type of murder<br />
is often called premeditated murder, although premeditation is not the only way murder<br />
can be classified as first-degree.<br />
Common Law<br />
According to Blackstone, English common law identified murder as a public wrong.<br />
According to common law, murder is considered to be malum in se, that is an act which<br />
is evil within itself. An act such as murder is wrong or evil by its very nature. And it is the<br />
very nature of the act which does not require any specific detailing or definition in the<br />
law to consider murder a crime.<br />
Some jurisdictions still take a common law view of murder. <strong>In</strong> such jurisdictions, what is<br />
considered to be murder is defined by precedent case law or previous decisions of the<br />
courts of law. However, although the common law is by nature flexible and adaptable, in<br />
the interests both of certainty and of securing convictions, most common law<br />
Page 204 of 372
jurisdictions have codified their criminal law and now have statutory definitions of<br />
murder.<br />
General<br />
Exclusions<br />
Although laws vary by country, there are circumstances of exclusion that are common in<br />
many legal systems.<br />
<br />
Killing of Enemy Combatants who have not surrendered by lawful combatants,<br />
in accordance with lawful orders in war, is also generally not considered murder;<br />
although illicit killings within a war may constitute murder or homicidal war<br />
crimes. (see the Laws of war article)<br />
<br />
<br />
Self-Defense: acting in self-defense or in defense of another person is generally<br />
accepted as legal justification for killing a person in situations that would<br />
otherwise have been murder. However, a self-defense killing might be<br />
considered manslaughter if the killer established control of the situation before<br />
the killing took place. <strong>In</strong> the case of self-defense it is called a "justifiable<br />
homicide".<br />
Unlawful killings without malice or intent are considered manslaughter.<br />
Page 205 of 372
<strong>In</strong> many common law countries, provocation is a partial defense to a charge of<br />
murder which acts by converting what would otherwise have been murder into<br />
manslaughter (this is voluntary manslaughter, which is more severe than<br />
involuntary manslaughter).<br />
Accidental killings are considered homicides. Depending on the circumstances,<br />
these may or may not be considered criminal offenses; they are often considered<br />
manslaughter.<br />
Suicide does not constitute murder in most societies. Assisting a suicide,<br />
however, may be considered murder in some circumstances.<br />
Specific to Certain Countries<br />
<br />
<br />
<br />
<br />
Capital Punishment: some countries practice the death penalty. Capital<br />
punishment may be ordered by a legitimate court of law as the result of a<br />
conviction in a criminal trial with due process for a serious crime. <strong>The</strong> 47 Member<br />
States of the Council of Europe are prohibited from using the death penalty.<br />
Euthanasia, doctor-assisted suicide: the administration of lethal drugs by a<br />
doctor to a terminally ill patient, if the intention is solely to alleviate pain, in many<br />
jurisdictions it is seen as a special case (see the doctrine of double effect and the<br />
case of Dr John Bodkin Adams).<br />
Killing to Prevent <strong>The</strong> <strong>The</strong>ft of One's Property may be legal, depending on the<br />
jurisdiction. <strong>In</strong> 2013, a jury in south Texas acquitted a man who killed a prostitute<br />
who attempted to run away with his money.<br />
Killing an <strong>In</strong>truder who is found by an owner to be in the owner's home (having<br />
entered unlawfully): legal in most US states (see Castle doctrine).<br />
Killing to Prevent Specific Forms of Aggravated Rape or Sexual Assault –<br />
killing of attacker by the potential victim or by witnesses to the scene; legal in<br />
parts of the US and in various other countries.<br />
<br />
<br />
<strong>In</strong> Pakistan, the killing of a woman or girl in specific circumstances (e.g., when<br />
she commits adultery and is killed by her husband or other family members,<br />
known as honor killing) is not considered murder.<br />
<strong>In</strong> the United States, in some states and in federal jurisdiction, a killing by a<br />
police officer is excluded from prosecution if the officer believes they are being<br />
threatened with deadly force by the victim. This may include such actions by the<br />
victim as reaching into a glove compartment or pocket for license and<br />
registration, if the officer thinks that the victim might be reaching for a gun.<br />
Page 206 of 372
Space jurisdiction is similar to that of international waters. <strong>The</strong>refore, a murder<br />
committed in outer space is subject to jurisdiction in the country that owns the<br />
space craft in which the killing transpired. <strong>In</strong> the event the murder occurred on an<br />
extraterrestrial planet (e.g. <strong>The</strong> Moon), no country can own land of any other<br />
planet so the killer is bound by the laws of the country in which they originate.<br />
This also applies to the ISS per agreement signed by all countries that have<br />
worked on the station so all astronauts are covered by extraterritorial jurisdiction.<br />
Victim<br />
All jurisdictions require that the victim be a natural person; that is, a human being who<br />
was still alive before being murdered. <strong>In</strong> other words, under the law one cannot murder<br />
a corpse, a corporation, a non-human animal, or any other non-human organism such<br />
as a plant or bacterium.<br />
California's murder statute, Penal Code Section 187, was interpreted by the Supreme<br />
Court of California in 1994 as not requiring any proof of the viability of the fetus as a<br />
prerequisite to a murder conviction. This holding has two implications. <strong>The</strong> first is a<br />
defendant in California can be convicted of murder for killing a fetus which the mother<br />
herself could have terminated without committing a crime. <strong>The</strong> second, as stated by<br />
Justice Stanley Mosk in his dissent, is that because women carrying nonviable fetuses<br />
may not be visibly pregnant, it may be possible for a defendant to be convicted of<br />
intentionally murdering a person they did not know existed.<br />
Mitigating Circumstances<br />
Some countries allow conditions that "affect the balance of the mind" to be regarded as<br />
mitigating circumstances. This means that a person may be found guilty of<br />
"manslaughter" on the basis of "diminished responsibility" rather than being found guilty<br />
of murder, if it can be proved that the killer was suffering from a condition that affected<br />
their judgment at the time. Depression, post-traumatic stress disorder and medication<br />
Page 207 of 372
side-effects are examples of conditions that may be taken into account when assessing<br />
responsibility.<br />
<strong>In</strong>sanity<br />
Mental disorder may apply to a wide range of disorders including psychosis caused by<br />
schizophrenia and dementia, and excuse the person from the need to undergo the<br />
stress of a trial as to liability. Usually, sociopathy and other personality disorders are not<br />
legally considered insanity, because of the belief they are the result of free will in many<br />
societies. <strong>In</strong> some jurisdictions, following the pre-trial hearing to determine the extent of<br />
the disorder, the defense of "not guilty by reason of insanity" may be used to get a not<br />
guilty verdict. This defense has two elements:<br />
1. That the defendant had a serious mental illness, disease, or defect.<br />
2. That the defendant's mental condition, at the time of the killing, rendered the<br />
perpetrator unable to determine right from wrong, or that what they were doing<br />
was wrong.<br />
Under <strong>New</strong> York law, for example:<br />
§ 40.15 Mental disease or defect. <strong>In</strong> any prosecution for an offense, it is an affirmative defense<br />
that when the defendant engaged in the proscribed conduct, he lacked criminal responsibility by<br />
reason of mental disease or defect. Such lack of criminal responsibility means that at the time of<br />
such conduct, as a result of mental disease or defect, he lacked substantial capacity to know or<br />
appreciate either: 1. <strong>The</strong> nature and consequences of such conduct; or 2. That such conduct was<br />
wrong.<br />
— N.Y. Penal Law, § 40.15<br />
Under the French Penal Code:<br />
Article 122-1<br />
A person is not criminally liable who, when the act was committed, was suffering<br />
from a psychological or neuropsychological disorder which destroyed his<br />
discernment or his ability to control his actions.<br />
<br />
A person who, at the time he acted, was suffering from a psychological or<br />
neuropsychological disorder which reduced his discernment or impeded his<br />
ability to control his actions, remains punishable; however, the court shall take<br />
this into account when it decides the penalty and determines its regime.<br />
Those who successfully argue a defense based on a mental disorder are usually<br />
referred to mandatory clinical treatment until they are certified safe to be released back<br />
into the community, rather than prison. A criminal defendant is often presented with the<br />
option of pleading "not guilty by reason of insanity". Thus, a finding of insanity results in<br />
a not-guilty verdict, although the defendant is placed in a state treatment facility where<br />
they could be kept for years or even decades.<br />
Page 208 of 372
Postpartum Depression<br />
Postpartum depression (also known as post-natal depression) is recognized in some<br />
countries as a mitigating factor in cases of infanticide. According to Dr. Susan<br />
Friedman, "Two dozen nations have infanticide laws that decrease the penalty for<br />
mothers who kill their children of up to one year of age. <strong>The</strong> United States does not<br />
have such a law, but mentally ill mothers may plead not guilty by reason of insanity." <strong>In</strong><br />
the law of the Republic of Ireland, infanticide was made a separate crime from murder in<br />
1949, applicable for the mother of a baby under one year old where "the balance of her<br />
mind was disturbed by reason of her not having fully recovered from the effect of giving<br />
birth to the child or by reason of the effect of lactation consequent upon the birth of the<br />
child". Since independence, death sentences for murder in such cases had always been<br />
Page 209 of 372
commuted; the new act was intended "to eliminate all the terrible ritual of the black cap<br />
and the solemn words of the judge pronouncing sentence of death in those cases ...<br />
where it is clear to the Court and to everybody, except perhaps the unfortunate<br />
accused, that the sentence will never be carried out." <strong>In</strong> Russia, murder of a newborn<br />
child by the mother has been separate crime since 1996.<br />
Unintentional<br />
For a killing to be considered murder in nine out of fifty states in the US, there normally<br />
needs to be an element of intent. A defendant may argue that they took precautions not<br />
to kill, that the death could not have been anticipated, or was unavoidable. As a general<br />
rule, manslaughter constitutes reckless killing, but manslaughter also includes criminally<br />
negligent (i.e. grossly negligent) homicide. Unintentional killing that results from an<br />
involuntary action generally cannot constitute murder. After examining the evidence, a<br />
judge or jury (depending on the jurisdiction) would determine whether the killing was<br />
intentional or unintentional.<br />
Diminished Capacity<br />
<strong>In</strong> those jurisdictions using the Uniform Penal Code, such as California, diminished<br />
capacity may be a defense. For example, Dan White used this defense to obtain a<br />
manslaughter conviction, instead of murder, in the assassination of Mayor George<br />
Moscone and Supervisor Harvey Milk. Afterward, California amended its penal code to<br />
provide "As a matter of public policy there shall be no defense of diminished capacity,<br />
diminished responsibility, or irresistible impulse in a criminal action...."<br />
Aggravating Circumstances<br />
Murder with specified aggravating circumstances is often punished more harshly.<br />
Depending on the jurisdiction, such circumstances may include:<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Premeditation<br />
Poisoning<br />
Murder of a child<br />
Murder of a police officer, judge, firefighter or witness to a crime<br />
Murder of a pregnant woman<br />
<strong>Crime</strong> committed for pay or other reward, such as contract killing<br />
Exceptional brutality or cruelty<br />
Methods which are dangerous to the public, e.g. explosion, arson, shooting in a<br />
crowd etc.<br />
Murder for a political cause<br />
Murder committed in order to conceal another crime or facilitate its commission.<br />
Hate crimes, which occur when a perpetrator targets a victim because of their<br />
perceived membership in a certain social group.<br />
Treachery (e.g. Heimtücke in German law)<br />
Page 210 of 372
<strong>In</strong> the United States and Canada, these murders are referred to as first-degree or<br />
aggravated murders. Murder, under English criminal law, always carries a mandatory<br />
life sentence, but is not classified into degrees. Penalties for murder committed under<br />
aggravating circumstances are often higher, under English law, than the 15-year<br />
minimum non-parole period that otherwise serves as a starting point for a murder<br />
committed by an adult.<br />
Felony Murder Rule<br />
A legal doctrine in some common law jurisdictions broadens the crime of murder: when<br />
an offender kills in the commission of a dangerous crime, (regardless of intent), he/she<br />
is guilty of murder. <strong>The</strong> felony murder rule is often justified by its supporters as a means<br />
of deterring dangerous felonies, but the case of Ryan Holle shows it can be used very<br />
widely.<br />
Year-And-A-Day Rule<br />
<strong>In</strong> some common law jurisdictions, a defendant accused of murder is not guilty if the<br />
victim survives for longer than one year and one day after the attack. This reflects the<br />
likelihood that if the victim dies, other factors will have contributed to the cause of death,<br />
breaking the chain of causation; and also means that the responsible person does not<br />
have a charge of murder "hanging over their head indefinitely". Subject to any statute of<br />
Page 211 of 372
limitations, the accused could still be charged with an offence reflecting the seriousness<br />
of the initial assault.<br />
With advances in modern medicine, most countries have abandoned a fixed time period<br />
and test causation on the facts of the case. This is known as "delayed death" and cases<br />
where this was applied or was attempted to be applied go back to at least 1966.<br />
<strong>In</strong> England and Wales, the "year-and-a-day rule" was abolished by the Law Reform<br />
(Year and a Day Rule) Act 1996. However, if death occurs three years or more after the<br />
original attack then prosecution can take place only with the Attorney-General's<br />
approval.<br />
<strong>In</strong> the United States, many jurisdictions have abolished the rule as well. Abolition of the<br />
rule has been accomplished by enactment of statutory criminal codes, which had the<br />
effect of displacing the common-law definitions of crimes and corresponding defenses.<br />
<strong>In</strong> 2001 the Supreme Court of the United States held that retroactive application of a<br />
state supreme court decision abolishing the year-and-a-day rule did not violate the Ex<br />
Post Facto Clause of Article I of the United States Constitution.<br />
<strong>The</strong> potential effect of fully abolishing the rule can be seen in the case of 74-year-old<br />
William Barnes, charged with the murder of a Philadelphia police officer Walter Barkley,<br />
who he'd shot nearly 41 years before. Barnes had served 16 years in prison for<br />
attempting to murder Barkley, but when the policeman died on August 19, 2007, this<br />
was alleged to be from complications of the wounds suffered from the shooting - and<br />
Barnes was charged with his murder. He was acquitted on May 24, 2010.<br />
Murder and Natural Selection<br />
Martin Daly and Margo Wilson of McMaster University have claimed that several<br />
aspects of homicides, including the genetic relations or proximity between murderers<br />
and their victims, (as in the Cinderella effect), can often be explained by the evolution<br />
theory or evolutionary psychology.<br />
Historical and Religious Attitudes<br />
<strong>In</strong> the Abrahamic religions, the first ever murder was committed by Cain against his<br />
brother Abel out of jealousy. <strong>In</strong> the past, certain types of homicide were lawful and<br />
justified. Georg Oesterdiekhoff wrote:<br />
Evans-Pritchard says about the Nuer from Sudan: "Homicide is not forbidden, and Nuer do not<br />
think it wrong to kill a man in fair fight. On the contrary, a man who slays another in combat is<br />
admired for his courage and skill." (Evans-Pritchard 1956: 195) This statement is true for most<br />
African tribes, for pre-modern Europeans, for <strong>In</strong>digenous Australians, and for Native Americans,<br />
according to ethnographic reports from all over the world. ... Homicides rise to incredible numbers<br />
among headhunter cultures such as the Papua. When a boy is born, the father has to kill a man.<br />
He needs a name for his child and can receive it only by a man, he himself has murdered. When<br />
a man wants to marry, he must kill a man. When a man dies, his family again has to kill a man.<br />
Page 212 of 372
<strong>In</strong> many such societies the redress was not via a legal system, but by blood revenge,<br />
although there might also be a form of payment that could be made instead—such as<br />
the weregild which in early Germanic society could be paid to the victim's family in lieu<br />
of their right of revenge.<br />
One of the oldest-known prohibitions against murder appears in the Sumerian Code of<br />
Ur-Nammu written sometime between 2100 and 2050 BC. <strong>The</strong> code states, "If a man<br />
commits a murder, that man must be killed."<br />
<strong>In</strong> Judeo-Christian traditions, the<br />
prohibition against murder is one of<br />
the Ten Commandments given by<br />
God to Moses in (Exodus: 20v13)<br />
and (Deuteronomy 5v17). <strong>The</strong><br />
Vulgate and subsequent early<br />
English translations of the Bible<br />
used the term secretly killeth his<br />
neighbor or smiteth his neighbor<br />
secretly rather than murder for the<br />
Latin clam percusserit proximum.<br />
Later editions such as Young's Literal Translation and the World English Bible have<br />
translated the Latin occides simply as murder rather than the alternatives of kill,<br />
assassinate, fall upon, or slay.<br />
<strong>In</strong> Islam according to the Qur'an, one of the greatest sins is to kill a human being who<br />
has committed no fault. "For that cause We decreed for the Children of Israel that<br />
whosoever killeth a human being for other than manslaughter or corruption in the earth,<br />
it shall be as if he had killed all mankind, and whoso saveth the life of one, it shall be as<br />
if he had saved the life of all mankind." "And those who cry not unto any other god along<br />
with Allah, nor take the life which Allah hath forbidden save in (course of) justice, nor<br />
commit adultery – and whoso doeth this shall pay the penalty."<br />
<strong>The</strong> term assassin derives from Hashshashin, a militant Ismaili Shi'ite sect, active from<br />
the 8th to 14th centuries. This mystic secret society killed members of the Abbasid,<br />
Fatimid, Seljuq and Crusader elite for political and religious reasons. <strong>The</strong> Thuggee cult<br />
that plagued <strong>In</strong>dia was devoted to Kali, the goddess of death and destruction. According<br />
to some estimates the Thuggees murdered 1 million people between 1740 and 1840.<br />
<strong>The</strong> Aztecs believed that without regular offerings of blood the sun god Huitzilopochtli<br />
would withdraw his support for them and destroy the world as they knew it. According to<br />
Ross Hassig, author of Aztec Warfare, "between 10,000 and 80,400 persons" were<br />
sacrificed in the 1487 re-consecration of the Great Pyramid of Tenochtitlan.<br />
Southern slave codes did make willful killing of a slave illegal in most cases. For<br />
example, the 1860 Mississippi case of Oliver v. State charged the defendant with<br />
murdering his own slave. <strong>In</strong> 1811, the wealthy white planter Arthur Hodge was hanged<br />
for murdering several of his slaves on his plantation in the British West <strong>In</strong>dies.<br />
Page 213 of 372
<strong>In</strong> Corsica, vendetta was a social code that required Corsicans to kill anyone who<br />
wronged their family honor. Between 1821 and 1852, no fewer than 4,300 murders were<br />
perpetrated in Corsica.<br />
<strong>In</strong>cidence<br />
<strong>The</strong> World Health Organization reported in October 2002 that a person is murdered<br />
every 60 seconds. An estimated 520,000 people were murdered in 2000 around the<br />
globe. Another study estimated the worldwide murder rate at 456,300 in 2010 with a<br />
35% increase since 1990. Two-fifths of them were young people between the ages of<br />
10 and 29 who were killed by other young people. Because murder is the least likely<br />
crime to go unreported, statistics of murder are seen as a bellwether of overall crime<br />
rates.<br />
Murder rates vary greatly among countries and societies around the world. <strong>In</strong> the<br />
Western world, murder rates in most countries have declined significantly during the<br />
20th century and are now between 1 and 4 cases per 100,000 people per year.<br />
Murder Rates by Country<br />
Murder rates in jurisdictions such as Japan, Singapore, Hong Kong, Iceland, Sweden,<br />
Switzerland, Italy, Spain and Germany are among the lowest in the world, around 0.3–1<br />
cases per 100,000 people per year; the rate of the United States is among the highest<br />
of developed countries, around 4.5 in 2014, with rates in larger cities sometimes over 40<br />
per 100,000. <strong>The</strong> top ten highest murder rates are in Honduras (91.6 per 100,000), El<br />
Salvador, Ivory Coast, Venezuela, Belize, Jamaica, U.S. Virgin Islands, Guatemala,<br />
Saint Kitts and Nevis and Zambia. (UNODC, 2011 – full table here).<br />
<strong>The</strong> following absolute murder counts per-country are not comparable because they are<br />
not adjusted by each country's total population. Nonetheless, they are included here for<br />
reference, with 2010 used as the base year (they may or may not include justifiable<br />
homicide, depending on the jurisdiction). <strong>The</strong>re were 52,260 murders in Brazil,<br />
consecutively elevating the record set in 2009. Over half a million people were shot to<br />
death in Brazil between 1979 and 2003. 33,335 murder cases were registered across<br />
<strong>In</strong>dia, about 19,000 murders committed in Russia, approximately 17,000 murders in<br />
Colombia (the murder rate was 38 per 100,000 people, in 2008 murders went down to<br />
15,000), approximately 16,000 murders in South Africa, approximately 15,000 murders<br />
in the United States, approximately 26,000 murders in Mexico, approximately 13,000<br />
murders in Venezuela, approximately 4,000 murders in El Salvador, approximately<br />
1,400 murders in Jamaica, approximately 550 murders in Canada and approximately<br />
470 murders in Trinidad and Tobago. Pakistan reported 12,580 murders.<br />
<strong>In</strong> the United States, 666,160 people were killed between 1960 and 1996.<br />
Approximately 90% of murders in the US are committed by males. Between 1976 and<br />
2005, 23.5% of all murder victims and 64.8% of victims murdered by intimate partners<br />
Page 214 of 372
were female. For women in the US, homicide is the leading cause of death in the<br />
workplace.<br />
<strong>In</strong> the US, murder is the leading cause of death for African American males aged 15 to<br />
34. Between 1976 and 2008, African Americans were victims of 329,825 homicides. <strong>In</strong><br />
2006, Federal Bureau of <strong>In</strong>vestigation's Supplementary Homicide Report indicated that<br />
nearly half of the 14,990 murder victims that year were Black (7421). <strong>In</strong> the year 2007,<br />
there were 3,221 black victims and 3,587 white victims of non-negligent homicides.<br />
While 2,905 of the black victims were killed by a black offender, 2,918 of the white<br />
victims were killed by white offenders. <strong>The</strong>re were 566 white victims of black offenders<br />
and 245 black victims of white offenders. <strong>The</strong> "white" category in the Uniform <strong>Crime</strong><br />
Reports (UCR) includes non-black Hispanics. <strong>In</strong> London in 2006, 75% of the victims of<br />
gun crime and 79% of the suspects were "from the African/Caribbean community".<br />
Murder demographics are affected by the improvement of trauma care, which has<br />
resulted in reduced lethality of violent assaults – thus the murder rate may not<br />
necessarily indicate the overall level of social violence.<br />
Page 215 of 372
Workplace homicide, which tripled during the 1980s, is the fastest growing category of<br />
murder in America.<br />
Development of murder rates over time in different countries is often used by both<br />
supporters and opponents of capital punishment and gun control. Using properly filtered<br />
data, it is possible to make the case for or against either of these issues. For example,<br />
one could look at murder rates in the United States from 1950 to 2000, and notice that<br />
those rates went up sharply shortly after a moratorium on death sentences was<br />
effectively imposed in the late 1960s. This fact has been used to argue that capital<br />
punishment serves as a deterrent and, as such, it is morally justified. Capital<br />
punishment opponents frequently counter that the United States has much higher<br />
murder rates than Canada and most European Union countries, although all those<br />
countries have abolished the death penalty. Overall, the global pattern is too complex,<br />
and on average, the influence of both these factors may not be significant and could be<br />
more social, economic, and cultural.<br />
Despite the immense improvements in forensics in the past few decades, the fraction of<br />
murders solved has decreased in the United States, from 90% in 1960 to 61% in 2007.<br />
Solved murder rates in major U.S. cities varied in 2007 from 36% in Boston,<br />
Massachusetts to 76% in San Jose, California. Major factors affecting the arrest rate<br />
include witness cooperation [118] and the number of people assigned to investigate the<br />
case.<br />
History of Murder Rates<br />
According to scholar Pieter Spierenburg homicide rates per 100,000 in Europe have<br />
fallen over the centuries, from 35 per 100,000 in medieval times, to 20 in 1500 AD, 5 in<br />
1700, to below two per 100,000 in 1900.<br />
<strong>In</strong> the United States, murder rates have been higher and have fluctuated. <strong>The</strong>y fell<br />
below 2 per 100,000 by 1900, rose during the first half of the century, dropped in the<br />
years following World War II, and bottomed out at 4.0 in 1957 before rising again. <strong>The</strong><br />
rate stayed in 9 to 10 range most of the period from 1972 to 1994, before falling to 5 in<br />
present times. <strong>The</strong> increase since 1957 would have been even greater if not for the<br />
significant improvements in medical techniques and emergency response times, which<br />
mean that more and more attempted homicide victims survive. According to one<br />
estimate, if the lethality levels of criminal assaults of 1964 still applied in 1993, the<br />
country would have seen the murder rate of around 26 per 100,000, almost triple the<br />
actually observed rate of 9.5 per 100,000.<br />
A similar, but less pronounced pattern has been seen in major European countries as<br />
well. <strong>The</strong> murder rate in the United Kingdom fell to 1 per 100,000 by the beginning of<br />
the 20th century and as low as 0.62 per 100,000 in 1960, and was at 1.28 per 100,000<br />
as of 2009. <strong>The</strong> murder rate in France (excluding Corsica) bottomed out after World<br />
War II at less than 0.4 per 100,000, quadrupling to 1.6 per 100,000 since then.<br />
Page 216 of 372
<strong>The</strong> specific factors driving this dynamics in murder rates are complex and not<br />
universally agreed upon. Much of the raise in the U.S. murder rate during the first half of<br />
the 20th century is generally thought to be attributed to gang violence associated with<br />
Prohibition. Since most murders are committed by young males, the near simultaneous<br />
low in the murder rates of major developed countries circa 1960 can be attributed to low<br />
birth rates during the Great Depression and World War II. Causes of further moves are<br />
more controversial. Some of the more exotic factors claimed to affect murder rates<br />
include the availability of abortion and the likelihood of chronic exposure to lead during<br />
childhood (due to the use of leaded paint in houses and tetraethyllead as a gasoline<br />
additive in internal combustion engines).<br />
Use of <strong>The</strong> Term<br />
<strong>In</strong> many countries, in news reports,<br />
journalists are typically careful not to call a<br />
killing a murder until the perpetrator is<br />
convicted of such. After arrest, journalists<br />
write that the person was "arrested on<br />
suspicion of murder". When a prosecutor<br />
files charges, the accused is referred to as<br />
an "accused murderer".<br />
Page 217 of 372
Page 218 of 372
XV. Prostitution<br />
Prostitution is the business or practice of engaging in sexual activity in exchange for<br />
payment. Prostitution is sometimes described as sexual services, commercial sex or,<br />
colloquially, hooking. It is sometimes referred to euphemistically as "the world's oldest<br />
profession" in the English-speaking world. A person who works in this field is called a<br />
prostitute, and is a type of sex worker.<br />
Prostitution occurs in a variety of forms, and its legal status varies from country to<br />
country (sometimes from region to region within a given country), ranging from being<br />
permissible but unregulated, to an enforced or unenforced crime, or a regulated<br />
profession. It is one branch of the sex industry, along with pornography, stripping, and<br />
erotic dancing. Brothels are establishments specifically dedicated to prostitution. <strong>In</strong><br />
escort prostitution, the act may take place at the client's residence or hotel room<br />
(referred to as out-call), or at the escort's residence or a hotel room rented for the<br />
occasion by the escort (in-call). Another form is street prostitution. Although the majority<br />
of prostitutes are female and have male clients, a prostitute can be, and have clients of,<br />
any gender or sexual orientation.<br />
Page 219 of 372
<strong>The</strong>re are about 42 million prostitutes in the world, living all over the world (though most<br />
of Central Asia, the Middle East and Africa lacks data, studied countries in that large<br />
region rank as top sex tourism destinations). Estimates place the annual revenue<br />
generated by prostitution worldwide to be over $100 billion.<br />
Some view prostitution as a form of exploitation of or violence against women, and<br />
children, that helps to create a supply of victims for human trafficking. Some critics of<br />
prostitution as an institution are supporters of the Swedish approach, which<br />
decriminalizes the act of selling sex, but makes the purchase of sex illegal. This<br />
approach has also been adopted by Canada, Iceland, the Republic of Ireland, Northern<br />
Ireland, Norway, and France.<br />
Etymology and terminology<br />
Prostitute is derived from the Latin prostituta. Some sources cite the verb as a<br />
composition of "pro" meaning "up front" or "forward" and "stituere", defined as "to offer<br />
up for sale". Another explanation is that prostituta is a composition of pro and statuere<br />
(to cause to stand, to station, place erect). A literal translation therefore is: "to put up<br />
front for sale" or "to place forward". <strong>The</strong> Online Etymology Dictionary states, "<strong>The</strong> notion<br />
of 'sex for hire' is not inherent in the etymology, which rather suggests one 'exposed to<br />
lust' or sex 'indiscriminately offered.'"<br />
<strong>The</strong> word prostitute was then carried down through various languages to the presentday<br />
Western society. Most sex worker activists groups reject the word prostitute and<br />
since the late 1970s have used the term sex worker instead. However, sex worker can<br />
also mean anyone who works within the sex industry or whose work is of a sexual<br />
nature and is not limited solely to prostitutes.<br />
A variety of terms are used for those who engage in prostitution, some of which<br />
distinguish between different types of prostitution or imply a value judgment about them.<br />
Common alternatives for prostitute include escort and whore; however, not all<br />
professional escorts are prostitutes.<br />
<strong>The</strong> English word whore derives from the Old English word hōra, from the Proto-<br />
Germanic *hōrōn (prostitute), which derives from the Proto-<strong>In</strong>do-European root *keh₂meaning<br />
"desire", a root which has also given us Latin cārus (dear), whence the French<br />
cher (dear, expensive) and the Latin cāritās (love, charity). Use of the word whore is<br />
widely considered pejorative, especially in its modern slang form of ho. <strong>In</strong> Germany,<br />
however, most prostitutes' organizations deliberately use the word Hure (whore) since<br />
they feel that prostitute is a bureaucratic term. Those seeking to remove the social<br />
stigma associated with prostitution often promote terminology such as sex worker,<br />
commercial sex worker (CSW) or sex trade worker. Another commonly used word for a<br />
prostitute is hooker. Although a popular etymology connects "hooker" with Joseph<br />
Hooker, a Union general in the American Civil War, the word more likely comes from the<br />
concentration of prostitutes around the shipyards and ferry terminal of the Corlear's<br />
Hook area of Manhattan in the 1820s, who came to be referred to as "hookers". A<br />
Page 220 of 372
streetwalker solicits customers on the streets or in public places, while a call girl makes<br />
appointments by phone, or in recent years, through email or the internet.<br />
Correctly or not, use of the word prostitute without specifying a sex may commonly be<br />
assumed to be female; compound terms such as male prostitution or male escort are<br />
therefore often used to identify males. Those offering services to female customers are<br />
commonly known as gigolos; those offering services to male customers are hustlers or<br />
rent boys.<br />
Procuring<br />
Organizers of prostitution may be known as pimps (if male) and madams or Mama-san<br />
(if female). More formally, one who is said to practice procuring is a procurer, or<br />
procuress.<br />
Clients<br />
Clients of prostitutes, most often men by prevalence, are sometimes known as johns or<br />
tricks in North America and punters in the British Isles. <strong>The</strong>se slang terms are used<br />
among both prostitutes and law enforcement for persons who solicit prostitutes. <strong>The</strong><br />
term john may have originated from the frequent customer practice of giving one's name<br />
Page 221 of 372
as "John", a common name in English-speaking countries, in an effort to maintain<br />
anonymity. <strong>In</strong> some places, men who drive around red-light districts for the purpose of<br />
soliciting prostitutes are also known as kerb crawlers.<br />
Female clients of prostitutes are sometimes referred to as janes or sugar mamas.<br />
Other Meanings<br />
<strong>The</strong> word "prostitution" can also be used metaphorically to mean debasing oneself or<br />
working towards an unworthy cause or "selling out". <strong>In</strong> this sense, "prostituting oneself"<br />
or "whoring oneself" the services or acts performed are typically not sexual. For<br />
instance, in the book <strong>The</strong> Catcher in the Rye, Holden Caulfield says of his brother<br />
("D.B."): "Now he's out in Hollywood, D.B., being a prostitute. If there's one thing I hate,<br />
it's the movies. Don't even mention them to me." D.B. is not literally a prostitute; Holden<br />
feels that his job writing B-movie screenplays is morally debasing.<br />
<strong>The</strong> prostitution metaphor, "traditionally used to signify political inconstancy,<br />
unreliability, fickleness, a lack of firm values and integrity, and venality, has long been a<br />
staple of Russian political rhetoric." One of the famous insults of Leon Trotsky made by<br />
Vladimir Lenin was calling him a "political prostitute". Leon Trotsky used this epithet<br />
himself, calling German Social Democracy, at that time "corrupted by Kautskianism", a<br />
"political prostitution disguised by theories".<br />
<strong>In</strong> 1938, he used the same description for the Comintern, saying that the chief aim of<br />
the Bonapartist clique of Stalin during the preceding several years "has consisted in<br />
proving to the imperialist 'democracies' its wise conservatism and love for order. For the<br />
sake of the longed alliance with imperialist democracies [Stalin] has brought the<br />
Comintern to the last stages of political prostitution."<br />
Besides targeting political figures, the term is used in relation to organizations and even<br />
small countries, which "have no choice but to sell themselves", because their voice in<br />
world affairs is insignificant. <strong>In</strong> 2007, a Russian caricature depicted the Baltic states as<br />
three "ladies of the night", "vying for the attentions of Uncle Sam, since the Russian<br />
client has run out of money".<br />
Usage of the "political prostitute" moniker is by no means unique to Russian political<br />
lexicon, such as when a Huffington Post contributor expressed the opinion that Donald<br />
Trump was "prostituting himself to feed his ego and gain power" when he ran for<br />
President of the United States.<br />
Sex work researcher and writer Gail Pheterson writes that these metaphorical usages<br />
exist because "the term "prostitute" gradually took on a Christian moralist tradition, as<br />
being synonymous with debasement of oneself or of others for the purpose of ill-gotten<br />
gains".<br />
Page 222 of 372
History<br />
Ancient Near East<br />
<strong>In</strong> the Ancient Near East along the Tigris–Euphrates river system there were many<br />
shrines and temples or "houses of heaven" dedicated to various deities documented by<br />
the Ancient Greek historian Herodotus in <strong>The</strong> Histories where sacred prostitution was a<br />
common practice. It came to an end when the emperor Constantine in the fourth century<br />
AD destroyed the goddess temples and replaced them with Christianity.<br />
As early as the 18th century BC, ancient Mesopotamia recognized the need to protect<br />
women's property rights. <strong>In</strong> the Code of Hammurabi, provisions were found that<br />
addressed inheritance rights of women, including female prostitutes.<br />
Ancient Hebrew Culture<br />
According to Zohar and the Alphabet of Ben Sira, there were four angels of sacred<br />
prostitution, who mated with archangel Samael. <strong>The</strong>y were the queens of the demons<br />
Lilith, Naamah, Agrat Bat Mahlat and Eisheth Zenunim.<br />
Page 223 of 372
Ancient Greece<br />
Both women and boys engaged in prostitution in ancient Greece. Female prostitutes<br />
could be independent and sometimes influential women. <strong>The</strong>y were required to wear<br />
distinctive dresses and had to pay taxes. Some similarities have been found between<br />
the Greek hetaera, the Japanese oiran, and also the <strong>In</strong>dian tawaif. Some prostitutes in<br />
ancient Greece, such as Lais were as famous for their company as their beauty, and<br />
some of these women charged extraordinary sums for their services.<br />
Ancient Rome<br />
Prostitution in ancient Rome was legal, public, and widespread. A registered prostitute<br />
was called a meretrix while the unregistered one fell under the broad category<br />
prostibulae. <strong>The</strong>re were some commonalities with the Greek system, but as the Empire<br />
grew, prostitutes were often foreign slaves, captured, purchased, or raised for that<br />
purpose, sometimes by large-scale "prostitute farmers" who took abandoned children.<br />
<strong>In</strong>deed, abandoned children were almost always raised as prostitutes. Enslavement into<br />
prostitution was sometimes used as a legal punishment against criminal free women.<br />
Buyers were allowed to inspect naked men and women for sale in private and there was<br />
no stigma attached to the purchase of males by a male aristocrat.<br />
Asia<br />
According to Shia Muslims, Muhammad sanctioned fixed-term marriage—muta'a in Iraq<br />
and sigheh in Iran—which has instead been used as a legitimizing cover for sex<br />
workers, in a culture where prostitution is otherwise forbidden. Sunni Muslims, who<br />
make up the majority of Muslims worldwide, believe the practice of fixed-term marriage<br />
was abrogated and ultimately forbidden by either Muhammad, or one of his successors,<br />
Umar. Sunnis regard prostitution as sinful and forbidden.<br />
<strong>In</strong> the early 17th century, there was widespread male and female prostitution throughout<br />
the cities of Kyoto, Edo, and Osaka, Japan. Oiran were courtesans in Japan during the<br />
Edo period. <strong>The</strong> oiran were considered a type of yūjo ( 遊 女 ) "woman of pleasure" or<br />
prostitute. Among the oiran, the tayū ( 太 夫 ) was considered the highest rank of<br />
courtesan available only to the wealthiest and highest ranking men. To entertain their<br />
clients, oiran practiced the arts of dance, music, poetry, and calligraphy as well as<br />
sexual services, and an educated wit was considered essential for sophisticated<br />
conversation. Many became celebrities of their times outside the pleasure districts.<br />
<strong>The</strong>ir art and fashions often set trends among wealthy women. <strong>The</strong> last recorded oiran<br />
was in 1761. Although illegal in modern Japan, the definition of prostitution does not<br />
extend to a "private agreement" reached between a woman and a man in a brothel.<br />
Yoshiwara has a large number of soaplands that began when explicit prostitution in<br />
Page 224 of 372
Japan became illegal, where women washed men's bodies. <strong>The</strong>y were originally known<br />
as toruko-buro, meaning Turkish bath.<br />
A tawaif was a courtesan who catered to the nobility of the <strong>In</strong>dian subcontinent,<br />
particularly during the era of the Mughal Empire. <strong>The</strong>se courtesans danced, sang,<br />
recited poetry and entertained their suitors at mehfils. Like the geisha tradition in Japan,<br />
their main purpose was to professionally entertain their guests, and while sex was often<br />
incidental, it was not assured contractually. High-class or the most popular tawaifs could<br />
often pick and choose between the best of their suitors. <strong>The</strong>y contributed to music,<br />
dance, theatre, film, and the Urdu literary tradition.<br />
Middle Ages<br />
Throughout the Middle Ages the<br />
definition of a prostitute has been<br />
ambiguous, with various secular<br />
and canonical organizations<br />
defining prostitution in constantly evolving terms. Even though medieval secular<br />
authorities created legislation to deal with the phenomenon of prostitution, they rarely<br />
attempted to define what a prostitute was because it was deemed unnecessary "to<br />
specify exactly who fell into that [specific] category" of a prostitute. <strong>The</strong> first known<br />
definition of prostitution was found in Marseille's thirteenth-century statutes, which<br />
included a chapter entitled De meretricibus ("regarding prostitutes"). <strong>The</strong> Marseillais<br />
designated prostitutes as "public girls" who, day and night, received two or more men in<br />
their house, and as a woman who "did business trading [their bodies], within the<br />
confine[s] of a brothel." A fourteenth-century English tract, Fasciculus Morum, states<br />
that the term prostitute (termed 'meretrix' in this document), "must be applied only to<br />
those women who give themselves to anyone and will refuse none, and that for<br />
monetary gain". <strong>In</strong> general prostitution was not typically a life-time career choice for<br />
women. Women usually alternated their career of prostitution with "petty retailing, and<br />
victualing," or only occasionally turning to prostitution in times of great financial need.<br />
Women who became prostitutes often did not have the familial ties or means to protect<br />
themselves from the lure of prostitution, and it has been recorded on several occasions<br />
that mothers would be charged with prostituting their own daughters in exchange for<br />
extra money. Medieval civilians accepted without question the fact of prostitution, it was<br />
necessary part of medieval life. Prostitutes subverted the sexual tendencies of male<br />
youth, just by existing. With the establishment of prostitution men were less likely to<br />
collectively rape honest women of marriageable and re-marriageable age. This is most<br />
clearly demonstrated in St. Augustine's claim that "the removal of the institution would<br />
bring lust into all aspects of the world." Meaning that without prostitutes to subvert male<br />
tendencies, men would go after innocent women instead, thus the prostitutes were<br />
actually doing society a favor.<br />
<strong>In</strong> urban societies there was an erroneous view that prostitution was flourishing more in<br />
rural regions rather than in cities, however it has been proven that prostitution was more<br />
rampant in cities and large towns. Although there were wandering prostitutes in rural<br />
Page 225 of 372
areas who worked according to the calendar of fairs, similar to riding a circuit, in which<br />
prostitutes stopped by various towns based on what event was going on at the time,<br />
most prostitutes remained in cities. Cities tended to draw more prostitutes due to the<br />
sheer size of the population and the institutionalization of prostitution in urban areas<br />
which made it more rampant in metropolitan regions. Furthermore, in both urban and<br />
rural areas of society, women who did not live under the rule of male authority were<br />
more likely to be suspected of prostitution than their oppressed counterparts because of<br />
the fear of women who did not fit into a stereotypical category outside of marriage or<br />
religious life. Secular law, like most other aspects of prostitution in the Middle Ages, is<br />
difficult to generalize due to the regional variations in attitudes towards prostitution. <strong>The</strong><br />
global trend of the thirteenth century was toward the development of positive policy on<br />
prostitution as laws exiling prostitutes changed towards sumptuary laws and the<br />
confinement of prostitutes to red light districts.<br />
Sumptuary laws became the regulatory norm for prostitutes and included making<br />
courtesans "wear a shoulder-knot of a particular color as a badge of their calling" to be<br />
able to easily distinguish the prostitute from a respectable woman in society. <strong>The</strong> color<br />
that designated them as prostitutes could vary from different earth tones to yellow, as<br />
was usually designated as a color of shame in the Hebrew communities. <strong>The</strong>se laws,<br />
however, proved no impediment to wealthier prostitutes because their glamorous<br />
appearances were almost indistinguishable from noble women. <strong>In</strong> the 14th century,<br />
London prostitutes were only tolerated when they wore yellow hoods.<br />
Although brothels were still present in most cities and urban centers, and could range<br />
from private bordelages run by a procuress from her home to public baths and centers<br />
established by municipal legislation, the only centers for prostitution legally allowed<br />
were the institutionalized and publicly funded brothels. However this did not prevent<br />
illegal brothels from thriving. Furthermore, brothels theoretically banned the patronage<br />
of married men and clergy also, but it was sporadically enforced and there is evidence<br />
of clergymen present in brawls that were documented in brothels. Thus the clergy were<br />
at least present in brothels at some point or another. Brothels also settled the<br />
"obsessive fear of the sharing of women" and solved the issue of "collective security."<br />
<strong>The</strong> lives of prostitutes in brothels were not cloistered like that of nuns and "only some<br />
lived permanently in the streets assigned to them." Prostitutes were only allowed to<br />
practice their trade in the brothel in which they worked. Brothels were also used to<br />
protect prostitutes and their clients through various regulations. For example, the law<br />
that "forbid brothel keepers [from] beat[ing] them." However, brothel regulations also<br />
hindered prostitutes' lives by forbidding them from having "lovers other than their<br />
customers" or from having a favored customer.<br />
Courts showed the conflicting views on the role of prostitutes in secular law as<br />
prostitutes could not inherit property, defend themselves in court, or make accusations<br />
in court. However, prostitutes were sometimes called upon as witnesses during trial.<br />
Page 226 of 372
16th–17th Centuries<br />
By the end of the 15th century attitudes seemed to have begun to harden against<br />
prostitution. An outbreak of syphilis in Naples 1494 which later swept across Europe,<br />
and which may have originated from the Columbian Exchange, and the prevalence of<br />
other sexually transmitted diseases from the earlier 13th century, may have been<br />
causes of this change in attitude. By the early 16th century the association between<br />
prostitutes, plague, and contagion emerged, causing brothels and prostitution to be<br />
outlawed by secular authority. Furthermore, outlawing brothel-keeping and prostitution<br />
was also used to "strengthen the criminal law" system of the sixteenth-century secular<br />
rulers. Canon law defined a prostitute as "a promiscuous woman, regardless of financial<br />
elements." <strong>The</strong> prostitute was considered a "whore … who [was] available for the lust of<br />
many men," and was most closely associated with promiscuity.<br />
<strong>The</strong> Church's stance on prostitution<br />
was three-fold: “acceptance of<br />
prostitution as an inevitable social<br />
fact, condemnation of those profiting<br />
from this commerce, and<br />
encouragement for the prostitute to<br />
repent." <strong>The</strong> Church was forced to<br />
recognize its inability to remove<br />
prostitution from the worldly society,<br />
and in the fourteenth century "began<br />
to tolerate prostitution as a lesser<br />
evil." However, prostitutes were to be excluded from the Church as long as they<br />
practiced.<br />
Around the twelfth century, the idea of prostitute saints took hold, with Mary Magdalene<br />
being one of the most popular saints of the era. <strong>The</strong> Church used Mary Magdalene's<br />
biblical history of being a reformed harlot to encourage prostitutes to repent and mend<br />
their ways. Simultaneously, religious houses were established with the purpose of<br />
providing asylum and encouraging the reformation of prostitution. 'Magdalene Homes'<br />
were particularly popular and peaked especially in the early fourteenth century. Over the<br />
course of the Middle Ages, popes and religious communities made various attempts to<br />
remove prostitution or reform prostitutes, with varying success.<br />
With the advent of the Protestant Reformation, numbers of Southern German towns<br />
closed their brothels in an attempt to eradicate prostitution. <strong>In</strong> some periods prostitutes<br />
had to distinguish themselves by particular signs, sometimes wearing very short hair or<br />
no hair at all, or wearing veils in societies where other women did not wear them.<br />
Ancient codes regulated in this case the crime of a prostitute that dissimulated her<br />
profession. <strong>In</strong> some cultures, prostitutes were the sole women allowed to sing in public<br />
or act in theatrical performances.<br />
Page 227 of 372
18th Century<br />
According to Dervish Ismail Agha, in the Dellâkname-i Dilküşâ, the Ottoman archives, in<br />
the Turkish baths, the masseurs were traditionally young men, who helped wash clients<br />
by soaping and scrubbing their bodies. <strong>The</strong>y also worked as sex workers. <strong>The</strong> Ottoman<br />
texts describe who they were, their prices, how many times they could bring their<br />
customers to orgasm, and the details of their sexual practices.<br />
During the British East <strong>In</strong>dia Company's rule in <strong>In</strong>dia in the late 18th and early 19th<br />
centuries, it was initially fairly common for British soldiers to engage in inter-ethnic<br />
prostitution in <strong>In</strong>dia, where they frequently visited local <strong>In</strong>dian nautch dancers. As British<br />
females began arriving in British <strong>In</strong>dia in large numbers from the early to mid-19th<br />
century, it became increasingly uncommon for British soldiers to visit <strong>In</strong>dian prostitutes,<br />
and miscegenation was despised altogether after the events of the <strong>In</strong>dian Rebellion of<br />
1857.<br />
19th Century<br />
<strong>In</strong> the 19th century, legalized prostitution became a public controversy as France and<br />
then the United Kingdom passed the Contagious Diseases Acts, legislation mandating<br />
pelvic examinations for suspected prostitutes. This legislation applied not only to the<br />
United Kingdom and France, but also to their overseas colonies. France, instead of<br />
trying to outlaw prostitution began to view prostitution as an evil necessary for society to<br />
function. France chose to regulate prostitution, introducing a Morals Brigade onto the<br />
streets of Paris. A similar situation did in fact exist in the Russian Empire; prostitutes<br />
operating out of government-sanctioned brothels were given yellow internal passports<br />
signifying their status and were subjected to weekly physical exams. A major work,<br />
Prostitution, Considered in Its Moral, Social, and Sanitary Aspects, was published by<br />
William Acton in 1857, which estimated that the County of London had 80,000<br />
prostitutes and that 1 house in 60 was serving as a brothel. Leo Tolstoy's novel<br />
Resurrection describes legal prostitution in 19th-century Russia.<br />
During this period, prostitution was also very prominent in the Barbary Coast, San<br />
Francisco as the population was mainly men, due to the influx from the Gold Rush. One<br />
of the more successful madams was Belle Cora, who inadvertently got involved in a<br />
scandal involving her husband, Charles Cora, shooting US Marshal William H.<br />
Richardson. This led to the rise of new statutes against prostitution, gambling and other<br />
activities seen as "immoral".<br />
20th century<br />
<strong>The</strong> leading theorists of Communism opposed prostitution. Communist governments<br />
often attempted to repress the practice immediately after obtaining power, although it<br />
always persisted. <strong>In</strong> contemporary Communist countries, it remains illegal but is<br />
nonetheless common. <strong>The</strong> economic decline brought about by the collapse of the<br />
Page 228 of 372
Soviet Union led to increased prostitution in many current or former Communist<br />
countries.<br />
Originally, prostitution was widely legal in the United States. Prostitution was made<br />
illegal in almost all states between 1910 and 1915 largely due to the influence of the<br />
Woman's Christian Temperance Union. On the other hand, prostitution generated much<br />
national revenue in South Korea, hence the military government encouraged prostitution<br />
for the U.S. military.<br />
<strong>In</strong> 1956, the United Kingdom introduced the Sexual Offences Act 1956. While this law<br />
did not criminalize the act of prostitution in the United Kingdom itself, it prohibited such<br />
activities as running a brothel.<br />
Soliciting was made illegal by the Street Offences Act 1959. <strong>The</strong>se laws were partly<br />
repealed, and altered, by the Sexual Offences Act 2003 and the Policing and <strong>Crime</strong> Act<br />
2009.<br />
Beginning in the late 1980s, many states in the US increased the penalties for<br />
prostitution in cases where the prostitute is knowingly HIV-positive. Penalties for felony<br />
prostitution vary, with maximum sentences of typically 10 to 15 years in prison.<br />
Sex tourism emerged in the late 20th century as a controversial aspect of Western<br />
tourism and globalization.<br />
Page 229 of 372
21st Century<br />
<strong>In</strong> the 21st century, Afghans revived a method of prostituting young boys which is<br />
referred to as "bacha bazi".<br />
Since the break up of the Soviet Union, thousands of eastern European women end up<br />
as prostitutes in China, Western Europe, Israel, and Turkey every year; some enter the<br />
profession willingly, but many are tricked, coerced, or kidnapped, and often experience<br />
captivity and violence. <strong>The</strong>re are tens of thousands of women from eastern Europe and<br />
Asia working as prostitutes in Dubai. Men from Saudi Arabia and the United Arab<br />
Emirates form a large proportion of the customers.<br />
<strong>In</strong>dia's devadasi girls are forced by their poor families to dedicate themselves to the<br />
Hindu goddess Renuka. <strong>The</strong> BBC wrote in 2007 that devadasis are "sanctified<br />
prostitutes".<br />
Historically, and currently, church prostitutes exist, and the practice may be legal or<br />
illegal, depending on the country, state or province.<br />
Islam<br />
According to Shia Muslims, Muhammad sanctioned Nikah mut‘ah (fixed-term marriage,<br />
called muta'a in Iraq and sigheh in Iran) which has instead been used as a legitimizing<br />
cover for sex workers, in a culture where prostitution is otherwise forbidden. Some<br />
Western writers have argued that mut'ah approximates prostitution. and Nikah misyar<br />
Julie Parshall writes that mut'ah is legalised prostitution which has been sanctioned by<br />
the Twelver Shia authorities. She quotes the Oxford encyclopedia of modern Islamic<br />
world to differentiate between marriage (nikah) and Mut'ah, and states that while nikah<br />
is for procreation, mut'ah is just for sexual gratification. According to Zeyno Baran, this<br />
kind of temporary marriage provides Shi'ite men with a religiously sanctioned equivalent<br />
to prostitution. According to Elena Andreeva's observation published in 2007, Russian<br />
travellers to Iran consider mut'ah to be "legalized profligacy" which is indistinguishable<br />
from prostitution. Religious supporters of mut'ah argue that temporary marriage is<br />
different from prostitution for a couple of reasons, including the necessity of iddah in<br />
case the couple have sexual intercourse. It means that if a woman marries a man in this<br />
way and has sex, she has to wait for a number of months before marrying again and<br />
therefore, a woman cannot marry more than 3 or 4 times in a year.<br />
Payments and Salaries<br />
Prostitutes' salaries and payments fluctuate according to the economic conditions of<br />
their respective countries. Prostitutes who usually have foreign clients, such as<br />
business travelers, depend on good foreign economic conditions. Payment may vary<br />
according to regulations made by pimps, brothel keepers, madams, and procurers, who<br />
usually take a slice out of a prostitute's income. Prices may further depend on demand;<br />
Page 230 of 372
popular, high-end prostitutes can earn significant amounts of money (upwards of $5,000<br />
per client), and virgins may receive even higher payments.<br />
Attitudes<br />
Laws<br />
Roughly speaking, the possible attitudes are:<br />
<br />
"Prostitution should be tolerated by society":<br />
o<br />
Decriminalization: "prostitution is labor like any other. Sex industry<br />
premises should not be subject to any special regulation or laws", the<br />
current situation in <strong>New</strong> Zealand; the laws against operating a brothel,<br />
pimping and street prostitution are struck down, but prostitution is hardly<br />
regulated at all. Proponents of this view often cite instances of government<br />
regulation under legalization that they consider intrusive, demeaning, or<br />
violent, but feel that criminalization adversely affects sex workers.<br />
Amnesty <strong>In</strong>ternational is one of the notable groups calling for the<br />
decriminalization of prostitution.<br />
o<br />
Regulation: prostitution may be considered a legitimate business;<br />
prostitution and the employment of prostitutes are legal, but regulated; the<br />
current situation in the Netherlands, Germany, most of Australia and parts<br />
of Nevada (see Prostitution in Nevada). <strong>The</strong> degree of regulation varies<br />
very much; for example, in the Netherlands, prostitutes are not required to<br />
undergo mandatory health checks (see Prostitution in the Netherlands),<br />
Page 231 of 372
while in Nevada, the regulations are very strict (see Prostitution in<br />
Nevada)<br />
<br />
"Prostitution should not be tolerated":<br />
o<br />
o<br />
o<br />
Abolitionism (prostitution itself is not prohibited, but most associated<br />
activities are illegal, in an attempt to make it more difficult to engage in<br />
prostitution, prostitution is heavily discouraged and seen as a social<br />
problem): prostitution (the exchange of sexual services for money) is legal,<br />
but the surrounding activities such as public solicitation, operating a<br />
brothel and other forms of pimping are prohibited, the current situation in<br />
Great Britain and Italy among others;<br />
Neo-Abolitionism ("prostitution is a form of violence against women, it is<br />
a violation of human rights, the clients of the prostitutes exploit the<br />
prostitutes"): prostitutes are not prosecuted, but their clients and pimps<br />
are, which is the current situation in Sweden, France, Norway and Iceland<br />
(in Norway the law is even more strict, forbidding also having sex with a<br />
prostitute abroad).<br />
Prohibitionism (both prostitutes and clients are criminalized and are seen<br />
as immoral, they are considered criminals): the prevailing attitude nearly<br />
everywhere in the United States, with a few exceptions in some rural<br />
Nevada counties (see Prostitution in Nevada)<br />
<strong>In</strong> some countries, there is controversy regarding the laws applicable to sex work. For<br />
instance, the legal stance of punishing pimping while keeping sex work legal but<br />
"underground" and risky is often denounced as hypocritical; opponents suggest either<br />
going the full abolition route and criminalize clients or making sex work a regulated<br />
business.<br />
Many countries have sex worker advocacy groups which lobby against criminalization<br />
and discrimination of prostitutes. <strong>The</strong>se groups generally oppose Nevada-style<br />
regulation and oversight, stating that prostitution should be treated like other<br />
professions. <strong>In</strong> the United States of America, one such group is COYOTE (an<br />
abbreviation for "Call Off Your Old Tired Ethics") and another is the North American<br />
Task Force on Prostitution. <strong>In</strong> Australia the lead sex worker rights organization is<br />
Scarlet Alliance. <strong>In</strong>ternational prostitutes' rights organizations include the <strong>In</strong>ternational<br />
Committee for Prostitutes' Rights and the Network of Sex Work Projects.<br />
Other groups, often with religious backgrounds, focus on offering women a way out of<br />
the world of prostitution while not taking a position on the legal question.<br />
Prostitution is a significant issue in feminist thought and activism. Many feminists are<br />
opposed to prostitution, which they see as a form of exploitation of women and male<br />
dominance over women, and as a practice which is the result of the existing patriarchal<br />
Page 232 of 372
societal order. <strong>The</strong>se feminists argue that prostitution has a very negative effect, both<br />
on the prostitutes themselves and on society as a whole, as it reinforces stereotypical<br />
views about women, who are seen as sex objects which can be used and abused by<br />
men. Other feminists hold that prostitution can be a valid choice for the women who<br />
choose to engage in it; in this view, prostitution must be differentiated from forced<br />
prostitution, and feminists should support sex worker activism against abuses by both<br />
the sex industry and the legal system.<br />
<strong>In</strong> February 2014, the members of the European Parliament voted in a non-binding<br />
resolution, (adopted by 343 votes to 139; with 105 abstentions), in favor of the 'Swedish<br />
Model' of criminalizing the buying, but not the selling of sex.<br />
Legality<br />
<strong>The</strong> position of prostitution and the law varies widely worldwide, reflecting differing<br />
opinions on victimhood and exploitation, inequality, gender roles, gender equality, ethics<br />
and morality, freedom of choice, historical social norms, and social costs and benefits.<br />
Legal themes tend to address four types of issue: victimhood (including potential<br />
victimhood), ethics and morality, freedom of choice, and general benefit or harm to<br />
society (including harm arising indirectly from matters connected to prostitution).<br />
Prostitution may be considered a form of exploitation (e.g., Sweden, Norway, Iceland,<br />
where it is illegal to buy sexual services, but not to sell them — the client commits a<br />
crime, but not the prostitute), a legitimate occupation (e.g., Netherlands, Germany,<br />
where prostitution is regulated as a profession) or a crime (e.g., many Muslim countries,<br />
where the prostitutes face severe penalties).<br />
Page 233 of 372
<strong>The</strong> legal status of prostitution varies from country to country, from being legal and<br />
considered a profession to being punishable by death. Some jurisdictions outlaw the act<br />
of prostitution (the exchange of sexual services for money); other countries do not<br />
prohibit prostitution itself, but ban the activities typically associated with it (soliciting in a<br />
public place, operating a brothel, pimping etc.), making it difficult to engage in<br />
prostitution without breaking any law; and in a few countries prostitution is legal and<br />
regulated.<br />
<strong>In</strong> 1949, the UN General Assembly adopted a convention stating that "prostitution and<br />
the accompanying evil of the traffic in persons for the purpose of prostitution are<br />
incompatible with the dignity and worth of the human person", requiring all signing<br />
parties to punish pimps and brothel owners and operators and to abolish all special<br />
treatment or registration of prostitutes. As of January 2009, the convention was ratified<br />
by 95 member nations including France, Spain, Italy, Denmark, and not ratified by<br />
another 97 member nations including Germany, the Netherlands, the United Kingdom<br />
and the United States.<br />
Advertising<br />
<strong>In</strong> countries where prostitution is legal, advertising it may be legal (as in the<br />
Netherlands) or illegal (as in <strong>In</strong>dia). Covert advertising for prostitution can take a<br />
number of forms:<br />
<br />
<br />
<br />
<br />
<br />
by cards in newsagents' windows<br />
by cards placed in public telephone enclosures: so-called tart cards<br />
by euphemistic advertisements in regular magazines and newspapers (for<br />
instance, talking of "massages" or "relaxation")<br />
in specialist contact magazines<br />
via the <strong>In</strong>ternet<br />
<strong>In</strong> the United States, massage parlors serving as a cover for prostitution may advertise<br />
"full service", a euphemism for coitus.<br />
<strong>In</strong> Las Vegas, prostitution is often promoted overtly on the Las Vegas Strip by third party<br />
workers distributing risque flyers with the pictures and phone numbers of escorts<br />
(despite the fact that prostitution is illegal in Las Vegas and Clark County, see<br />
Prostitution in Nevada).<br />
<strong>The</strong> way in which prostitutes advertise their presence varies widely. Some remain in<br />
apartments which have hints or clues outside such as posters with "model" written on<br />
them to lure potential customers inside. Others advertise by putting numbers or location<br />
in phoneboxes or in online or newspaper ads. <strong>In</strong> more sexually permissive societies,<br />
prostitutes can advertise in public view, such as through display windows. <strong>In</strong> sexually<br />
restrictive societies it may occur through word-of-mouth and other means.<br />
Page 234 of 372
Socio-Economic Issues<br />
Illegal Immigration<br />
A difficulty facing migrant prostitutes in many developed countries is the illegal<br />
residence status of some of these women. <strong>The</strong>y face potential deportation, and so do<br />
not have recourse to the law. Hence there are brothels that may not adhere to the usual<br />
legal standards intended to safeguard public health and the safety of the workers.<br />
<strong>The</strong> immigration status of the persons who sell sexual services is – particularly in<br />
Western Europe – a controversial and highly debated political issue. Currently, in most<br />
of these countries most prostitutes are immigrants, mainly from Eastern and Central<br />
Europe; in Spain and Italy 90% of prostitutes are estimated to be migrants, in Austria<br />
78%, in Switzerland 75%, in Greece 73%, in Norway 70% (according to a 2009<br />
TAMPEP report, Sex Work in Europe-A mapping of the prostitution scene in 25<br />
European countries). An article in Le Monde diplomatique in 1997 stated that 80% of<br />
prostitutes in Amsterdam were foreigners and 70% had no immigration papers.<br />
Survival Sex<br />
Survival sex is when the prostitute is driven to prostitution by a need for basic<br />
necessities such as food or shelter. This type of prostitution is common among the<br />
homeless and in refugee camps. <strong>The</strong> term is used in the sex trade and by aid workers,<br />
although some practitioners do not regard the act as exploitative.<br />
Page 235 of 372
Use of Children<br />
Regarding the prostitution of children the laws on prostitution as well as those on sex<br />
with a child apply. If prostitution in general is legal there is usually a minimum age<br />
requirement for legal prostitution that is higher than the general age of consent (see<br />
above for some examples). Although some countries do not single out patronage of<br />
child prostitution as a separate crime, the same act is punishable as sex with an<br />
underage person.<br />
<strong>In</strong> <strong>In</strong>dia, the federal police say that around 1.2 million children are believed to be<br />
involved in prostitution. A CBI statement said that studies and surveys sponsored by the<br />
ministry of women and child development estimated that about 40% of all <strong>In</strong>dia's<br />
prostitutes are children.<br />
<strong>In</strong> Bangladesh, child prostitutes are known to take the drug Oradexon, also known as<br />
dexamethasone. This over-the-counter steroid, usually used by farmers to fatten cattle,<br />
makes child prostitutes look larger and older. Charities say that 90% of prostitutes in the<br />
country's legalized brothels use the drug. According to social activists, the steroid can<br />
cause diabetes, high blood pressure and is highly addictive.<br />
Thailand's Health System Research <strong>In</strong>stitute reported that children in prostitution make<br />
up 40% of prostitutes in Thailand.<br />
Some adults travel to other countries to have access to sex with children, which is<br />
unavailable in their home country. Cambodia has become a notorious destination for<br />
sex with children. Thailand is also a destination for child sex tourism. Several western<br />
countries have recently enacted laws with extraterritorial reach, punishing citizens who<br />
engage in sex with minors in other countries. As the crime usually goes undiscovered,<br />
these laws are rarely enforced.<br />
Among the Elderly<br />
Prostitution among the elderly is a phenomenon reported in South Korea where elderly<br />
people turn to prostitution to pay their bills. This problem comes about because the<br />
state does not provide enough income for necessities. Clients in Korea tend also to be<br />
elderly.<br />
Violence<br />
Street prostitutes are at higher risk of violent crime than brothel prostitutes and bar<br />
prostitutes.<br />
<strong>In</strong> the United States, the homicide rate for female prostitutes was estimated to be 204<br />
per 100,000. <strong>The</strong>re are substantial differences in rates of victimization between street<br />
prostitutes and indoor prostitutes who work as escorts, call girls, or in brothels and<br />
massage parlors. Violence against male prostitutes is less common.<br />
Page 236 of 372
Prostitution may sometimes be associated with illegal, abusive, and dangerous<br />
activities. One view maintains that this results from prostitution being stigmatized or<br />
illegal, or both. Another, however, believes that legalizing and regulating prostitution<br />
does not improve the situation, but instead makes it worse, creating a parallel illegal<br />
prostitution industry, and failing to dissociate the legal part of the sex trade from crime.<br />
Human trafficking<br />
Sex trafficking is defined as using coercion or force to transport an unwilling person into<br />
prostitution or other sexual exploitation. <strong>The</strong> United Nations stated in 2009 that sex<br />
trafficking is the most commonly identified form of human trafficking and estimates that<br />
about 79% of human trafficking reported is for prostitution (although the study notes that<br />
this may be the result of statistical bias and that sex trafficking tends to receive the most<br />
attention and be the most visible). Sex trafficking has been described by Kul Gautum,<br />
Deputy Executive Director of UNICEF, as "the largest slave trade in history." It is also<br />
the fastest growing criminal industry, predicted to outgrow drug trafficking. While there<br />
may be a higher number of people involved in slavery today than at any time in history,<br />
the proportion of the population is probably the smallest in history.<br />
Page 237 of 372
“Annually, according to U.S. Government-sponsored research completed in 2006,<br />
approximately 800,000 people are trafficked across national borders, which does not<br />
include millions trafficked within their own countries. Approximately 80 percent of<br />
transnational victims are women and girls and up to 50 percent are minors," estimated<br />
the US Department of State in a 2008 study, in reference to the number of people<br />
estimated to be victims of all forms of human trafficking. Due in part to the illegal and<br />
underground nature of sex trafficking, the actual extent of women and children forced<br />
into prostitution is unknown. A statistical analysis of various measures of trafficking<br />
found that the legal status of prostitution did not have a significant impact on trafficking.<br />
Children are sold into the global sex trade every year. Often they are kidnapped or<br />
orphaned, and sometimes they are sold by their own families. According to the<br />
<strong>In</strong>ternational Labor Organization, the occurrence is especially common in places such<br />
as Thailand, the Philippines, Sri Lanka, Vietnam, Cambodia, Nepal and <strong>In</strong>dia.<br />
Globally, forced labor generates an estimated $31 billion, about half of it in the<br />
industrialized world and around one tenth in transitional countries, according to the<br />
<strong>In</strong>ternational Labor Organization in a report on forced labor ("A global alliance against<br />
forced labor", ILO, 11 May 2005). Trafficking in people has been facilitated by factors<br />
such as porous borders and advanced communication technologies, and has become<br />
increasingly transnational in scope and highly financially lucrative.<br />
<strong>The</strong> most common destinations for victims of human trafficking are Thailand, Japan,<br />
Israel, Belgium, the Netherlands, Germany, Italy, Turkey and the US, according to a<br />
report by the UNODC (UN Office on Drugs and <strong>Crime</strong>).<br />
Major sources of trafficked persons include Thailand, China, Nigeria, Albania, Bulgaria,<br />
Belarus, Moldova and Ukraine.<br />
Illicit Uses<br />
Prostitution, often when it is illegal, is used in extortion and blackmail, which always<br />
involves extortion, where the extortionist threatens to reveal information about a victim<br />
or their family members that is potentially embarrassing, socially damaging, or<br />
incriminating unless a demand for money, property, or services is met.<br />
<strong>The</strong> subject of the extortion may be manipulated into or voluntarily solicit the use of<br />
prostitution which is then later used to extort money or for profit otherwise. <strong>The</strong> film <strong>The</strong><br />
Godfather Part II famously depicts the role of Senator Geary who is implicated in the<br />
use of prostitution in order to gain his compliance on political issues.<br />
Page 238 of 372
Types<br />
Street<br />
<strong>In</strong> street prostitution, the prostitute solicits customers while waiting at street corners,<br />
sometimes called "the track" by pimps and prostitutes alike. <strong>The</strong>y usually dress in<br />
skimpy, provocative clothing, regardless of the weather. Street prostitutes are often<br />
called "streetwalkers" while their customers are referred to as "tricks" or "johns."<br />
Servicing the customers is described as "turning tricks." <strong>The</strong> sex is usually performed in<br />
the customer's car, in a nearby alley, or in a rented room. Motels and hotels that<br />
accommodate prostitutes commonly rent rooms by the half or full hour.<br />
<strong>In</strong> Russia and other countries of the former USSR, prostitution takes the form of an<br />
open-air market. One prostitute stands by a roadside, and directs cars to a so-called<br />
"tochka" (usually located in alleyways or carparks), where lines of women are paraded<br />
for customers in front of their car headlights. <strong>The</strong> client selects a prostitute, whom he<br />
takes away in his car. Prevalent in the late 1990s, this type of service has been steadily<br />
declining in recent years.<br />
A "lot lizard" is a commonly encountered special case of street prostitution. Lot lizards<br />
mainly serve those in the trucking industry at truck stops and stopping centers.<br />
Prostitutes will often proposition truckers using a CB radio from a vehicle parked in the<br />
Page 239 of 372
non-commercial section of a truck stop parking lot, communicating through codes based<br />
on commercial driving slang, then join the driver in his truck.<br />
Brothels<br />
Brothels are establishments specifically dedicated to prostitution, often confined to<br />
special red-light districts in big cities. Other names for brothels include bordello,<br />
whorehouse, cathouse, knocking shop, and general houses. Prostitution also occurs in<br />
some massage parlors, and in Asian countries in some barber shops where sexual<br />
services may be offered as a secondary function of the premises.<br />
Escorts<br />
Escort services may be distinguished from prostitution or other forms of prostitution in<br />
that sexual activities are often not explicitly advertised as necessarily included in these<br />
services; rather, payment is often noted as being for an escort's time and<br />
companionship only, although there is often an implicit assumption that sexual activities<br />
are expected.<br />
<strong>In</strong> escort prostitution, the act takes place at the customer's residence or hotel room<br />
(referred to as out-call), or at the escort's residence or in a hotel room rented for the<br />
occasion by the escort (called in-call). <strong>The</strong> prostitute may be independent or working<br />
under the auspices of an escort agency. Services may be advertised over the <strong>In</strong>ternet,<br />
in regional publications, or in local telephone listings.<br />
Use of the <strong>In</strong>ternet by prostitutes and customers is common. A prostitute may use adult<br />
boards or create a website of their own with contact details, such as email addresses.<br />
Adult contact sites, chats and on-line communities are also used. This, in turn, has<br />
brought increased scrutiny from law enforcement, public officials, and activist groups<br />
toward online prostitution. <strong>In</strong> 2009, Craigslist came under fire for its role in facilitating<br />
online prostitution, and was sued by some 40 US state attorneys general, local<br />
prosecutors, and law enforcement officials.<br />
Reviews of the services of individual prostitutes can often be found at various escort<br />
review boards worldwide. <strong>The</strong>se online forums are used to trade information between<br />
potential clients, and also by prostitutes to advertise the various services available. Sex<br />
workers, in turn, often use online forums of their own to exchange information on clients,<br />
particularly to warn others about dangerous clients.<br />
Sex Tourism<br />
Sex tourism is travel for sexual intercourse with prostitutes or to engage in other sexual<br />
activity. <strong>The</strong> World Tourism Organization, a specialized agency of the United Nations<br />
defines sex tourism as "trips organized from within the tourism sector, or from outside<br />
this sector but using its structures and networks, with the primary purpose of effecting a<br />
commercial sexual relationship by the tourist with residents at the destination".<br />
Page 240 of 372
As opposed to regular sex tourism, which is often legal, a tourist who has sex with a<br />
child prostitute will usually be committing a crime in the host country, under the laws of<br />
his own country (notwithstanding him being outside of it) and against international law.<br />
Child sex tourism (CST) is defined as a travel to a foreign country for the purpose of<br />
engaging in commercially facilitated child sexual abuse. Thailand, Cambodia, <strong>In</strong>dia,<br />
Brazil, and Mexico have been identified as leading hotspots of child sexual exploitation.<br />
Virtual Sex<br />
Virtual sex, that is, sexual acts conveyed by messages rather than physically, is also the<br />
subject of commercial transactions. Commercial phone sex services have been<br />
available for decades. <strong>The</strong> advent of the <strong>In</strong>ternet has made other forms of virtual sex<br />
available for money, including computer-mediated cybersex, in which sexual services<br />
are provided in text form by way of chat rooms or instant messaging, or audiovisually<br />
through a webcam (see camgirl).<br />
Prevalence<br />
According to the paper "Estimating the prevalence and career longevity of prostitute<br />
women", the number of full-time equivalent prostitutes in a typical area in the United<br />
States (Colorado Springs, CO, during 1970–1988) is estimated at 23 per 100,000<br />
Page 241 of 372
population (0.023%), of which some 4% were under 18. <strong>The</strong> length of these prostitutes'<br />
working careers was estimated at a mean of 5 years. According to a 2012 report by<br />
Fondation Scelles there are between 40 and 42 million prostitutes in the world.<br />
<strong>In</strong> 2003, it was estimated that in Amsterdam, one woman in 35 was working as a<br />
prostitute, compared to one in 300 in London.<br />
<strong>The</strong> number of men who have used a prostitute at least once varies widely from country<br />
to country, from an estimated low of between 7% and 8.8% in the United Kingdom, to a<br />
high of between 59% and 80% in Cambodia. A study conducted by ProCon – a<br />
nonpartisan nonprofit organization – estimated the percentage of men who had paid for<br />
sex at least once in their lives, and found the highest rates in Cambodia (between 59<br />
and 80% of men had paid for sex at least once) and Thailand (an estimated 75%),<br />
followed by Italy (16.7–45%), Spain (27–39%), Japan (37%), the Netherlands (13.5–<br />
21.6%), the United States (15.0–20.0%), and China (6.4-20%). Nations with higher<br />
rates of prostitution clients, or “johns”, display much more positive attitudes towards<br />
commercial sex. <strong>In</strong> some countries, such as Cambodia and Thailand, sex with<br />
prostitutes is considered commonplace and men who do not engage in commercial sex<br />
may be considered unusual by their peers. <strong>In</strong> Thailand, it has been reported that about<br />
75% of men have visited a prostitute at least once in their lifetimes. <strong>In</strong> Cambodia, that<br />
figure is 59% to 80%.<br />
<strong>In</strong> the United States, a 2004 TNS poll reported 15% of all men admitted to having paid<br />
for sex at least once in their life. However, a paper entitled "Prostitution and the sex<br />
discrepancy in reported number of sexual partners" concluded that men's self-reporting<br />
of prostitutes as sexual partners provides a serious underestimate.<br />
<strong>In</strong> Australia, a survey conducted in the early 2000s showed that 15.6% of men aged 16–<br />
59 reported paying for sex at least once in their life, and 1.9% had done so in the past<br />
year.<br />
Reports disagree on whether prostitution levels are growing or declining in developed<br />
countries. Some studies indicate that the percentage of men engaging in commercial<br />
sex in the United States has declined significantly in recent decades: in 1964, an<br />
estimated 69–80% of men had paid for sex at least once. Some have suggested that<br />
prostitution levels have fallen in sexually liberal countries, most likely because of the<br />
increased availability of non-commercial, non-marital sex or, for example in Sweden,<br />
because of stricter legal penalties. Other reports suggest a growth in prostitution levels,<br />
for example in the US, where again, sexual liberalization is suggested as the cause. As<br />
Norma Ramos, Executive Director of the Coalition Against Trafficking in Women says<br />
"<strong>The</strong> more the commercial sex industry normalizes this behavior, the more of this<br />
behavior you get".<br />
Prostitutes have long plied their trades to the military in many cultures. For example, the<br />
British naval port of Portsmouth had a flourishing local sex industry in the 19th century,<br />
and until the early 1990s there were large red-light districts near American military<br />
Page 242 of 372
ases in the Philippines. <strong>The</strong> notorious Patpong entertainment district in Bangkok,<br />
Thailand, started as an R&R location for US troops serving in the Vietnam War in the<br />
early 1970s. Washington D.C. itself had Murder Bay which attracted the military of the<br />
Civil War. <strong>The</strong> village of Vadia, <strong>In</strong>dia is known locally as the village of prostitutes, where<br />
unmarried women are involved in prostitution. Mass weddings for children of prostitutes<br />
in the village are held to protect them from being pushed into prostitution.<br />
Medical Situation<br />
<strong>In</strong> some places, prostitution may be associated with the spread of sexually transmitted<br />
diseases (STDs). Lack of condom use among prostitutes and their clients has been<br />
cited as a factor in the spread of HIV in Asia: "One of the main reasons for the rapid<br />
spread of HIV in Asian countries is the massive transmission among sex workers and<br />
clients". As a result, prevention campaigns aimed at increasing condom use by sex<br />
workers have been attributed to play a major role in restricting the spread of HIV.<br />
One of the sources for the spread of HIV in Africa is prostitution, with one study finding<br />
that encounters with prostitutes produced 84% of new HIV infections in adult males in<br />
Accra, Ghana. <strong>The</strong> spread of HIV from urban settings to rural areas in Africa has been<br />
attributed to the mobility of farmers who visit sex workers in cities, for example in<br />
Ethiopia. Some studies of prostitution in urban settings in developing countries, such as<br />
Page 243 of 372
Kenya, have stated that prostitution acts as a reservoir of STDs within the general<br />
population.<br />
Typical responses to the problem are:<br />
<br />
<br />
<br />
banning prostitution completely<br />
introducing a system of registration for prostitutes that mandates health checks<br />
and other public health measures<br />
educating prostitutes and their clients to encourage the use of barrier<br />
contraception and greater interaction with health care<br />
Some think that the first two measures are counter-productive. Banning prostitution<br />
tends to drive it underground, making safe sex promotion, treatment and monitoring<br />
more difficult. Registering prostitutes makes the state complicit in prostitution and does<br />
not address the health risks of unregistered prostitutes. Both of the last two measures<br />
can be viewed as harm reduction policies.<br />
<strong>In</strong> countries and areas where safer sex precautions are either unavailable or not<br />
practiced for cultural reasons, prostitution is an active disease vector for all STDs,<br />
including HIV/AIDS, but the encouragement of safer sex practices, combined with<br />
regular testing for sexually transmitted diseases, has been very successful when<br />
applied consistently. As an example, Thailand's condom program has been largely<br />
responsible for the country's progress against the HIV epidemic. It has been estimated<br />
that successful implementation of safe sex practices in <strong>In</strong>dia "would drive the [HIV]<br />
epidemic to extinction" while similar measures could achieve a 50% reduction in<br />
Botswana. <strong>In</strong> 2009, UN Secretary-General Ban Ki-moon urged all countries to remove<br />
bans on prostitution and homosexual sex, because "such laws constitute major barriers<br />
to reaching key populations with HIV services". <strong>In</strong> 2012, the Global Commission on HIV<br />
and the Law, which was convened by Ban Ki-moon, and which is an independent body,<br />
established at the request of the UNAIDS, and supported by a Secretariat based at the<br />
UNDP, reached the same conclusions, also recommending decriminalization of brothels<br />
and procuring. Nevertheless, the report states that: "<strong>The</strong> content, analysis, opinions and<br />
policy recommendations contained in this publication do not necessarily reflect the<br />
views of the United Nations Development Program."<br />
Page 244 of 372
XVI. Racketeering<br />
A Racket is an organized criminal act, usually in which the criminal act is a form of<br />
business or a way to earn illegal money regularly or briefly but repeatedly. A racket is<br />
often a repeated or continuous criminal operation. Originally and often still specifically, a<br />
racket was a criminal act in which the perpetrator or perpetrators fraudulently offer a<br />
service to solve a nonexistent problem, a service that will not be put into effect, or a<br />
service that would not exist without the racket. Conducting a racket is racketeering.<br />
Particularly, the potential problem may be caused by the same party that offers to solve<br />
it, but that fact may be concealed, with the specific intent to engender continual<br />
patronage for this party.<br />
<strong>The</strong> most common example of a racket is the "protection racket", which promises to<br />
protect the target business or person from dangerous individuals in the neighborhood<br />
and then either collects the money or causes damage to the business until the owner<br />
pays. <strong>The</strong> racket exists as both the problem and its solution, and it is used as a method<br />
of extortion.<br />
However, the term "racket" has expanded in definition and may be used less strictly to<br />
refer to any illegal organized crime operation, including those that do not necessarily<br />
involve fraudulent practices. For example, "racket" may be used to refer to the "numbers<br />
Page 245 of 372
acket" or the "drug racket", neither of which generally or explicitly involve fraud or<br />
deception with regard to the intended clientele.<br />
Racketeering is most often associated with organized crime, and the term was coined<br />
by the Employers' Association of Chicago in June 1927 in a statement about the<br />
influence of organized crime in the Teamsters union.<br />
Examples<br />
Examples of crimes that may be alleged to be part of a pattern of racketeering activity<br />
include<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
A protection racket is a form of extortion whereby racketeers offer to "protect"<br />
property from damage in exchange for a fee, while also being responsible, in part<br />
or in whole, for the property damage.<br />
A fencing racket is an operation specializing in the resale of stolen goods.<br />
A numbers racket is any unauthorized lottery or illegal gambling operation.<br />
Money laundering and other creative accounting practices that are misused in<br />
ways to disguise sources of illegal funds.<br />
<strong>The</strong>ft operations, including: burglary, home invasion, robbery, identity theft, auto<br />
theft, art theft, car hijacking, truck hijacking, organized retail crime, shoplifting,<br />
and copyright infringement (including the sale of counterfeit goods)<br />
Fraud and embezzlement operations, including: credit card fraud, check fraud,<br />
health care fraud, insurance fraud, mail and wire fraud, securities fraud, bank<br />
fraud, mortgage fraud, skimming (fraud), electoral fraud, confidence tricks, and<br />
bid rigging<br />
Kidnapping<br />
Murder and murder-for-hire<br />
Bribery and police corruption<br />
<strong>Organized</strong> academic dishonesty by school administrators<br />
Loan sharking<br />
Computer crimes<br />
Drug trafficking<br />
Arms trafficking<br />
Extortion<br />
Prostitution and commercial sexual exploitation of children<br />
Human trafficking<br />
People smuggling<br />
Tax evasion and cigarette smuggling<br />
Witness tampering and intimidation<br />
Skimming (casinos)<br />
Operating chop shops<br />
Illegal gambling or bookmaking, including match fixing<br />
Criminal operation of otherwise ostensibly legal operations, such as strip clubs,<br />
casinos, and waste management firms<br />
Poaching, overfishing, illegal logging, illegal construction, and illegal mining<br />
Page 246 of 372
Dog fighting, cockfighting, and bullfighting<br />
RICO Act<br />
On October 15, 1970, the Racketeer <strong>In</strong>fluenced and Corrupt Organizations Act (18<br />
U.S.C. §§ 1961–1968), commonly referred to as the "RICO Act", became United States<br />
law. <strong>The</strong> RICO Act allowed law enforcement to charge a person or group of people with<br />
racketeering, defined as committing multiple violations of certain varieties within a tenyear<br />
period. <strong>The</strong> purpose of the RICO Act was stated as "the elimination of the<br />
infiltration of organized crime and racketeering into legitimate organizations operating in<br />
interstate commerce". S.Rep. No. 617, 91st Cong., 1st Sess. 76 (1968). However, the<br />
statute is sufficiently broad to encompass illegal activities relating to any enterprise<br />
affecting interstate or foreign commerce.<br />
Section 1961(10) of Title 18 provides that the Attorney General of the United States<br />
may designate any department or agency to conduct investigations authorized by the<br />
RICO statute and such department or agency may use the investigative provisions of<br />
the statute or the investigative power of such department or agency otherwise conferred<br />
by law. Absent a specific designation by the Attorney General, jurisdiction to conduct<br />
investigations for violations of 18 U.S.C. § 1962 lies with the agency having jurisdiction<br />
over the violations constituting the pattern of racketeering activity listed in 18 U.S.C. §<br />
1961.<br />
Page 247 of 372
<strong>In</strong> the US, civil racketeering laws are also used in federal and state courts.<br />
Page 248 of 372
XVII. Terrorism<br />
Terrorism is, in the broadest sense, the use of intentionally indiscriminate violence as a<br />
means to create terror among masses of people; or fear to achieve a religious or<br />
political aim. It is used in this regard primarily to refer to violence during peacetime or in<br />
war against non-combatants. <strong>The</strong> terms "terrorist" and "terrorism" originated during the<br />
French Revolution of the late 18th century but gained mainstream popularity in the<br />
1970s in news reports and books covering the conflicts in Northern Ireland, the Basque<br />
Country and Palestine. <strong>The</strong> increased use of suicide attacks from the 1980s onwards<br />
was typified by the September 11 attacks in <strong>New</strong> York City and Washington, D.C. in<br />
2001.<br />
<strong>The</strong>re is no commonly accepted definition of "terrorism". Terrorism is a charged term. It<br />
is often used with the connotation of something that is "morally wrong". Governments<br />
and non-state groups use the term to abuse or denounce opposing groups.<br />
Varied political organizations have been accused of using terrorism to achieve their<br />
objectives. <strong>The</strong>se organizations include right-wing and left-wing political organizations,<br />
nationalist groups, religious groups, revolutionaries and ruling governments. Legislation<br />
declaring terrorism a crime has been adopted in many states. <strong>The</strong>re is no consensus as<br />
to whether or not terrorism should be regarded as a war crime.<br />
<strong>The</strong> Global Terrorism Database, maintained by the University of Maryland, College<br />
Park, has recorded more than 61,000 incidents of non-state terrorism, resulting in at<br />
least 140,000 deaths between 2000 and 2014.<br />
Page 249 of 372
Etymology<br />
Etmologically, the word terror is derived from the Latin verb Tersere, which later<br />
becomes Terrere. <strong>The</strong> latter form appears in European languages as early as the 12th<br />
century; its first known use in French is the word terrible in 1160. By 1356 the word<br />
terreur is in use. Terreur is the origin of the Middle English term terrour, which later<br />
becomes the modern word "terror".<br />
Historical Background<br />
<strong>The</strong> term terroriste, meaning "terrorist", is first used in 1794 by the French philosopher<br />
François-Noël Babeuf, who denounces Maximilien Robespierre's Jacobin regime as a<br />
dictatorship. <strong>In</strong> the years leading up to the Reign of Terror, the Brunswick Manifesto<br />
threatened Paris with an "exemplary, never to be forgotten vengeance: the city would be<br />
subjected to military punishment and total destruction" if the royal family was harmed,<br />
but this only increased the Revolution's will to abolish the monarchy. Some writers<br />
attitudes about French Revolution grew less favorable after the French monarchy was<br />
abolished in 1792. During the Reign of Terror, which began in July 1793 and lasted<br />
thirteen months, Paris was governed by the Committee of Public safety who oversaw a<br />
regime of mass executions and public purges.<br />
Prior to the French Revolution, ancient philosophers wrote about tyrannicide, as tyranny<br />
was seen as the greatest political threat to Greco-Roman civilization. Medieval<br />
philosophers were similarly occupied with the concept of tyranny, though the analysis of<br />
some theologians like Thomas Aquinas drew a distinction between usurpers, who could<br />
be killed by anyone, and legitimate rulers who abused their power – the latter, in<br />
Aquinas' view, could only be punished by a public authority. John of Salisbury was the<br />
first medieval Christian scholar to defend tyrannicide.<br />
Most scholars today trace the origins of the modern tactic of terrorism to the Jewish<br />
Sicarii Zealots who attacked Romans and Jews in 1st century Palestine. <strong>The</strong>y follow its<br />
development from the Persian Order of Assassins through to 19th-century anarchists.<br />
<strong>The</strong> "Reign of Terror" is usually regarded as an issue of etymology. <strong>The</strong> term terrorism<br />
has generally been used to describe violence by non-state actors rather than<br />
government violence since the 19th-century Anarchist Movement.<br />
<strong>In</strong> December 1795, Edmund Burke used the word "Terrorists" in a description of the<br />
new French government called 'Directory':<br />
At length, after a terrible struggle, the [Directory] Troops prevailed over the Citizens (…)<br />
To secure them further, they have a strong corps of irregulars, ready armed. Thousands<br />
of those Hell-hounds called Terrorists, whom they had shut up in Prison on their last<br />
Revolution, as the Satellites of Tyranny, are let loose on the people. (emphasis added)<br />
<strong>The</strong> terms "terrorism" and "terrorist" gained renewed currency in the 1970s as a result of<br />
the Israeli–Palestinian conflict, the Northern Ireland conflict, the Basque conflict, and the<br />
Page 250 of 372
operations of groups such as the Red Army Faction. Leila Khaled was described as a<br />
terrorist in a 1970 number of Life magazine. A number of books on terrorism were<br />
published in the 1970s. <strong>The</strong> topic came further to the fore after the 1983 Beirut barracks<br />
bombings and again after the 2001 September 11 attacks and the 2002 Bali bombings.<br />
Modern Definitions<br />
<strong>The</strong>re are over 109 different definitions of terrorism. American political philosopher<br />
Michael Walzer in 2002 wrote: "Terrorism is the deliberate killing of innocent people, at<br />
random, to spread fear through a whole population and force the hand of its political<br />
leaders". [5] Bruce Hoffman, an American scholar, has noted that:<br />
It is not only individual agencies within the same governmental apparatus that cannot agree on a<br />
single definition of terrorism. Experts and other long-established scholars in the field are equally<br />
incapable of reaching a consensus.<br />
C.A.J. Coady has written that the question of how to define terrorism is "irresolvable"<br />
because "its natural home is in polemical, ideological and propagandist contexts".<br />
French historian Sophie Wahnich distinguishes between the revolutionary terror of the<br />
French Revolution and the terrorists of the September 11 attacks:<br />
Revolutionary terror is not terrorism. To make a moral equivalence between the<br />
Revolution's year II and September 2001 is historical and philosophical nonsense ...<br />
<strong>The</strong> violence exercised on 11 September 2001 aimed neither at equality nor liberty. Nor<br />
did the preventive war announced by the president of the United States.<br />
Page 251 of 372
Experts disagree about "whether terrorism is wrong by definition or just wrong as a<br />
matter of fact; they disagree about whether terrorism should be defined in terms of its<br />
aims, or its methods, or both, or neither; they disagree about whether or not states can<br />
perpetrate terrorism; they even disagree about the importance or otherwise of terror for<br />
a definition of terrorism."<br />
State Terrorism<br />
Alternatively, responding to developments in modern warfare, Paul James and<br />
Jonathan Friedman distinguish between state terrorism against non-combatants and<br />
state terrorism against combatants, including 'Shock and Awe' tactics:<br />
Shock and Awe" as a subcategory of "rapid dominance" is the name given to massive<br />
intervention designed to strike terror into the minds of the enemy. It is a form of stateterrorism.<br />
<strong>The</strong> concept was however developed long before the Second Gulf War by<br />
Harlan Ullman as chair of a forum of retired military personnel.<br />
United Nations<br />
<strong>In</strong> November 2004, a Secretary-General of the United Nations report described<br />
terrorism as any act "intended to cause death or serious bodily harm to civilians or noncombatants<br />
with the purpose of intimidating a population or compelling a government or<br />
an international organization to do or abstain from doing any act". <strong>The</strong> international<br />
community has been slow to formulate a universally agreed, legally binding definition of<br />
this crime. <strong>The</strong>se difficulties arise from the fact that the term "terrorism" is politically and<br />
emotionally charged. <strong>In</strong> this regard, Angus Martyn, briefing the Australian parliament,<br />
stated,<br />
<strong>The</strong> international community has never succeeded in developing an accepted<br />
comprehensive definition of terrorism. During the 1970s and 1980s, the United Nations<br />
attempts to define the term floundered mainly due to differences of opinion between<br />
various members about the use of violence in the context of conflicts over national<br />
liberation and self-determination.<br />
<strong>The</strong>se divergences have made it impossible for the United Nations to conclude a<br />
Comprehensive Convention on <strong>In</strong>ternational Terrorism that incorporates a single, allencompassing,<br />
legally binding, criminal law definition of terrorism. <strong>The</strong> international<br />
community has adopted a series of sectoral conventions that define and criminalize<br />
various types of terrorist activities.<br />
Since 1994, the United Nations General Assembly has repeatedly condemned terrorist<br />
acts using the following political description of terrorism:<br />
Criminal acts intended or calculated to provoke a state of terror in the public, a group of<br />
persons or particular persons for political purposes are in any circumstance<br />
Page 252 of 372
unjustifiable, whatever the considerations of a political, philosophical, ideological, racial,<br />
ethnic, religious or any other nature that may be invoked to justify them.<br />
U.S. Law<br />
Various legal systems and government agencies use different definitions of terrorism in<br />
their national legislation.<br />
U.S. Code Title 22 Chapter 38, Section 2656f(d) defines terrorism as: "Premeditated,<br />
politically motivated violence perpetrated against noncombatant targets by subnational<br />
groups or clandestine agents, usually intended to influence an audience".<br />
18 U.S.C. § 2331 defines "international terrorism" and "domestic terrorism" for purposes<br />
of Chapter 113B of the Code, entitled "Terrorism":<br />
"<strong>In</strong>ternational terrorism" means activities with the following three characteristics:<br />
<strong>In</strong>volve violent acts or acts dangerous to human life that violate federal or state law; Appear to be<br />
intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government<br />
by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction,<br />
assassination, or kidnapping; and occur primarily outside the territorial jurisdiction of the U.S., or<br />
transcend national boundaries in terms of the means by which they are accomplished, the<br />
persons they appear intended to intimidate or coerce, or the locale in which their perpetrators<br />
operate or seek asylum.<br />
Media Spectacle<br />
A definition proposed by Carsten Bockstette at the George C. Marshall European<br />
Center for Security Studies, underlines the psychological and tactical aspects of<br />
terrorism:<br />
Page 253 of 372
Terrorism is defined as political violence in an asymmetrical conflict that is designed to<br />
induce terror and psychic fear (sometimes indiscriminate) through the violent<br />
victimization and destruction of noncombatant targets (sometimes iconic symbols).<br />
Such acts are meant to send a message from an illicit clandestine organization. <strong>The</strong><br />
purpose of terrorism is to exploit the media in order to achieve maximum attainable<br />
publicity as an amplifying force multiplier in order to influence the targeted audience(s)<br />
in order to reach short- and midterm political goals and/or desired long-term end states.<br />
Terrorists attack national symbols, which may negatively affect a government, while<br />
increasing the prestige of the given terrorist group or its ideology.<br />
Political Violence<br />
Terrorist acts frequently have a political purpose. Some official, governmental definitions<br />
of terrorism use the criterion of the illegitimacy or unlawfulness of the act. to distinguish<br />
between actions authorized by a government (and thus "lawful") and those of other<br />
actors, including individuals and small groups. For example, carrying out a strategic<br />
bombing on an enemy city, which is designed to affect civilian support for a cause,<br />
would not be considered terrorism if it were authorized by a government. This criterion<br />
is inherently problematic and is not universally accepted, because: it denies the<br />
existence of state terrorism. An associated term is violent non-state actor.<br />
According to Ali Khan, the distinction lies ultimately in a political judgment.<br />
Pejorative Use<br />
Having the moral charge in our vocabulary of 'something morally wrong', the term<br />
'terrorism' is often used to abuse or denounce opposite parties, either governments or<br />
non-state-groups.<br />
Those labeled "terrorists" by their opponents rarely identify themselves as such, and<br />
typically use other terms or terms specific to their situation, such as separatist, freedom<br />
fighter, liberator, revolutionary, vigilante, militant, paramilitary, guerrilla, rebel, patriot, or<br />
any similar-meaning word in other languages and cultures. Jihadi, mujaheddin, and<br />
fedayeen are similar Arabic words that have entered the English lexicon. It is common<br />
for both parties in a conflict to describe each other as terrorists.<br />
On whether particular terrorist acts, such as killing non-combatants, can be justified as<br />
the lesser evil in a particular circumstance, philosophers have expressed different<br />
views: while, according to David Rodin, utilitarian philosophers can (in theory) conceive<br />
of cases in which the evil of terrorism is outweighed by the good that could not be<br />
achieved in a less morally costly way, in practice the "harmful effects of undermining the<br />
convention of non-combatant immunity is thought to outweigh the goods that may be<br />
achieved by particular acts of terrorism". Among the non-utilitarian philosophers,<br />
Michael Walzer argued that terrorism can be morally justified in only one specific case:<br />
Page 254 of 372
when "a nation or community faces the extreme threat of complete destruction and the<br />
only way it can preserve itself is by intentionally targeting non-combatants, then it is<br />
morally entitled to do so".<br />
<strong>In</strong> his book <strong>In</strong>side Terrorism Bruce Hoffman offered an explanation of why the term<br />
terrorism becomes distorted:<br />
On one point, at least, everyone agrees: terrorism is a pejorative term. It is a word with<br />
intrinsically negative connotations that is generally applied to one's enemies and opponents, or to<br />
those with whom one disagrees and would otherwise prefer to ignore. 'What is called terrorism,'<br />
Brian Jenkins has written, 'thus seems to depend on one's point of view. Use of the term implies a<br />
moral judgment; and if one party can successfully attach the label terrorist to its opponent, then it<br />
has indirectly persuaded others to adopt its moral viewpoint.' Hence the decision to call someone<br />
or label some organization terrorist becomes almost unavoidably subjective, depending largely on<br />
whether one sympathizes with or opposes the person/group/cause concerned. If one identifies<br />
with the victim of the violence, for example, then the act is terrorism. If, however, one identifies<br />
with the perpetrator, the violent act is regarded in a more sympathetic, if not positive (or, at the<br />
worst, an ambivalent) light; and it is not terrorism.<br />
<strong>The</strong> pejorative connotations of the word can be summed up in the aphorism, "One<br />
man's terrorist is another man's freedom fighter". This is exemplified when a group<br />
using irregular military methods is an ally of a state against a mutual enemy, but later<br />
Page 255 of 372
falls out with the state and starts to use those methods against its former ally. During<br />
World War II, the Malayan People's Anti-Japanese Army was allied with the British, but<br />
during the Malayan Emergency, members of its successor (the Malayan Races<br />
Liberation Army), were branded "terrorists" by the British. More recently, Ronald<br />
Reagan and others in the American administration frequently called the mujaheddin<br />
"freedom fighters" during the Soviet–Afghan War yet twenty years later, when a new<br />
generation of Afghan men were fighting against what they perceive to be a regime<br />
installed by foreign powers, their attacks were labelled "terrorism" by George W. Bush.<br />
Groups accused of terrorism understandably prefer terms reflecting legitimate military or<br />
ideological action. Leading terrorism researcher Professor Martin Rudner, director of the<br />
Canadian Centre of <strong>In</strong>telligence and Security Studies at Ottawa's Carleton University,<br />
defines "terrorist acts" as unlawful attacks for political or other ideological goals, and<br />
said:<br />
<strong>The</strong>re is the famous statement: 'One man's terrorist is another man's freedom fighter.' But that is<br />
grossly misleading. It assesses the validity of the cause when terrorism is an act. One can have a<br />
perfectly beautiful cause and yet if one commits terrorist acts, it is terrorism regardless.<br />
Some groups, when involved in a "liberation" struggle, have been called "terrorists" by<br />
the Western governments or media. Later, these same persons, as leaders of the<br />
liberated nations, are called "statesmen" by similar organizations. Two examples of this<br />
phenomenon are the Nobel Peace Prize laureates Menachem Begin and Nelson<br />
Mandela. WikiLeaks editor Julian Assange has been called a "terrorist" by Sarah Palin<br />
and Joe Biden.<br />
Sometimes, states that are close allies, for reasons of history, culture and politics, can<br />
disagree over whether or not members of a certain organization are terrorists. For<br />
instance, for many years, some branches of the United States government refused to<br />
label members of the Provisional Irish Republican Army (IRA) as terrorists while the IRA<br />
was using methods against one of the United States' closest allies (the United Kingdom)<br />
that the UK branded as terrorism. This was highlighted by the Quinn v. Robinson case.<br />
Media outlets who wish to convey impartiality may limit their usage of "terrorist" and<br />
"terrorism" because they are loosely defined, potentially controversial in nature, and<br />
subjective terms.<br />
History<br />
Depending on how broadly the term is defined, the roots and practice of terrorism can<br />
be traced at least to the 1st-century AD. Sicarii Zealots, though some dispute whether<br />
the group, a radical offshoot of the Zealots which was active in Judaea Province at the<br />
beginning of the 1st century AD, was in fact terrorist. According to the contemporary<br />
Jewish-Roman historian Josephus, after the Zealotry rebellion against Roman rule in<br />
Judea, when some prominent Jewish collaborators with Roman rule were killed, Judas<br />
of Galilee formed a small and more extreme offshoot of the Zealots, the Sicarii, in 6 AD.<br />
<strong>The</strong>ir terror was directed against Jewish "collaborators", including temple priests,<br />
Sadducees, Herodians, and other wealthy elites.<br />
Page 256 of 372
<strong>The</strong> term "terrorism" itself was originally used to describe the actions of the Jacobin<br />
Club during the "Reign of Terror" in the French Revolution. "Terror is nothing other than<br />
justice, prompt, severe, inflexible", said Jacobin leader Maximilien Robespierre. <strong>In</strong> 1795,<br />
Edmund Burke denounced the Jacobins for letting "thousands of those hell-hounds<br />
called Terrorists ... loose on the people" of France.<br />
<strong>In</strong> January 1858, Italian patriot Felice Orsini threw three bombs in an attempt to<br />
assassinate French Emperor Napoleon III. Eight bystanders were killed and 142 injured.<br />
<strong>The</strong> incident played a crucial role as an inspiration for the development of the early<br />
terrorist groups.<br />
Arguably the first organization to utilize modern terrorist techniques was the Irish<br />
Republican Brotherhood, founded in 1858 as a revolutionary Irish nationalist group that<br />
carried out attacks in England. <strong>The</strong> group initiated the Fenian dynamite campaign in<br />
1881, one of the first modern terror campaigns. <strong>In</strong>stead of earlier forms of terrorism<br />
based on political assassination, this campaign used modern, timed explosives with the<br />
express aim of sowing fear in the very heart of metropolitan Britain, in order to achieve<br />
political gains.<br />
Page 257 of 372
Another early terrorist group was Narodnaya Volya, founded in Russia in 1878 as a<br />
revolutionary anarchist group inspired by Sergei Nechayev and "propaganda by the<br />
deed" theorist Carlo Pisacane. <strong>The</strong> group developed ideas – such as targeted killing of<br />
the 'leaders of oppression' – that were to become the hallmark of subsequent violence<br />
by small non-state groups, and they were convinced that the developing technologies of<br />
the age – such as the invention of dynamite, which they were the first anarchist group to<br />
make widespread use of – enabled them to strike directly and with discrimination.<br />
Scholars of terrorism refer to four major waves of global terrorism: "the Anarchist, the<br />
Anti-Colonial, the <strong>New</strong> Left, and the Religious. <strong>The</strong> first three have been completed and<br />
lasted around 40 years; the fourth is now in its third decade."<br />
Types<br />
<strong>In</strong>fographics<br />
Depending on the country, the political system, and the time in history, the types of<br />
terrorism are varying.<br />
<strong>In</strong> early 1975, the Law Enforcement Assistant Administration in the United States<br />
formed the National Advisory Committee on Criminal Justice Standards and Goals. One<br />
of the five volumes that the committee wrote was titled Disorders and Terrorism,<br />
produced by the Task Force on Disorders and Terrorism under the direction of H. H. A.<br />
Cooper, Director of the Task Force staff.<br />
<strong>The</strong> Task Force defines terrorism as "a tactic or technique by means of which a violent<br />
act or the threat thereof is used for the prime purpose of creating overwhelming fear for<br />
coercive purposes". It classified disorders and terrorism into six categories:<br />
<br />
<br />
<br />
<br />
Civil Disorder – A form of collective violence interfering with the peace, security,<br />
and normal functioning of the community.<br />
Political Terrorism – Violent criminal behavior designed primarily to generate<br />
fear in the community, or substantial segment of it, for political purposes.<br />
Non-Political Terrorism – Terrorism that is not aimed at political purposes but<br />
which exhibits "conscious design to create and maintain a high degree of fear for<br />
coercive purposes, but the end is individual or collective gain rather than the<br />
achievement of a political objective".<br />
Quasi-Terrorism – <strong>The</strong> activities incidental to the commission of crimes of<br />
violence that are similar in form and method to genuine terrorism but which<br />
nevertheless lack its essential ingredient. It is not the main purpose of the quasiterrorists<br />
to induce terror in the immediate victim as in the case of genuine<br />
terrorism, but the quasi-terrorist uses the modalities and techniques of the<br />
genuine terrorist and produces similar consequences and reaction. For example,<br />
Page 258 of 372
the fleeing felon who takes hostages is a quasi-terrorist, whose methods are<br />
similar to those of the genuine terrorist but whose purposes are quite different.<br />
<br />
<br />
Limited Political Terrorism – Genuine political terrorism is characterized by a<br />
revolutionary approach; limited political terrorism refers to "acts of terrorism<br />
which are committed for ideological or political motives but which are not part of a<br />
concerted campaign to capture control of the state".<br />
Official or State Terrorism – "referring to nations whose rule is based upon fear<br />
and oppression that reach similar to terrorism or such proportions". It may be<br />
referred to as Structural Terrorism defined broadly as terrorist acts carried out<br />
by governments in pursuit of political objectives, often as part of their foreign<br />
policy.<br />
Other sources have defined the typology of terrorism in different ways, for example,<br />
broadly classifying it into domestic terrorism and international terrorism, or using<br />
categories such as vigilante terrorism or insurgent terrorism. One way the typology of<br />
terrorism may be defined:<br />
<br />
Political terrorism<br />
o<br />
Sub-state terrorism<br />
• Social revolutionary terrorism<br />
• Nationalist-separatist terrorism<br />
Page 259 of 372
• Religious extremist terrorism<br />
• Religious fundamentalist Terrorism<br />
• <strong>New</strong> religions terrorism<br />
• Right-wing terrorism<br />
• Left-wing terrorism<br />
• Communist terrorism<br />
o<br />
o<br />
State-sponsored terrorism<br />
Regime or state terrorism<br />
<br />
<br />
Criminal terrorism<br />
Pathological terrorism<br />
Motivations of Terrorists<br />
As well as there being no one agreed definition of terrorism, there is a similar lack of<br />
consensus regarding the causes – or motivations behind – terrorism. Numerous studies<br />
have identified certain behavioral and situational characteristics that are common, and<br />
perhaps causal, to the consequence of terrorism, specific analysis of case studies have<br />
led to suggested motivations to individual historical acts.<br />
A report conducted by Paul Gill, John Horgan and Paige Deckert on behalf of <strong>The</strong><br />
Department of security of UK highlights the vast discrepancies between individual cases<br />
of terrorism recorded. To begin with, 43 percent of lone wolf terrorism is motivated by<br />
religious beliefs. <strong>The</strong> same report indicates that just less than a third (32 percent) have<br />
pre-existing mental health disorders, while many more are found to have these<br />
problems upon arrest. At least 37 percent lived alone at the time of their event planning<br />
and/or execution, a further 26 percent lived with others, and no data were available for<br />
the remaining cases. 40 percent were unemployed at the time of their arrest or terrorist<br />
event. 19 percent subjectively experienced being disrespected by others, while 14<br />
percent experienced being the victim of verbal or physical assault.<br />
<strong>In</strong>timidation<br />
Attacks on 'collaborators' are used to intimidate people from cooperating with the state<br />
in order to undermine state control. This strategy was used in Ireland, in Kenya, in<br />
Algeria and in Cyprus during their independence struggles.<br />
<strong>In</strong>ternational Attention<br />
This strategy was used by Al-Qaeda in its attacks on the World Trade Center and the<br />
Pentagon in the United States on September 11, 2001. <strong>The</strong>se attacks are used to draw<br />
Page 260 of 372
international attention to struggles that are otherwise unreported, such as the<br />
Palestinian airplane hijackings in 1970 and the 1975 Dutch train hostage crisis.<br />
Local/<strong>In</strong>ternal Social Standing<br />
Abrahm suggests that terrorist organizations do not select terrorism for its political<br />
effectiveness. <strong>In</strong>dividual terrorists tend to be motivated more by a desire for social<br />
solidarity with other members of their organization than by political platforms or strategic<br />
objectives, which are often murky and undefined.<br />
Cultural Tolerance of Violence<br />
Additionally, Michael Mousseau shows possible relationships between the type of<br />
economy within a country and ideology associated with terrorism. Many terrorists have<br />
a history of domestic violence.<br />
Perceived Illegitimacy of <strong>The</strong> State<br />
Some terrorists like Timothy McVeigh were motivated by revenge against a state for its<br />
actions against its citizens.<br />
Page 261 of 372
Religious Beliefs/ Zealotry<br />
According to Paul Gill, John Horgan and Paige Deckert on behalf of <strong>The</strong> Department of<br />
security of UK, 43 percent of lone wolf terrorism is motivated by religious beliefs. <strong>The</strong><br />
same report indicates that Just less than a third (32 percent) have pre-existing mental<br />
health disorders, while many are found to have these problems upon arrest. At least 37<br />
percent lived alone at the time of their event planning and/or execution, a further 26<br />
percent lived with others, and no data were available for the remaining cases. 40<br />
percent were unemployed at the time of their arrest or terrorist event. Many were<br />
chronically unemployed and consistently struggled to hold any form of employment for a<br />
significant amount of time. 19 percent subjectively experienced being disrespected by<br />
others, while 14.3 percent experienced being the victim of verbal or physical assault.<br />
Mental Health<br />
Ariel Merari, a psychologist who has studied the psychological profiles of suicide<br />
terrorists since 1983 through media reports that contained biographical details,<br />
interviews with the suicides’ families, and interviews with jailed would-be suicide<br />
attackers, concluded that they were unlikely to be psychologically abnormal.<br />
<strong>In</strong> comparison to economic theories of criminal behaviour, Scott Atran found that suicide<br />
terrorists exhibit none of the socially dysfunctional attributes – such as fatherless,<br />
friendless, jobless situations – or suicidal symptoms. By which he means, they do not<br />
kill themselves simply out of hopelessness or a sense of 'having nothing to lose'.<br />
Nationalism<br />
Although a common factor in terrorism is a strong religious belief there are other factors<br />
such as cultural, social and political that wholly preclude religion. For example, the drive<br />
behind these Chechen terrorists are quite distinct and unique from others. Many of the<br />
Chechens considered themselves secular freedom fighters, nationalist insurgents<br />
seeking to establish an independent secular state of Chechnya. Although a distinction<br />
should be made between national Chechen terrorists and non-Chechen fighters who<br />
have adopted the idea from abroad. Few Chechen fighters fought for the jihads whereas<br />
most of the non-Chechen fighters did (Janeczko, 2014).<br />
Financial Support for Family<br />
Another factor are perceived assurances of financial stability for the actor's families, that<br />
they are given when they join a terrorist organization or complete an attempt of terror.<br />
An extra grant is provided for the families of suicide bombers.<br />
Democracy and Domestic Terrorism<br />
Terrorism is most common in nations with intermediate political freedom, and it is least<br />
common in the most democratic nations. one study suggests that suicide attacks may<br />
Page 262 of 372
e an exception to this general rule. Evidence regarding this particular method of<br />
terrorism reveals that every modern suicide campaign has targeted a democracy–a<br />
state with a considerable degree of political freedom. <strong>The</strong> study suggests that<br />
concessions awarded to terrorists during the 1980s and 1990s for suicide attacks<br />
increased their frequency. <strong>The</strong>re is a connection between the existence of civil liberties,<br />
democratic participation and terrorism. According to Young and Dugan, these things<br />
encourage terrorist groups to organize and generate terror.<br />
Some examples of "terrorism" in non-democratic nations include ETA in Spain under<br />
Francisco Franco (although the group's terrorist activities increased sharply after<br />
Franco's death), the Organization of Ukrainian Nationalists in pre-war Poland, the<br />
Shining Path in Peru under Alberto Fujimori, the Kurdistan Workers Party when Turkey<br />
was ruled by military leaders and the ANC in South Africa. Democracies, such as<br />
Japan, the United Kingdom, the United States, Israel, <strong>In</strong>donesia, <strong>In</strong>dia, Spain, Germany,<br />
Italy and the Philippines, have experienced domestic terrorism.<br />
While a democratic nation espousing civil liberties may claim a sense of higher moral<br />
ground than other regimes, an act of terrorism within such a state may cause a<br />
dilemma: whether to maintain its civil liberties and thus risk being perceived as<br />
ineffective in dealing with the problem; or alternatively to restrict its civil liberties and<br />
thus risk delegitimizing its claim of supporting civil liberties. For this reason, homegrown<br />
terrorism has started to be seen as a greater threat, as stated by former CIA Director<br />
Michael Hayden. This dilemma, some social theorists would conclude, may very well<br />
Page 263 of 372
play into the initial plans of the acting terrorist(s); namely, to delegitimize the state and<br />
cause a systematic shift towards anarchy via the accumulation of negative sentiments<br />
towards the state system.<br />
Religious Terrorism<br />
Terrorist acts throughout history have been performed on religious grounds with the<br />
goal to either spread or enforce a system of belief, viewpoint or opinion. <strong>The</strong> validity and<br />
scope of religious terrorism is limited to an individual's view or a group's view or<br />
interpretation of that belief system's teachings.<br />
According to the Global Terrorism <strong>In</strong>dex by the University of Maryland, College Park,<br />
religious extremism has overtaken national separatism and become the main driver of<br />
terrorist attacks around the world. Since 9/11 there has been a five-fold increase in<br />
deaths from terrorist attacks. <strong>The</strong> majority of incidents over the past several years can<br />
be tied to groups with a religious agenda. Before 2000, it was nationalist separatist<br />
terrorist organizations such as the IRA and Chechen rebels who were behind the most<br />
attacks. <strong>The</strong> number of incidents from nationalist separatist groups has remained<br />
relatively stable in the years since while religious extremism has grown. <strong>The</strong> prevalence<br />
of Islamist groups in Iraq, Afghanistan, Pakistan, Nigeria and Syria is the main driver<br />
behind these trends.<br />
Four of the terrorist groups that have been most active since 2001 are Boko Haram, Al<br />
Qaeda, the Taliban and ISIL. <strong>The</strong>se groups have been most active in Iraq, Afghanistan,<br />
Pakistan, Nigeria and Syria. 80 percent of all deaths from terrorism occurred in one of<br />
these five countries.<br />
Terrorism in Pakistan has become a great problem. From the summer of 2007 until late<br />
2009, more than 1,500 people were killed in suicide and other attacks on civilians for<br />
reasons attributed to a number of causes – sectarian violence between Sunni and Shia<br />
Muslims; easy availability of guns and explosives; the existence of a "Kalashnikov<br />
culture"; an influx of ideologically driven Muslims based in or near Pakistan, who<br />
originated from various nations around the world and the subsequent war against the<br />
pro-Soviet Afghans in the 1980s which blew back into Pakistan; the presence of Islamist<br />
insurgent groups and forces such as the Taliban and Lashkar-e-Taiba. Pakistan is the<br />
10th most dangerous country by criminality index. On July 2, 2013 in Lahore, 50 Muslim<br />
scholars of the Sunni Ittehad Council (SIC) issued a collective fatwa against suicide<br />
bombings, the killing of innocent people, bomb attacks, and targeted killings declaring<br />
them as Haraam or forbidden.<br />
<strong>In</strong> 2015, the Southern Poverty Law Center released a report on terrorism in the United<br />
States. <strong>The</strong> report (titled <strong>The</strong> Age of the Wolf) found that during that period, "more<br />
people have been killed in America by non-Islamic domestic terrorists than jihadists."<br />
<strong>The</strong> "virulent racist and anti-semitic" ideology of the ultra-right wing Christian Identity<br />
movement is usually accompanied by anti-government sentiments. Adherents of<br />
Christian Identity believe that whites of European descent can be traced back to the<br />
Page 264 of 372
"Lost Tribes of Israel" and many consider Jews to be the Satanic offspring of Eve and<br />
the Serpent. This group has committed hate crimes, bombings and other acts of<br />
terrorism. Its influence ranges from the Ku Klux Klan and neo-Nazi groups to the antigovernment<br />
militia and sovereign citizen movements. Christian Identity's origins can be<br />
traced back to Anglo-Israelism. Anglo-Israelism held the view that Jews were<br />
descendants of ancient Israelites who had never been lost. By the 1930s, the<br />
movement had been infected with anti-Semitism, and eventually Christian Identity<br />
theology diverged from traditional Anglo-Israelism, and developed what is known as the<br />
"two seed" theory. According to the two-seed theory, the Jewish people are descended<br />
from Cain and the serpent (not from Shem). <strong>The</strong> white European seedline is descended<br />
from the "lost tribes" of Israel. <strong>The</strong>y hold themselves to "God's laws", not to "man's<br />
laws", and they do not feel bound to a government that they consider run by Jews and<br />
the <strong>New</strong> World Order.<br />
Israel has had problems with Jewish religious terrorism. Yigal Amir assassinated Israeli<br />
Prime Minister Yitzhak Rabin in 1995. For Amir, killing Rabin was an exemplary act that<br />
symbolized the fight against an illegitimate government that was prepared to cede<br />
Jewish Holy Land to the Palestinians.<br />
Perpetrators<br />
<strong>The</strong> perpetrators of acts of terrorism can be individuals, groups, or states. According to<br />
some definitions, clandestine or semi-clandestine state actors may carry out terrorist<br />
acts outside the framework of a state of war. the most common image of terrorism is<br />
that it is carried out by small and secretive cells, highly motivated to serve a particular<br />
cause and many of the most deadly operations in recent times, such as the September<br />
Page 265 of 372
11 attacks, the London underground bombing, 2008 Mumbai attacks and the 2002 Bali<br />
bombing were planned and carried out by a close clique, composed of close friends,<br />
family members and other strong social networks. <strong>The</strong>se groups benefited from the free<br />
flow of information and efficient telecommunications to succeed where others had failed.<br />
Over the years, much research has been conducted to distill a terrorist profile to explain<br />
these individuals' actions through their psychology and socio-economic circumstances.<br />
Others, like Roderick Hindery, have sought to discern profiles in the propaganda tactics<br />
used by terrorists. Some security organizations designate these groups as violent nonstate<br />
actors. A 2007 study by economist Alan B. Krueger found that terrorists were less<br />
likely to come from an impoverished background (28 percent vs. 33 percent) and more<br />
likely to have at least a high-school education (47 percent vs. 38 percent). Another<br />
analysis found only 16 percent of terrorists came from impoverished families, vs. 30<br />
percent of male Palestinians, and over 60 percent had gone beyond high school, vs. 15<br />
percent of the populace.<br />
A study into the poverty-stricken conditions and whether or not, terrorists are more likely<br />
to come from here, show that people who grew up in these situations tend to show<br />
aggression and frustration towards others. This theory is largely debated for the simple<br />
fact that just because one is frustrated, does not make them a potential terrorist.<br />
To avoid detection, a terrorist will look, dress, and behave normally until executing the<br />
assigned mission. Some claim that attempts to profile terrorists based on personality,<br />
physical, or sociological traits are not useful. <strong>The</strong> physical and behavioral description of<br />
the terrorist could describe almost any normal person. the majority of terrorist attacks<br />
are carried out by military age men, aged 16–40.<br />
Non-State Groups<br />
Groups not part of the state apparatus of in opposition to the state are most commonly<br />
referred to as a "terrorist" in the media.<br />
According to the Global Terrorism Database, the most active terrorist group in the<br />
period 1970 to 2010 was Shining Path (with 4,517 attacks), followed by Farabundo<br />
Marti National Liberation Front (FMLN), Irish Republican Army (IRA), Basque<br />
Fatherland and Freedom (ETA), Revolutionary Armed Forces of Colombia (FARC),<br />
Taliban, Liberation Tigers of Tamil Eelam, <strong>New</strong> People's Army, National Liberation Army<br />
of Colombia (ELN), and Kurdistan Workers Party (PKK).<br />
State Sponsors<br />
A state can sponsor terrorism by funding or harboring a terrorist group. Opinions as to<br />
which acts of violence by states consist of state-sponsored terrorism vary widely. When<br />
states provide funding for groups considered by some to be terrorist, they rarely<br />
acknowledge them as such.<br />
Page 266 of 372
State Terrorism<br />
Civilization is based on a clearly defined and widely accepted yet often unarticulated<br />
hierarchy. Violence done by those higher on the hierarchy to those lower is nearly<br />
always invisible, that is, unnoticed. When it is noticed, it is fully rationalized. Violence<br />
done by those lower on the hierarchy to those higher is unthinkable, and when it does<br />
occur it is regarded with shock, horror, and the fetishization of the victims.<br />
— Derrick Jensen<br />
As with "terrorism" the concept of "state terrorism" is controversial. <strong>The</strong> Chairman of the<br />
United Nations Counter-Terrorism Committee has stated that the Committee was<br />
conscious of 12 international Conventions on the subject, and none of them referred to<br />
State terrorism, which was not an international legal concept. If States abused their<br />
power, they should be judged against international conventions dealing with war crimes,<br />
international human rights law, and international humanitarian law. Former United<br />
Nations Secretary-General Kofi Annan has said that it is "time to set aside debates on<br />
so-called 'state terrorism'. <strong>The</strong> use of force by states is already thoroughly regulated<br />
under international law". he made clear that, "regardless of the differences between<br />
governments on the question of the definition of terrorism, what is clear and what we<br />
can all agree on is that any deliberate attack on innocent civilians [or non-combatants],<br />
regardless of one's cause, is unacceptable and fits into the definition of terrorism."<br />
USS Arizona (BB-39) burning during the Japanese surprise attack on Pearl Harbor,<br />
December 7, 1941.<br />
State terrorism has been used to refer to terrorist acts committed by governmental<br />
agents or forces. This involves the use of state resources employed by a state's foreign<br />
policies, such as using its military to directly perform acts of terrorism. Professor of<br />
Political Science Michael Stohl cites the examples that include the German bombing of<br />
London, the Japanese bombing of Pearl Harbor, the British and American firebombing<br />
of Dresden, and the U.S. atomic bombings of Hiroshima and Nagasaki during World<br />
War II. He argues that "the use of terror tactics is common in international relations and<br />
Page 267 of 372
the state has been and remains a more likely employer of terrorism within the<br />
international system than insurgents." He cites the first strike option as an example of<br />
the "terror of coercive diplomacy" as a form of this, which holds the world hostage with<br />
the implied threat of using nuclear weapons in "crisis management" and he argues that<br />
the institutionalized form of terrorism has occurred as a result of changes that took<br />
place following World War II. <strong>In</strong> this analysis, state terrorism exhibited as a form of<br />
foreign policy was shaped by the presence and use of weapons of mass destruction,<br />
and the legitimizing of such violent behavior led to an increasingly accepted form of this<br />
behavior by the state.<br />
Charles Stewart Parnell described William Ewart Gladstone's Irish Coercion Act as<br />
terrorism in his "no-Rent manifesto" in 1881, during the Irish Land War. <strong>The</strong> concept is<br />
used to describe political repressions by governments against their own civilian<br />
populations with the purpose of inciting fear. For example, taking and executing civilian<br />
hostages or extrajudicial elimination campaigns are commonly considered "terror" or<br />
terrorism, for example during the Red Terror or the Great Terror. Such actions are often<br />
described as democide or genocide, which have been argued to be equivalent to state<br />
terrorism.<br />
Empirical studies on this have found that democracies have little democide. Western<br />
democracies, including the United States, have supported state terrorism and mass<br />
killings, with some examples being the <strong>In</strong>donesian mass killings of 1965–66 and<br />
Operation Condor.<br />
Connection with Tourism<br />
<strong>The</strong> connection between terrorism and tourism has been widely studied since the Luxor<br />
massacre in Egypt. <strong>In</strong> the 1970s, the targets of terrorists were politicians and chiefs of<br />
police while now, international tourists and visitors are selected as the main targets of<br />
attacks. <strong>The</strong> attacks on the World Trade Center and the Pentagon on September 11,<br />
2001, were the symbolic epicenter, which marked a new epoch in the use of civil<br />
transport against the main power of the planet. From this event onwards, the spaces of<br />
leisure that characterized the pride of West, were conceived as dangerous and frightful.<br />
Funding<br />
State sponsors have constituted a major form of funding; for example, Palestine<br />
Liberation Organization, Democratic Front for the Liberation of Palestine and other<br />
groups considered to be terrorist organizations, were funded by the Soviet Union. <strong>The</strong><br />
Stern Gang received funding from Italian Fascist officers in Beirut to undermine the<br />
British Mandate for Palestine. Pakistan has created and nurtured terrorist groups as<br />
policy for achieving tactical objectives against its neighbors, especially <strong>In</strong>dia.<br />
"Revolutionary tax" is another major form of funding, and essentially a euphemism for<br />
"protection money". Revolutionary taxes "play a secondary role as one other means of<br />
intimidating the target population".<br />
Page 268 of 372
Other major sources of funding include kidnapping for ransoms, smuggling (including<br />
wildlife smuggling), fraud, and robbery. <strong>The</strong> Islamic State in Iraq and the Levant has<br />
reportedly received funding "via private donations from the Gulf states".<br />
<strong>The</strong> Financial Action Task Force is an inter-governmental body whose mandate, since<br />
October 2001, has included combating terrorist financing.<br />
Tactics<br />
Terrorist attacks are often targeted to maximize fear and publicity, usually using<br />
explosives or poison. Terrorist groups usually methodically plan attacks in advance, and<br />
may train participants, plant undercover agents, and raise money from supporters or<br />
through organized crime. Communications occur through modern telecommunications,<br />
or through old-fashioned methods such as couriers. <strong>The</strong>re is concern about terrorist<br />
attacks employing weapons of mass destruction.<br />
Terrorism is a form of asymmetric warfare, and is more common when direct<br />
conventional warfare will not be effective because forces vary greatly in power.<br />
<strong>The</strong> context in which terrorist tactics are used is often a large-scale, unresolved political<br />
conflict. <strong>The</strong> type of conflict varies widely; historical examples include:<br />
<br />
<br />
<br />
Secession of a territory to form a new sovereign state or become part of a<br />
different state<br />
Dominance of territory or resources by various ethnic groups<br />
Imposition of a particular form of government<br />
Page 269 of 372
Economic deprivation of a population<br />
Opposition to a domestic government or occupying army<br />
Religious fanaticism<br />
Responses<br />
Responses to terrorism are broad in scope. <strong>The</strong>y can include re-alignments of the<br />
political spectrum and reassessments of fundamental values.<br />
Specific types of responses include:<br />
<br />
<br />
<br />
<br />
<br />
<br />
Targeted laws, criminal procedures, deportations, and enhanced police powers<br />
Target hardening, such as locking doors or adding traffic barriers<br />
Preemptive or reactive military action<br />
<strong>In</strong>creased intelligence and surveillance activities<br />
Preemptive humanitarian activities<br />
More permissive interrogation and detention policies<br />
<strong>The</strong> term "counter-terrorism" has a narrower connotation, implying that it is directed at<br />
terrorist actors.<br />
Response in <strong>The</strong> United States<br />
According to the TSA, this is what the remote TSA agent would see on their screen.<br />
According to a report by Dana Priest and William M. Arkin in <strong>The</strong> Washington Post,<br />
"Some 1,271 government organizations and 1,931 private companies work on programs<br />
related to counterterrorism, homeland security and intelligence in about 10,000<br />
locations across the United States."<br />
America's thinking on how to defeat radical Islamists is split along two very different<br />
schools of thought. Republicans, typically follow what is known as the Bush Doctrine,<br />
advocate the military model of taking the fight to the enemy and seeking to democratize<br />
the Middle East. Democrats, by contrast, generally propose the law enforcement model<br />
of better cooperation with nations and more security at home. <strong>In</strong> the introduction of the<br />
U.S. Army / Marine Corps Counterinsurgency Field Manual, Sarah Sewall states the<br />
need for "U.S. forces to make securing the civilian, rather than destroying the enemy,<br />
their top priority. <strong>The</strong> civilian population is the center of gravity – the deciding factor in<br />
the struggle.... Civilian deaths create an extended family of enemies – new insurgent<br />
recruits or informants – and erode support of the host nation." Sewall sums up the<br />
book's key points on how to win this battle: "Sometimes, the more you protect your<br />
force, the less secure you may be.... Sometimes, the more force is used, the less<br />
effective it is.... <strong>The</strong> more successful the counterinsurgency is, the less force can be<br />
used and the more risk must be accepted.... Sometimes, doing nothing is the best<br />
reaction." This strategy, often termed "courageous restraint", has certainly led to some<br />
Page 270 of 372
success on the Middle East battlefield, yet it fails to address the central truth: the<br />
terrorists we face are mostly homegrown.<br />
Terrorism Research<br />
Terrorism research, called terrorism and counter-terrorism research, is an<br />
interdisciplinary academic field which seeks to understand the causes of terrorism, how<br />
to prevent it as well as its impact in the broadest sense. Terrorism research can be<br />
carried out in both military and civilian contexts, for example by research centers such<br />
as the British Centre for the Study of Terrorism and Political Violence, the Norwegian<br />
Centre for Violence and Traumatic Stress Studies, and the <strong>In</strong>ternational Centre for<br />
Counter-Terrorism (ICCT). <strong>The</strong>re are several academic journals devoted to the field.<br />
<strong>In</strong>ternational Agreements<br />
One of the agreements that promote the international legal anti-terror framework is the<br />
Code of Conduct Towards Achieving a World Free of Terrorism that was adopted at the<br />
73rd session of the United Nations General Assembly in 2018. <strong>The</strong> Code of Conduct<br />
was initiated by Kazakhstan President Nursultan Nazarbayev. Its main goal is to<br />
implement a wide range of international commitments to counter terrorism and establish<br />
a broad global coalition towards achieving a world free of terrorism by 2045. <strong>The</strong> Code<br />
was signed by more than 70 countries.<br />
Mass Media<br />
Mass media exposure may be a primary goal of those carrying out terrorism, to expose<br />
issues that would otherwise be ignored by the media. Some consider this to be<br />
manipulation and exploitation of the media.<br />
<strong>The</strong> <strong>In</strong>ternet has created a new channel for groups to spread their messages. This has<br />
created a cycle of measures and counter measures by groups in support of and in<br />
opposition to terrorist movements. <strong>The</strong> United Nations has created its own online<br />
counter-terrorism resource.<br />
<strong>The</strong> mass media will, on occasion, censor organizations involved in terrorism (through<br />
self-restraint or regulation) to discourage further terrorism. This may encourage<br />
organizations to perform more extreme acts of terrorism to be shown in the mass<br />
media. Conversely James F. Pastor explains the significant relationship between<br />
terrorism and the media, and the underlying benefit each receives from the other.<br />
<strong>The</strong>re is always a point at which the terrorist ceases to manipulate the media gestalt. A<br />
point at which the violence may well escalate, but beyond which the terrorist has<br />
become symptomatic of the media gestalt itself. Terrorism as we ordinarily understand it<br />
is innately media-related.<br />
— Novelist William Gibson<br />
Page 271 of 372
Former British Prime Minister Margaret Thatcher famously spoke of the close<br />
connection between terrorism and the media, calling publicity 'the oxygen of terrorism'.<br />
Outcome of Terrorist Groups<br />
How terrorist groups end (n = 268): <strong>The</strong> most common ending for a terrorist group is to<br />
convert to nonviolence via negotiations (43 percent), with most of the rest terminated by<br />
routine policing (40 percent). Groups that were ended by military force constituted only<br />
7 percent.<br />
Jones and Libicki (2008) created a list of all the terrorist groups they could find that were<br />
active between 1968 and 2006. <strong>The</strong>y found 648. of those, 136 splintered and 244 were<br />
still active in 2006. Of the ones that ended, 43 percent converted to nonviolent political<br />
actions, like the Irish Republican Army in Northern Ireland. Law enforcement took out 40<br />
percent. Ten percent won. Only 20 groups, 7 percent, were taken out by military force.<br />
Forty-two groups became large enough to be labeled an insurgency; 38 of those had<br />
ended by 2006. Of those, 47 percent converted to nonviolent political actors. Only 5<br />
percent were taken out by law enforcement. 26 percent won. 21 percent succumbed to<br />
military force. Jones and Libicki concluded that military force may be necessary to deal<br />
with large insurgencies but are only occasionally decisive, because the military is too<br />
often seen as a bigger threat to civilians than the terrorists. To avoid that, the rules of<br />
engagement must be conscious of collateral damage and work to minimize it.<br />
Page 272 of 372
Another researcher, Audrey Cronin, lists six primary ways that terrorist groups end:<br />
1. Capture or killing of a group's leader. (Decapitation).<br />
2. Entry of the group into a legitimate political process. (Negotiation).<br />
3. Achievement of group aims. (Success).<br />
4. Group implosion or loss of public support. (Failure).<br />
5. Defeat and elimination through brute force. (Repression).<br />
6. Transition from terrorism into other forms of violence. (Reorientation).<br />
Databases<br />
<strong>The</strong> following terrorism databases are or were made publicly available for research<br />
purposes, and track specific acts of terrorism:<br />
<br />
<br />
<br />
<br />
Global Terrorism Database, an open-source database by the University of<br />
Maryland, College Park on terrorist events around the world from 1970 through<br />
2017 with more than 150,000 cases.<br />
MIPT Terrorism Knowledge Base<br />
Worldwide <strong>In</strong>cidents Tracking System<br />
Tocsearch (dynamic database)<br />
<strong>The</strong> following public report and index provides a summary of key global trends and<br />
patterns in terrorism around the world<br />
<br />
Global Terrorism <strong>In</strong>dex, produced annually by the <strong>In</strong>stitute for Economics and<br />
Peace<br />
Page 273 of 372
<strong>The</strong> following publicly available resources index electronic and bibliographic resources<br />
on the subject of terrorism<br />
<br />
Human Security Gateway<br />
<strong>The</strong> following terrorism databases are maintained in secrecy by the United States<br />
Government for intelligence and counter-terrorism purposes:<br />
<br />
<br />
Terrorist Identities Datamart Environment<br />
Terrorist Screening Database<br />
Jones and Libicki (2008) includes a table of 268 terrorist groups active between 1968<br />
and 2006 with their status as of 2006: still active, splintered, converted to nonviolence,<br />
removed by law enforcement or military, or won. (<strong>The</strong>se data are not in a convenient<br />
machine-readable format but are available.)<br />
Page 274 of 372
XVIII. <strong>The</strong>ft<br />
<strong>In</strong> common usage, <strong>The</strong>ft is the taking of another person's property or services without<br />
that person's permission or consent with the intent to deprive the rightful owner of it. <strong>The</strong><br />
word is also used as an informal shorthand term for some crimes against property, such<br />
as burglary, embezzlement, larceny, looting, robbery, shoplifting, library theft, and fraud<br />
(obtaining money under false pretenses). <strong>In</strong> some jurisdictions, theft is considered to be<br />
synonymous with larceny; in others, theft has replaced larceny. Someone who carries<br />
out an act of or makes a career of theft is known as a thief. <strong>The</strong> act of theft is also<br />
known by other terms such as stealing, thieving, and filching.<br />
<strong>The</strong>ft is the name of a statutory offence in California, Canada, England and Wales,<br />
Hong Kong, Northern Ireland, the Republic of Ireland, and the Australian states of South<br />
Australia, and Victoria.<br />
Elements<br />
<strong>The</strong> actus reus of theft is usually defined as an unauthorized taking, keeping, or using of<br />
another's property which must be accompanied by a mens rea of dishonesty and the<br />
intent permanently to deprive the owner or rightful possessor of that property or its use.<br />
For example, if X goes to a restaurant and, by mistake, takes Y's scarf instead of her<br />
own, she has physically deprived Y of the use of the property (which is the actus reus)<br />
but the mistake prevents X from forming the mens rea (i.e., because she believes that<br />
she is the owner, she is not dishonest and does not intend to deprive the "owner" of it)<br />
Page 275 of 372
so no crime has been committed at this point. But if she realizes the mistake when she<br />
gets home and could return the scarf to Y, she will steal the scarf if she dishonestly<br />
keeps it (see theft by finding). Note that there may be civil liability for the torts of<br />
trespass to chattels or conversion in either eventuality.<br />
Canada<br />
By Jurisdiction<br />
Section 322(1) of the Criminal Code provides the general definition for theft in Canada:<br />
322. (1) Every one commits theft who fraudulently and without color of right takes, or<br />
fraudulently and without color of right converts to his/her use or to the use of another<br />
person, anything, whether animate or inanimate, with intent<br />
(a) to deprive, temporarily or absolutely, the owner of it, or a person who has a special<br />
property or interest in it, of the thing or of his property or interest in it;<br />
(b) to pledge it or deposit it as security;<br />
(c) to part with it under a condition with respect to its return that the person who parts<br />
with it may be unable to perform; or<br />
(d) to deal with it in such a manner that it cannot be restored in the condition in which it<br />
was at the time it was taken or converted.<br />
Sections 323 to 333 provide for more specific instances and exclusions:<br />
theft from oyster beds (s. 323)<br />
theft by bailee of things under seizure (s. 324)<br />
exception when agent is pledging goods (s. 325)<br />
theft of telecommunications service (s. 326)<br />
possession of device to obtain telecommunication facility or service (s. 327)<br />
theft by or from person having special property or interest (s. 328)<br />
theft by person required to account (s. 330)<br />
theft by person holding power of attorney (s. 331)<br />
misappropriation of money held under direction (s. 332)<br />
exception for ore taken for exploration or scientific research (s. 333)<br />
<strong>In</strong> the general definition above, the Supreme Court of Canada has construed "anything"<br />
very broadly, stating that it is not restricted to tangibles, but includes intangibles. To be<br />
the subject of theft it must, however:<br />
<br />
<br />
<br />
<br />
be property of some sort;<br />
be property capable of being<br />
taken (therefore intangibles are excluded); or<br />
converted (and may be an intangible);<br />
Page 276 of 372
taken or converted in a way that deprives the owner of his/her proprietary interest<br />
in some way.<br />
Because of this, confidential information cannot be the subject of theft, as it is not<br />
capable of being taken as only tangibles can be taken. It cannot be converted, not<br />
because it is an intangible, but because, save in very exceptional far-fetched<br />
circumstances, the owner would never be deprived of it. However, the theft of trade<br />
secrets in certain circumstances does constitute part of the offence of economic<br />
espionage, which can be prosecuted under s. 19 of the Security of <strong>In</strong>formation Act.<br />
For the purposes of punishment, Section 334 divides theft into two separate offences,<br />
according to the value and nature of the goods stolen:<br />
<br />
<br />
<br />
If the thing stolen is worth more than $5000 or is a testamentary instrument the<br />
offence is commonly referred to as <strong>The</strong>ft Over $5000 and is an indictable<br />
offence with a maximum punishment of 10 years imprisonment.<br />
Where the stolen item is not a testamentary instrument and is not worth more<br />
than $5000 it is known as <strong>The</strong>ft Under $5000 and is a hybrid offence, meaning<br />
that it can be treated either as an indictable offence or a less serious summary<br />
conviction offence, depending on the choice of the prosecutor.<br />
if dealt with as an indictable offence, it is punishable by imprisonment for not<br />
more than 2 years, and,<br />
Page 277 of 372
if treated as a summary conviction offence, it is punishable by 6 months<br />
imprisonment, a fine of $2000 or both.<br />
Where a motor vehicle is stolen, Section 333.1 provides for a maximum punishment of<br />
10 years for an indictable offence (and a minimum sentence of six months for a third or<br />
subsequent conviction), and a maximum sentence of 18 months on summary<br />
conviction.<br />
Hong Kong<br />
Article 2 of the <strong>The</strong>ft Ordinance provides the general definition of theft in Hong Kong:<br />
(1) A person commits theft if he dishonestly appropriates property belonging to another<br />
with the intention of permanently depriving the other of it; and thief and steal shall be<br />
construed accordingly.<br />
(2) It is immaterial whether the appropriation is made with a view to gain, or is made for<br />
the thief’s own benefit.<br />
<strong>The</strong> Netherlands<br />
<strong>The</strong>ft is a crime with related articles in the Wetboek van Strafrecht.<br />
<br />
<br />
Article 310 prohibits theft (Dutch: diefstal), which is defined as taking away any<br />
object that (partly) belongs to someone else, with the intention to appropriate it<br />
illegally. Maximum imprisonment is 4 years or a fine of the fifth category.<br />
Article 311 consists of the following:<br />
o<br />
Part 1. Punishable with maximum imprisonment of 6 years or a fine of the<br />
fourth category is:<br />
• 1. <strong>The</strong>ft of cattle;<br />
• 2. <strong>The</strong>ft during certain emergency occasions;<br />
• 3. <strong>The</strong>ft during night in a residence by someone who is there<br />
without knowledge or permission of the owner;<br />
• 4. <strong>The</strong>ft by 2 or more organized people;<br />
• 5. <strong>The</strong>ft, where the thief got access by means of violence, climbing<br />
in, using false keys or disguise;<br />
• 6. Terroristic theft.<br />
o<br />
Part 2. When theft if committed as in 3 with the situation of 4 and 5, the<br />
punishment is a maximum imprisonment of 9 years or a fine of the fifth<br />
category.<br />
<br />
Article 312 consists of the following:<br />
Page 278 of 372
o<br />
o<br />
Part 1 prohibits robbery (Dutch: beroving), which is defined as taking away<br />
any object with violence or with threat of violence. Maximum imprisonment<br />
is 9 years or a fine with the fifth category<br />
Part 2 allows maximum imprisonment of 12 years or a fine of the fifth<br />
category when:<br />
• 1. Robbery was committed during night, in a residence, on the<br />
public road or moving train;<br />
• 2. Robbery was committed by 2 or more people;<br />
• 3. Robbery was committed by violence, climbing in, false key or<br />
disguise;<br />
• 4. Robbery caused severe injury;<br />
• 5. Robbery was terroristic.<br />
o<br />
Part 3 allows maximum imprisonment of 15 years instead of 12 when<br />
robbery caused death to the victim.<br />
<br />
Article 314 consists of the following:<br />
Page 279 of 372
o<br />
o<br />
Part 1 prohibits poaching (Dutch: stroperij), which is defined as taking<br />
away without violence the following: clay, sand, earth, raw wood, fallen<br />
vegetables (see the source for a complete list). Maximum imprisonment is<br />
one month or a fine of the second category.<br />
Part 2 increases the maximum imprisonment to 2 months when the crime<br />
is committed again less than 2 years after the first time.<br />
<br />
Article 315 increases the maximum imprisonment and fine category when<br />
poaching is done with vehicles and draft animals. Maximum imprisonment is 3<br />
years or a fine of the fourth category.<br />
Republic of Ireland<br />
<strong>The</strong>ft is a statutory offence, created by section 4(1) of the Criminal Justice (<strong>The</strong>ft and<br />
Fraud Offences) Act, 2001.<br />
Romania<br />
According to the Romanian Penal Code a person committing theft (furt) can face a<br />
penalty ranging from 1 to 20 years.<br />
Degrees of theft:<br />
<br />
<br />
<br />
<br />
Article 208: <strong>The</strong>ft (1 to 12 years)—When a person steals an object, or uses a<br />
vehicle without permission and no aggravating circumstances apply.<br />
Article 209: Qualified theft (3 to 20 years)<br />
Aggravating circumstances (3 to 15 years): a) by two or more persons together;<br />
b) by a person in possession of a gun or a narcotic substance; c) by a masked or<br />
disguised person; d) against a person who cannot defend his or herself; e) in a<br />
public place; f) in a public transportation vehicle; g) during nighttime; h) during a<br />
natural disaster; i) through burglary, or by using an original or copied key; j)<br />
stealing national treasures; k) stealing official identity papers with the intention to<br />
make use of them; l) stealing official identity badges with the intention to make<br />
use of them.<br />
Aggravating circumstances (4 to 18 years): a) stealing petrol-based products<br />
directly from transportation pipes and vehicles or deposits; b) stealing<br />
components from national electrification, telecommunication, irrigation networks<br />
or from any type of navigational system; c) stealing a siren; d) stealing a public<br />
intervention vehicle or device; e) stealing something which jeopardises the safety<br />
of public transportation.<br />
Page 280 of 372
Aggravating circumstances (10 to 20 years): when the consequences are<br />
extremely grave and affect public institutions or the material stolen is worth over<br />
200,000 RON (approximately US$80,000).<br />
United Kingdom<br />
England and Wales<br />
<strong>In</strong> England and Wales, theft is a statutory offence, created by section 1(1) of the <strong>The</strong>ft<br />
Act 1968. This offence replaces the former offences of larceny, embezzlement and<br />
fraudulent conversion.<br />
<strong>The</strong> marginal note to section 1 of the <strong>The</strong>ft Act 1968 describes it as a "basic definition"<br />
of theft. Sections 1(1) and (2) provide:<br />
1.-(1) A person is guilty of theft, if he dishonestly appropriates property belonging to<br />
another with the intention of permanently depriving the other of it; and "thief" and "steal"<br />
shall be construed accordingly.<br />
(2) It is immaterial whether the appropriation is made with a view to gain, or is made for<br />
the thief’s own benefit.<br />
Page 281 of 372
Sections 2 to 6 of the <strong>The</strong>ft Act 1968 have effect as regards the interpretation and<br />
operation of section 1 of that Act. Except as otherwise provided by that Act, sections 2<br />
to 6 of that Act apply only for the purposes of section 1 of that Act.<br />
Appropriates<br />
Section 3 provides:<br />
(1) Any assumption by a person of the rights of an owner amounts to an appropriation,<br />
and this includes, where he has come by the property (innocently or not) without<br />
stealing it, any later assumption of a right to it by keeping or dealing with it as owner.<br />
(2) Where property or a right or interest in property is or purports to be transferred for<br />
value to a person acting in good faith, no later assumption by him of rights which he<br />
believed himself to be acquiring shall, by reason of any defect in the transferor’s title,<br />
amount to theft of the property.<br />
Property<br />
Section 4(1) provides that:<br />
"Property" includes money and all other property, real or personal, including things in<br />
action and other intangible property.<br />
Edward Griew said that section 4(1) could, without changing its meaning, be reduced,<br />
by omitting words, to:<br />
"Property" includes … all … property.<br />
Sections 4(2) to (4) provide that the following can only be stolen under certain<br />
circumstances:<br />
Land or things forming part of land and severed from it (s. 4(2))<br />
Mushrooms growing wild on any land, or the flowers, fruit or foliage of plants<br />
growing wild on any land (s. 4(3))<br />
Wild creatures or the carcases of wild creatures (s. 4(4))<br />
<strong>In</strong>tangible property<br />
Confidential information and trade secrets are not property within the meaning of<br />
section 4.<br />
<strong>The</strong> words "other intangible property" include export quotas that are transferable for<br />
value on a temporary or permanent basis.<br />
Page 282 of 372
Electricity<br />
Electricity cannot be stolen. It is not property within the meaning of section 4 and is not<br />
appropriated by switching on a current. Cf. the offence of abstracting electricity under<br />
section 13.<br />
Belonging to Another<br />
Section 5 "belonging to another" requires a distinction to be made between ownership,<br />
possession and control:<br />
<br />
<br />
<br />
ownership is where a person is not legally accountable to anyone else for the use<br />
of the property:<br />
possession is where a person is only accountable to the owner for the use of the<br />
property; and<br />
control is where a person is only accountable to two people for the use of the<br />
property.<br />
So if A buys a car for cash, A will be the owner. If A then lends the car to B Ltd (a<br />
company), B Ltd will have possession. C, an employee of B Ltd then uses the car and<br />
has control. If C uses the car in an unauthorized way, C will steal the car from A and B<br />
Ltd. This means that it is possible to steal one's own property.<br />
<strong>In</strong> R v Turner, the owner removed his car from the forecourt of a garage where it had<br />
been left for collection after repair. He intended to avoid paying the bill. <strong>The</strong>re was an<br />
appropriation of the car because it had been physically removed but there were two<br />
issues to be decided:<br />
Page 283 of 372
did the car "belong to another"? <strong>The</strong> garage had a lien i.e. a "proprietary right or<br />
interest" in the car as security for the unpaid bill and this gave the garage a better<br />
right than the owner to possess the car at the relevant time.<br />
what was the relevance of Turner's belief that he could not steal his own<br />
property? <strong>The</strong> defence of mistake of law only applies if the defendant honestly<br />
believes that he has a right in law to act in the given way. Generalized and nonspecific<br />
beliefs about what the law might permit are not a defense.<br />
With <strong>The</strong> <strong>In</strong>tention of Permanently Depriving <strong>The</strong> Other of It<br />
Section 6 "with the intent to permanently deprive the other of it" is sufficiently flexible to<br />
include situations where the property is later returned. For example, suppose that B, a<br />
keen football fan, has bought a ticket for the next home match. T takes the ticket,<br />
watches the match and then returns the ticket to B. <strong>In</strong> this instance, all that T returns is<br />
a piece of paper. Its value as a license to enter the stadium on a particular day has<br />
been permanently lost. Hence, T steals the ticket.<br />
Similarly, if T takes a valuable antique but later repents and returns the goods, T has<br />
committed the actus reus with the mens rea. <strong>The</strong> fact that T's conscience forces a<br />
change of mind is relevant only for sentencing.<br />
Alternative Verdict<br />
<strong>The</strong> offense created by section 12(1) of the <strong>The</strong>ft Act 1968 (TWOC) is available an<br />
alternative verdict on an indictment for theft.<br />
Visiting forces<br />
<strong>The</strong>ft is an offence against property for the purposes of section 3 of the Visiting Forces<br />
Act 1952.<br />
Mode of Trial and Sentence<br />
<strong>The</strong>ft is triable either way. A person guilty of theft is liable, on conviction on indictment,<br />
to imprisonment for a term not exceeding seven years, or on summary conviction to<br />
imprisonment for a term not exceeding six months, or to a fine not exceeding the<br />
prescribed sum, or to both.<br />
Aggravated <strong>The</strong>ft<br />
<strong>The</strong> only offence of aggravated theft is robbery, contrary to section 8 of the <strong>The</strong>ft Act<br />
1968.<br />
Page 284 of 372
Stolen Goods<br />
For the purposes of the provisions of the <strong>The</strong>ft Act 1968 which relate to stolen goods,<br />
goods obtain in England or Wales or elsewhere by blackmail or fraud are regarded as<br />
stolen, and the words "steal", "theft" and "thief" are construed accordingly.<br />
Sections 22 to 24 and 26 to 28 of the <strong>The</strong>ft Act 1968 contain references to stolen goods.<br />
Handling stolen goods<br />
<strong>The</strong> offence of handling stolen goods, contrary to section 22(1) of the <strong>The</strong>ft Act 1968,<br />
can only be committed "otherwise than in the course of stealing".<br />
Similar or Associated Offences<br />
According to its title, the <strong>The</strong>ft<br />
theft and similar or associated<br />
1978.<br />
Act 1968 revises the law as to<br />
offences. See also the <strong>The</strong>ft Act<br />
Northern Ireland<br />
<strong>In</strong> Northern Ireland, theft is a<br />
statutory offence, created by<br />
section 1 of the <strong>The</strong>ft Act (Northern Ireland) 1969.<br />
United States<br />
<strong>In</strong> the United States, plenary regulation of theft exists only at<br />
the state level, in the sense that most thefts by default will be<br />
prosecuted by the state in which the theft occurred. <strong>The</strong> federal<br />
government has criminalized certain narrow categories of theft which<br />
directly affect federal agencies or interstate commerce. <strong>The</strong> Model Penal Code includes<br />
categories of theft by unlawful taking or by unlawfully disposing of property, theft by<br />
deception (fraud), theft by extortion, theft by failure to take measures to return lost or<br />
mislaid or mistakenly delivered property, theft by receipt of stolen property, theft by<br />
failing to make agreed disposition of received funds, and theft of services.<br />
Although many U.S. states have retained larceny as the primary offense, [40] some have<br />
now adopted theft provisions.<br />
Grand theft, also called grand larceny, is a term used throughout the United States<br />
designating theft that is large in magnitude or serious in potential penological<br />
consequences. Grand theft is contrasted with petty theft, also called petit theft, that is<br />
of smaller magnitude or lesser seriousness.<br />
<strong>The</strong>ft laws, including the distinction between grand theft and petty theft for cases falling<br />
within its jurisdiction, vary by state. This distinction is established by statute, as are the<br />
Page 285 of 372
penological consequences. Most commonly, statutes establishing the distinction<br />
between grand theft and petty theft do so on the basis of the value of the money or<br />
property taken by the thief or lost by the victim, with the dollar threshold for grand theft<br />
varying from state to state. Most commonly, the penological consequences of the<br />
distinction include the significant one that grand theft can be treated as a felony, while<br />
petty theft is generally treated as a misdemeanor.<br />
<strong>In</strong> some states, grand theft of a vehicle may be charged as "grand theft auto" (see<br />
motor vehicle theft for more information).<br />
Repeat offenders who continue to steal may become subject to life imprisonment in<br />
certain states.<br />
Sometimes the federal anti-theft-of-government-property law 18 U.S.C. § 640 is used to<br />
prosecute cases where the Espionage Act would otherwise be involved; the theory<br />
being that by retaining sensitive information, the defendant has taken a 'thing of value'<br />
from the government. For examples, see the Amerasia case and United States v.<br />
Manning.<br />
Alabama<br />
When stolen property exceeds the amount of $500 it is a felony offense. If property is<br />
less than $500, then it is a Class A misdemeanor. Unlike some other states, shoplifting<br />
is not defined by a separate statute but falls under the state's general theft statute.<br />
Alaska<br />
<strong>The</strong> Alaska State Code does not use the terms "grand theft" or "grand larceny."<br />
However, it specifies that theft of property valued at more than $1,000 is a felony<br />
whereas thefts of lesser amounts are misdemeanors. <strong>The</strong> felony categories (class 1<br />
and class 2 theft) also include theft of firearms; property taken from the person of<br />
another; vessel or aircraft safety or survival equipment; and of access devices.<br />
Arizona<br />
Felony theft is committed when the value of the stolen property exceeds $1000.<br />
Regardless of the value of the item, if it is a firearm or an animal taken for the purpose<br />
of animal fighting, then the theft is a Class 6 Felony.<br />
California<br />
<strong>The</strong> <strong>The</strong>ft Act of 1927 consolidated a variety of common law crimes into theft. <strong>The</strong> state<br />
now distinguishes between two types of theft, grand theft and petty theft. <strong>The</strong> older<br />
crimes of embezzlement, larceny, and stealing, and any preexisting references to them<br />
now fall under the theft statute.<br />
Page 286 of 372
<strong>The</strong>re are a number of criminal statutes in the California Penal Code defining grand<br />
theft in different amounts. Grand theft generally consists of the theft of something of<br />
value over $950 (including money, labor or property but is lower with respect to various<br />
specified property), <strong>The</strong>ft is also considered grand theft when more than $250 in crops<br />
or marine life forms are stolen, “when the property is taken from the person of another,”<br />
or when the property stolen is an automobile, farm animal, or firearm.<br />
Petty theft is the default category for all other thefts.<br />
Grand theft is punishable by up to a year in jail or prison, and may be charged<br />
(depending upon the circumstances) as a misdemeanor or felony, while petty theft is a<br />
misdemeanor punishable by a fine or imprisonment not exceeding six months in jail or<br />
both.<br />
Florida<br />
<strong>In</strong> general, any property taken that carries a value of more than $300 can be considered<br />
grand theft in certain circumstances.<br />
Georgia<br />
<strong>In</strong> Georgia, when a theft offense involves property valued at $500 or less, the crime is<br />
punishable as a misdemeanor.<br />
Any theft of property determined to be exceeding $500 may be treated as grand theft<br />
and charged as a felony.<br />
Page 287 of 372
Hawaii<br />
<strong>The</strong>ft in the first or second degree is a felony. <strong>The</strong>ft in the first degree means theft<br />
above $20,000 or of a firearm or explosive; or theft over $300 during a declared<br />
emergency. <strong>The</strong>ft in the second degree means theft above $750, theft from the person<br />
of another, or agricultural products over $100 or aqua-cultural products from an<br />
enclosed property.<br />
Illinois<br />
<strong>The</strong>ft is a felony if the value of the property exceeds $300 or the property is stolen from<br />
the person of another. Thresholds at $10,000, $100,000, and $500,000 determine how<br />
severe the punishment can be. <strong>The</strong> location from which property was stolen is also a<br />
factor in sentencing.<br />
Kentucky<br />
KRS 514.030 states that theft by unlawful taking or disposition is generally a Class A<br />
misdemeanor unless the items stolen are a firearm, anhydrous ammonia, a controlled<br />
substance valued at less than $10,000 or any other item or combination of items valued<br />
$500 or higher and less than $10,000 in which case the theft is a Class D felony.<br />
<strong>The</strong>ft of items valued at $10,000 or higher and less than $1,000,000 is a Class C felony.<br />
<strong>The</strong>ft of items valued at $1,000,000 or more is a Class B felony, as is first offense theft<br />
of anhydrous ammonia for the express purpose of manufacturing methamphetamines in<br />
violation of KRS 218A.1432. <strong>In</strong> the latter case, subsequent offenses are a Class A<br />
felony.<br />
Massachusetts<br />
<strong>In</strong> Massachusetts, theft may generally be charged as a felony alue of stolen property is<br />
greater than $250.<br />
Missouri<br />
Stealing is a felony if the value of stolen property exceeds $500. It is also a felony if<br />
“<strong>The</strong> actor physically takes the property appropriated from the person of the victim” or<br />
the stolen property is a vehicle, legal document, credit card, firearm, explosive, U.S. flag<br />
on display, livestock animal, fish with value exceeding $75, captive wildlife, controlled<br />
substance, or ammonia.<br />
Stealing in excess of $25,000 is usually a class B felony (sentence: 5–15 years), while<br />
any other felony stealing (not including the felonies of burglary or robbery) that does not<br />
involve chemicals is a class C felony (sentence: up to 7 years). Non-felony stealing is a<br />
class A misdemeanor (sentence: up to 1 year).<br />
Page 288 of 372
<strong>New</strong> York<br />
Grand larceny consists of stealing property with a value exceeding $1000; or stealing a<br />
public record, secret scientific material, firearm, credit or debit card, ammonia,<br />
telephone with service, or motor vehicle or religious item with value exceeding $100; or<br />
stealing from the person of another or by extortion or from an ATM.<br />
<strong>The</strong> degree of grand larceny is increased if the theft was from an ATM, through<br />
extortion involving fear, or involved a value exceeding the thresholds of $3,000,<br />
$50,000, or $1,000,000.<br />
Vermont<br />
Grand Larceny: Value of goods exceed $900 (13 V.S.A. § 2501)<br />
Virginia<br />
Grand Larceny: Value of goods exceed $200 (Virginia Code § 18.2-95)<br />
Washington State<br />
<strong>The</strong>ft of goods valued between $750 and $5000 is second-degree theft, a Class C<br />
felony. <strong>The</strong>ft of goods valued above $5000, of a search-and-rescue dog on duty, of<br />
public records from a public office or official, of metal wire from a utility, or of an access<br />
device, is a Class B felony, as is theft of a motor vehicle or a firearm.<br />
Page 289 of 372
Australia<br />
Actus reus<br />
Victoria<br />
<strong>The</strong>ft is defined in the <strong>Crime</strong>s Act 1958 (Vic) as when a person "dishonestly<br />
appropriates property belonging to another with the intention of permanently depriving<br />
the other of it.". <strong>The</strong> actus reus and mens rea are defined as follows: Appropriation is<br />
defined in section 73(4) of the <strong>Crime</strong>s Act 1958 (Vic) as the assumption of any of the<br />
owners rights. It does not have to be all the owner's rights, as long as at least one right<br />
has been assumed. If the owner gave their consent to the appropriation there cannot be<br />
an appropriation. However, if this consent is obtained by deception, this consent is<br />
vitiated.<br />
Property – defined in section 71(1) of the <strong>Crime</strong>s Act 1958 (Vic) as being both tangible<br />
property, including money and intangible property. <strong>In</strong>formation has been held not be<br />
property.<br />
Belonging to another – section 73(5) of the <strong>Crime</strong>s Act 1958 (Vic) provides that property<br />
belongs to another if that person has ownership, possession, or a proprietary interest in<br />
the property. Property can belong to more than one person. sections 73(9) & 73(10)<br />
deal with situations where the accused receives property under an obligation or by<br />
mistake.<br />
South Australia<br />
<strong>The</strong>ft is defined in section 134 of the Criminal Consolidation Act 1935 (SA) as being<br />
where a person deals with property dishonestly, without the owners consent and<br />
intending to deprive the owner of their property, or make a serious encroachment on the<br />
proprietary rights of the owner.<br />
Under this law, encroachment on proprietary rights means that the property is dealt with<br />
in a way that creates a substantial risk that the property will not be returned to the<br />
owner, or that the value of the property will be greatly diminished when the owner does<br />
get it back.<br />
Also, where property is treated as the defendants own property to dispose of,<br />
disregarding the actual property owner's rights.<br />
For a basic offence, a person found guilty of this offence is liable for imprisonment of up<br />
to 10 years.<br />
For an aggravated offence, a person found guilty of this offence is liable for<br />
imprisonment of up to 15 years.<br />
Page 290 of 372
Mens Rea<br />
Victoria<br />
<strong>In</strong>tention to permanently deprive – defined at s.73(12) as treating property as it belongs<br />
to the accused, rather than the owner.<br />
Dishonestly – section 73(2) of the <strong>Crime</strong>s Act 1958 (Vic) creates a negative definition of<br />
the term 'dishonestly'. <strong>The</strong> section deems only three circumstances when the accused<br />
is deemed to have been acting honestly. <strong>The</strong>se are a belief in a legal claim of right, a<br />
belief that the owner would have consented, or a belief the owner could not be found.<br />
South Australia<br />
Whether a person's conduct is dishonest is a question of fact to be determined by the<br />
jury, based on their own knowledge and experience. As with the definition in Victoria, it<br />
contains definitions of what is not dishonesty, including a belief in a legal claim of right<br />
or a belief the owner could not be found.<br />
West <strong>In</strong>dies<br />
Page 291 of 372
<strong>In</strong> the British West <strong>In</strong>dies, especially Grenada, there have been a spate of large-scale<br />
thefts of tons of sand from beaches. Both Grenada and Jamaica are considering<br />
increasing fines and jail time for the thefts.<br />
Islam<br />
Religious Views and Practices<br />
<strong>In</strong> parts of the world which govern with sharia law, the punishment for theft is<br />
amputation of the right hand if the thief does not repent. This ruling is derived from sura<br />
5 verse 38 of the Quran which states As to the thief, Male or female, cut off his or her<br />
hands: a punishment by way of example, from Allah, for their crime: and Allah is Exalted<br />
in power. This is viewed as being a deterrent.<br />
Buddhism<br />
<strong>In</strong> Buddhism, one of the five precepts prohibits theft, and involves the intention to steal<br />
what one perceives as not belonging to oneself ("what is not given") and acting<br />
successfully upon that intention. <strong>The</strong> severity of the act of theft is judged by the worth of<br />
the owner and the worth of that which is stolen. Underhand dealings, fraud, cheating<br />
and forgery are also included in this precept. Professions that are seen to violate the<br />
precept against theft are working in the gambling industry or marketing products that are<br />
not actually required for the customer.<br />
Psychology<br />
Possible causes for acts of theft include both economic and non-economic motivations.<br />
For example, an act of theft may be a response to the offender's feelings of anger, grief,<br />
depression, anxiety and compulsion, boredom, power and control issues, low selfesteem,<br />
a sense of entitlement, an effort to conform or fit in with a peer group, or<br />
rebellion. <strong>The</strong>ft from work may be attributed to factors that include greed, perceptions of<br />
economic need, support of a drug addiction, a response to or revenge for work-related<br />
issues, rationalization that the act is not actually one of stealing, response to<br />
opportunistic temptation, or the same emotional issues that may be involved in any<br />
other act of theft.<br />
<strong>The</strong> most common reasons for shoplifting include participation in an organized<br />
shoplifting ring, opportunistic theft, compulsive acts of theft, thrill-seeking, and theft due<br />
to need. Studies focusing on shoplifting by teenagers suggest that minors shoplift for<br />
reasons including the novelty of the experience, peer pressure, the desire to obtain<br />
goods that a minor cannot legally purchase, and for economic reasons, as well as selfindulgence<br />
and rebellion against parents.<br />
Page 292 of 372
XIX. Witness Tampering<br />
and <strong>In</strong>timidation<br />
Witness Tampering is the act of attempting to alter or prevent the testimony of<br />
witnesses within criminal or civil proceedings. Laws regarding witness tampering also<br />
apply to proceedings before the U.S. Congress, executive departments, and<br />
administrative agencies. To be charged with witness tampering in the United States, the<br />
attempt to alter or prevent testimony is sufficient. <strong>The</strong>re is no requirement that the<br />
intended obstruction of justice be completed.<br />
<strong>In</strong> situations where intimidation or retaliation against witnesses is likely (such as cases<br />
involving organized crime), witnesses may be placed in witness protection to prevent<br />
suspects or their colleagues from intimidating or harming them.<br />
<strong>In</strong> the United Kingdom, witness intimidation is covered by Criminal Justice and Public<br />
Order Act 1994, section 51. Under this act it is an offence to perform an act which is<br />
intended to and does intimidate a person who the offender knows or believes to be<br />
involved with a criminal case with the intention of disturbing the proceedings.<br />
United States<br />
<strong>In</strong> the United States, the crime of witness tampering in federal cases is defined by<br />
statute at 18 U.S.C. § 1512, which defines it as "tampering with a witness, victim, or an<br />
informant." <strong>The</strong> punishment for such an offense is up to 20 years if physical force was<br />
Page 293 of 372
used, attempted, or threatened. <strong>The</strong> tampering need not have actually been successful<br />
in order for it to be criminal.<br />
One of the better known cases involving Section 1512 is Arthur Andersen LLP v. United<br />
States, decided by the U.S. Supreme Court in May 2005. <strong>The</strong> Supreme Court ruled that<br />
Section 1512 had been misinterpreted by the Fifth Circuit Court of Appeals, and<br />
reversed the decision of the lower court which had found the firm guilty of violating the<br />
section. <strong>The</strong> issue had, to some extent, become moot, because in 2002 the firm had all<br />
but dissolved as a result of prosecution on this criminal charge.<br />
Examples of witness tampering include American politicians Buddy Cianci, Meg Scott<br />
Phipps and Ted Klaudt, convicted in 2001, 2003 and 2007, respectively.<br />
England and Wales<br />
<strong>In</strong> England and Wales, witness intimidation by unlawful means, such as violence,<br />
bribery, threats, or improper pressure, is known as Perverting the course of justice.<br />
Section 51 of the Criminal Justice and Public Order Act 1994 includes the offences of<br />
intimidating a witness and taking revenge on a witness.<br />
Kosovo<br />
By prosecutors<br />
A current source of controversy is the lack of penalties for prosecutors who commit<br />
witness tampering or other forms of prosecutorial misconduct. <strong>In</strong> the United States,<br />
prosecutors have full immunity from civil liability regardless of how egregious their<br />
actions may be. However, prosecutors do not have immunity from criminal proceedings<br />
and can be professionally censured, but studies demonstrate that this rarely happens.<br />
<strong>In</strong> March 2003, the U.S. Fifth Circuit Court of Appeals, ruled against a man named<br />
Shareef Cousin, who filed a lawsuit against <strong>New</strong> Orleans prosecutors after he was<br />
wrongfully convicted of the 1995 murder of Michael Gerardi. A number of examples of<br />
witness tampering during the trial were uncovered. <strong>In</strong> court, a friend of Cousin's was<br />
expected to testify for the prosecution that Cousin had confessed to him. <strong>In</strong>stead, he<br />
told jurors that he had been promised leniency in his own trial if he would falsely<br />
implicate Cousin for the murder.<br />
An eyewitness then testified that she saw Cousin commit the murder. Her original<br />
statement to police indicated that she had very poor vision and could not identify the<br />
killer. Her statements regarding her vision were not disclosed to the defense. Cousin<br />
also accused the state of illegally detaining many of his witnesses to prevent them from<br />
testifying in his defense.<br />
Page 294 of 372
<strong>In</strong>timidation<br />
<strong>In</strong>timidation (also called cowing) is intentional behavior that "would cause a person of<br />
ordinary sensibilities" to fear injury or harm. It is not necessary to prove that the<br />
behavior was so violent as to cause mean terror or that the victim was actually<br />
frightened.<br />
Threat, criminal threatening (or threatening behavior) is the crime of intentionally or<br />
knowingly putting another person in fear of bodily injury. "Threat of harm generally<br />
involves a perception of injury...physical or mental damage...act or instance of injury, or<br />
a material and detriment or loss to a person." "A terroristic threat is a crime generally<br />
involving a threat to commit violence communicated with the intent to terrorize other."<br />
"<strong>In</strong>timidation" is the name of a criminal offense in several U.S. states.<br />
Description<br />
Threatening behaviors may be conceptualized as a maladaptive outgrowth of normal<br />
competitive urge for inter-relational dominance generally seen in animals. Alternatively,<br />
intimidation may result from the type of society in which individuals are socialized, as<br />
human beings are generally reluctant to engage in confrontation or threaten violence.<br />
Like all behavioral traits, it exists in greater or lesser manifestation in each individual<br />
person over time, but may be a more significant "compensatory behavior" for some as<br />
opposed to others. Behavioral theorists often see threatening behaviors as a<br />
consequence of being threatened by others, including parents, authority figures,<br />
playmates and siblings. "Use of force is justified when a person reasonably believes that<br />
Page 295 of 372
it is necessary for the defense of oneself or another against the immediate use of<br />
unlawful force."<br />
<strong>In</strong>timidation may be employed consciously or unconsciously, and a percentage of<br />
people who employ it consciously may do so as the result of selfishly rationalized<br />
notions of its appropriation, utility or self-empowerment. <strong>In</strong>timidation related to prejudice<br />
and discrimination may include conduct "which annoys, threatens, intimidates, alarms,<br />
or puts a person in fear of their safety...because of a belief or perception regarding such<br />
person's race, color, national origin, ancestry, gender, religion, religious practice, age,<br />
disability or sexual orientation, regardless of whether the belief or perception is correct."<br />
<strong>In</strong>timidation may be manifested in such manner as physical contacts, glowering<br />
countenance, emotional manipulation, verbal abuse, making someone feel lower than<br />
you, purposeful embarrassment and/or actual physical assault. "Behavior may include,<br />
but is not limited to, epithets, derogatory comments or slurs and lewd propositions,<br />
assault, impeding or blocking movement, offensive touching or any physical interference<br />
with normal work or movement, and visual insults, such as derogatory posters or<br />
cartoons."<br />
United States<br />
As a Criminal Offense<br />
"<strong>In</strong>timidation" is the name of a criminal offense in several U.S. states. <strong>The</strong> definitions of<br />
the crime of <strong>In</strong>timidation differ by state.<br />
<strong>In</strong> Montana, <strong>In</strong>timidation is defined as follows:<br />
45-5-203. <strong>In</strong>timidation.<br />
(1) A person commits the offense of intimidation when, with the purpose to cause<br />
another to perform or to omit the performance of any act, the person communicates to<br />
another, under circumstances that reasonably tend to produce a fear that it will be<br />
carried out, a threat to perform without lawful authority any of the following acts:<br />
(a) inflict physical harm on the person threatened or any other person;<br />
(b) subject any person to physical confinement or restraint; or<br />
(c) commit any felony.<br />
(2) A person commits the offense of intimidation if the person knowingly communicates<br />
a threat or false report of a pending fire, explosion, or disaster that would endanger life<br />
or property.<br />
(3) A person convicted of the offense of intimidation shall be imprisoned in the state<br />
prison for any term not to exceed 10 years or be fined an amount not to exceed<br />
$50,000, or both.<br />
Page 296 of 372
Several states have a crime called "Ethnic intimidation". For instance, the law of the<br />
state of Michigan reads:<br />
750.147b Ethnic intimidation.<br />
Sec. 147b.<br />
(1) A person is guilty of ethnic intimidation if that person maliciously, and with specific<br />
intent to intimidate or harass another person because of that person's race, color,<br />
religion, gender, or national origin, does any of the following:<br />
(a) Causes physical contact with another person.<br />
(b) Damages, destroys, or defaces any real or personal property of another<br />
person.<br />
(c) Threatens, by word or act, to do an act described in subdivision (a) or (b), if<br />
there is reasonable cause to believe that an act described in subdivision (a) or<br />
(b) will occur.<br />
(2) Ethnic intimidation is a felony punishable by imprisonment for not more than 2 years,<br />
or by a fine of not more than $5,000.00, or both.<br />
(3) Regardless of the existence or outcome of any criminal prosecution, a person who<br />
suffers injury to his or her person or damage to his or her property as a result of ethnic<br />
intimidation may bring a civil cause of action against the person who commits the<br />
offense to secure an injunction, actual damages, including damages for emotional<br />
distress, or other appropriate relief. A plaintiff who prevails in a civil action brought<br />
pursuant to this section may recover both of the following:<br />
(a) Damages in the amount of 3 times the actual damages described in this<br />
subsection or $2,000.00, whichever is greater.<br />
(b) Reasonable attorney fees and costs.<br />
<strong>Crime</strong>s closely related to intimidation are menacing, coercion, terrorizing, and<br />
assault.<br />
<strong>In</strong> California, making criminal threats is a wobbler and may be charged as either a<br />
misdemeanor or a felony under California Penal Code 422. A felony criminal threat is a<br />
strike under California's three strikes law.<br />
As a Civil Offense<br />
United States<br />
<strong>In</strong>timidation can also be a civil offense, in addition to a criminal offense, in some U.S.<br />
states. For example, in Oregon a violation of the state criminal statute for intimidation<br />
Page 297 of 372
esults in a civil violation. <strong>The</strong> plaintiff in the civil suit for intimidation may then secure<br />
remedies including an injunction or special and general damages.<br />
Page 298 of 372
XX. Transnational <strong>Crime</strong><br />
Transnational <strong>Crime</strong>s are crimes that have actual or potential effect across national<br />
borders and crimes that are intrastate but offend fundamental values of the international<br />
community. <strong>The</strong> term is commonly used in the law enforcement and academic<br />
communities. Transnational organized crime (TOC) refers specifically to transnational<br />
crime carried out by crime organizations.<br />
<strong>The</strong> word transnational describes crimes that are not only international (that is, crimes<br />
that cross borders between countries), but crimes that by their nature involve crossborder<br />
transference as an essential part of the criminal activity. Transnational crimes<br />
also include crimes that take place in one country, but their consequences significantly<br />
affect another country and transit countries may also be involved.<br />
Examples of transnational crimes include: human trafficking, people smuggling,<br />
smuggling/trafficking of goods (such as arms trafficking and drug trafficking and illegal<br />
animal and plant products and other goods prohibited on environmental grounds (e.g.<br />
banned ozone depleting substances), sex slavery, terrorism offences, torture and<br />
apartheid.<br />
Transnational crimes may also be crimes of customary international law or international<br />
crimes when committed in certain circumstances. For example, they may in certain<br />
situations constitute crimes against humanity.<br />
Page 299 of 372
<strong>In</strong> Failed or Failing States<br />
<strong>The</strong> international community is confronted with an increasing level of transnational<br />
crime in which criminal conduct in one country has an impact in another or even several<br />
others. Drug trafficking, human trafficking, computer crimes, terrorism, and a host of<br />
other crimes can involve actors operating outside the borders of a country which might<br />
have a significant interest in stemming the activity in question and prosecuting the<br />
perpetrator. Contemporary transnational crimes take advantage of globalization, trade<br />
liberalization and exploding new technologies to perpetrate diverse crimes and to move<br />
money, goods, services and people instantaneously for purposes of perpetrating<br />
violence for political ends.<br />
Moreover, problems of weakened states and transnational crime create an unholy<br />
confluence that is uniquely challenging. When a criminal operates outside the territory of<br />
an offended state, the offended state might ordinarily appeal to the state from which the<br />
criminal is operating to take some sort of action, such as to prosecute the offender<br />
domestically or extradite the offender so that he or she may face punishment in the<br />
offended state. Nonetheless, in situations in which a government is unable (or unwilling)<br />
to cooperate in the arrest or prosecution of a criminal, the offended state has few<br />
options for recourse. [3]<br />
<strong>In</strong>ternational Cooperation<br />
Given the limits on the exercise of extraterritorial enforcement jurisdiction, states have<br />
developed mechanisms to cooperate in transnational criminal matters. <strong>The</strong> primary<br />
mechanisms used in this regard are extradition, lawful removal, and mutual legal<br />
assistance.<br />
Extradition is the mechanism by which one sovereign requests and obtains custody of a<br />
fugitive located within the jurisdiction and control of another sovereign. It is an ancient<br />
mechanism, dating back to at least the thirteenth century BCE, when an Egyptian<br />
Pharaoh negotiated an extradition treaty with a Hittite King. Through the extradition<br />
process, a sovereign (the requesting state) typically makes a formal request to another<br />
sovereign (the requested state). If the fugitive is found within the territory of the<br />
requested state, then the requested state may arrest the fugitive and subject him or her<br />
to its extradition process. <strong>The</strong> extradition procedures to which the fugitive will be<br />
subjected are dependent on the law and practice of the requested state.<br />
Aside from mechanisms for the return of fugitives, states have also developed<br />
mechanisms for requesting and obtaining evidence for criminal investigations and<br />
prosecutions. When evidence or other forms of legal assistance, such as witness<br />
statements or the service of documents, are needed from a foreign sovereign, states<br />
may attempt to cooperate informally through their respective police agencies or,<br />
alternatively, resort to what is typically referred to as requests for "mutual legal<br />
assistance" [3] <strong>The</strong> practice of mutual legal assistance developed from the comity-based<br />
system of letters rogatory, though it is now far more common for states to make mutual<br />
Page 300 of 372
legal assistance requests directly to the designated "Central Authorities" within each<br />
state. <strong>In</strong> contemporary practice, such requests may still be made on the basis of<br />
reciprocity but may also be made pursuant to bilateral and multilateral treaties that<br />
obligate countries to provide assistance. Many countries are able to provide a broad<br />
range of mutual legal assistance to other countries even in the absence of a treaty.<br />
Torture<br />
<strong>The</strong>re can be few issues on which international legal opinion is more clear than on the<br />
condemnation of torture. Offenders have been recognized as the "common enemies of<br />
mankind"<br />
— Lord Bingham<br />
Page 301 of 372
Page 302 of 372
XXI. Criminal Enterprises, Gangs<br />
and Syndicates<br />
This is a listing of enterprises, gangs, mafias and syndicates that are involved in<br />
organized crime. Tongs and outlaw motorcycle gangs, as well as terrorist, militant, and<br />
paramilitary groups are mentioned if they are involved in criminal activity for funding.<br />
However, since their stated aim and genesis is often ideological rather than commercial,<br />
they are distinct from mafia-type groups.<br />
Drug Cartels<br />
<strong>In</strong> several drug-producing or transit countries, drug traffickers have taken advantage of<br />
local corruption and lack of law enforcement to establish cartels turning in millions if not<br />
billions of dollars each year. Sometimes if government enforcement is particularly poor,<br />
the cartels become quasi-paramilitary organizations.<br />
Latin America<br />
<br />
<br />
<br />
Dominican drug cartels<br />
o Paulino organization<br />
o Féliz organization<br />
Bolivian drug cartels (See also García Meza regime drug trafficking)<br />
o La Corporación<br />
o Santa Cruz cartel<br />
Nicaraguan drug cartels (see also Contras)<br />
o Oscar Danilo Blandón<br />
Page 303 of 372
Peruvian drug cartels (see also Shining Path and Vladimiro Montesinos)<br />
o Zevallos organisation<br />
Honduran drug cartels<br />
o Matta organization<br />
o Cachiros<br />
Venezuelan drug cartels (see also Colectivos)<br />
o Cartel of the Suns<br />
Colombia<br />
Active<br />
<br />
<br />
Bandas criminales (See also Paramilitarism in Colombia)<br />
o Clan del Golfo<br />
<strong>The</strong> Office of Envigado<br />
Defunct<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Medellín Cartel (See also Muerte a Secuestradores)<br />
o<br />
• Miami branch<br />
Cali Cartel (see also Los Pepes)<br />
Norte del Valle Cartel<br />
North Coast Cartel<br />
Leticia Cartel<br />
Los Rastrojos<br />
<strong>New</strong> Generation<br />
Los Nevados<br />
Los Machos<br />
Popular Revolutionary Antiterrorist Army of Colombia<br />
Bloque Meta<br />
Libertadores del Vichada<br />
Black Eagles<br />
Mexico<br />
<br />
<br />
Sinaloa Cartel<br />
o Milenio Cartel (defunct)<br />
o Colima Cartel (defunct)<br />
o Artistas Asesinos (defunct)<br />
o Gente Nueva<br />
o Jalisco <strong>New</strong> Generation Cartel<br />
o Los Ántrax<br />
Gulf Cartel<br />
o Los Rojos<br />
o Los Metros<br />
Page 304 of 372
Los Zetas<br />
o Guatemala branch (defunct)<br />
Knights Templar Cartel<br />
La Familia Michoacana (defunct)<br />
o La Resistencia (defunct)<br />
Juárez Cartel (disbanded)<br />
o La Linea<br />
Tijuana Cartel (disbanded)<br />
o Oaxaca Cartel (defunct)<br />
o Los Santos street gang<br />
Guadalajara Cartel (defunct)<br />
o Sonora Cartel (defunct)<br />
Beltrán-Leyva Cartel (defunct)<br />
o Los Negros (defunct)<br />
o Los Pelones (defunct)<br />
o Los Mazatlecos (still active)<br />
o Guerreros Unidos (still active)<br />
o South Pacific Cartel (defunct)<br />
o <strong>In</strong>dependent Cartel of Acapulco (defunct)<br />
o La Barredora (defunct)<br />
Los Narcosatánicos (defunct)<br />
Asia<br />
<br />
<br />
Golden Triangle<br />
o Burmese drug cartels(see also Myanmar Nationalities Democratic Alliance<br />
Army)<br />
• Khun Sa cartel (see also Mong Tai Army)<br />
• Red Wa Cartel (see also United Wa State Army and National<br />
Democratic Alliance Army)<br />
• Hawngleuk Militia<br />
• Han cartel<br />
o Laotian drug cartels (see also Ouane Rattikone)<br />
Golden Crescent<br />
o Afridi Network<br />
o Afghan drug cartels (see also Taliban)<br />
• Noorzai Organization<br />
• Khan organization<br />
• Karzai organization (alleged)<br />
• Bagcho organization<br />
• Haqqani Network<br />
Page 305 of 372
North American <strong>Organized</strong> <strong>Crime</strong><br />
Canada<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Rivard organization<br />
Red Scorpions<br />
Bacon Brothers<br />
West End Gang<br />
Dubois Brothers<br />
<strong>In</strong>do-Canadian organized crime<br />
o Punjabi Mafia जोहल गिरोह (Canada)<br />
Canadian mafia families<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Rizzuto crime family<br />
Cuntrera-Caruana Mafia clan<br />
Cotroni crime family<br />
Musitano crime family<br />
Papalia crime family<br />
Perri crime family<br />
Siderno Group<br />
Commisso 'ndrina<br />
Luppino crime family<br />
United States<br />
<br />
<br />
<br />
National <strong>Crime</strong> Syndicate<br />
o Seven Group<br />
o Murder, <strong>In</strong>c.<br />
Prohibition-era gangs<br />
o Galveston<br />
• Downtown Gang<br />
• Beach Gang<br />
• <strong>The</strong> Maceo syndicate<br />
o Broadway Mob<br />
o <strong>The</strong> Lanzetta Brothers<br />
o Shelton Brothers Gang<br />
o Sheldon Gang<br />
o Circus Cafe Gang<br />
o Wandering Family<br />
Polish Mob<br />
o Saltis-McErlane Gang<br />
o Kielbasa Posse<br />
o <strong>The</strong> Greenpoint Crew<br />
o Flats Mob<br />
o <strong>The</strong> Flathead gang<br />
Page 306 of 372
Dixie Mafia<br />
o Cornbread Mafia<br />
o State Line Mob<br />
Wall gang<br />
Greek-American organized crime<br />
o Philadelphia Greek Mob<br />
o Velentzas Family<br />
Hispanic-American<br />
o Marielitos<br />
• <strong>The</strong> Corporation<br />
o Puerto Rican mafia<br />
• Agosto organization<br />
• La ONU<br />
• Solano organization<br />
• Negri organization<br />
• Márquez gambling ring<br />
o Polanco-Rodriguez organization<br />
Assyrian/Chaldean mafia<br />
Hawaii<br />
o <strong>The</strong> Company<br />
o Leota mob<br />
Los Angeles<br />
o Nash gang<br />
o Wonderland Gang<br />
Elkins mob<br />
Binion mob<br />
Page 307 of 372
American Mafia<br />
Italian immigrants to the United States in the early 20th century formed various smalltime<br />
gangs which gradually evolved into sophisticated crime syndicates which<br />
dominated organized crime in America for several decades. Although government<br />
crackdowns and a less-tightly knit Italian-American community have largely reduced<br />
their power, they remain an active force in the underworld<br />
Active<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<strong>The</strong> Commission<br />
<strong>The</strong> Five Families of <strong>New</strong> York City<br />
o Bonanno<br />
• <strong>In</strong>delicato crew<br />
• <strong>The</strong> Motion Lounge Crew<br />
o Colombo<br />
• Scarpa crew<br />
o Genovese<br />
• 116th Street Crew<br />
• Greenwich Village Crew<br />
• <strong>New</strong> Jersey Crew<br />
o Gambino<br />
• Ozone Park Boys<br />
• DeMeo crew<br />
• Baltimore Crew<br />
• South Florida faction<br />
• <strong>New</strong> Jersey faction<br />
• <strong>The</strong> Bergin Crew<br />
• Cherry Hill Gambinos<br />
o Lucchese<br />
• <strong>The</strong> Jersey Crew<br />
• <strong>The</strong> Vario Crew<br />
• 107th Street gang<br />
Magaddino crime family<br />
DeCavalcante crime family<br />
<strong>The</strong> Chicago Outfit<br />
o Las Vegas crew (defunct)<br />
Philadelphia crime family<br />
Pittsburgh crime family<br />
Patriarca crime family<br />
o Angiulo Brothers crew<br />
Cleveland crime family<br />
Los Angeles crime family<br />
Kansas City crime family<br />
Trafficante crime family<br />
Detroit Partnership<br />
Page 308 of 372
Milwaukee crime family<br />
<strong>New</strong> Orleans crime family<br />
Defunct<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Morello crime family<br />
Genna crime family<br />
Porrello crime family<br />
St. Louis crime family<br />
Rochester <strong>Crime</strong> Family<br />
Bufalino crime family<br />
Dallas crime family<br />
Denver crime family<br />
San Francisco crime family<br />
San Jose crime family<br />
Seattle crime family<br />
Omaha crime family<br />
Licavoli Mob<br />
Cardinelli gang<br />
<strong>New</strong> York Camorra<br />
East Harlem Purple Gang<br />
Jewish Mafia<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<strong>New</strong> York City<br />
o <strong>The</strong> Bugs and Meyer Mob<br />
o Kaplan gang<br />
o Rosenzweig gang<br />
o Rothstein organization<br />
o Schultz gang<br />
o Shapiro Brothers<br />
o Yiddish Black Hand<br />
o Epstein-Wolmark gang<br />
Boston<br />
o 69th Street Gang<br />
o Sagansky organization<br />
o Solomon organization<br />
Los Angeles<br />
o Cohen crime family (mix between Jewish and Italian members)<br />
<strong>The</strong> Purple Gang<br />
Zwillman gang<br />
Kid Cann's gang<br />
Birger mob<br />
Cleveland Syndicate<br />
Page 309 of 372
African-American <strong>Organized</strong> <strong>Crime</strong><br />
Certain members of the Black Panther Party, particularly the Oakland chapter, also<br />
engaged in criminal activities such as drug dealing and extortion.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<strong>New</strong> York City<br />
o <strong>The</strong> Council<br />
o Harlem numbers racket<br />
o Bumpy Johnson gang<br />
o Supreme Team<br />
o <strong>The</strong> Bebos<br />
o <strong>The</strong> Country Boys<br />
o Matthews Organization<br />
<strong>The</strong> Family<br />
Detroit<br />
o Black Mafia Family<br />
o Young Boys, <strong>In</strong>c.<br />
o Chambers Brothers<br />
Philadelphia<br />
o Black Mafia<br />
o Junior Black Mafia<br />
Oakland, California<br />
o 69 Mob<br />
Baltimore<br />
o<br />
Williams organization (drug trafficking)<br />
Washington, D.C.<br />
o<br />
Chicago<br />
o<br />
o<br />
Atlantic City<br />
o<br />
Rayful Edmond organization<br />
<strong>The</strong>odore Roe's gambling ring<br />
Stokes organization<br />
Aso Posse<br />
Miami<br />
o Miami Boys<br />
Rosemond Organization<br />
Irish Mob<br />
<br />
Prohibition-era Chicago gangs<br />
o North Side Gang<br />
o James Patrick O'Leary organization<br />
o John Patrick Looney gang<br />
o Valley Gang<br />
o Ragen's Colts<br />
o Touhy gang<br />
o Enright gang<br />
Page 310 of 372
Boston<br />
o Mullen Gang<br />
o Winter Hill Gang<br />
o Gustin Gang<br />
o Charlestown Mob<br />
o Killeen gang<br />
Danny Hogan's gang<br />
Danny Walsh gang<br />
Tom Dennison empire<br />
Nucky Johnson's Organization<br />
Danny Greene's Celtic Club<br />
K&A Gang<br />
<strong>New</strong> York<br />
o Dwyer gang<br />
o White Hand Gang<br />
o Higgins gang<br />
o <strong>The</strong> Westies<br />
St Louis<br />
o Hogan Gang<br />
o Egan's Rats<br />
European <strong>Organized</strong> <strong>Crime</strong><br />
<br />
<br />
<br />
<strong>Organized</strong> crime in Sweden<br />
o Original Gangsters<br />
o Fucked For Life<br />
o Uppsala mafia<br />
o Chosen Ones<br />
o Werewolf Legion<br />
o Asir<br />
o Vårvädersligan<br />
Dutch 'Penose'<br />
o Bruinsma drug gang<br />
o Holleeder gang<br />
o Mieremet gang<br />
o Riphagen gang (WWII-era)<br />
o Hopi Boys<br />
French Milieu<br />
o Corsican mafia<br />
• Unione Corse<br />
• Carbone crime family<br />
• Francisci crime family<br />
• Mondoloni crime family<br />
• Brise de Mer gang<br />
o Les Caïds Des Cités<br />
• Faïd gang<br />
Page 311 of 372
o<br />
o<br />
o<br />
o<br />
• <strong>The</strong> Barbarians<br />
Wigs gang<br />
North African Brigade<br />
Tractions Avant gang<br />
Bande des Trois Canards<br />
<br />
<br />
Greece<br />
o Greek mafia<br />
Ireland (See also Irish Republican Army)<br />
o Dublin<br />
• Cahill gang<br />
• Gilligan gang<br />
• Foley gang<br />
• Hyland gang<br />
• Dunne gang<br />
• <strong>The</strong> Westies<br />
o Limerick<br />
• McCarthy-Dundon<br />
• Keane-Collopy<br />
o Rathkeale Rovers<br />
o Kinahan gang<br />
<br />
Spain<br />
o<br />
Galician mafia<br />
<br />
<br />
<br />
<br />
<br />
Poland<br />
o Pruszków mafia<br />
Slovak mafia<br />
Romani clans<br />
o El Clan De La Paca<br />
o Raffael clan<br />
o Sztojka clan<br />
o Rashkov clan<br />
o French gypsy gangs<br />
• Hornec gang<br />
Czech Republic<br />
o Mrázek organization<br />
o Krejčíř organization<br />
<strong>The</strong> Belgian Milieu<br />
o 'Hormone mafia'<br />
o Milieu Liègeois<br />
Page 312 of 372
Italian <strong>Organized</strong> <strong>Crime</strong><br />
<strong>Organized</strong> crime in Italy, especially the south, has existed for hundreds of years and<br />
has given rise to a number of notorious organizations with their own traditions and<br />
subculture which have managed to infiltrate almost every part of Italian society. <strong>The</strong><br />
Italian mafia is often thought of as being the archetype for organized crime worldwide.<br />
<br />
<br />
<br />
Sicilian Mafia<br />
• Cuntrera-Caruana Mafia clan<br />
• Sicilian Mafia Commission<br />
• <strong>In</strong>zerillo Mafia clan<br />
• Mandamenti<br />
• Corleonesi<br />
• Greco Mafia clan<br />
• Motisi Mafia clan<br />
'Ndrangheta<br />
o La Provincia<br />
o Honoured Society (Melbourne)<br />
o Mammoliti 'ndrina<br />
o Bellocco 'ndrina<br />
o Cataldo 'ndrina<br />
o Commisso 'ndrina<br />
o Cordì 'ndrina<br />
o De Stefano 'ndrina<br />
o Pesce 'ndrina<br />
o Barbaro 'ndrina<br />
o Piromalli 'ndrina<br />
o Serraino 'ndrina<br />
o Siderno Group<br />
Camorra<br />
o Secondigliano Alliance<br />
• Licciardi clan<br />
• Contini clan<br />
• Lo Russo clan<br />
• Mallardo clan<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Nuova Camorra Organizzata<br />
Di Lauro Clan<br />
Nuova Famiglia<br />
Casalesi clan<br />
Fabbrocino clan<br />
Giuliano clan<br />
Nuvoletta clan<br />
Vollaro clan<br />
Page 313 of 372
o<br />
o<br />
o<br />
o<br />
Scissionisti di Secondigliano<br />
La Torre clan<br />
Alfieri clan<br />
Russo clan<br />
<br />
<br />
<br />
<br />
<br />
<br />
Sacra Corona Unita<br />
Stidda<br />
Mala del Brenta<br />
Basilischi<br />
Rome<br />
o Banda della Magliana<br />
o Mafia Capitale<br />
Milanese gangs<br />
o Banda della Comasina<br />
o Turatello crew<br />
British Organised <strong>Crime</strong> "Firms"<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
London<br />
o Adams crime family<br />
o <strong>The</strong> Richardson Gang<br />
o <strong>The</strong> Firm<br />
o <strong>The</strong> Syndicate<br />
o Comer gang<br />
o Buttmarsh Boys<br />
o <strong>In</strong>terwar era mobs<br />
• Messina Brothers<br />
• Sabini syndicate<br />
• Hoxton Gang<br />
• Elephant and Castle Mob<br />
• Birmingham Boys<br />
Essex Boys<br />
Manchester<br />
o Quality Street Gang<br />
o Noonan firm<br />
o Cheetham Hillbillies<br />
o <strong>The</strong> Gooch Close Gang<br />
Liverpool<br />
o Curtis Warren's drug empire<br />
o Whitney gang<br />
Aggi Crew<br />
Glasgow<br />
o McGraw firm<br />
o Thompson firm<br />
o Delta <strong>Crime</strong> Syndicate<br />
Brighton razor gangs<br />
Page 314 of 372
Bestwood Cartel<br />
Balkan <strong>Organized</strong> <strong>Crime</strong><br />
Balkan organized crime gained prominence in the chaos following the communist era,<br />
notably the transition to capitalism and the wars in former Yugoslavia.<br />
<br />
<br />
<br />
<br />
<br />
<br />
Albanian mafia<br />
o Kosovan mafia<br />
o Albania<br />
• Gang of Çole<br />
• Gang of Gaxhai<br />
• Gang of Pusi i Mezinit<br />
• Lazarat marijuana growers<br />
o Rudaj Organization (<strong>New</strong> York City)<br />
o Gang of Ismail Lika<br />
o Dobroshi gang (<strong>In</strong>ternational)<br />
o Naserligan (Sweden)<br />
o K-Falangen (Sweden)<br />
Bosnian mafia<br />
o Prazina gang<br />
o Bajramović gang<br />
o Delalić gang<br />
o M-Falangen (Sweden)<br />
Bulgarian mafia (see also Multigroup)<br />
o VIS<br />
o SIC<br />
o Karamanski gang<br />
o TIM<br />
o Naglite<br />
Serbian mafia<br />
o Arkan clan<br />
o Zemun Clan<br />
o Joca Amsterdam gang<br />
o Magaš clan<br />
o Giška gang<br />
o Pink Panthers<br />
o Serb mafia in Scandinavia<br />
• Kotur mob<br />
• Yugoslav Brotherhood<br />
Montenegrin mafia (see also allegations of Milo Đukanović's involvement in<br />
cigarette smuggling)<br />
Macedonian mafia<br />
o Frankfurt mafia<br />
o Bajrush klan<br />
Page 315 of 372
o Nezim klan'<br />
Romanian mafia<br />
o Băhăian organisation<br />
o Clanu Camataru<br />
o Clanu Coordunenilor<br />
o Clanu Rosianu<br />
o Craiova Underground Killers Gang<br />
Croatian organized crime<br />
Post-Soviet <strong>Organized</strong> <strong>Crime</strong><br />
Although organized crime existed in the Soviet era, the gangs really gained in power<br />
and international reach during the transition to capitalism. <strong>The</strong> term Russian Mafia,<br />
'mafiya' or mob is a blanket (and somewhat inaccurate) term for the various organized<br />
crime groups that emerged in this period from the 15 former republics of the USSR and<br />
unlike their Italian counterparts does not mean members are necessarily of Russian<br />
ethnicity or uphold any ancient criminal traditions, although this is the case for some<br />
members.<br />
<br />
<br />
<br />
Russian-Jewish mafia<br />
o Brighton Beach<br />
• Agron gang<br />
• Nayfeld gang<br />
• Balagula gang<br />
o Mogilevich organization<br />
Brothers' Circle (Existence is debatable)<br />
Russian mafia<br />
o Moscow<br />
• Izmaylovskaya gang<br />
• Solntsevskaya bratva<br />
• <strong>New</strong> York branch<br />
• Orekhovskaya gang<br />
o St Petersburg<br />
• Tambov Gang<br />
o Togliatti mafia<br />
o Uralmash gang<br />
o <strong>The</strong> Family<br />
o Lazovsky gang<br />
o Vladivostok gang<br />
o Kurganskaya group<br />
o Tsapok gang<br />
o 'Elephants' group<br />
o Kazan gang<br />
o A.U.E.<br />
Page 316 of 372
Ukrainian mafia<br />
o Donetsk Clan<br />
o Salem gang<br />
o Mukacheve cigarette smuggling syndicate<br />
Lithuanian mafia<br />
o Vilnius Brigade<br />
Estonian mafia<br />
o Linnuvabriku group<br />
Transnistrian mafia<br />
Caucasian <strong>Crime</strong> Syndicates<br />
<br />
<br />
<br />
<br />
Georgian mafia<br />
o Kutaisi clan<br />
o Tbilisi clan<br />
o 21st Century Association<br />
Armenian mafia<br />
o Mirzoyan-Terdjanian organization<br />
o Armenian Power<br />
Azeri mafia<br />
o Janiev organization<br />
Chechen mafia<br />
o Obschina<br />
o Labazanov gang<br />
Central Asian crime syndicates<br />
Uzbek mafia<br />
o Rakhimov organization<br />
Kyrgyz mafia<br />
o Erkinbayev group<br />
o Akmatbayev group<br />
o Kolbayev group<br />
Asian <strong>Organized</strong> <strong>Crime</strong><br />
East Asian Criminal Organizations<br />
<br />
Korean criminal organizations<br />
o Jongro street gang<br />
Japanese Yakuza<br />
<strong>The</strong> yakuza of Japan are similar to the Italian mafias in that they originated centuries<br />
ago and follow a rigid set of traditions, but have several aspects that make them unique,<br />
such as their full-body tattoos and their fairly open place in Japanese society. Many<br />
Page 317 of 372
yakuza groups are umbrella organizations, smaller gangs reporting to a larger crime<br />
syndicate.<br />
Active Yakuza Groups<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Roku-daime Yamaguchi-gumi 六 代 目 山 口 組<br />
o Yoshitomi Group<br />
o Yon-daime Yamaken-gumi 四 代 目 山 健 組<br />
o Ni-daime Kodo-kai 二 代 目 弘 道 会<br />
o Ni-daime Takumi-gumi 二 代 目 宅 見 組<br />
o Go-daime Kokusui-kai 五 代 目 國 粹 会<br />
<strong>In</strong>agawa-kai 稲 川 会<br />
Sumiyoshi-kai 住 吉 会<br />
o Sumiyoshi-ikka Shinwa-kai 住 吉 一 家 親 和 会<br />
• Kansuke Juni-daime 勘 助 十 二 代 目<br />
Kobe Yamaguchi-gumi<br />
Matsuba-kai 松 葉 会<br />
Kyokuto-kai 極 東 会<br />
Dojin-kai [60] 道 仁 会<br />
o Kitamura-gumi<br />
Yon-daime Kudo-kai 四 代 目 工 藤 會<br />
Roku-daime Aizu-Kotetsu-kai 六 代 目 会 津 小 鉄 会<br />
Okinawa Kyokuryu-kai 沖 縄 旭 琉 会<br />
Kyushu Seido-kai 九 州 誠 道 会<br />
Go-daime Kyosei-kai 五 代 目 共 政 会<br />
San-daime Fukuhaku-kai 三 代 目 福 博 会<br />
Soai-kai 双 愛 会<br />
Yon-daime Kyokuryu-kai 四 代 目 旭 琉 会<br />
San-daime Kyodo-kai 三 代 目 俠 道 会<br />
Taishu-kai 太 州 会<br />
Shichi-daime Goda-ikka 七 代 目 合 田 一 家<br />
Toa-kai 東 亜 会<br />
Ni-daime Azuma-gumi 二 代 目 東 組<br />
Yon-daime Asano-gumi 四 代 目 浅 野 組<br />
Hachi-daime Sakaume-gumi 八 代 目 酒 梅 組<br />
Yon-daime Kozakura-ikka 四 代 目 小 桜 一 家<br />
Ni-daime Shinwa-kai 二 代 目 親 和 会<br />
Defunct Yakuza Groups<br />
<br />
<br />
Kantō-kai 関 東 会<br />
Ni-daime Honda-kai 二 代 目 本 多 会<br />
Page 318 of 372
Yamaguchi-gumi<br />
o Goto-gumi 後 藤 組<br />
o Suishin-kai 水 心 会<br />
Ichiwa-kai 一 和 会<br />
San-daime Yamano-kai 三 代 目 山 野 会<br />
Nakano-kai 中 野 会<br />
Kyokuto Sakurai-soke-rengokai 極 東 桜 井 總 家 連 合 会<br />
Triads and Other Chinese Criminal Organizations<br />
<strong>The</strong> Triads is a popular name for a number of Chinese criminal secret societies, which<br />
have existed in various forms over the centuries (see for example Tiandihui). However,<br />
not all Chinese gangs fall into line with these traditional groups, as many non-traditional<br />
criminal organizations have formed, both in China and the Chinese diaspora.<br />
Hong Kong-based Triads<br />
o 14K Group 十 四 K<br />
o Wo Group 和 字 頭<br />
• Wo Shing Wo 和 勝 和<br />
• Wo On Lok (Shui Fong) 和 安 樂 ( 水 房 )<br />
• Wo Hop To 和 合 圖 ( 老 和 )<br />
o Sun Yee On 新 義 安 ( 老 新 )<br />
o Luen Group 聯 字 頭<br />
o Big Circle Gang 大 圈<br />
Sio Sam Ong ( 小 三 王 )<br />
Chinese-American gangs (See also Tongs)<br />
o Wah Ching 華 青<br />
o Ping On<br />
o Black Dragons 黑 龍<br />
o Jackson Street Boys 積 臣 街 小 子<br />
Secret societies in Singapore<br />
o Ang Soon Tong 昂 很 快 塘<br />
o Ghee Hin Kongsi 酥 油 軒 懸 空 寺<br />
o Hai San 海 新<br />
o Wah Kee 華 記<br />
o Ah Kong 新 加 坡 黑 手 黨<br />
<br />
<br />
Taiwan-based Triads<br />
o United Bamboo Gang 竹 聯 幫<br />
o Four Seas Gang 四 海 幫<br />
o Celestial Alliance<br />
Mainland Chinese crime groups (see also Hanlong Group)<br />
Page 319 of 372
o<br />
o<br />
o<br />
Chongqing group 重 慶 組<br />
Defunct<br />
• Honghuzi gangs<br />
• Green Gang 青 帮<br />
Boshe group<br />
<br />
Triads in Cholon<br />
o Wu Bang<br />
Southeast Asian criminal organizations<br />
<br />
<br />
Chao pho<br />
o Red Wa<br />
Filipino crime gangs (See also Abu Sayyaf and <strong>New</strong> People's Army)<br />
• Salonga Group<br />
• Kuratong Baleleng<br />
• Changco gang<br />
• Putik gang<br />
<br />
<br />
<br />
<br />
Cambodian crime gangs<br />
o Teng Bunma organization<br />
<strong>In</strong>donesia<br />
Preman (See also Pancasila Youth and insurgency in Aceh)<br />
o Medan gang<br />
Malaysian crime gangs<br />
o Mamak Gang<br />
Vietnamese Xã Hội Đen<br />
<br />
<br />
<br />
<br />
<br />
Bình Xuyên<br />
Đại Cathay's mafia during the 60s<br />
Năm Cam's mafia of the 90s<br />
Khánh Trắng's "Đồng Xuân Labor Union", a crime syndicate under the guise of a<br />
legal entity<br />
Dung Hà's gang<br />
South Asian Criminal Organizations<br />
<br />
<strong>In</strong>dian mafia<br />
o Mumbai<br />
• D-Company डी कं पनी<br />
Page 320 of 372
o<br />
o<br />
o<br />
o<br />
o<br />
• Rajan gang राजन गिरोह<br />
• Gawli gang िवली गिरोह<br />
• Rajan gang<br />
• Surve gang<br />
• Mudaliar gang<br />
• Mastan gang<br />
• Budesh gang<br />
• Kalani gang<br />
Pathan mafia<br />
• Lala gang<br />
Uttar Pradesh<br />
• Ansari gang<br />
• Yadav gang<br />
Bangalore<br />
• Rai gang<br />
• Ramachandra gang<br />
• Jayaraj gang<br />
Kala Kaccha Gang<br />
Chaddi Baniyan Gang<br />
<br />
<br />
<br />
<br />
Sri Lankan Criminal Groups (See also Tamil Tigers, Eelam People's Democratic<br />
Party and Tamil Makkal Viduthalai Pulikal)<br />
Pakistani mafia (See also Peoples' Aman Committee, Tehrik-i-Taliban Pakistan,<br />
Muttahida Qaumi Movement and ISI involvement with drugs)<br />
o Chotu gang<br />
o Lyari Gang<br />
Mafia Raj<br />
Dacoit gangs<br />
o Singh gang<br />
o Veerappan gang<br />
o Devi gang<br />
Middle Eastern <strong>Organized</strong> <strong>Crime</strong><br />
<br />
<br />
Israeli mafia (see also Stern Gang)<br />
יל'אברג משפחת o Abergil <strong>Crime</strong> Family<br />
פשע משפחת אלפרון o Alperon crime family<br />
הארגון רוזנשטיין זאב o Zeev Rosenstein organization<br />
o Palestinian organized crime ( See also Abu Nidal Organization)<br />
• Doghmush clan<br />
Turkish mafia<br />
Page 321 of 372
o<br />
o<br />
o<br />
o<br />
o<br />
<strong>Crime</strong> groups in Turkey (see also Deep state and Yüksekova Gang)<br />
• Kilic gang<br />
• Cakici gang<br />
• Peker gang<br />
• Yaprak gang<br />
• Topal organisation<br />
• Söylemez Gang<br />
Kurdish mafia (see also Kurdistan Workers' Party)<br />
• Baybasin drug organization<br />
• Cantürk organization<br />
Turkish organised crime in Great Britain<br />
• Arifs<br />
Turkish organised crime in Germany<br />
• Arabaci clan<br />
Imac clan (Netherlands)<br />
<br />
<br />
Iranian organized crime (see also People's Mujahedin of Iran#Fraud and money<br />
laundering, Jundallah and illegal activities of the IRGC)<br />
o Tahvili crime family<br />
Lebanese mafia (See also Lebanese Civil War militias)<br />
o Mhallami-Lebanese crime clans<br />
• Miri-Clan<br />
• Al-Zein Clan<br />
o Juomaa drug trafficking organisation (See also Hezbollah)<br />
o Ibrahim clan<br />
Australian <strong>Organized</strong> <strong>Crime</strong><br />
<br />
<br />
Sydney<br />
o Razor gangs<br />
o 5T gang<br />
o Freeman gang<br />
o <strong>The</strong> Team<br />
o Mr Sin gang<br />
Melbourne<br />
o Carlton Crew<br />
o Moran family<br />
o Williams family<br />
o Pettingill family<br />
o Richmond gang<br />
Caribbean <strong>Crime</strong> Groups<br />
<br />
Chadee gang (Trinidad & Tobago) (see also Jamaat al Muslimeen)<br />
Page 322 of 372
Jamaican Yardies & Posses<br />
o Shower Posse<br />
o POW Posse<br />
o Tottenham Mandem<br />
• Star Gang<br />
o Klans Massive<br />
No Limit Soldiers<br />
Phantom death squad (Guyana)<br />
Zoe Pound (Haitian, see also Tonton Macoute)<br />
African Criminal Organisations<br />
*Mai-Mai militia gangs<br />
Cape Verdean organized crime<br />
Mungiki<br />
Nigerian organized crime<br />
o Confraternities in Nigeria<br />
• Black Axe Confraternity<br />
o Anini gang<br />
Le Roux organization<br />
Moroccan hashish smugglers<br />
o Ahmed organization<br />
Cybercrime Networks<br />
As society enters the <strong>In</strong>formation Age, certain individuals take advantage of easy flow of<br />
information over the <strong>In</strong>ternet to commit online fraud or similar activities. Often the<br />
hackers will form a network to better facilitate their activities. On occasion the hackers<br />
will be a part of a criminal gang involved in more 'blue collar crime', but this is unusual.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
ShadowCrew<br />
Avalanche<br />
DarkMarket<br />
Legion of Doom<br />
Carder.su<br />
Tor Carding Forum<br />
HackBB<br />
Masters of Deception<br />
Russian cybercrime<br />
o<br />
o<br />
o<br />
o<br />
Russian Business Network<br />
Anton Gelonkin internet fraud group<br />
Leo Kuvayev internet spam group<br />
CyberVor<br />
<br />
Darknet markets<br />
Page 323 of 372
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
AlphaBay<br />
Utopia<br />
<strong>The</strong> Silk Road<br />
Sheep Marketplace<br />
<strong>The</strong>RealDeal<br />
Black Market Reloaded<br />
<strong>The</strong> Farmer's Market<br />
Evolution<br />
Agora<br />
AlphaBay Market<br />
Russian Anonymous Marketplace<br />
Drug and Smuggling Rings<br />
Smuggling is a behavior that has occurred ever since there were laws or a moral code<br />
that forbade access to a specific person or object. At the core of any smuggling<br />
organization is the economic relationship between supply and demand. From the<br />
organization's point of view, the issues are what the consumer wants, and how much<br />
the consumer is willing to pay the smuggler or smuggling organization to obtain it.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
England<br />
o Hawkhurst Gang (historical)<br />
o <strong>The</strong> Aldington Gang (historical)<br />
Organ trafficking organizations<br />
o Gurgaon organ trafficking network<br />
Arms trafficking organizations<br />
o Russian arms traffickers<br />
• Viktor Bout's organization<br />
• Leonid Minin's organization<br />
o Monzer al-Kassar's organization<br />
o Tomislav Damnjanovic organization<br />
o Soghanalian organization<br />
People smuggling<br />
o Snakeheads 蛇 頭<br />
• Sister Ping's organization<br />
o Coyotaje<br />
o Shettie organization<br />
o Mediterranean people smugglers<br />
Lai Changxing organization<br />
Bedouin smugglers<br />
Subotić Tobacco mafia (alleged)<br />
Drug rings<br />
<br />
North American drug rings<br />
o Garza organization<br />
Page 324 of 372
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Jesse James Hollywood's drug ring<br />
<strong>The</strong> Brotherhood of Eternal Love<br />
Black Tuna Gang<br />
<strong>The</strong> Company<br />
Jung organization<br />
Mancuso organization<br />
Chagra organization<br />
"Freeway" Rick Ross<br />
Ike Atkinson<br />
Cournoyer organization<br />
Cowboy Mafia<br />
Pizza Connection<br />
<strong>The</strong> Yogurt Connection<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Bali Nine<br />
Mr Asia syndicate<br />
<strong>The</strong> French Connection<br />
<strong>The</strong> Couscous connection<br />
Valencia drug ring<br />
Brian Brendan Wright's drug empire<br />
Howard Marks<br />
Rum-running organization<br />
o William McCoy<br />
o Roy Olmstead<br />
Remus organization<br />
Yashukichi network<br />
Edward Ezra's opium smuggling operation<br />
Tyrrell organisation<br />
Guinea-Bissau cocaine traffickers<br />
o Na Tchuto organization<br />
Prison Gangs<br />
Prisons are a natural meeting place for criminals, and for the purposes of protection<br />
from other inmates and business prisoners join gangs. <strong>The</strong>se gangs often develop a<br />
large influence outside the prison walls through their networks. Most prison gangs do<br />
more than offer simple protection for their members. Most often, prison gangs are<br />
responsible for any drug, tobacco or alcohol handling inside correctional facilities.<br />
Furthermore, many prison gangs involve themselves in prostitution, assaults,<br />
kidnappings and murders. Prison gangs often seek to intimidate the other inmates,<br />
pressuring them to relinquish their food and other resources. <strong>In</strong> addition, prison gangs<br />
often exercise a large degree of influence over organized crime in the "free world",<br />
larger than their isolation in prison might lead one to expect.<br />
<br />
<br />
Primeiro Comando da Capital (First Command of the Capital) (São Paulo, Brazil)<br />
Vory v zakone (вор в законе) (Prisons in Russia and other post-Soviet countries)<br />
Page 325 of 372
<strong>The</strong> Numbers Gang (Prisons in South Africa)<br />
Brödraskapet (<strong>The</strong> Brotherhood) (Kumla Prison, Sweden)<br />
<strong>The</strong> Overcoat Gang (Prisons in Australia)<br />
Philippines<br />
o <strong>New</strong> Bilibid Prison<br />
• Commandos<br />
o Wild Boys of DaPeCol (Davao)<br />
Prison gangs in the United States<br />
<br />
<br />
<br />
<br />
<br />
White<br />
o Aryan Brotherhood<br />
o Dead Man <strong>In</strong>corporated<br />
o Public Enemy No. 1<br />
o Nazi Lowriders<br />
o European Kindred<br />
o Aryan Circle<br />
o 211 Crew<br />
o Peckerwoods<br />
o Aryan Brotherhood of Texas<br />
Hispanic<br />
o Barrio Azteca<br />
o Mexican Mafia (La Eme)<br />
o Nuestra Familia<br />
o Texas Syndicate (Syndicato Tejano)<br />
o Ñetas<br />
o Puro Tango Blast<br />
o Mexikanemi<br />
o Hermanos de Pistoleros Latinos<br />
African American<br />
o Black Guerrilla Family<br />
o D.C. Blacks<br />
o United Blood Nation<br />
o KUMI 415<br />
People Nation<br />
Folk Nation<br />
Street Gangs<br />
Youth gangs have often served as a recruiting ground for more organized crime<br />
syndicates, where juvenile delinquents grow up to be full-fledged mobsters, as well as<br />
providing muscle and other low-key work. <strong>In</strong>creasingly, especially in the United States<br />
and other western countries, street gangs are becoming much more organized in their<br />
Page 326 of 372
own right with a hierarchical structure and are fulfilling the role previously taken by<br />
traditional organized crime.<br />
North America<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Friends Stand United<br />
Freight Train Riders of America (alleged)<br />
<strong>The</strong> Baldies<br />
Juggalo gangs<br />
Albanian Boys <strong>In</strong>c<br />
Chicago<br />
o TAP Boyz<br />
o Simon City Royals<br />
o Chicago Gaylords<br />
o Jousters<br />
o Almighty Saints<br />
o Popes<br />
Italian-American street gangs<br />
o South Brooklyn Boys<br />
o Forty-Two Gang<br />
o <strong>The</strong> Tanglewood Boys<br />
Green Street Counts<br />
Zoe Pound<br />
Pacific-Islander American gangs<br />
o Sons of Samoa<br />
o Tongan Crip Gang<br />
Native Mob<br />
Savage Skulls (defunct)<br />
African-American<br />
<br />
<br />
<br />
Chicago<br />
o Gangster Disciples<br />
o Mickey Cobras<br />
o Black Disciples<br />
o Vice Lords<br />
o Black P. Stones<br />
o Four Corner Hustlers<br />
o OutLaw Gangster Disciples<br />
Black P. Stones (Jungles)<br />
Bloods<br />
o Sex Money Murda<br />
o Double II Set<br />
o Pirus<br />
o Nine Trey Gangsters<br />
Page 327 of 372
Crips<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Venice Shoreline Crips<br />
Rollin 60's Neighborhood Crips<br />
Eight Tray Gangsta Crips<br />
East Nashville Crips<br />
Du Roc Crips<br />
Rollin' 30s Harlem Crips<br />
Grape Street Watts Crips<br />
South Side Compton Crips<br />
<br />
<br />
<br />
<br />
<br />
<br />
12th Street Gang<br />
Errol Flynns<br />
Westmob<br />
Hidden Valley Kings<br />
<strong>New</strong> York City<br />
o Decepticons (defunct)<br />
o Black Spades (defunct)<br />
o GS9<br />
Boston<br />
o Lucerne Street Doggz<br />
o Columbia Point Dawgs<br />
o Orchard Park Trailblazers<br />
Asian-American<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<strong>New</strong> York City Chinatown<br />
o Ghost Shadows 鬼 影 幫<br />
o Flying Dragons<br />
o Born To Kill 天 生 殺 手 幫<br />
Asian Boyz 亞 洲<br />
Chung Ching Yee (Joe Boys) 忠 精 義<br />
Menace of Destruction 毀 滅 的 威 脅<br />
Tiny Rascal gang<br />
Fullerton Boys<br />
Satanas<br />
Viet Boyz<br />
Hispanic<br />
<br />
<br />
<br />
Latin Kings<br />
Ghetto Brothers<br />
<strong>New</strong> York City Dominican gangs<br />
o Dominicans Don't Play<br />
o Jheri Curls<br />
o Trinitarios<br />
Page 328 of 372
California<br />
o White Fence<br />
o Whittier gang<br />
o Fresno Bulldogs<br />
o Lott Stoner Gang<br />
o Norteños<br />
o Sureños<br />
• 38th Street gang<br />
• Culver City Boys 13<br />
• Santa Monica 13<br />
• Azusa 13<br />
• Puente 13<br />
• OVS<br />
• Eastside Bolen Parque 13<br />
• Northside Bolen Parque 13<br />
• El Monte Flores 13<br />
• Venice 13<br />
• Tooner Ville Rifa 13<br />
• Clanton 14<br />
• Varrio Nuevo Estrada<br />
• Playboys<br />
• Avenues<br />
• Logan Heights Gang<br />
• Pomona 12th Street Sharkies<br />
Chicago<br />
o La Raza Nation<br />
o Maniac Latin Disciples<br />
o Spanish Cobras<br />
o Spanish Gangster Disciples<br />
Los Mexicles<br />
Latin Syndicate<br />
Historical<br />
<br />
Irish American<br />
o Bottoms Gang<br />
o 19th Street Gang<br />
o Bowe Brothers<br />
o 40 Thieves<br />
o Dead Rabbits<br />
o Gopher Gang<br />
o Grady Gang<br />
o Five Points Gang<br />
o Daybreak Boys<br />
o Tenth Avenue Gang<br />
o Kerryonians<br />
Page 329 of 372
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Roach Guards<br />
Whyos<br />
Chichesters<br />
Marginals<br />
Live Oak Boys<br />
Potashes<br />
Bottoms Gang<br />
<br />
<br />
<br />
<br />
<br />
<strong>New</strong> York<br />
o Neighbors' Sons<br />
o Boodle Gang<br />
o Loomis Gang<br />
o Baxter Street Dudes<br />
o Honeymoon Gang<br />
o Mandelbaum organization<br />
o Dutch Mob<br />
o Eastman Gang<br />
o Batavia Street Gang<br />
o Bowery Boys<br />
o Charlton Street Gang<br />
o Gas House Gang<br />
o Lenox Avenue Gang<br />
o Crazy Butch Gang<br />
o Hudson Dusters<br />
o Humpty Jackson Gang<br />
o Slaughter House Gang<br />
o Cherry Hill Gang<br />
o Swamp Angels<br />
o Yakey Yakes<br />
o Hook Gang<br />
o Tub of Blood Bunch<br />
Baltimore<br />
o Bloody Tubs<br />
o Plug Uglies<br />
Sydney Ducks<br />
Chicago<br />
o Formby Gang<br />
o Henry Street Gang<br />
Yellow Henry Gang<br />
Gangs in Canada<br />
<br />
Vancouver<br />
o <strong>In</strong>dependent Soldiers<br />
Page 330 of 372
o United Nations<br />
o Red Scorpions<br />
Aboriginal Based <strong>Organized</strong> <strong>Crime</strong><br />
o <strong>In</strong>dian Posse<br />
o Native Syndicate<br />
o Redd Alert<br />
o Manitoba Warriors - 1323<br />
Toronto<br />
o VVT<br />
o Dixon Bloods<br />
o Khimera<br />
Tri-City Skins<br />
Shiners (historical)<br />
South America<br />
<br />
<br />
<br />
Gangs in Brazil<br />
o Rio de Janeiro<br />
• Amigos dos Amigos<br />
• Comando Vermelho<br />
• Terceiro Comando<br />
• Terceiro Comando Puro<br />
o São Paulo<br />
• PCC - Primeiro Comando da Capital<br />
o Brazilian police militias<br />
• Acre death squad<br />
o Maras<br />
o Mara Salvatrucha<br />
o 18th Street gang<br />
Gangs in Haiti<br />
o Zoe Pound<br />
o Cannibal Army<br />
Belize<br />
o George Street Crew<br />
Europe<br />
<br />
Gangs in the United Kingdom<br />
o<br />
o<br />
London<br />
• Ghetto Boys<br />
• Peckham Boys<br />
• PDC<br />
• Brick Lane Massive<br />
• Woolwich Boys<br />
• Wo Shing Wo street gang (defunct)<br />
• Mus Love Crew<br />
Gooch gang<br />
Page 331 of 372
o<br />
o<br />
Birmingham<br />
• Lynx gang<br />
• Burger Bar Boys & Johnson Crew<br />
Croxteth Crew & Strand Crew<br />
<br />
<br />
<br />
<br />
Denmark<br />
o AK81<br />
o Black Cobra<br />
Turkish-German gangs<br />
o 36 Boys<br />
o Black Jackets<br />
Apaches (Belle Époque period)<br />
Red Wall Gang (Dublin)<br />
Africa<br />
<br />
<br />
<br />
Gangs in South Africa<br />
o Cape Ganglands<br />
• Hard Livings<br />
• <strong>The</strong> Americans<br />
Gangs in Nigeria<br />
o Area Boys<br />
• One Million Boys<br />
Morocco<br />
o Tcharmils<br />
Asia<br />
<br />
<br />
<br />
Salakau<br />
Bahala Na Gang<br />
Rugby boys<br />
Oceania<br />
<br />
Gangs in Australia<br />
o Sydney<br />
• Rocks Push<br />
• Dlasthr<br />
o Melbourne<br />
• Apex<br />
o Perth<br />
• Sword Boys<br />
o Evil Warriors<br />
Page 332 of 372
Gangs in <strong>New</strong> Zealand<br />
o Mongrel Mob<br />
o Black Power<br />
o King Cobras<br />
o Killa Beez<br />
o Fourth Reich<br />
Raskol gangs<br />
Other<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Timber mafia<br />
o Malagasy logging syndicates<br />
• 'Rosewood mafia'<br />
Football hooliganism groups<br />
o 6.57 Crew<br />
o Arsenal firm<br />
o Aston Villa Hardcore<br />
Prostitution rings<br />
o Emperors Club VIP<br />
o Heidi Fleiss prostitution ring<br />
o North Preston's Finest<br />
o Vivian's Friends<br />
o Pamela Martin and Associates<br />
Spy rings<br />
o Atomic spies<br />
o Cambridge Five<br />
o Duquesne Spy Ring<br />
o Illegals program<br />
o Portland Spy Ring<br />
o Walker spy ring<br />
Burglary rings<br />
o Dinner Set Gang<br />
o Bling Ring<br />
o Johnston gang<br />
o Sugarman Gang<br />
Fraud rings (See also List of Ponzi schemes)<br />
o Potato Bag gang<br />
o Nigerian 419 gangs<br />
• Chief Nwude and accomplices<br />
o Benson Syndicate<br />
o Dominion of Melchizedek<br />
Illegal gambling rings<br />
o Brazilian Jogo do Bicho rings<br />
• Anísio group<br />
• Capitão Guimarães group<br />
• Andrade group<br />
Page 333 of 372
• Luizinho Drummond group<br />
• Turcão group<br />
• Pinheiro group<br />
o Tan betting syndicate<br />
o Bad <strong>New</strong>z Kennels dogfighting ring<br />
Human trafficking rings<br />
o Domotor family crime group<br />
o la Chancha gang<br />
Wildlife trafficking rings<br />
o Wong organization<br />
Kidnapping<br />
o Black Death Group (alleged)<br />
o <strong>The</strong> College Kidnappers<br />
Criminals-for-hire<br />
o Philadelphia Poison Ring (murder-for-hire)<br />
o Sangerman's Bombers (arson)<br />
<strong>The</strong> Chickens and the Bulls<br />
Historical<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Black Hand<br />
o Chicago Black Hand<br />
Thuggee (See also Criminal Tribes Act)<br />
Garduna<br />
Markham Gang<br />
England<br />
o Early crime syndicates<br />
• Jonathan Wild's crime ring<br />
• Charles Hitchen's crime ring<br />
• Forty Elephants<br />
• Ikey Solomon gang<br />
• Worth gang<br />
o Street gangs<br />
• <strong>The</strong> Yiddishers<br />
• Peaky Blinders<br />
• Scuttlers<br />
• Glasgow<br />
• Penny Mobs<br />
• Tongs<br />
• Razor gangs<br />
• Norman Conks<br />
Predecessors to modern yakuza (See also Genyōsha)<br />
o Tekiya 的 屋<br />
o Bakuto 博 徒<br />
o Kabukimono 傾 奇 者 (カブキもの)<br />
American Frontier gangs (See also List of Old West gangs)<br />
Page 334 of 372
o Ames organization<br />
o Soap Gang criminal empire, Denver, Creede, Colorado, and Skagway,<br />
Alaska 1880s-1890s.<br />
o Swearengen gang<br />
o Banditti of the Prairie<br />
o Dodge City Gang<br />
Dennison syndicate<br />
o <strong>The</strong> Cowboys (Cochise County)<br />
o Blonger gang<br />
Ringvereine (Weimar Germany)<br />
Historic prostitution rings<br />
o Zwi Migdal<br />
• Ashkenazum<br />
o Red Light Lizzie and associates<br />
o Jane the Grabber and associates<br />
Historical Russian gangs (See also Early life of Joseph Stalin)<br />
o Mishka Yaponchik gang<br />
o Kotovsky gang<br />
Stuppagghiari<br />
Page 335 of 372
Page 336 of 372
XXII. References<br />
1. https://en.wikipedia.org/wiki/<strong>Organized</strong>_crime<br />
2. https://en.wikipedia.org/wiki/White-collar_crime<br />
3. https://en.wikipedia.org/wiki/Arms_trafficking<br />
4. https://en.wikipedia.org/wiki/Bribery<br />
5. https://en.wikipedia.org/wiki/Cybercrime<br />
6. https://en.wikipedia.org/wiki/Illegal_drug_trade<br />
7. https://en.wikipedia.org/wiki/Embezzlement<br />
8. https://en.wikipedia.org/wiki/Extortion<br />
9. https://en.wikipedia.org/wiki/Fence_(criminal)<br />
10. https://en.wikipedia.org/wiki/Fraud<br />
11. https://en.wikipedia.org/wiki/Identity_theft<br />
12. https://en.wikipedia.org/wiki/Kidnapping<br />
13. https://en.wikipedia.org/wiki/Loan_shark<br />
14. https://en.wikipedia.org/wiki/Money_laundering<br />
15. https://en.wikipedia.org/wiki/Murder<br />
16. https://en.wikipedia.org/wiki/Prostitution<br />
17. https://en.wikipedia.org/wiki/Racket_(crime)<br />
18. https://en.wikipedia.org/wiki/Terrorism<br />
19. https://en.wikipedia.org/wiki/<strong>The</strong>ft<br />
20. https://en.wikipedia.org/wiki/Witness_tampering<br />
21. https://en.wikipedia.org/wiki/<strong>In</strong>timidation<br />
22. https://en.wikipedia.org/wiki/Transnational_crime<br />
23. https://en.wikipedia.org/wiki/List_of_criminal_enterprises,_gangs_and_syndicates<br />
24. https://openscholarship.wustl.edu/cgi/viewcontent.cgi?article=2101&context=law_lawreview<br />
25. https://fas.org/sgp/crs/misc/R41547.pdf<br />
26. https://www.unodc.org/documents/toc/factsheets/TOC12_fs_general_EN_HIRES.pdf<br />
Page 337 of 372
Notes<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
Page 338 of 372
Notes<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
_____________________________________________________________________________________<br />
Page 339 of 372
Page 340 of 372
Attachment A<br />
Biblical Atonement<br />
and Modern Criminal Law<br />
Page 341 of 372
Washington University Law Review<br />
Volume 65<br />
Issue 4 Festschrift: A Celebration of the Scholarship and Teaching of Gray L. Dorsey<br />
January 1987<br />
Biblical Atonement and Modern Criminal Law<br />
Jerome Hall<br />
Follow this and additional works at: http://openscholarship.wustl.edu/law_lawreview<br />
Part of the Criminal Law Commons, and the Religion Law Commons<br />
Recommended Citation<br />
Jerome Hall, Biblical Atonement and Modern Criminal Law, 65 Wash. U. L. Q. 694 (1987).<br />
Available at: http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7<br />
This Dedication is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for<br />
inclusion in Washington University Law Review by an authorized administrator of Washington University Open Scholarship. For more information,<br />
please contact digital@wumail.wustl.edu.
III. CONCEPTIONS, VALUE AND LAW<br />
<strong>In</strong> Western civilization, a rationally ordered universe and human rationality<br />
are the central tenets of theology and moral philosophy. Conceptions,<br />
values, and principles implied by these premises have become entrenched<br />
in social and legal institutions. Concluding that religious teachings, even<br />
those of antiquity, are consistent with modern legal principles is reasonable,<br />
and almost common sense. An inquiry into whether this relationship<br />
is to any extent causal is fascinating. Professor Jerome Hall, the first President<br />
of AMINTAPHIL, discusses the relationship between the Christian<br />
doctrine of atonement and principles of modern criminal law.<br />
BIBLICAL ATONEMENT AND MODERN<br />
CRIMINAL LAW*<br />
JEROME HALL**<br />
<strong>The</strong> organization of a Section on Law and Religion in 1976 by the<br />
Association of American Law Schools (after Watergate) was followed in<br />
1977 by the incorporation of the Council on Religion and Law. My participation<br />
in both led to the study of theology and especially to the question,<br />
what, if anything, can a legal scholar, particularly one specialized in<br />
penal law and the philosophy of law, contribute to the literature on the<br />
interrelations of law and religion? <strong>In</strong> the English-speaking world not<br />
many legal scholars have written on this subject, and none, to my knowledge,<br />
on the interrelationship of religion and modem criminal law. 1 I<br />
here confine my discussion to the Bible and, more particularly, to some<br />
of the writing on atonement by Christian theologians.<br />
<strong>The</strong> central focus of Christianity is on the crucifixion and resurrection<br />
of Jesus Christ, and the relevant theme, originating in the Old Testament<br />
* This article was originally published in Japan in a Festschrift for Justice Shigemitsu Dando<br />
upon his retirement from the Supreme Court of Japan. It subsequently appeared in THE JOURNAL<br />
OF LAW AND RELIGION, Volume I, Number 2, 1983.<br />
** Jerome Hall, LLD. (H.C.) Tfibingen University 1978, is Professor of Law at the University<br />
of California's Hastings College of the Law. He is a past president of the American Society for<br />
Political and Legal Philosophy, a member of the China Academy, Honorary Director of the Korean<br />
Law Center, and a Director of <strong>The</strong> Council on Religion and Law.<br />
1. See J. HALL, LAW, SOCIAL SCIENCE AND CRIMINAL THEORY, chs. I and 2 (1982).<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
and frequently addressed in the <strong>New</strong> Testament, is that of atonement.<br />
Both the Old Testament and the <strong>New</strong> Testament accept and emphasize<br />
the vicarious significance of the sacrifice-the lamb in the Old Testament,<br />
Jesus in the <strong>New</strong> Testament. <strong>The</strong> one sacrificed takes on itself or<br />
himself the sins of Israel or the sins of all mankind. Likewise, the sacrifice<br />
frees all Israel or all mankind from sin, and the consequence is reconciliation<br />
with God.<br />
But modem ethics, especially Kantian, and modem penal law reject<br />
both connotations of Biblical atonement and the relevant theology. <strong>In</strong><br />
modem penal law, for example, one is responsible only for his own<br />
crimes, not for those of his wife or bother. So, too, no substitute for the<br />
criminal will be punished. <strong>The</strong> offer of a father to go to prison instead of<br />
his convicted son's doing so would be irrelevant, and is hardly conceivable<br />
in modem penal law. Hence, the principal problem: Is there a sharp<br />
conflict between religion on the one side and law and ethics on the other?<br />
Or, since one must distinguish religious faith from knowledge of positive<br />
law and morality, are the two realms compatible?<br />
<strong>The</strong>re have been innumerable interpretations of atonement but for the<br />
present purpose they may be divided into two types or classes-the legal<br />
interpretation and the antilegal interpretation posited solely on God's<br />
love. Not that the legal interpreters did not appreciate God's love; that<br />
would be inconceivable in any Christian theologian. But they also recognized<br />
the "wrath of God," his hatred of evil, and his frequent threats to<br />
impose harsh sanctions. 2 For obvious reasons, I shall be particularly interested<br />
in the legal interpretation, for it is there that we find both the<br />
direct influence of law on religion and theology, and the influence of religion<br />
through its theological view of atonement on penal law. <strong>The</strong>re are<br />
many statements in the Old Testament that express or imply one or more<br />
of the ideas that define "atonement." "And Aaron shall offer the bull, as<br />
a sin offering for himself, and shall make atonement for himself and for<br />
his house.., and shall lay both his hands upon the head of the goat and<br />
send him away into the wilderness ... and make atonement for himself<br />
and for the people." (Lev. 16:6, 21, 24).<br />
One thousand years separate the authors of the earliest books in the<br />
Old Testament from the later prophets who spoke of God not as jealous<br />
or hating but as a loving father and merciful judge. <strong>In</strong>deed, it is in Isaiah<br />
2. This simplification of the difference between the principal types of interpretation will be<br />
more fully elucidated in the following discussion.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
696 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
53 where one finds the later expression of atonement to which Christian<br />
theologians constantly refer and rely on as prophetic of the coming of<br />
Jesus as Messiah. "He was despised and rejected by men.... Surely he<br />
has borne our griefs and carried our sorrows.... He was wounded for<br />
our transgressions . . .upon him was the chastisement that made us<br />
whole, and with his stripes we are healed.... He bore the sins of many,<br />
and made intercession for the transgressors."<br />
<strong>In</strong> the <strong>New</strong> Testament, Jesus, the perfect man-God, "died for the ungodly;"<br />
(Rom. 5:6) "while we were enemies we were reconciled to God<br />
by the death of his Son.... ." (Rom. 5:10) "<strong>The</strong>n as one man's (Adam's)<br />
trespass led to condemnation for all men, so one man's act of righteousness<br />
leads to acquittal and life for all men." (Rom. 5:18, also Heb. 7:25).<br />
"By his wounds you have been healed." (1 Peter 2:24; also Col. 1:14).<br />
"This was to fulfill what was spoken by the prophet Isaiah ..... " (Matt.<br />
8:17). "Christ redeemed us from the curse of the law.... ." (Gal. 3:13).<br />
"Behold, the Lamb of God, who takes away the sin of the world." (John<br />
1:29).<br />
What have the theologians whose interpretations have been called<br />
"legal" said about these passages in the Bible? Tertullian (c. 155 A.D.-<br />
230 A.D.), one of the most erudite of the Church fathers, was said by<br />
some to be a Roman lawyer and he was even identified, probably mistakenly,<br />
with the jurist Tertullianus. <strong>In</strong> any case, the schools in Carthage,<br />
where Tertullian studied, taught rhetoric, law and philosophy, and every<br />
educated Carthaginian knew a great deal of the dominant Roman law. a<br />
Certainly Tertullian's treatises bear the unmistakable marks of a legal<br />
mind. His Apology Against the Heathen 4 is a lawyer's brief criticizing<br />
Roman procedure in the trial of Christians. Tertullian spoke of "God's<br />
wrath" and his "eternal penalties." 5 His central terms-debt, satisfaction,<br />
compensation, guilt-have obvious legal connotations.' He empha-<br />
3. "... (Tertullian) displays a thorough and (it is claimed) profound knowledge of Roman<br />
Law." (T. BARNES, TERTULLIAN 23 (1971) citing Beck, Romisches Recht Bei Tertullian and Cyprian<br />
(1930)). "Secondly, knowledge of Roman law was not the exclusive prerogative of iuris consult.<br />
It was a necessity for advocates pleading cases in court and also a normal possession of the educated<br />
man." Id. at 24.<br />
4. TERTULLIAN, APOLOGETIC AND PRACTICAL TREATISES published in 10 LIBRARY OF FA.<br />
THERS OF THE HOLY CATHOLIC CHURCH 6-12 (1854).<br />
5. Id. at 146, 366.<br />
6. "<strong>The</strong> old Roman law conception appears... in Tertullian's portrayal of God as Judge and<br />
in his teaching that the relationship of man to Him is pre-eminently that of a criminal to his judge."<br />
J. MORGAN, THE IMPORTANCE OF TERTULLIAN IN THE DEVELOPMENT OF CHRISTIAN DOGMA 54<br />
(1928). For examples of Tertullian's use of other legal terms, see MORGAN, id. at 67-76.<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
sized man's duty to make "satisfaction to God by repenting of his sins." 7<br />
"How foolish, moreover, how (unjust) ... not to pay the price (repentance)<br />
and yet to stretch forth the hand for the merchandise- For at<br />
this price the Lord hath determined to grant His forgiveness." ' Repentance<br />
was "satisfaction," 9 appeasement of the wrath of God and avoidance<br />
of punishment. 10 "God sitteth over us as a Judge to exact and to<br />
maintain that righteousness.., and with a view to this establisheth the<br />
entire sum of His law...."11<br />
One derives Tertullian's legal interpretation of the atonement by bringing<br />
together relevant statements in several of his essays. It was Anslem<br />
who provided the classic legal interpretation in a systematic, tight, logical<br />
discussion-the renowned Cur Deus Homo. 1 2 He was born in 1033<br />
(d. 1109) in Piedmont and studied law in Pavia. His thought reveals the<br />
influence of the feudalism of his time, of Lombard law and the Church's<br />
penitentials. "[T]o sin," he said, "is nothing other than not to render to<br />
God what is due." 13 "What is the debt which we owe to God? Whoever<br />
does not pay to God his honor due Him dishonors Him and removes<br />
from Him what belongs to Him.. ."."' "<strong>In</strong>deed God's wrath is nothing<br />
other than his will to punish." 15 Repayment for the dishonor is not sufficient<br />
unless "in proportion to the injury caused by the dishonoring, he<br />
makes some restitution which is acceptable to the one whom he has dishonored.<br />
Satisfaction ought to be proportional to the measure of the<br />
sin."' 6 When earthly rulers "rightly exercise retribution, the Lord Himself<br />
does it; for they have been ordained by Him to this end." 17 It follows<br />
inexorably that either the dishonor of God is "repaid" or there will be<br />
punishment. 18 Thus, in the end, God cannot be dishonored.<br />
<strong>The</strong> next step in Anselm's argument is that no man, indeed, not even<br />
all human beings, can make sufficient satisfaction since all men are sinners.<br />
Christ was a logical necessity since the required satisfaction can<br />
7. TERTULLIAN, supra note 4, at 358.<br />
8. Id. at 359.<br />
9. Id. at 370.<br />
10. Id at 371.<br />
11. Id. at 353.<br />
12. 3 ANSELM OF CANTERBURY (J. Hopkins, H. Richardson, trans., 1976).<br />
13. Id. at 67.<br />
14. Id at 68.<br />
15. Id. at 55.<br />
16. Id.<br />
17. Id at 69.<br />
18. Id. at 71.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
698 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
only be paid by someone who is sinless. Sin calls for payment "greater<br />
than any existing thing besides God.... <strong>The</strong>refore only God can make<br />
this satisfaction." 19 But since man ought to make this satisfaction and<br />
since only God can make it, "it is necessary that a man-God make it." 20<br />
<strong>The</strong> logic of this argument is evident in its successive steps-God's<br />
honor, the sinner's disobedience, God's wrath, the need for satisfaction,<br />
and the inability of sinners to justify sinners-hence the Virgin birth and<br />
the incarnation of the man-God who pays the price and effects the reconciliation.<br />
21 <strong>In</strong> later discussions of the atonement there are variations<br />
from the rigor of Anselm's treatise, but Why God Became Man set the<br />
parameters of those discussions whether pro or con the legal<br />
interpretation.<br />
Calvin (1509-1564) studied law at Orleans and Bourges; hence it is not<br />
surprising that he praised law as God's commands "that he might lift<br />
their minds higher." 22 Law also admonishes, is a necessary deterrent 23<br />
"and urges them on in well-doing." 2 4 "<strong>The</strong> law shows the righteousness<br />
of God ....,25 He anticipated Jhering and Fuller: ". . . if the forms of<br />
the law be separated from its end, one must condemn it as vanity." 26<br />
Alvin wrote of "God's fearful vengeance against the whole of mankind."<br />
2 7 But God, while not ceasing to love his children, is "wondrously<br />
angry toward them . ..he would frighten them . . .to humble their<br />
fleshly pride, . . . and arouse them to repentance." 28 Although "they<br />
who ... provoke his wrath ... will not escape his vengeance,"29 ". . .it is<br />
not, properly speaking, punishment or vengeance, but correction and admonition."<br />
3 A secular judge "applies the penalty to the crime itself.<br />
But when a father ... corrects his son, he does not do this to take yen-<br />
19. Id. at 102.<br />
20. Id.<br />
21. See Anselm's essay, <strong>The</strong> Virgin Conception and Original Sin, id. at 143. <strong>The</strong> influence of<br />
ancient Greek mythology and metaphysics on Christology is beyond the scope of this paper.<br />
22. J. CALVIN, <strong>In</strong>stitution of the Christian Religion, 20 LIBRARY OF CHRISTIAN CLASSICS 349<br />
(J.T. McNeill ed. 1960).<br />
23. Id. at 358-59.<br />
24. Id at 360.<br />
25. Id at 354.<br />
26. Id. at 349.<br />
27. Id at 244-45.<br />
28. Id at 577.<br />
29. Id. at 659.<br />
30. Id.<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
geance on him or to maltreat him but rather to teach him ....<br />
"[T]he whole human race perished" because of Adam's disobedience.<br />
32 "This is our acquittal: the guilt that held us liable for punishment<br />
has been transferred to the head of the Son of God." ' 33 ".... God's<br />
judgment was satisfied by that price.", 34 Calvin writes of Jesus' sacrifice<br />
as "his act of expiation" to "appease the father's righteous wrath. '35<br />
Jesus' "pleading, ' 36 his intercession as man's advocate, brings "our acquittal,"<br />
37 "[t]he curse.., was transferred to him... (who) clothed us<br />
with his purity." 38<br />
Opposition to legal interpretation of atonement, based in part on<br />
Clement and Abelard, was eloquently expressed by Bushnell, an American<br />
clergyman, in 1874. 39 Bushnell argued that Jesus did not suffer for<br />
justice but in self-sacrifice. It dishonors God, indeed it implies that he is<br />
immoral, to say that he "accepts the pains of the good in payment of the<br />
pains of the bad." ' <strong>The</strong> legal interpretation of atonement describes "a<br />
coarse commercial transaction."'" Law is defective, first, because it is<br />
penal and does not bring about reform by free choice. And, second, it is<br />
negative in its prohibitions. 42 Bushnell uses the model of the family and<br />
the school; the mother or the teacher corrects out of love. <strong>The</strong>ir correction<br />
is "not judicially penal ... for it is not graded by the desert of<br />
actions, but by what is wanted for the future benefit and due correction<br />
of the actors." '4 3 It is not "a substantive measure of their iln-desert." 44<br />
Bushnell thought there was "no such thing" as "a penalty undeserved."<br />
Moreover, there is no "common measure" in undeserved penal-<br />
31. Id at 340. "<strong>In</strong> the dogma that the whole human race is condemned on account of the sin of<br />
its first parents, the doctrine of collective responsibility has reached its pitch." WESTERMARCK, 1<br />
THE ORIGIN AND DEVELOPMENT OF THE MORAL IDEAS 50-51 (1971).<br />
32. Calvin, supra n.22, at 509, 510.<br />
33. Id. at 351.<br />
34. Id. at 467.<br />
35. Id. at 502.<br />
36. Id. at 509.<br />
37. Id at 510.<br />
38. H. BUSHNELL, FORGIVENESS AND LAW (1874). See Rashdall, <strong>The</strong> Abelardiun Doctrine of<br />
the Atonement, in DocrINE AND DEVELOPMENT 128 (1898).<br />
39. Bushnell, supra n.39, at 86.<br />
40. Id. at 91.<br />
41. Id. at 109.<br />
42. Id. at 134.<br />
43. Id. at 135. Bushnell says "the word justice does not occur once in the <strong>New</strong> Testament...<br />
Id. at 141.<br />
44. Id. at 143-44.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
700 WASHINGTON UNIVERSITY LAW QUARTERLY [Vol. 65:694<br />
ties and deserved ones. 45 It is contrary to the spirit of the <strong>New</strong><br />
Testament to list a set of "vocables" as substitutes for penalty, compensation,<br />
transferable merits, sins carried over, sins accepted for the sinner<br />
and so on. <strong>The</strong>se "theological counters" and "computations of atonement"<br />
are "to any Christian believer" a "very sad affair," not "altogether<br />
spurious," but "artificial. ' 46 <strong>In</strong> even stronger terms a contemporary theologian<br />
wrote: "To speak as if the Son... appeased or propitiated God<br />
... is blasphemy. 4 7<br />
<strong>In</strong> a similar vein, the philosopher-theologian, H. Rashdall, critical of<br />
every aspect of the legal interpretation, argued that Jesus' death could<br />
help others only in the way that the acts of other righteous persons could<br />
help others-by their example, stimulating benevolence. 4 8 He also rejected<br />
the view that Christ's death was a ransom paid to the Devil or to<br />
God. 49 "God is a loving Father who will pardon sin upon the sole condition<br />
of true repentance." 50 He seeks reconciliation, or at-one-ment. Tertullian's<br />
theory is "coarsened and legalized,"" 1 "poisoned by the<br />
substitution of legal for moral conceptions." 2 To Rashdall, Anselm employed<br />
Lombard conceptions of civil law-satisfaction, debt and Wergild.<br />
53 His "notions of justice are the barbaric ideas of an ancient<br />
Lombard king or the technicalities of a Lombard lawyer... ."I Most<br />
interesting is Rashdall's rejection of "the attribution of guilt to all humanity<br />
for the sin of one, nor can the payment of a penalty by the sinless<br />
Christ rationally or morally be considered to make any easier or any<br />
juster the remission of the penalty which man owes for his own sin." ' 5<br />
"We have no right to pronounce just in God what would have seemed<br />
the highest injustice among men. 9 ' 56<br />
Rashdall strikes his heaviest blow on the retributive theory of punishment.<br />
That theory, he states, is implied in the emphasis on expiation and<br />
penalty in all legal interpretations of atonement. It is "a survival of<br />
45. Id. at 95.<br />
46. F. DILLISTONE, THE CHRISTIAN UNDERSTANDING OF ATONEMENT 244 (1968).<br />
47. H. RASHDALL, THE IDEA OF ATONEMENT IN CHRISTIAN THEOLOGY 35 (1919).<br />
48. Cf. Mark 10:43-45; Matthew 20:26-28.<br />
49. RASHDALL, supra note 48, at 48.<br />
50. Id. at 249.<br />
51. Id. at 253.<br />
52. Id. at 351-52.<br />
53. Id. at 355.<br />
54. Id.<br />
55. Id. at 356.<br />
56. Id. at 422.<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
primitive modes of thought.., it cannot be rational to inflict an evil<br />
except as a means to good-the good of the offender or of others." It is<br />
inconsistent with the Christian ethic of love and the character of God.<br />
"Even on the retributive view of punishment it is impossible to defend<br />
7<br />
the punishment of the innocent in place of the guilty."'<br />
<strong>In</strong> his recent book 5 " Hans Kiing, a Catholic theologian, adds some<br />
surprising innovations in his criticism of the legal interpretations of the<br />
atonement. For him God is "wholly love." 59 Conspicuously omitted<br />
from his <strong>In</strong>dex are the terms "penance," "punishment," "wrath of God"<br />
and "Hell." ' After listing the "juridical concepts" used in legal interpretations-"law,<br />
guilt, penalty, reward, penance, expiation, ransom, satisfaction,<br />
reconciliation, restitution," 6 he characterizes those<br />
interpretations as "a re-Judaizing process in the name of Christianity."" 2<br />
More surprising is his statement that the idea of original inherited sin,<br />
upon which the necessity of the God-man's intercession depends, "seems<br />
problematic." 63 He rejects the theory of redemption on which the legal<br />
interpretation rests because it is legalistic, based on Roman law, "legal<br />
niceties" and human justice, not on the "grace, mercy and love" characteristic<br />
of the <strong>New</strong> Testament." He even rejects "sacrifice" emphasized<br />
in the legal interpretation. "Is God so cruel, even sadistic, that his anger<br />
can be appeased only by the blood of his Son?" <strong>In</strong>stead of "sacrifice,"<br />
Kung would substitute "voluntary personal self-surrender".... "self-giving.",<br />
65 <strong>In</strong>stead of "expiatory sacrifice," Kung offers "reconciliation, representation,<br />
redemption, liberation." ' 66 For Kung, "God loves sinners<br />
more than his righteous. ' 67 "He forgives instead of condemning, liberates<br />
instead of punishing, permits the unrestricted rule of grace instead of<br />
57. H. KUNG, ON BEING A CHRISTIAN (E. Quinn, trans., 1976).<br />
58. Ma at 435.<br />
59. Jesus often threatened hell, everlasting fire and "gnashing of teeth." Matthew 5:22, 30;<br />
8:12; 11; 23; 13; 42; 18:8, 9. "Wrath of god" is a frequent expression in the <strong>New</strong> Testament, Matthew<br />
3:7; Romans 1:18; Ephesians 5:6.<br />
60. KLUNG, supra note 58, at 421.<br />
61. Id<br />
62. Id. at 422.<br />
63. Id. at 423. Similarly, "[i]t [redemption] is ... an outstanding example of a legal notion<br />
being taken up and made into a religious notion by priests and prophets." D. DAUBE, STUDIES IN<br />
BIBLICAL LAW 42 (1947).<br />
64. Kung, supra note 58, at 424-25. KUNG omits any reference to Jesus' first words on the<br />
cross-the first line of Psalm 22.<br />
65. KUNG, supra note 58, at 426.<br />
66. Id. at 274. Kung's italics.<br />
67. Id. at 313.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
702 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
law .... <strong>The</strong> God who prefers the sinner.., the prostitutes and adulterers<br />
to their judges, the law-breakers and outlaws to the guardians of the<br />
law." 6 "He is a God who lavishes his grace on those who do not deserve<br />
it." 6 9 "He is not a God of law, but a God of grace." 70<br />
<strong>The</strong> distinguished theologian, Emil Brunner, provides a detailed refutation<br />
of the anti-legalist interpretations of the atonement. 71 <strong>The</strong>y err, he<br />
argues, in thinking that the only alternative to Anselm is the "wholly<br />
subjective" view that "the death of Jesus was a sublime and noble martyrdom.<br />
'72 <strong>The</strong>ir most serious defect is that they trivialize guilt. "If the<br />
Cross merely denotes the removal of a religious error (namely, that God<br />
is not an angry Judge) then guilt is not taken seriously," '73 Moreover, if<br />
"guilt is merely error, and God is nothing but love, there is no need for<br />
forgiveness; ... all you need is to know it." 74<br />
"Divine punishment also issues necessarily from the Holiness of<br />
God," '75 but at the same time there is "the overwhelming reality of forgiving<br />
love." ' 76 "That God can be both at once, the One who 'is not<br />
mocked,' and the One who 'doth not deal with us after our transgressions,'<br />
that neither aspect is sacrificed to the other ... this fundamental<br />
theme of the whole Bible is the message of the Cross .... , Accordingly,<br />
although Jesus' Passion is not a penalty, certainly not a transaction,<br />
"it is a sacrifice, a vicarious action" in which Jesus identified himself<br />
wholly with the human race.<br />
<strong>In</strong>stead of deprecating law, Brunner eulogizes it. "<strong>The</strong> law is the manifested<br />
Will of the Lord God.... All order, all significance, all beauty,<br />
all trustworthiness, all constancy, all fidelity and all faith, all truth and<br />
all good, are based .. .upon the Law, which constitutes the intrinsic<br />
68. Id. at 435. Tillich has echoed this: ... justice is the structural form of love without which<br />
it would be sheer sentimentality ... there are no conflicts in God between his reconciling love and<br />
his retributive justice." P. TILLICH, 2 SYSTEMATIC THEOLOGY 174 (1957).<br />
69. KUNG, supra note 58, at 314. "thus the law is an enemy.... <strong>The</strong> Divine Love cannot be<br />
imprisoned in the categories of merit and justice .... " G. AULEN, CHRISTUS VICTOR 68 (A.<br />
Herbent trans. 1966).<br />
70. E. BRUNNER, THE MEDIATOR (0. Wyon trans. 1934).<br />
71. Id. at 439.<br />
72. Id. at 471.<br />
73. Id. at 472.<br />
74. Id. at 464.<br />
75. Id. at 449.<br />
76. Id. at 452.<br />
77. Id. at 495.<br />
78. Id. at 461.<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
content of His Will .... ,"79 "[This law] demands the divine reaction, the<br />
divine concern about sin, the divine resistance to this rebellion, and this<br />
breach of order.... If this were not true there would be no seriousness<br />
in the world at all; there would be no meaning in anything, no order, no<br />
stability... chaos and desolation would be supreme." 80 <strong>The</strong> Bible is<br />
"full of such juridical expressions... guilt, remission of guilt, judgment,<br />
judge, punishment, accusation, condemnation, pardon, release...." 81<br />
I leave it to the reader to choose which, if any, interpretation of biblical<br />
atonement he prefers. <strong>The</strong> problem discussed here is an interdisciplinary<br />
one based on certain interrelations of law and religion. More<br />
narrowly, it is focused on the legal interpretation of atonement and especially<br />
on the opposition of vicarious and individual responsibility.<br />
Pervading all of these problems is that of interpretation itself-what<br />
the theologians call exegesis or hermeneutics. A Christian theologian<br />
will interpret Isaiah 53, indeed most of the Old Testament, as prophetic<br />
of the coming of Christ while a Jewish theologian will provide a very<br />
different interpretation of that Testament, including Isaiah 53. So, too,<br />
Kung's negative view of Hinduism and Buddhism is far different from<br />
that of adherents to those world religions. Just as lawyers are influenced<br />
by their clients' interest and interpret statutes in conformity with that<br />
given end, so does a theologian's conception of God determine his interpretation<br />
of a religious text. Just as lawyers pick and choose among the<br />
cases so do theologians select those biblical passages that support their<br />
ordained goal. <strong>In</strong> the practice of law, however, subjectivity is diminished<br />
by the adversary system either directly as in the Anglo-American system<br />
or indirectly as in the civil law systems and, also, in both, by the impartiality<br />
of the judge. 82<br />
Certain other generalizations regarding the interpretations of biblical<br />
atonement may be ventured. First, both legalists and anti-legalists agree<br />
that Jesus bore all men's sins. But the reasons differ widely-from a belief<br />
in orthodox Christology to the simple belief that Jesus identified with<br />
79. Id. at 444.<br />
80. Id. at 465.<br />
81. See J. HALL, Religion, Law and Ethics, in LAW, SOCIAL SCIENCE AND CRIMINAL THEORY<br />
(1982).<br />
82. <strong>In</strong> Judaism "atonement... is effected through suffering by the individual himself. This is<br />
where Judaism and other religious systems differ most widely from Christianity, which does not<br />
think of atonement as affected by man's effort or suffering.... Christianity met [this problem] with<br />
its Christology." O.S. RANKIN, ISRAEL'S WIsDOM LITERATURE 122 (1954 reprint of 1936). See I.<br />
al Farqi, Islum, in THE GREAT ASIAN RELIGIONS 312 (W. Chan ed. 1969).<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
704 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
all suffering, sinful humanity. 83<br />
Second, both sides seem to agree that Jesus' life, if not his crucifixion,<br />
was necessary for the salvation of sinful humanity, although again "necessary"<br />
is given different interpretations ranging from acceptance of orthodox<br />
views of original sin and the incarnation to the inspiration of his<br />
life "unto death."<br />
Third, the legalists praise law and retributive justice, while the antilegalists<br />
criticize and condemn both. For the former, law, far from being<br />
a burden, 84 represents God's communication of his righteousness, his<br />
guidance, and his loving chastisement to lead people away from evil and<br />
toward goodness. For the anti-legalists, acceptance of law even as a minimum<br />
standard turns quickly to criticism of law as "legalistic" and, in<br />
any case, as far inferior to God's loving grace. <strong>The</strong> parallel of that with<br />
Plato's criticism of law in <strong>The</strong> Statesman and his preference for the justice<br />
and wisdom of the philosopher-king are striking. Equally significant<br />
are the biblical foundations of the perennial debates between deontologists<br />
and utilitarians regarding punishment.<br />
We can better understand atonement vis-a-vis present-day problems of<br />
penal law if we first take a backward glance at the place of collective<br />
responsibility and retribution in past ages. Only then can we appreciate<br />
the fact that our ancestors were not irrational in their penology. Moreover,<br />
that history is a necessary prolegomenon to a realistic grasp of present<br />
problems, for in that wider perspective we may discover not only that<br />
the past can guide us toward feasible reforms but also that it imposes<br />
limits on utopian plans to uproot retributive justice.<br />
From the perspectives of sociology and modern penal law collective<br />
responsibility seems superstitious and based on the myth that a society is<br />
a great ego, a person separate from the interactions of individuals; and it<br />
is outrageous from an ethical viewpoint since it imposes punitive sanctions<br />
on innocent persons. But history reveals interesting relevant facts.<br />
First, in pre-industrial societies, both ancient and modern, social groups<br />
are so closely knit in intimate contact and association (whose unity was<br />
symbolized in the leadership of a chief or ruler) that it is the most natural<br />
83. Psalm 19. See A. BUCHLER, STUDIES IN SIN AND ATONEMENT (<strong>In</strong>tro. by F.C. Grant,<br />
1967).<br />
84. See H. ROBINSON, THE HEBREW CONCEPTION OF CORPORATE PERSONALITY (1964). <strong>In</strong><br />
the thought of ancient Israel "sin was more than guilt; it was pollution. It infected the whole neighborhood...<br />
his city, his tribe or nation, and also their cattle and crops." F. Grant, Prolegomenon, in<br />
A. BUCHLER, STUDIES IN SIN AND ATONEMENT XXI, XXVII (1967).<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
thing in the world to think not of or as an individual but, instead, to<br />
think in concepts of the family, the clan, the community, or the nation.<br />
Only with industrialization and the loosening of ties does individualism<br />
make its appearance. Accordingly, we should distinguish present-day sociological<br />
conceptions of the group from the corporate idea that dominated<br />
biblical times. 5<br />
But, secondly, it has become clear that there was not simple unilinear<br />
evolution starting solely from the idea of corporate responsibility and<br />
ending in the substitution of the ethic of individual responsibility. From<br />
ancient times, moral leaders, including dramatists of ancient Greece, limited<br />
corporate liability by insisting that the innocent should not be punished<br />
for crimes committed by others. Moreover, as we shall see,<br />
although the pendulum has swung far from collective to individual liability,<br />
corporate liability is by no means completely absent in contemporary<br />
society, even from present-day law. It was usually the prophets who<br />
spoke of the nation's blessings and its liability. But Jeremiah and Ezekiel<br />
(Ez. 18) were among the first to criticize collective liability, especially the<br />
punishment of innocent persons for the sins of others. 8 6 It is also noteworthy<br />
that in many cases when God punished the nation, it was not for<br />
its sin but because of the ruler's sin; the king was the "owner" of the<br />
people. 8 7 Still, collective thinking was dominant.<br />
Westermarck cites literally hundreds of examples of collective responsibility<br />
among the ancient Greeks, Hebrews, Christians, Japanese, Koreans,<br />
Persians, Hindus and Teutons as well as among many primitive<br />
peoples. 88 He also gives instances of the rejection of collective liability. 9<br />
Sin was regarded as a contagious disease which could be transferred to<br />
85. 0. Rankin, supra note 82 at 53-54, 70. Recent studies by anthropologists support the view<br />
expressed in the Bible, namely, that individual responsibility was sometimes advocated along with<br />
collective responsibility. One anthropologist even says: "<strong>In</strong> fact, individual responsibility always<br />
exists inside corporate groups." <strong>In</strong> the pre-industrial societies which this anthropologist studied,<br />
collective responsibility was manifested in relation to other groups, that is, when a member of group<br />
A killed a member of Group B. MOOR, THE ALLOCATION OF RESPONSIBILITY 100 (M. Glickman<br />
ed. 1972). See T. ELIAS, THE NATURE OF AFIucAN CUSTOMARY LAW 134 (1954).<br />
86. D. Daube, supra note 64, at 162-63.<br />
87. E. WESTERMARCK, 1 THE ORIGIN AND DEVELOPMENT OF THE MORAL IDEAS 32, Ch. 2<br />
and 19 (1917); L. HOBHOUSE, MORALS IN EVOLUTION 70-104 (1916); POLLOCK, MkrTLAND, 1<br />
HISTORY OF ENGLISH LAW 678 (1923).<br />
88. "[Flor another's sin let me not suffer." RIG-VEDA ii, 28; 29; Westermarck, supra note 87,<br />
at 49. See, Deuteronomy 24:16 and 2 Kings 14:6.<br />
89. Westermarck, supra note 87, at 61.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
706 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
others and spread like an epidemic. 90 This led to the ritual of "transferring"<br />
the sins of the people to the sacrificed animal or the human<br />
sacrifice. 91<br />
Because collective responsibility means strict liability, the punishment<br />
of innocent persons, it is abhorrent to the modem mind. As Kant put it,<br />
penal liability is not "transmissible ... like a financial indebtedness...<br />
only the culprit can bear [punishment] which no innocent person can<br />
assume even though he be magnanimous enough to wish to take it upon<br />
himself for the sake of another." 92 Nevertheless, the universality of collective<br />
responsibility in past ages, the group mind-set rather than individualism<br />
(although alleviated from early times by pleas to spare the<br />
innocent), the likelihood that deterrence was also advanced by the threat<br />
to punish a wrongdoer's family, clan or nation-these and other factors<br />
described above made acceptance of the concept of collective responsibility<br />
natural and normal.<br />
<strong>The</strong>re is another phase of social experience that must be considered if<br />
we are to understand biblical atonement, namely, the role of the hero in<br />
history. If "society," viewed either as the aggregate of individuals or as a<br />
separate holistic entity, can be harmed (e.g. in ways that distinguish<br />
crimes from civil damages) 93 it is also true that society benefits from the<br />
sacrifice and contributions of its heroes-its great religious and moral<br />
leaders, its artists, scientists and scholars. All through history people<br />
have identified with and sung the praises of great men and women. <strong>In</strong>deed,<br />
*Carlyle hardly exaggerated when he included "Hero Worship" in<br />
the title of his book since, for him, "Universal History, the history of<br />
what man has accomplished in this world, is at bottom the History of the<br />
Great Men .... 9<br />
A more circumspect study of heroes emphasizes "the vicarious gratification<br />
of the [people's] yearnings through his presumed traits and<br />
90. Id. at 63. Quoting Frazer: <strong>The</strong> Victim must be a "representative of the community...<br />
accepted as a substitute on the principle of social solidarity." Id. at 67-68. See D. BROWNING,<br />
ATONEMENT AND PSYCHOTHERAPY (1966).<br />
91. 1. Kant, Religion Within <strong>The</strong> Lights of Reason Alone 66 (T. Greene, H. Hudson trans.<br />
1934).<br />
92. See J. HALL, GENERAL PRINCIPLES OF CRIMINAL LAW 240-246 (1960).<br />
93. T. CARLYLE, HEROES, HERO WORSHIP AND THE HEROIC IN HISTORY 1 (1840). "Such<br />
great teachers are very few in the world.... <strong>The</strong>y alone can carry us to the life divine." R. SRIVAS-<br />
TAVA, COMPARATIVE RELIGION 241 (1974).<br />
94. S. HOOK, THE HERO IN HISTORY 22 (1943).<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
achievements." 9 Krishna took human form when the need to overcome<br />
unrighteousness became urgent, Buddha's compassion went out to all<br />
suffering humanity, and many heroes in Ancient Greece were believed to<br />
be the sons of gods or goddesses. Nor is it only the great who elicit praise<br />
and gratitude. Many soldiers have sacrificed their lives that their comrades<br />
might live, and countless other "ordinary" persons never mentioned<br />
in the history books make daily sacrifices that others may benefit.<br />
It is in this perspective that versions of the atonement emphasizing Jesus'<br />
identification with all troubled, rejected men and women have great<br />
proximity to the experience of gratitude and love that people have felt for<br />
their heroes. 96<br />
If we combine reverence for the hero and the gratitude and affection he<br />
or she inspires-if we join that to normal acceptance of collective responsibility<br />
especially in past ages, it is no great leap from that platform to<br />
Biblical atonement in both its connotations-bearing the sins of others<br />
and the consequent benefit to the sinners. <strong>The</strong> above experience is projected<br />
into a religious faith.<br />
My concern here, however, is not theological, but secular, 97 especially<br />
with the interactions of law and religion. <strong>In</strong>deed, positive law and religion<br />
are so intertwined, both in the Bible and in the Qur'an, that it is no<br />
exaggeration to speak of the legal component of religion, of law in religion.<br />
<strong>The</strong>re is no better evidence of that than the writing of the theologians<br />
who for centuries advocated legal interpretations of atonement.<br />
If we glance at our present situation we find that some of the relevant<br />
concepts are still operative. Samuel Johnson said: "No man is thought<br />
the worse of here, whose brother was hanged." 98 But humanists are rare,<br />
and who can doubt that the families of some convicted criminals are<br />
often ostracized and suffer other discriminations? <strong>In</strong> wartime hostages<br />
are taken or killed, prisoners in a concentration camp are held responsible<br />
for the conduct of all the prisoners, and teachers penalize an entire<br />
class for the misbehavior of one student, especially if he does not confess.<br />
95. Compare Kant regarding the "superhuman." "[H]is distance from the natural man would<br />
then be so infinitely great that such a divine person could no longer be held up as an example of him.<br />
Man would say: If I too had a perfectly holy will all temptations to evil would of themselves be<br />
thwarted in me... I too should take upon myself not only willingly but joyfully all sorrows... even<br />
to the most ignominious death, since I would see before my eyes the glorious and imminent sequel."<br />
Kant, supra note 91, at 57-58.<br />
96. For my support and defense of religous faith see supra note 92, at 57-58.<br />
97. For my support and defense of religious faith see supra note 1, at 16-26.<br />
98. Daube, supra note 64, at 188.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
708 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
<strong>The</strong>re is strict vicarious liability in modem legal systems when an innocent<br />
employer is fined because of his employee's misconduct. <strong>In</strong>nocent<br />
stockholders pay the fines assessed against the corporation and they also<br />
benefit from most actions of the managers. 9 <strong>In</strong> international relations,<br />
political leaders may provoke wars, and innocent lives are lost. Thus,<br />
collective responsibility remains very much alive. Much of it, perhaps<br />
most of it, does not fall within the precise meaning of "crime," "criminal<br />
law" or "punishment;" this, indeed, has been said by many scholars<br />
about strict penal liability. But the liability of associations, social sanctions,<br />
and the work of social agencies are important aspects of the wider<br />
context in which modem systems of criminal law can be placed to the<br />
advance of knowledge of that law.<br />
<strong>The</strong>re is a final problem to be confronted which raises the most insistent<br />
of all the issues. Following precedent, we have been saying thus far<br />
that the legal interpretation of atonement was influenced by Roman or<br />
Lombard or feudal law. But if we press beyond those indubitable legal<br />
factors, if we seek the cause of many of their penal provisions, we find at<br />
the bottom of them-retribution. <strong>The</strong> usual description of the evolution<br />
and progress of retribution seems persuasive. First came instinctive retaliation<br />
against aggression. Second, comes vengeance which is supported<br />
by social norms, "oo and is limited by a sense of equivalence and<br />
reciprocity, as in barter. Finally, there emerges a principle of retribution<br />
which is refined over the years until it becomes the retributive justice that<br />
moral philosophers espouse.<br />
<strong>The</strong> Bible and the history of theology reveal the outlines of the perennial<br />
battle between those who would punish sinners and criminals because<br />
they were intentional wrongdoers and those who would deter or<br />
reform them. <strong>The</strong>y also reveal the commingling of retributive and utilitarian<br />
concepts. <strong>The</strong> sinner deserves to be punished, and punishment<br />
will also deter potential sinners; but most of all the Bible teaches that<br />
what is paramount is the reform of wrongdoers, i.e., reconciliation with<br />
God, resulting from repentance, restitution, and forgiveness.<br />
99. H. MANNHEIM, GROUP PROBLEMS IN CRIMINAL PUNISHMENT 43 (1955) distinguishes<br />
strict liability from that imposed on members of a union or partnership by reliance on the act of<br />
members in joining those associations. But surely the act of one who buys stock or joins a union is a<br />
very slender reed on which to rest punitive sanctions.<br />
100. H. KELSEN, SOCIETY AND NATURE 52, 55 (1943) W. McCulloch wrote that among the<br />
Koupoules of <strong>In</strong>dia "the greatest misconduct is the forgiveness of an injury, the first virtue, revenge."<br />
KEILSEN, id. at 64-65. Kelsen says at p. 235 that the retributive principle is the origin of the<br />
idea of causation.<br />
Washington University Open Scholarship
1987]<br />
ATONEMENT AND CRIMINAL LAW<br />
<strong>In</strong> modem times the issues have been cast in sharper, mutually exclusive<br />
terms. At the one extreme is Kant's scom of the crass utilitarianism<br />
that defends punishment only because it would deter others. For him,<br />
every human being should be treated as an end in himself, not as a means<br />
to extrinsic objectives. Desert is the only justification for punishing anyone.<br />
At the other extreme is Henry Sidgwick, the eminent moral philosopher,<br />
who wrote that he had "an instinctive and strong moral aversion<br />
to it [retribution] ... it is gradually passing away from the moral consciousness<br />
of educated persons in most advanced communities.... ." But<br />
he admitted that "it is still perhaps the more ordinary view." 1 0 1 Even<br />
stronger was Rashdall's condemnation of retribution. For him, "it cannot<br />
be rational to inflict an evil except as a means to good-the good of<br />
the offender or of others.'<br />
2<br />
It is not my present purpose to unravel the complexities of the voluminous<br />
literature on "punishment." 103 But I should like to suggest a possible<br />
way to advance discussion of this subject.<br />
Retribution is a universal phenomenon and experience among primitive<br />
as well as among civilized people, in ancient Greek drama, in the Old<br />
and <strong>New</strong> Testaments."4 It is implied or expressed in every legal system,<br />
even in those that explicitly reject it and then go on to impose punitive<br />
sanctions on criminals in proportion to the gravity of the harms they<br />
commit. Critics of retributive justice like Sidgwick and Rashdall believe<br />
that all thoughtful persons reject it (pace the heirs of Kant of Hegelta)<br />
but they regretfully acknowledge that "ordinary" people still support it.<br />
Even Plato, on whom Rashdall relied, seems to have made room for it.<br />
<strong>The</strong> plain fact, like it or not, is that retribution, crude or refined, has been<br />
and is inevitable. Responsibility will vary from collective to individual,<br />
or both may coexist, but retribution is constant. Although many academic<br />
utilitarians continue to ignore that fact or to argue as though it an<br />
somehow be made to disappear, non-academic utilitarians simply accept<br />
the inevitable and try to minimize its effect when its manifestation in<br />
specific penalties does not further deterrence or rehabilitation.<br />
<strong>The</strong> factual inevitability of retribution supports the position I have<br />
long advocated: (1) the primacy of retributive justice on the ground of<br />
101. H. SxiDGWICK, THE METHODS OF ETHICS 281 (1901).<br />
102. Rashdall, supra note 48, at 421, 422.<br />
103. See Hall, supra note 92, at ch. 9, and consult the <strong>In</strong>dex in J. HALL, LAW, SOCIAL SCIENCE<br />
AND THEORY (1982).<br />
104. Matthew 13: 41-44; 16:27; Mark 9:42.<br />
http://openscholarship.wustl.edu/law_lawreview/vol65/iss4/7
710 WASHINGTON UNIVERSITY LAW QUARTERLY<br />
[Vol. 65:694<br />
desert (guilt) and (2) the advance of the utilitarian ends of punishment<br />
(deterrence and rehabilitation) so far as they do not trivialize or exceed<br />
the limits ofjustice. 105 <strong>The</strong> pendulum has swung sharply in the direction<br />
of retributive justice and, unfortunately, in recent legislation in the<br />
United States rehabilitation has been ignored or rejected. Religion can<br />
remind us of the importance of helping wrongdoers develop an appreciation<br />
of moral values. Especially suggestive are modem versions of the<br />
legal and the anti-legal interpretations of atonement. What the philosopher-king<br />
will do in Utopia or God in heaven is a matter of faith. So far<br />
as the secular problems of crime and punishment are concerned, legal<br />
scholars will agree that sound positive law has great value. Still it seems<br />
necessary to stress the fact that even the soundest penal law limits what<br />
can be achieved in relianpe solely on it. <strong>In</strong> all world religions much emphasis<br />
is placed on the reform of wrongdoers, thought of as turning them<br />
from evil to goodness or as their advance in knowledge and understanding.<br />
<strong>The</strong>re can be little doubt that this aspect of religion has inspired the<br />
reform of penal institutions and much concern for the rehabilitation of<br />
their inmates.<br />
105. HALL, GENERAL PRINCIPLES OF CRIMINAL LAW 130 (lst ed. 1947). 307-308 (2nd ed.<br />
1960). This was not a discovery or a novelty. <strong>In</strong> 1797 Kant wrote: "He must first be found to be<br />
deserving of punishment before any consideration is given to the utility of this punishment for himself<br />
or for his fellow citizens." I. KANT, THE METAPHYSICAL ELEMENTS OF JUSTICE 100 (J. Ladd<br />
trans. 1965).<br />
Washington University Open Scholarship
Page 342 of 372
Attachment B<br />
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge<br />
for Law Enforcement<br />
Page 343 of 372
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for<br />
U.S. Law Enforcement<br />
Jerome P. Bjelopera<br />
Specialist in <strong>Organized</strong> <strong>Crime</strong> and Terrorism<br />
Kristin M. Finklea<br />
Specialist in Domestic Security<br />
January 6, 2012<br />
CRS Report for Congress<br />
Prepared for Members and Committees of Congress<br />
Congressional Research Service<br />
7-5700<br />
www.crs.gov<br />
R41547
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Summary<br />
<strong>In</strong> the last two decades, organized crime has grown more complex, posing evolving challenges for<br />
U.S. federal law enforcement. <strong>The</strong>se criminals have transformed their operations in ways that<br />
broaden their reach and make it harder for law enforcement to combat them. <strong>The</strong>y have adopted<br />
more-networked structural models, internationalized their operations, and grown more tech savvy.<br />
<strong>The</strong>y are a significant challenge to U.S. law enforcement.<br />
Modern organized criminals often prefer cellular or networked structural models for their<br />
flexibility and avoid the hierarchies that previously governed more traditional organized crime<br />
groups such as the Cosa Nostra. Fluid network structures make it harder for law enforcement to<br />
infiltrate, disrupt, and dismantle conspiracies. Many 21 st century organized crime groups<br />
opportunistically form around specific, short-term schemes and may outsource portions of their<br />
operations rather than keeping it all “in-house.”<br />
Globalization has revolutionized both licit and illicit commerce. Commercial and technological<br />
innovations have reduced national trade barriers, widened transportation infrastructure, and<br />
bolstered volumes of international business. <strong>The</strong> <strong>In</strong>ternet and extensive cellular telephone<br />
networks have fostered rapid communication. <strong>In</strong>tegrated financial systems, which allow for easy<br />
global movement of money, are exploited by criminals to launder their illicit proceeds. Estimates<br />
suggest that money laundering annually accounts for between 2% and 5% of world GDP.<br />
Simultaneously, borders are opportunities for criminals and impediments to law enforcement.<br />
<strong>Organized</strong> criminals have expanded their technological “toolkits,” incorporating technologydriven<br />
fraud into their capabilities. <strong>The</strong>ir operations can harm U.S. citizens without ever having a<br />
physical presence in the country. <strong>The</strong>se illicit activities include cyber intrusions into corporate<br />
databases, theft of individual consumer credit card information, fencing of stolen merchandise<br />
online, and leveraging technology to aid in narcotics smuggling. Further, criminal<br />
organizations—which have historically burrowed into and exploited local ethnic communities—<br />
can now rely on <strong>In</strong>ternet connectivity and extensive, international transportation linkages to target<br />
localities around the globe.<br />
Since the terrorist attacks of September 11, 2001, there has been a shift in law enforcement<br />
attention and resources toward counterterrorism-related activities and away from traditional crime<br />
fighting activities including the investigation of organized crime. Although the effects of<br />
organized crime may not be seen in a consolidated attack resulting in the physical loss of life,<br />
they are far-reaching—impacting economic stability, public health and safety, as well as national<br />
security.<br />
<strong>In</strong> July 2011, the Obama Administration issued its Strategy to Combat Transnational <strong>Organized</strong><br />
<strong>Crime</strong>. It addresses the fact that federal investigation of organized crime matters has not<br />
historically been a centralized effort. Regardless, there still is no single agency charged with<br />
investigating organized crime in the way the Federal Bureau of <strong>In</strong>vestigation (FBI) has been<br />
designated the lead investigative agency for terrorism. Further, resources to tackle this issue are<br />
divided among many federal agencies. As such, Congress may exert its oversight authority<br />
regarding the federal coordination of organized crime investigations via the 2011 strategy.<br />
Policymakers may also debate the efficacy of current resources appropriated to combat organized<br />
crime.<br />
Congressional Research Service
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Contents<br />
<strong>In</strong>troduction...................................................................................................................................... 1<br />
<strong>Organized</strong> <strong>Crime</strong> Adapting to Globalization ................................................................................... 2<br />
Borders and <strong>Organized</strong> <strong>Crime</strong> ................................................................................................... 3<br />
Copycats and Smugglers ..................................................................................................... 3<br />
Drug Trafficking.................................................................................................................. 7<br />
Money Laundering .............................................................................................................. 9<br />
<strong>Organized</strong> <strong>Crime</strong> and Technological Change .......................................................................... 11<br />
Mass Marketing Fraud ...................................................................................................... 11<br />
Cyberspace, Electronic <strong>In</strong>formation, and <strong>Organized</strong> <strong>Crime</strong>.............................................. 13<br />
Online Identity <strong>The</strong>ft and Sophisticated Credit Card Fraud.............................................. 13<br />
<strong>Organized</strong> Retail <strong>Crime</strong> and Online Fencing .................................................................... 15<br />
Bulk Narcotics Smuggling and Technology...................................................................... 16<br />
Exploitation of Ethnic Diaspora Communities........................................................................ 18<br />
Changing Structures ................................................................................................................ 21<br />
Network Models................................................................................................................ 22<br />
Corruption................................................................................................................................ 24<br />
“Ground-Level” Exploitation of Private Businesses......................................................... 24<br />
Big Business and <strong>Organized</strong> Criminals............................................................................. 25<br />
Corruption of Public Officials........................................................................................... 27<br />
<strong>Organized</strong> <strong>Crime</strong>, a “National Security” and “Public Security” Concern ..................................... 28<br />
Conceptualizing <strong>Organized</strong> <strong>Crime</strong> .......................................................................................... 29<br />
Transnational <strong>Organized</strong> <strong>Crime</strong> Defined........................................................................... 30<br />
Statutory Definition........................................................................................................... 34<br />
Issues.............................................................................................................................................. 35<br />
Defining <strong>Organized</strong> <strong>Crime</strong> in Statute................................................................................ 35<br />
Congressional Commission............................................................................................... 36<br />
<strong>In</strong>centives for <strong>In</strong>vestigating <strong>Organized</strong> <strong>Crime</strong> .................................................................. 37<br />
Implementing the National Strategy to Combat TOC ....................................................... 38<br />
Figures<br />
Figure 1. Transnational <strong>Organized</strong> <strong>Crime</strong> Strategy ....................................................................... 34<br />
Contacts<br />
Author Contact <strong>In</strong>formation........................................................................................................... 40<br />
Congressional Research Service
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>In</strong>troduction<br />
<strong>In</strong> the last two decades, organized crime has grown more complex, posing evolving challenges for<br />
U.S. federal law enforcement. This is largely because these criminals have transformed their<br />
operations in ways that broaden their reach and make it harder for law enforcement to define and<br />
combat the threat they pose. Globalization and technological innovation have not only impacted<br />
legitimate commerce, but they have simultaneously revolutionized crime. <strong>In</strong> response to these<br />
forces, organized criminals have adopted more-networked structural models, internationalized<br />
their operations, and grown more tech savvy. Criminals have become more elusive. <strong>The</strong>y see<br />
international borders as opportunities while law enforcement views them as obstacles. Criminals<br />
have expanded their range of tools and targets as well. Meanwhile, law enforcement “plays by<br />
yesterday’s rules and increasingly risks dealing only with the weakest criminals and the easiest<br />
problems,” according to the Strategic Alliance Group, a partnership of seven law enforcement<br />
agencies from five nations. 1<br />
Motivated by money, organized crime fills needs not met by licit market structures and/or exploits<br />
businesses, consumers, and nations for profit. <strong>Organized</strong> criminals have capitalized on<br />
commercial and technological advances that have bolstered communication and international<br />
business. <strong>The</strong>y use innovative methods of moving illegal proceeds around the world. Some<br />
nations have also witnessed the creation of ties between powerful business figures, politicians,<br />
and criminals.<br />
Modern organized criminals may prefer cellular or networked structural models for their<br />
flexibility and avoid the hierarchies governed by elaborate initiation rituals that were favored by<br />
their predecessors. Fluid network structures make it harder for law enforcement to infiltrate,<br />
disrupt, and dismantle conspiracies. Many 21 st century organized crime groups opportunistically<br />
form around specific, short-term schemes. Further, these groups may outsource portions of their<br />
operations rather than keeping all of their expertise “in-house.”<br />
<strong>In</strong> July 2011, to address these and other issues, the Obama Administration issued its Strategy to<br />
Combat Transnational <strong>Organized</strong> <strong>Crime</strong> (2011 Strategy). It described transnational organized<br />
crime (TOC) networks as a strategic threat to national security, laid out a definition of<br />
transnational organized crime, and set forth five policy objectives and six categories of priority<br />
actions in an attempt to devise a cohesive federal response to transnational organized crime. 2<br />
Complicating all of this, since the terrorist attacks of September 11, 2001 (9/11), there has been a<br />
shift in law enforcement attention and resources more toward counterterrorism-related activities<br />
and away from traditional crime fighting activities—including the investigation of organized<br />
crime.<br />
1 <strong>The</strong>se law enforcement agencies include the U.S. Federal Bureau of <strong>In</strong>vestigation (FBI); Drug Enforcement<br />
Administration (DEA); Immigration and Customs Enforcement (ICE); the United Kingdom’s Serious Organised <strong>Crime</strong><br />
Agency (SOCA); the Australian <strong>Crime</strong> Commission and Australian Federal Police; the <strong>New</strong> Zealand Police; and the<br />
Royal Canadian Mounted Police. See SOCA, “SOCA Working in Partnership Worldwide,” http://www.soca.gov.uk/<br />
about-soca/working-in-partnership/international-partnerships. <strong>In</strong>telligence Committee Futures Working Group, <strong>Crime</strong><br />
and Policing Futures, Strategic Alliance Group, March 2008, p. 2. (Hereafter, <strong>In</strong>telligence Committee Futures Working<br />
Group, Futures.)<br />
2 For details see Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, July 2011, http://www.whitehouse.gov/sites/<br />
default/files/Strategy_to_Combat_Transnational_<strong>Organized</strong>_<strong>Crime</strong>_July_2011.pdf. (Hereafter: Strategy to Combat<br />
Transnational <strong>Organized</strong> <strong>Crime</strong>.)<br />
Congressional Research Service 1
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
This report provides an analysis of how organized crime has capitalized on globalization by using<br />
borders as opportunities, relying on fast-paced technological change, and adapting its<br />
organizational structures. It illustrates how these transformations can impact U.S. persons,<br />
businesses, and interests. <strong>The</strong> report includes a discussion of how U.S. law enforcement<br />
conceptualizes organized crime in the 21 st century and concludes by examining potential issues<br />
for Congress, including the extent to which organized crime is a national security threat (partly to<br />
be tackled by U.S. law enforcement agencies), congressional oversight regarding the federal<br />
coordination of organized crime investigations, and the utility of current resources appropriated to<br />
combat organized crime.<br />
This report employs a broad conceptualization of organized crime in its narrative discussion of<br />
criminal activity. <strong>In</strong> other words, the analysis includes groups engaged in sustained criminal<br />
enterprises, such as—but not limited to—drug traffickers, mafia families, smugglers, violent<br />
gangs, and fraudsters. <strong>The</strong>se operations may or may not have a transnational dimension to them<br />
(which is a requirement under the guidelines of the 2011 Strategy), but they directly impact U.S.<br />
persons, businesses, and/or interests. While this conceptualization may be broader than the<br />
definition laid out in the 2011 Strategy, it incorporates a range of criminality that may inform<br />
Congress in future legislation impacting organized crime. <strong>The</strong> cases and examples discussed in<br />
this report are not intended to set definitional boundaries for organized crime.<br />
<strong>Organized</strong> <strong>Crime</strong> Adapting to Globalization<br />
<strong>Organized</strong> crime targeting the United States has internationalized and its structures have flattened.<br />
<strong>The</strong> popular image of mobsters employing elaborate initiation rituals and strict codes of conduct<br />
to control crews that assail their own communities is outmoded. Today, nimble, adaptive, loosely<br />
structured small groups with global reach harm consumers, businesses, and government interests<br />
on a daily basis. Commercial and technological innovations are behind this transformation. <strong>The</strong>y<br />
have helped to reduce national trade barriers, widen transportation infrastructure, and bolster<br />
volumes of international business. Smugglers have taken advantage of growing international<br />
commerce to hide illicit trade. <strong>The</strong> <strong>In</strong>ternet and extensive cellular telephone networks have<br />
fostered rapid communication, simultaneously revolutionizing licit and illicit commerce. For<br />
example, integrated financial systems allow for easy global movement of money. Estimates<br />
suggest that money laundering annually accounts for between 2% and 5% of world GDP. 3<br />
Criminal organizations targeting the United States operate in many of the world’s nations. Areas<br />
wracked by social disorder, inadequate policing, and poor governance offer opportunities for<br />
organized crime to take root. 4 <strong>The</strong>se groups exploit diaspora communities in the United States as<br />
cover for their operations, situating elements of their global operations among immigrant<br />
enclaves.<br />
<strong>Organized</strong> crime groups are becoming more entrepreneurial or market focused, reacting to<br />
changes in both illicit and licit economies. 5 Of course, they are still heavily involved in activities<br />
3 Moisės Naím, Illicit: How Smugglers, Traffickers, and Copycats are Hijacking the Global Economy (<strong>New</strong> York:<br />
Anchor Books, 2006) p. 16. (Hereafter: Naím, Illicit.)<br />
4 <strong>In</strong>telligence Committee Futures Working Group, Futures, p. 5. See also United Nations Office on Drugs and <strong>Crime</strong><br />
(UNODC), <strong>The</strong> Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat Assessment, (Vienna: UNODC,<br />
2010), p. 221.<br />
5 Jharna Chatterjee, <strong>The</strong> Changing Structure of <strong>Organized</strong> <strong>Crime</strong> Groups, Royal Canadian Mounted Police, 2005, pp. 2,<br />
(continued...)<br />
Congressional Research Service 2
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
such as narcotics trafficking and money laundering (which have been greatly impacted by<br />
globalization), but organized criminals are increasingly involved in less “traditional” high-tech<br />
operations encompassing identity theft, counterfeiting of goods, and various types of fraud.<br />
Borders and <strong>Organized</strong> <strong>Crime</strong><br />
Modern organized criminals prey upon weaknesses in international transportation and customs<br />
security regimens. 6 Border policing efforts have attempted to keep pace with the expansion of<br />
international commerce. <strong>Organized</strong> criminals attempting to smuggle goods, people, or<br />
information across borders also face enhanced border security regimens resulting from the<br />
terrorist attacks of 9/11. Regardless, specialized criminal networks smuggle items such as<br />
narcotics, counterfeit goods, stolen goods, and bulk cash, as well as humans, around the world<br />
and into the United States. <strong>The</strong>y have hidden their contraband within the growing volume of<br />
legitimate global trade. Prior to the global recession, between 1995 and 2008 the volume of<br />
global containerized traffic tripled. 7 Drug traffickers move large loads of cocaine, eventually<br />
destined for U.S. markets, from South America to Mexico via containerized shipping.<br />
<strong>In</strong>ternational counterfeiters use containers to smuggle their fake goods into the United States. As<br />
Moisės Naím has succinctly put it, most illicit trade involves copycats, smugglers, and<br />
traffickers. 8 While individuals can and do engage in these activities, a good deal can be attributed<br />
to organized crime.<br />
Copycats and Smugglers<br />
Criminal groups engage in counterfeiting and smuggling across and within the borders of the<br />
United States. This activity includes a wide range of products and influences the lives of everyday<br />
Americans, U.S. businesses, and government.<br />
Counterfeiting and Piracy<br />
Counterfeiting highlights the nexus between globalization and the modernization of organized<br />
crime. Although it is difficult, if not impossible, to determine how deeply immersed organized<br />
criminals are in this activity, at least one study has suggested serious involvement. 9 Further, in a<br />
recent speech before the <strong>In</strong>ternational <strong>In</strong>tellectual Property Summit, Attorney General Holder<br />
reinforced the need for the international law enforcement community to combat “the international<br />
networks of organized criminals now seeking to profit from IP [intellectual property] crimes.” 10<br />
(...continued)<br />
7-8, http://dsp-psd.pwgsc.gc.ca/Collection/PS64-9-2005E.pdf. (Hereafter: Chatterjee, <strong>The</strong> Changing Structure.)<br />
6 For more on this, see Naím, Illicit; Melvyn Levitsky, “Transnational Criminal Networks and <strong>In</strong>ternational Security,”<br />
Syracuse Journal of <strong>In</strong>ternational Law and Commerce, vol. 30, no. 2 (Summer 2003), pp. 227-240.<br />
7 Research and <strong>In</strong>novative Technology Administration, Bureau of Transportation Statistics, America’s Container Ports:<br />
Freight Hubs That Connect Our Nation to Global Markets, Department of Transportation, June 2009, pp. 7-8,<br />
http://www.bts.gov/publications/americas_container_ports/2009/pdf/entire.pdf.<br />
8 Naím, Illicit, pp. 1-8.<br />
9 See, for example, Gregory F. Treverton et al., Film Piracy, <strong>Organized</strong> <strong>Crime</strong>, and Terrorism, RAND Corporation,<br />
Santa Monica, CA, 2009, p. 27, http://www.rand.org/pubs/monographs/2009/RAND_MG742.pdf. (Hereafter,<br />
Treverton et al., Film Piracy.)<br />
10 Department of Justice, “Attorney General Eric Holder Speaks at the <strong>In</strong>ternational <strong>In</strong>tellectual Property Summit,”<br />
(continued...)<br />
Congressional Research Service 3
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>In</strong> areas such as film piracy, counterfeiting does not necessarily involve high entry costs or large<br />
legal penalties when compared to more conventional criminal activity such as drug trafficking. 11<br />
It is also potentially very lucrative. With little infrastructure—a high-speed <strong>In</strong>ternet connection,<br />
scanner, and copier and off-the-shelf software—criminals around the globe can easily imitate the<br />
branding and packaging that accompanies products, let alone copy the products themselves. 12<br />
Counterfeiting and pirating goods 13 involves the violation of intellectual property rights (IPR), 14<br />
essential to creative and high-tech industries particularly reliant on copyrights, trademarks, and<br />
patents to protect innovation. Counterfeiting and piracy potentially harm legitimate businesses<br />
and consumers, sapping profits and brand value and flooding markets with inferior and even<br />
dangerous products masquerading as legitimate goods. Aside from enforcement outlays, the<br />
activity also costs governments tax revenue and may slow economic growth by driving down<br />
incentives to innovate. 15<br />
Between FY2005 and FY2008, the yearly domestic value 16 of IPR-related law enforcement<br />
seizures of contraband in the United States leaped from $93 million to $273 million. <strong>In</strong> FY2009,<br />
(...continued)<br />
press release, October 18, 2010, http://www.justice.gov/iso/opa/ag/speeches/2010/ag-speech-101018.html.<br />
11 Treverton et al., Film Piracy.<br />
12 Treverton et al., Film Piracy, p. 3; Deputy Assistant Attorney General Criminal Division, Department of Justice,<br />
Jason M. Weinstein, Statement Before the United States House of Representatives Committee on Oversight and<br />
Government Reform Subcommittee on Government Management, Organization, and Procurement, Department of<br />
Justice, Prepared Testimony “Protecting <strong>In</strong>tellectual Property Rights in a Global Economy: Current Trends and Future<br />
Challenges,” December 9, 2009, p. 2, http://oversight.house.gov/images/stories/Hearings/Government_Management/<br />
<strong>In</strong>tellectual_Property_Rights/Draft_DAAG_Weinstein_testimony_OMB_CLEARED_with_new_date.pdf.<br />
13 U.S. Government Accountability Office (GAO), <strong>In</strong>tellectual Property, p. 5 offers the following definition: “‘Pirated<br />
copyright goods’ refer to any goods that are copies made without the consent of the right holder or person duly<br />
authorized by the right holder. ‘Counterfeit goods’ refer to any goods, including packaging or bearing without<br />
authorization, a trademark that is identical to a trademark validly registered for those goods, or that cannot be<br />
distinguished in its essential aspects from such a trademark, and that, thereby, infringes the rights of the owner of the<br />
trademark in question. According to the U.S. Food and Drug Administration (FDA), ‘counterfeit drugs’ are defined<br />
under U.S. law as those sold under a product name without proper authorization, where the identity of the source drug<br />
is knowingly and intentionally mislabeled in a way that suggests that it is the authentic and approved product.”<br />
14 U.S. Government Accountability Office (GAO), <strong>In</strong>tellectual Property: Observations on Efforts to Quantify the<br />
Economic Effects of Counterfeit and Pirated Goods, GAO-1-423, April 2010, p. 5, http://www.gao.gov/new.items/<br />
d10423.pdf defines intellectual property (IP) as “any innovation, commercial or artistic, or any unique name, symbol,<br />
logo, or design used commercially. IP rights protect the economic interests of the creators of these works by giving<br />
them property rights over their creations.” <strong>The</strong> report describes copyright as “[a] set of exclusive rights subsisting in<br />
original works of authorship fixed in any tangible medium of expression now known or later developed, for a fixed<br />
period of time. For example, works may be literary, musical, or artistic.” <strong>The</strong> report defines trademark as “[a]ny sign or<br />
any combination of signs capable of distinguishing the source of goods or services is capable of constituting a<br />
trademark. Such signs—in particular, words (including personal names), letters, numerals, figurative elements, and<br />
combinations of colors, as well as any combination of such signs—are eligible for registration as trademarks.” Patents<br />
are “[e]xclusive rights granted to inventions for a fixed period of time, whether products or processes, in all fields of<br />
technology, provided they are new, not obvious (involve an inventive step), and have utility (are capable of industrial<br />
application).”<br />
15 U.S. Government Accountability Office (GAO), <strong>In</strong>tellectual Property; U.S. Chamber of Commerce, “Protecting<br />
<strong>In</strong>tellectual Property,” pp. 9-15, http://www.uschamber.com/IP.htm. IPR infringement may also have some positive<br />
effects for consumers who may derive benefit from the lower costs of pirated goods. <strong>In</strong>dustry may also eventually<br />
generate more sales as consumers possibly develop interest in purchasing legitimate versions of cheaper counterfeit<br />
products they have sampled.<br />
16 According to U.S. Customs and Border Protection, “domestic value” is the “cost of seized goods, plus the cost of<br />
shipping and importing the goods into the U.S. and an amount for profit.”<br />
Congressional Research Service 4
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
the domestic value of seizures dropped 4%. 17 This is likely due to the global recession. Products<br />
originating in China—both Mainland China and Hong Kong—accounted for over 85% of these<br />
IPR seizures in FY2008 and FY2009. 18 Two 2010 operations in the United States together netted<br />
$240 million in counterfeit materials. <strong>The</strong> hauls included fake Rolex watches, Coach handbags,<br />
pirated DVDs, and fake pharmaceutical products. Much of the material came from China. 19<br />
Auto <strong>The</strong>ft Rings<br />
Another example of organized criminals viewing borders as opportunity involves auto theft.<br />
Although international automobile theft has existed almost as long as cars have been around, 20 the<br />
integration of worldwide markets and expansion of international shipping have greatly impacted<br />
it by facilitating international transport of stolen automobiles. Assessing the level of such activity<br />
is very difficult since few metrics for it exist. Regardless, today’s international automobile theft<br />
rings benefit from the high levels of cargo container traffic ushered in by globalization. <strong>The</strong>se<br />
groups profit by stealing vehicles in the United States and shipping them abroad, where they are<br />
sold. Such illicit operations react to global demand for luxury vehicles, and in some instances are<br />
extremely responsive to market forces. <strong>The</strong>y trawl large U.S. metropolitan areas that have<br />
assortments of vehicles and rely on rail or port facilities to move stolen vehicles abroad. 21<br />
<strong>In</strong> June 2010, law enforcement officials announced indictments of 17 participants in an alleged<br />
scheme that pilfered 450 cars annually in <strong>New</strong> York, <strong>New</strong> Jersey, and Connecticut. According to<br />
law enforcement officials, the group, described as a “steal to order” outfit by <strong>New</strong> York State<br />
Attorney General Andrew Cuomo, filled specific requests from U.S. customers and others in<br />
Senegal and netted up to $25,000 per car. <strong>The</strong> group supposedly relied on specialists who could<br />
reprogram car keys to match a vehicle’s specific code, exporters, and two car dealership<br />
employees, among others. <strong>The</strong> ring allegedly stored vehicles in four Bronx, NY, garages and<br />
loaded those destined for Senegal into shipping containers, concealing the cars behind furniture. 22<br />
17 U.S. Customs and Border Protection, “Yearly Comparisons: Seizure Statistics for <strong>In</strong>tellectual Property Rights (FY<br />
2005-FY2009),” January 2010, http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/seizure/seizure_stats.xml; U.S.<br />
Customs and Border Protection, U.S. Immigration and Customs Enforcement, “<strong>In</strong>tellectual Property Rights Seizure<br />
Statistics: FY 2009,” October 2009, p. 2, http://www.cbp.gov/linkhandler/cgov/trade/priority_trade/ipr/seizure/<br />
fy09_stats.ctt/fy09_stats.pdf; U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement,<br />
“<strong>In</strong>tellectual Property Rights Seizure Statistics: FY 2008,” January 2009, p. 2, http://www.cbp.gov/linkhandler/cgov/<br />
trade/priority_trade/ipr/seizure/fy08_final_stat.ctt/fy08_final_stat.pdf.<br />
18 U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, “<strong>In</strong>tellectual Property Rights<br />
Seizure Statistics: FY2009,” October 2009, p. 12, http://www.cbp.gov/linkhandler/cgov/trade/priority_trade/ipr/pubs/<br />
seizure/fy09_stats.ctt/fy09_stats.pdf; U.S. Customs and Border Protection, U.S. Immigration and Customs<br />
Enforcement, “<strong>In</strong>tellectual Property Rights Seizure Statistics: FY2008,” January 2009, p. 13, http://www.cbp.gov/<br />
linkhandler/cgov/trade/priority_trade/ipr/pubs/seizure/fy08_final_stat.ctt/fy08_final_stat.pdf.<br />
19 Keith Johnson, “U.S. Seizes Big Batches of Fake Goods,” Wall Street Journal, April 26, 2010.<br />
20 See “Stolen American Autos Clog the Mexican Market,” <strong>New</strong> York Times, February 5, 1922,<br />
http://query.nytimes.com/mem/archive-free/pdf?res=9D0DE5D71130EE3ABC4D53DFB4668389639EDE.<br />
21 Eva Dou, “<strong>New</strong>-York Based <strong>The</strong>ft Ring Shipped Hot Cars to Senegal,” Associated Press, June 30, 2010.<br />
22 Ibid; Rob Sgobbo, Joe Jackson, and Brendan Brosh, “U.S. to Senegal Car <strong>The</strong>ft Ring Busted, Attorney General<br />
Andrew Cuomo Says,” <strong>New</strong> York Daily <strong>New</strong>s, June 30, 2010.<br />
Congressional Research Service 5
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Human Smuggling and Trafficking<br />
Criminal organizations are taking advantage of an unprecedented era of international migration,<br />
including illegal migration to the United States. 23 However, since 2007 illegal immigration to the<br />
United States has declined. 24 This may be attributable, in part, to dwindling job opportunities<br />
resulting from the global recession and increased immigration enforcement activity along the U.S.<br />
Southwest border. 25 Nonetheless, criminal organizations continue to capitalize on the desire of<br />
unauthorized immigrants to enter the United States. Networks of human smugglers and others—<br />
including Mexican drug trafficking organizations (DTOs) that have broadened their moneygenerating<br />
activities to include human and weapon smuggling, counterfeiting, kidnapping for<br />
ransom, and extortion—bring unauthorized immigrants across the border and into the United<br />
States. 26 <strong>In</strong> one well-known case, Cheng Chui Ping—also known as “Sister Ping”—sentenced in<br />
March 2006, had led an international human smuggling ring that was responsible for smuggling<br />
Chinese villagers to the United States between the early 1980s and April 2000. <strong>In</strong> a 2006 press<br />
release, the Department of Justice (DOJ) described her as “one of the first, and ultimately most<br />
successful, alien smugglers of all time.” 27 At the start, Ping’s smuggling ring brought small<br />
numbers of villagers to the United States via aircraft, using fake immigration documents. She<br />
turned from exclusive reliance on air transit to include the use of maritime shipping as her<br />
operation matured. This way, Ping likely exploited increasing volumes of international seaborne<br />
cargo engendered by globalization to mask her illegal movement of human beings. She eventually<br />
developed the capability to smuggle hundreds of victims at a time via cargo ships, where the<br />
villagers could be stashed below the deck until they reached their U.S. destination and eventually<br />
paid her exorbitant smuggling fees. 28 Criminals who smuggle individuals into the United States<br />
may also turn the smuggling into a trafficking situation by increasing the immigrants’ debts owed<br />
once they have been smuggled to the United States. <strong>The</strong> smugglers/traffickers may then require<br />
their victims to work for a period of time to pay off the debts. 29<br />
<strong>Organized</strong> crime exploits individuals through both labor and sex trafficking. <strong>In</strong> 2006, the FBI<br />
reported that human trafficking generates about $9.5 billion for organized crime annually. 30<br />
23 Naím, Illicit p. 89; Jackie Turner and Liz Kelly, “<strong>In</strong>tersections Between Diasporas and <strong>Crime</strong> Groups in the<br />
Constitution of the Human Trafficking Chain,” British Journal of Criminology, vol. 49, no. 2 (March 2009), p. 184.<br />
24 Jeffrey S. Passel and D'Vera Cohn, U.S. Unauthorized Immigration Flows Are Down Sharply Since Mid-Decade,<br />
Pew Hispanic Center, Report, Washington, DC, September 1, 2010, p. i, http://pewhispanic.org/files/reports/126.pdf.<br />
25 Miriam Jordan, “Illegal Immigration to U.S. Slows Sharply,” Wall Street Journal, September 1, 2010,<br />
http://online.wsj.com/article/SB10001424052748703882304575465742670985642.html?mod=googlenews_wsj.<br />
26 Also, while some drug trafficking organizations may not be directly involved in human smuggling, they may tax the<br />
smugglers who wish to use the established drug trafficking routes. For details on Mexican cartels and human<br />
smuggling, see David Luhnow and Jose De Cordoba, “Mexican Military Finds 72 Bodies Near Border,” Wall Street<br />
Journal, August 26, 2010, http://online.wsj.com/article/<br />
SB10001424052748703632304575450761550490920.html#articleTabs%3Darticle; Josh Meyer, “Drug Cartels Raise<br />
the Stakes on Human Smuggling,” Los Angeles Times, March 23, 2009, http://articles.latimes.com/2009/mar/23/nation/<br />
na-human-smuggling23.<br />
27 Department of Justice, “Sister Ping Sentenced to 35 Years in Prison for Alien Smuggling, Hostage Taking, Money<br />
Laundering, and Ransom Proceeds Conspiracy,” press release, March 16, 2006, http://www.justice.gov/usao/nys/<br />
pressreleases/March06/sisterpingsentencingpr.pdf.<br />
28 Ibid.<br />
29 Department of Justice, “Hudson County Bar Owner Pleads Guilty to Role in <strong>In</strong>ternational Human Smuggling Ring,”<br />
press release, September 12, 2006, http://www.justice.gov/usao/nj/press/files/pdffiles/medr0912rel.pdf.<br />
30 Department of State, Trafficking <strong>In</strong> Persons Report 2006, June 2006, p. 13, http://www.state.gov/documents/<br />
organization/66086.pdf.<br />
Congressional Research Service 6
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
However, as the Government Accountability Office (GAO) has noted, estimates regarding the<br />
global scale of human trafficking are questionable; 31 as such, any estimates regarding the<br />
proceeds generated through these crimes may not be representative of their true scope. <strong>The</strong>se<br />
criminal organizations target both U.S. citizens and foreign nationals who are drawn to visions of<br />
better lives in the United States.<br />
<strong>In</strong>ternational borders often play a central role in the dynamics involved in forced labor and sex<br />
trafficking. <strong>In</strong> many instances, victims likely perceive borders and border security regimens as<br />
insurmountable barriers via legitimate means, requiring them to turn to illicit methods of transit<br />
offered by traffickers. <strong>Organized</strong> criminals prey on victims’ powerful desires to live or work in<br />
other countries. While the following two cases may not have been prosecuted by DOJ as<br />
traditional “organized crime,” the networks involved highlight some of the dynamics involved in<br />
labor and sex trafficking. <strong>In</strong> August 2010, federal law enforcement announced an indictment of<br />
six individuals for participation in an alleged conspiracy to exploit Thai nationals through forced<br />
labor in the United States. <strong>The</strong> defendants allegedly enticed workers to the United States by<br />
offering opportunities for lucrative jobs. Once in the United States, the approximately 400 Thai<br />
workers had their passports confiscated, were threatened with economic harm and deportation,<br />
and were forced to work on farms in Washington and Hawaii. 32 <strong>In</strong> another case, four individuals<br />
from the United States, Mexico, and Guatemala were sentenced in April 2010 for involvement in<br />
a sex trafficking organization that targeted young Mexican women. <strong>The</strong>y lured these women to<br />
the United States on the promise of better lives or legitimate employment. Once the women were<br />
brought to the United States, they were instead physically threatened, beaten, intimidated, and<br />
forced to engage in commercial sex. 33 DOJ has also reported an uptick in Asian organized crime<br />
groups becoming involved as pimps or brokers in domestic human sex trafficking. Although the<br />
increase is noted for Asian organized crime groups, involvement in sex trafficking is certainly not<br />
limited by ethnic or geographic origin; these criminals collaborate with other, non-Asian groups<br />
to further their sex trafficking enterprises. 34<br />
Drug Trafficking<br />
<strong>In</strong> the last decade, cocaine has become a truly global commodity dependent on illicit market<br />
fluctuations. Traffickers now can leverage wide, international distribution networks to ride out<br />
pressures or changes that may make their traditional illicit markets less hospitable. According to<br />
media reports, some Colombian and Mexican cocaine suppliers have shifted sizeable amounts of<br />
product using containerized shipping—hiding their illicit material within the daily globalized<br />
flow of legitimate seaborne international commerce. 35 And some of the Mexican Gulf Cartel’s<br />
31 Government Accountability Office (GAO), Human Trafficking: Better Data, Strategy, and Reporting Needed to<br />
Enhance U.S. Antitrafficking Efforts Abroad, GAO-06-825, July 2006, http://www.gao.gov/new.items/d06825.pdf.<br />
32 Department of Justice, “Six People Charged in Human Trafficking Conspiracy for Exploiting 400 Thai Farm<br />
Workers,” press release, September 2, 2010, http://www.justice.gov/opa/pr/2010/September/10-crt-999.html. For<br />
another case involving forced labor, see Department of Justice, “Uzbek Man Sentenced for Role in Multi-National<br />
Racketeering and Forced Labor Enterprise,” press release, May 9, 2011, http://www.justice.gov/opa/pr/2011/May/11-<br />
crt-589.html.<br />
33 Department of Justice, “Four Defendants Sentenced to Prison in Human Trafficking Ring,” press release, April 28,<br />
2010, http://www.justice.gov/usao/gan/press/2010/04-28-10.pdf.<br />
34 Comments by DOJ officials at the 2010 National Conference on Human Trafficking, May 3–5, Arlington, VA.<br />
35 Mark Townsend, “How Liverpool Docks Became a Hub of Europe’s Deadly Cocaine Trade,” <strong>The</strong> Guardian, May<br />
16, 2010.<br />
Congressional Research Service 7
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
smuggling activity involving European markets has used the United States as a transshipment<br />
point. 36<br />
When it comes to the internationalization of cocaine markets, not all the news involves the<br />
growth of supply, however. Global demand for cocaine has partly impacted U.S. bound supplies<br />
of the drug. Cocaine availability levels in the United States have decreased since 2006. Diversion<br />
of cocaine to European and Latin American markets by Colombian and Mexican drug cartels has<br />
fueled this downturn in availability, as have coca eradication efforts, large seizures, law<br />
enforcement pressure on Mexican cartels, and violent inter-cartel rivalries. 37<br />
While the story of globalized drug smuggling impacting the United States often revolves around<br />
Colombian and Mexican cartels specializing in drugs such as cocaine, marijuana, heroin, and<br />
methamphetamine, criminal groups trafficking narcotics come in all sizes and handle a variety of<br />
drugs. Because of the ease of international communications, travel, and transportation networks<br />
inherent in globalization, drug trafficking groups need not be directly tied to the large cartels to<br />
have significant worldwide reach. Even relatively small groups can forge far-flung supply and<br />
transportation links.<br />
<strong>The</strong> FBI’s operation Black Eagle tracked a small Albanian network of alleged criminals based in<br />
northern <strong>New</strong> Jersey who were indicted in March 2009. 38 <strong>The</strong> network purportedly had domestic<br />
ties to Chicago, Detroit, and Texas, as well as international links to Macedonia and Albania. At<br />
one point, the group of opportunists supposedly conspired to smuggle 100 kilograms of heroin<br />
from Albania to the United States. According to the FBI, the group planned to use a Balkan front<br />
company to conceal the heroin in containerized shipments of furniture bound for the United<br />
States. <strong>The</strong> heroin was purportedly to come from Afghanistan, likely via Turkey and into Albania.<br />
<strong>The</strong>re was no clear cut leadership in the loosely knit group. <strong>The</strong> heroin deal was going to be one<br />
last score before some of the criminals “retired,” according to the FBI. <strong>The</strong>y were also likely<br />
involved with stealing and selling pharmaceuticals, illegal gambling, dealing ecstasy, and theft of<br />
retail goods. 39<br />
<strong>In</strong> another case involving a relatively small group, Phuong Thi Tran pleaded guilty in February<br />
2010 for her involvement in what has been described in press reports as an Asian drug trafficking<br />
ring that smuggled ecstasy pills and other drugs into the United States from Canada, where they<br />
were manufactured. Tran, who lived in Canada, is originally from Vietnam and served as the<br />
36 Michele M. Leonhart, DEA Acting Administrator, “Prepared Remarks: Project Reckoning Press Conference,”<br />
September 17, 2008, http://www.justice.gov/dea/speeches/s091808.html.<br />
37 National Drug <strong>In</strong>telligence Center, National Drug Threat Assessment, February 2010, p. 29, http://www.justice.gov/<br />
ndic/pubs38/38661/38661p.pdf.<br />
38 Federal Bureau of <strong>In</strong>vestigation, <strong>New</strong>ark Division, “Federal Agents Shut Down <strong>In</strong>ternational Smorgasbord of<br />
<strong>Crime</strong>,” press release, March 18, 2009, http://newark.fbi.gov/pressrel/pressrel09/nk031809.htm.<br />
39 Federal Bureau of <strong>In</strong>vestigation, “<strong>In</strong>side the FBI: Albanian <strong>Organized</strong> <strong>Crime</strong>,” November 27, 2009,<br />
http://www.fbi.gov/inside/archive/inside112709.htm. For more on Albanian organized crime activity in the United<br />
States see Department of Justice, “Two Leaders of Violent Albanian Drug Gang Found Guilty in Manhattan Federal<br />
Court,” press release, December 7, 2011, http://www.fbi.gov/newyork/press-releases/2011/two-leaders-of-violentalbanian-drug-gang-found-guilty-in-manhattan-federal-court;<br />
Department of Justice, “Sixteen Members of <strong>In</strong>ternational<br />
<strong>Organized</strong> <strong>Crime</strong> Group Charged with Kidnapping, Narcotics, Robbery and Firearms <strong>Crime</strong>s,” press release, June 8,<br />
2010, http://www.fbi.gov/newyork/press-releases/2010/nyfo060810.htm.<br />
Congressional Research Service 8
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
group’s ringleader. She oversaw an operation that smuggled millions of ecstasy pills into the<br />
United States between 2002 and 2008, when she was arrested. 40<br />
Money Laundering<br />
Making ill-gotten gains appear legitimate is critical to the success of organized criminals. For<br />
many criminals, the movement of money—either as bulk cash or digital transactions—across<br />
international borders plays an integral role in this process. <strong>The</strong>y use many techniques to launder<br />
money, often exploiting legitimate financial structures to mask the illegal origins of their profits.<br />
Money laundering includes three fundamental steps: (1) placement, the introduction of illicit<br />
funds into licit financial systems; (2) layering, the movement (often international) of illicit funds<br />
through a variety of business structures to obscure its origins; and (3) integration, the use of illicit<br />
funds that at this stage appear legitimate in lawful business transactions. 41 It is impossible to<br />
determine with any accuracy how much money is laundered by organized criminals whose<br />
operations impact the United States. However, U.S. government estimates suggest that Mexican<br />
and Columbian drug trafficking organizations earn between $18 billion and $39 billion annually<br />
from sales in the United States. 42 Annually, perhaps between $20 billion and $25 billion in bank<br />
notes is smuggled across the Southwest border into Mexico. 43 How much of this is profit and then<br />
laundered is unclear. 44 While bulk cash smuggling is an important means by which criminals<br />
move illegal profits from the United States into Mexico, they have increasingly turned to storedvalue<br />
cards 45 to move money. With these cards, criminals are able to avoid the reporting<br />
requirement under which they would have to declare any amount over $10,000 in cash moving<br />
across the border. 46 Aside from bulk cash smuggling and stored-value cards, Mexican traffickers<br />
move and launder money by using digital currency accounts, e-businesses that facilitate money<br />
transfers via the <strong>In</strong>ternet, online role-playing games or virtual worlds that enable the exchange of<br />
game-based currencies for real currency, and “mobile payments through cell phones that provide<br />
40 Department of Justice, “Ringleader of <strong>In</strong>ternational Drug Trafficking Ring Pleads Guilty for Role in Drug Smuggling<br />
Case,” press release, February 24, 2010, http://www.justice.gov/usao/pae/<strong>New</strong>s/Pr/2010/feb/<br />
tran_guilty_plea_release.pdf; Troy Graham, “Woman at Center of Asian Drug-Trafficking Ring Gets Nearly Six Year<br />
Term,” Philadelphia <strong>In</strong>quirer, August 25, 2010, http://www.philly.com/inquirer/local/<br />
20100825_Woman_at_center_of_Asian_drug-trafficking_ring_gets_nearly_six-year_term.html.<br />
41 Brian Seymour, “Global Money Laundering,” Journal of Applied Security Research, vol. 3, no. 3-4 (2008), pp. 374-<br />
375. (Hereafter, Seymour, “Global Money.”)<br />
42 Dennis C. Blair, Director of National <strong>In</strong>telligence, “Annual Threat Assessment of the US <strong>In</strong>telligence Community for<br />
the Senate Select Committee on <strong>In</strong>telligence,” Office of the Director of National <strong>In</strong>telligence, February 2, 2010, p. 31.<br />
(Hereafter, Blair, “Annual Threat Assessment.”)<br />
43 William Booth and Nick Miroff, “Stepped-Up Efforts by U.S., Mexico Fail to Stem Flow of Drug Money South,”<br />
Washington Post, August 25, 2010, http://www.washingtonpost.com/wp-dyn/content/article/2010/08/25/<br />
AR2010082506161.html.<br />
44 For a discussion of estimates, see Douglas Farah, Money Laundering and Bulk Cash Smuggling: Challenges for the<br />
Mérida <strong>In</strong>itiative, Woodrow Wilson <strong>In</strong>ternational Center For Scholars, Mexico <strong>In</strong>stitute and University of San Diego<br />
Trans-Border <strong>In</strong>stitute, Working Paper Series on U.S.-Mexico Security Cooperation, Washington, DC, May 2010, p. 6,<br />
http://wilsoncenter.org/topics/pubs/Money%20Laundering%20and%20Bulk%20Cash%20Smuggling.%20Farah.pdf.<br />
(Hereafter, Farah, Money Laundering.)<br />
45 A stored value card looks like a debit or credit card, but stores value directly on the card using magnetic strip<br />
technology.<br />
46 Legislation has been introduced in the 111 th Congress (H.R. 5127) that would, among other things, classify stored<br />
value cards as monetary instruments in order to require individuals to declare to Customs over $10,000 that they are<br />
carrying on a stored value card.<br />
Congressional Research Service 9
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
traffickers with remote access to existing payment mechanisms such as bank and credit card<br />
accounts and prepaid cards.” 47<br />
<strong>Organized</strong> criminals also use the globalized international financial system in the layering stage of<br />
money laundering. <strong>The</strong> United States is impacted by this from at least two directions. Criminals<br />
operating abroad can exploit U.S. structures to launder money while those operating domestically<br />
can wash their illicit profits abroad in an attempt to avoid U.S. law enforcement. Large financial<br />
markets such as <strong>New</strong> York, where criminal activity is potentially hidden within voluminous<br />
legitimate business, are used by criminals. Criminals use banks and businesses to launder money<br />
in offshore locations with strict privacy laws such as Panama, the Cayman Islands, or the Isle of<br />
Man. <strong>In</strong> these locales, law enforcement struggles to determine the true ownership of assets. 48<br />
<strong>In</strong>ternational or domestic shell companies can be used for money laundering. <strong>The</strong>y are legal<br />
entities that have no independent operations or assets of their own and largely exist only on paper.<br />
Shell companies have legitimate purposes, for example, “they may be formed to obtain financing<br />
prior to starting operations.” 49 Regardless, DOJ has identified U.S.-based shell companies as<br />
especially difficult to investigate because “lax company formation laws [allow] criminals [to]<br />
form [them] quickly and cheaply and obtain virtual anonymity.” 50<br />
<strong>Organized</strong> criminals likely rely on the veneer of legitimacy conferred by U.S.-based shell<br />
companies, which in many instances allow criminals to conceal their ownership. 51 Most U.S.<br />
states do not require owner information when companies are formed or even on annual or<br />
biennial reports. 52 <strong>In</strong>dividuals can distance themselves from the actual formation of specific shell<br />
companies by using company formation agents (registered agents) to establish them. Shell<br />
companies enable criminals to move money around the globe through legitimate bank accounts<br />
without attracting law enforcement scrutiny. With relative ease, a criminal organization can open<br />
multiple shell companies worldwide and systematically distance ill-gotten gains from their<br />
criminal origins, leaving behind a hard-to-untangle web of accounts, legitimate corporations, and<br />
transactions. 53 Both Mexico’s Sinaloa Cartel and alleged Eurasian organized crime figure Semion<br />
Mogilevich have likely used U.S. shell companies to launder money. 54<br />
47 Farah, Money Laundering, 23.<br />
48 Seymour, “Global Money,” pp. 375-376.<br />
49 U.S. Government Accountability Office (GAO), Company Formations: Minimal Ownership <strong>In</strong>formation Is Collected<br />
and Available, GAO-06-376, April 2006, p. 1, http://www.gao.gov/new.items/d06376.pdf. Hereafter GAO, Company<br />
Formations.<br />
50 Jennifer Shasky Calvery, Senior Counsel to the Deputy Attorney General, Department of Justice, Statement Before<br />
the United States Senate Committee on Homeland Security and Governmental Affairs, Hearing, “Examining State<br />
Business <strong>In</strong>corporation Practices: A Discussion of the <strong>In</strong>corporation Transparency and Law Enforcement Assistance<br />
Act,” June 18, 2009, pp 1-2, http://www.justice.gov/ola/testimony/111-1/2009-06-18-dag-shasky-incorporation.pdf.<br />
(Hereafter, Shasky, “Examining State Business.”)<br />
51 GAO, Company Formations, p. 1.<br />
52 GAO, Company Formations, p. 13.<br />
53 Shasky, “Examining State Business,” pp. 4-5; Seymour, “Global Money,” p. 375.<br />
54 Jennifer Shasky, Senior Counsel to the Deputy Attorney General, Department of Justice, Statement Before the<br />
United States Senate Committee on Homeland Security and Governmental Affairs, Hearing, “Business Formation and<br />
Financial <strong>Crime</strong>: Finding a Legislative Solution,” November 5, 2009, p. 1, http://hsgac.senate.gov/public/index.cfm?<br />
FuseAction=Hearings.Hearing&Hearing_ID=88d1a5fb-7312-4e9e-92b2-8558ccd44f22. Legislation has been<br />
introduced in the 111 th Congress (S. 569, H.R. 6098) that would establish uniform requirements for states regarding<br />
beneficial ownership of public corporations and limited liability companies.<br />
Congressional Research Service 10
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>Organized</strong> <strong>Crime</strong> and Technological Change<br />
<strong>Organized</strong> criminals have expanded their technological “toolkits.” <strong>The</strong>y have adapted to<br />
incorporate technology-driven fraud into their capabilities. 55 <strong>The</strong>ir operations can harm U.S.<br />
citizens without ever having a physical presence in the country. <strong>Organized</strong> crime groups engage<br />
in a wide variety of tech savvy mass marketing frauds. Even traditional arenas of criminal activity<br />
such as illegal gambling have been transformed by the <strong>In</strong>ternet. For example, illegal gambling has<br />
been a staple in the Cosa Nostra’s criminal diet for decades. <strong>In</strong> recent years, they have branched<br />
out into <strong>In</strong>ternet gambling, 56 which debuted in the mid 1990s. 57 Operation Heat, an investigation<br />
by the <strong>New</strong> Jersey Division of Criminal Justice, led to the arrest of Brian Cohen, who allegedly<br />
facilitated the Lucchese family’s offshore gambling activities. According to law enforcement<br />
officials, the family earned billions of dollars via offshore <strong>In</strong>ternet activity that included a website<br />
and a Costa Rican wire room that handled transactions, both managed by Cohen. 58<br />
Mass Marketing Fraud<br />
<strong>The</strong> <strong>In</strong>ternational Mass-Marketing Fraud Working Group defines mass marketing fraud as<br />
Fraud schemes that use mass-communications media—including telephones, the <strong>In</strong>ternet,<br />
mass mailings, television, radio, and even personal contact—to contact, solicit, and obtain<br />
money, funds, or other items of value from multiple victims in one or more jurisdictions. 59<br />
Mass marketing fraud involves a wide range of criminal activity that has been transformed by<br />
globalization and technological change. It can be perpetrated by individuals, small groups, or<br />
sophisticated criminal enterprises. Parsing out exactly how much of this activity can be attributed<br />
to organized criminals is tricky, but experts suggest that “fraudulent mass marketing operations<br />
are increasingly transnational, interconnected, and fluid.” 60 “Boiler room” scams, one iteration of<br />
the fraud with a long history, entail groups of fraudsters making high-pressure deceptive<br />
merchandise pitches and misleading service offers to unwitting customers around the world.<br />
Recently, criminals have innovated based on tried-and-true boiler room schemes by outsourcing<br />
some activity to specialists, internationalizing their operations, and adopting sophisticated<br />
concealment strategies for their communications capabilities and locations.<br />
55 Criminal <strong>In</strong>telligence Service Canada (CISC), 2010 Report on <strong>Organized</strong> <strong>Crime</strong>, May 2010, p. 12,<br />
http://www.cisc.gc.ca/annual_reports/annual_report_2010/document/report_oc_2010_e.pdf. (Hereafter, CISC, 2010<br />
Report.)<br />
56 For information on unlawful <strong>In</strong>ternet gambling, see CRS Report RS22749, Unlawful <strong>In</strong>ternet Gambling Enforcement<br />
Act (UIGEA) and Its Implementing Regulations, by Brian T. Yeh and Charles Doyle.<br />
57 On the advent of <strong>In</strong>ternet gambling, see David G. Schwartz, Roll the Bones: <strong>The</strong> History of Gambling, (<strong>New</strong> York:<br />
Gotham Books, Penguin Group (USA), 2006) pp. 488-494.<br />
58 George Anastasia, “Officials Charge Man Who Allegedly Ran Mob Gambling Website,” Philadelphia <strong>In</strong>quirer, May<br />
29, 2010, http://www.philly.com/inquirer/local/nj/<br />
20100529_Officials_charge_man_who_allegedly_ran_mob_gambling_website.html.<br />
59 <strong>In</strong>ternational Mass-Marketing Fraud Working Group (IMMFWG), Mass-Marketing Fraud: A Threat Assessment,<br />
June 2010, p. 3. (Hereafter, IMMFWG, Mass Marketing Fraud.) <strong>The</strong> IMMFWG includes law enforcement, regulatory,<br />
and consumer protection agencies from Australia, Belgium, Canada, the Netherlands, Nigeria, the United Kingdom,<br />
and the United States. Europol is also involved.<br />
60 IMMFWG, Mass Marketing Fraud, p. 14.<br />
Congressional Research Service 11
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>The</strong> Cosa Nostra and other organized criminals use boiler rooms. 61 <strong>In</strong> June 2010, the FBI raided<br />
an alleged boiler room operation involving Anthony Guarino, a purported Bonnano family<br />
soldier. According to law enforcement officials, the boiler room hoodwinked elderly investors<br />
into buying shares of companies, and 40% of the money taken in was handed over to the boiler<br />
room operators as commissions. 62<br />
Technology Transforms Advance Fee Fraud (AFF)<br />
Since the 1970s, technological advancements have revolutionized advance fee fraud (AFF)<br />
operations—a form of mass marketing fraud used by criminal organizations and individual<br />
fraudsters. Today, these schemes often involve criminals appealing for money via unsolicited<br />
(spam) emails. <strong>The</strong>se emails typically request an initial cash payment from recipients. <strong>The</strong> initial<br />
cash payment supposedly facilitates the disbursement of a much larger sum of money to the email<br />
recipients. 63 <strong>The</strong> later sum never arrives. A recent AFF email scam attempting to dupe people into<br />
believing they had been contacted by the FBI’s Detroit Field Office asked email recipients to<br />
forward $14,300 in return for the release of over $18 million to their accounts. <strong>In</strong> one of the<br />
emails associated with this scheme, the fraudsters suggest that “the <strong>In</strong>ternational clamp down on<br />
Terrorist [sic]” has frozen the larger pot of money. 64<br />
Also known as “419 scams” after a section in the Nigerian criminal code, the broad outlines of<br />
the modern version of AFF originated in Nigeria during the 1970s and early 1980s, and perhaps<br />
even earlier. AFF’s original incarnation may stretch back to the 1500s in the “Spanish Prisoner”<br />
scheme. Wealthy English business owners were asked to help pay for a rescue mission to save<br />
someone held captive in Spain. <strong>In</strong> return, they would supposedly receive part of the vast alleged<br />
reward payment. Of course, it never came. 65 <strong>In</strong> the late 1970s and early 1980s, Nigerian<br />
fraudsters became known for mailing unsolicited letters requesting monetary assistance in<br />
transferring frozen or hidden funds out of West African countries. When fax machines became<br />
commonplace, perpetrators quickly reached many more victims with less effort. <strong>The</strong> <strong>In</strong>ternet and<br />
email further revolutionized AFF operations.<br />
Today, these schemes are global, emanating from many other countries. 66 <strong>The</strong> spamming<br />
networks involved often have short lives focusing on specific schemes. 67 Recent estimates<br />
suggest that AFF networks may have swindled over $2 billion from U.S. companies and citizens<br />
in 2009. 68 <strong>In</strong> July 2011, six defendants were sentenced for running an AFF scam that duped U.S.<br />
61 Ibid.<br />
62 Chad Bray, “FBI Raids Alleged Boiler Room,” Wall Street Journal, June 10, 2010, http://online.wsj.com/article/<br />
SB10001424052748703890904575297220025441524.html.<br />
63 Federal Bureau of <strong>In</strong>vestigation, “Common Fraud Schemes,” http://www.fbi.gov/majcases/fraud/fraudschemes.htm.<br />
64 Federal Bureau of <strong>In</strong>vestigation, Detroit Division, “Scam E-Mail/Letter Claiming To Be Associated with FBI Detroit<br />
SAC Arena,” press release, May 25, 2010, http://detroit.fbi.gov/pressrel/pressrel10/de052510.htm.<br />
65 Harvey Glickman, “<strong>The</strong> Nigerian ‘419’ Advance Fee Scams: Prank or Peril?,” Canadian Journal of African Studies,<br />
vol. 39, no. 3 (2005), pp. 463-476.<br />
66 Edward Fokuoh Ampratwum, “Advance Fee Fraud, ‘419,’ and <strong>In</strong>vestor Confidence in the Economies of Sub-<br />
Saharan Africa (SSA) ,” Journal of Financial <strong>Crime</strong>, vol. 16, no. 1 (2009), pp. 68-69.<br />
67 Matthew Zook, “Your Urgent Assistance Is Required: <strong>The</strong> <strong>In</strong>tersection of 419 Spam and <strong>New</strong> Networks of<br />
Imagination,” Ethics, Place, and Environment, vol. 10, no. 1 (March 2007), pp. 66-70.<br />
68 Jeremy Kirk, “Advance Fee Fraud Scams Rise Dramatically in 2009,” Compuworld, January 28, 2010,<br />
http://www.computerworld.com/s/article/9149890/Advance_fee_fraud_scams_rise_dramatically_in_2009.<br />
Congressional Research Service 12
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
sweepstakes participants into believing that they had won substantial cash prizes. This money<br />
would have purportedly been sent to the victims once they paid the required taxes and fees.<br />
Ultimately, there was no lottery prize, and the fraud netted about $2 million. 69 Estimates indicate<br />
that today’s AFF networks only need to dupe 1% of the people or businesses they reach to turn a<br />
profit. 70<br />
Cyberspace, Electronic <strong>In</strong>formation, and <strong>Organized</strong> <strong>Crime</strong><br />
As the history of AFF may indicate, organized criminals have adapted to the digital age by<br />
becoming expert at stealing information stored and shared electronically. Many are adept at<br />
manipulating and defrauding victims in the virtual world. All of this covers a range of activity<br />
including cyber intrusions into corporate databases, the theft of individual consumer credit card<br />
information, and a wide variety of fraudulent online activity. <strong>The</strong> criminal groups operating in<br />
cyberspace can be broken into two categories: (1) part-timers—those who leverage digital<br />
information to enhance other activities, and (2) full-timers—those who solely commit and<br />
specialize in online or digital crimes. 71 While this is a helpful distinction to draw for discussion<br />
purposes, it is difficult to attribute specific volumes of criminal activity to each category of<br />
actors. General statistics suggest that organized criminals from both categories play a large role in<br />
online data theft. For instance, in selected data breaches investigated by Verizon and the U.S.<br />
Secret Service (USSS) involving businesses around the globe during 2009, 85% of compromised<br />
computer records were attributed to organized crime. As 94% of all compromised records in this<br />
study were in the financial services sector, many of those records targeted by organized criminals<br />
were likely from financial organizations as well. 72<br />
Online Identity <strong>The</strong>ft and Sophisticated Credit Card Fraud<br />
<strong>Organized</strong> criminals are involved in stealing the identities of online consumers and have engaged<br />
in technologically advanced credit card fraud. <strong>The</strong>se illicit ventures pilfer from the bank accounts<br />
of ordinary citizens and often cast a wide net to maximize the number of victims.<br />
Some organized crime groups have stolen money from victims on intenet auction sites such as<br />
eBay. For example, on March 13, 2010, Georgi Boychev Georgiev, a Bulgarian national pleaded<br />
guilty in U.S. federal court to laundering money for a transnational criminal network involved in<br />
eBay fraud. <strong>The</strong> scam did not physically exist in the United States, but it accrued more than $1.4<br />
69 Federal Bureau of <strong>In</strong>vestigation, “Six Defendants Sentenced in Manhattan Federal Court for <strong>The</strong>ir <strong>In</strong>volvement in a<br />
Multi-Million-Dollar Lottery Telemarketing Fraud Scheme,” press release, July 1, 2011, http://www.fbi.gov/newyork/<br />
press-releases/2011/six-defendants-sentenced-in-manhattan-federal-court-for-their-involvement-in-a-multi-milliondollar-lottery-telemarketing-fraud-scheme.<br />
70 Blaise J. Bergiel, Erich B. Bergiel, and Phillip W. Balsmeir, “<strong>In</strong>ternet Cross Border <strong>Crime</strong>: A Growing Problem,”<br />
Journal of Website Promotion, vol. 3, no. 3/4 (2008), p. 135.<br />
71 This parallels the first two elements in Kim-Kwang Raymond Choo’s three-part typology of criminal activity in<br />
cyberspace. <strong>The</strong> typology includes “(1) traditional organized crime groups which make use of ICT [information and<br />
communications technologies] to enhance their terrestrial criminal activities; (2) organized cybercrime groups which<br />
operate exclusively online; and (3) organized groups of ideologically and politically motivated individuals who make<br />
use of ICT to facilitate their criminal conduct.” See Kim-Kwang Raymond Choo, “<strong>Organized</strong> <strong>Crime</strong> Groups in<br />
Cyberspace: A Typology,” Trends in <strong>Organized</strong> <strong>Crime</strong>, vol. 11, no. 3 (September 2008), pp. 271.<br />
72 Wade Baker et al., 2010 Data Breach <strong>In</strong>vestigations Report: A Study Conducted by the Verizon RISK Team in<br />
Cooperation with the United States Secret Service, Verizon, July 2010, pp. 2-15, http://www.verizonbusiness.com/<br />
resources/reports/rp_2010-data-breach-report_en_xg.pdf.<br />
Congressional Research Service 13
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
million from U.S. victims in 2005 and 2006. <strong>The</strong> network posted fraudulent advertisements on<br />
eBay and used a ruse dubbed “eBay Secure Traders” to bilk people out of cash that was wired<br />
directly into Eastern European bank accounts. 73 <strong>In</strong> another case from April 2010, Romanian law<br />
enforcement, the FBI, and USSS cooperated in the dismantling an alleged eBay fraud ring that<br />
purportedly involved 70 individuals from what have been described in media sources as three<br />
different organized cybercrime groups. According to news reports, the scheme included hijacking<br />
the eBay accounts of legitimate consumers and then using the hijacked accounts to stage fake<br />
sales of non-existent merchandise on eBay. Fraudsters purportedly scammed bidders from Spain,<br />
Italy, France, <strong>New</strong> Zealand, Denmark, Sweden, Germany, Austria, Canada, Switzerland, and the<br />
United States, generating $1 million in profits since 2006. 74<br />
Eurasian criminals in California are engaging in identity theft in which they leverage<br />
technological savvy, old-school organized crime strategies, and <strong>In</strong>ternet connectivity to reap<br />
thousands of dollars in profits. <strong>In</strong> 2009 in the city of Redondo Beach in Southern California,<br />
Armenian or Russian criminals allegedly targeted a gas station with an Armenian owner<br />
(exploiting their own ethnic group). <strong>The</strong>y placed one of their crew members as an employee at<br />
the station, where he implanted high-tech skimming devices at gas pumps to steal customer credit<br />
card information, victimizing more than 1,000 individuals, including Redondo Beach police<br />
officers. <strong>The</strong> employee quit work and the group made off with more than $300,000 from people’s<br />
accounts. 75 Another case, this time in the Las Vegas area in 2008, involved an alleged Armenian<br />
criminal group that reportedly skimmed more than 1,000 credit and debit cards using insiders at<br />
restaurants, bars, and smoke shops. <strong>In</strong> some instances, the crew manufactured its own cards using<br />
stolen information. 76 Losses approached $1.5 million. 77 <strong>In</strong> 2009, Las Vegas authorities also<br />
uncovered a skimming scheme complete with a credit card manufacturing lab. 78 This crew used<br />
skimmers that captured information from magnetic strips on credit cards as well as pin numbers<br />
using a camera. 79<br />
73 Department of Justice, “Foreign National Pleads Guilty for Role in <strong>In</strong>ternational Money Laundering Scheme<br />
<strong>In</strong>volving More than $1.4 Million in Losses to Victims,” press release, May 13, 2010, http://www.justice.gov/opa/pr/<br />
2010/May/10-crm-568.html.<br />
74 Angela Moscaritolo, “Romanian Police, FBI Break Up 70-Strong eBay Fraud Ring,” SC Magazine, April 7, 2010,<br />
http://www.scmagazineus.com/romanian-police-fbi-break-up-70-strong-ebay-fraud-ring/article/167554/.<br />
75 Paul Teetor, “Russian or Armenian Mob Used ‘Model Employee’ Con at PCH Arco,” LA Weekly, June 18, 2009.<br />
76 Lawrence Mower, “ID <strong>The</strong>ft Operation Outlined,” Las Vegas Review-Journal, December 8, 2008.<br />
77 “Eurasian <strong>Organized</strong> <strong>Crime</strong> Task Force Members Arrest 12 <strong>In</strong>dividuals Following Federal Credit Card Fraud and<br />
Identity <strong>The</strong>ft Charges,” States <strong>New</strong>s Service, December 9, 2008. See also: Department of Justice, “Men Sentenced for<br />
Credit Card Fraud Conspiracy,” press release, June 10, 2011, http://www.justice.gov/usao/nv/press/june2011/<br />
palikyan06102011.htm.<br />
78 “Three Arrested in Credit Card Forgery Ring,” KTNV ABC, March 26, 2009.<br />
79 “18 Month Credit Card Fraud Ring Leads to Three Arrests,” KTNV ABC, March 25, 2009. Additionally, in February<br />
2011, DOJ announced an indictment charging 29 defendants tied to an organized crime group called “Armenian<br />
Power” or “AP.” DOJ noted “Among the conspiracies charged in the racketeering indictment is a bank fraud and<br />
counterfeit credit card scheme that victimized hundreds of customers of 99 Cents Only Stores throughout Southern<br />
California. AP members allegedly caused more than $2 million in losses when they secretly installed sophisticated<br />
‘skimming’ devices to steal customer account information at cash registers and then used the skimmed information to<br />
create counterfeit debit and credit cards.” See Department of Justice, “Armenian Power <strong>Organized</strong> <strong>Crime</strong> Group<br />
Targeted in Federal <strong>In</strong>dictments That Allege Racketeering Offenses, <strong>In</strong>cluding Bank Fraud Schemes, Kidnappings, and<br />
Drug Trafficking,” press release, February 16, 2011, http://www.fbi.gov/losangeles/press-releases/2011/la021611.htm.<br />
For another case involving skimming, see Department of Justice, “Rancho Cordova Man Arrested for Identity <strong>The</strong>ft<br />
and Trafficking in Counterfeit Credit Card <strong>In</strong>formation,” press release, April 21, 2011, http://www.justice.gov/usao/<br />
cae/news/docs/2011/04-21-11Avagyan<strong>In</strong>dictment.html.<br />
Congressional Research Service 14
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>In</strong> March 2010, Albert Gonzalez, the leader of the largest identity theft and retail hacking ring<br />
prosecuted by the United States, was sentenced to 20 years in prison. 80 Through “wardriving”—a<br />
technique in which individuals drive around in a car with a laptop computer and search for<br />
unsecured wireless networks—the ring hacked into credit card payment systems at retailers<br />
including TJX Companies, BJ’s Wholesale Club, OfficeMax, Boston Market, Barnes & Noble<br />
and Sports Authority, and stole more than 40 million credit and debit card numbers. Gonzalez<br />
also provided malware to hackers to aid them in evading anti-virus programs and firewalls in<br />
order to access companies’ networks and payment systems. <strong>The</strong> conspirators, located in the<br />
United States, Ukraine, and Estonia, laundered their illicit proceeds through banks in Eastern<br />
Europe.<br />
<strong>Organized</strong> Retail <strong>Crime</strong> and Online Fencing<br />
While not necessarily viewed as “organized crime” by U.S. law enforcement agencies, as its<br />
name implies organized retail crime (ORC), or organized retail theft, bears some of the hallmarks<br />
of organized criminal activity. ORC typically refers to large-scale retail theft and fraud by<br />
organized groups of professional shoplifters, or “boosters.” 81 ORC involves a host of retail crimes<br />
ranging from retail, manufacturing, distribution, and cargo theft to gift card fraud, receipt fraud,<br />
and ticket switching. 82 <strong>The</strong> organized crime rings resell illegally acquired merchandise in a<br />
variety of fencing operations such as flea markets, swap meets, pawn shops, and, more recently,<br />
online marketplaces. Most stolen merchandise is sold to a low-level fence, commonly called a<br />
“street fence.” Street fences will either sell these goods directly to the public or will sell the<br />
merchandise to mid-level fences who run “cleaning operations” that remove security tags and<br />
store labels as well as repackage stolen goods so they appear as though they came directly from<br />
the manufacturer. This “cleaning” may even involve changing the expiration date on perishable<br />
goods such as over-the-counter medication and infant formula.<br />
Globalization and technological innovation have allowed more and more transactions to take<br />
place online rather than face-to-face. This holds true for retail crime, where thieves have turned to<br />
“e-fencing”—using the <strong>In</strong>ternet and online marketplaces as means to fence ill-gotten goods. 83<br />
This has increased criminals’ anonymity, global reach, and profitability. Online markets allow<br />
criminals to easily distribute stolen goods across the nation and around the globe. E-fencing has<br />
also proven to be more profitable to criminals than has fencing at physical locations. While<br />
criminals may profit about 30 cents on the dollar (30% of the retail price) by selling goods at<br />
physical fencing locations, they can make about 70 cents on the dollar via e-fencing. 84<br />
A criminal network based in Baltimore serves as an example of an operation that integrated<br />
traditional as well as more technologically advanced fencing techniques. As of September 2010,<br />
80 Department of Justice, “Leader of Hacking Ring Sentenced for Massive Identity <strong>The</strong>fts from Payment Processor and<br />
U.S. Retail Networks,” press release, March 26, 2010, http://www.justice.gov/opa/pr/2010/March/10-crm-329.html.<br />
81 A “booster” is someone who steals merchandise and then sells it to a fence for a profit. A “fence” is someone who<br />
knowingly buys illegally obtained goods from a booster and then sells the goods for a profit. For more information on<br />
ORC, see CRS Report R41118, <strong>Organized</strong> Retail <strong>Crime</strong>, by Kristin M. Finklea.<br />
82 Ticket switching involves means by which criminals alter the UPC bar codes on merchandise so that the items ring<br />
up differently–significantly below the original price–at check-out.<br />
83 King Rogers, “<strong>Organized</strong> Retail <strong>The</strong>ft,” in Retail <strong>Crime</strong>, Security, and Loss Prevention: An Encyclopedic Reference,<br />
ed. Charles A. Sennewald and John H. Christman (Elseiver <strong>In</strong>c., 2008).<br />
84 National Retail Federation, 2009 <strong>Organized</strong> Retail <strong>Crime</strong> Survey, 2009, p. 8.<br />
Congressional Research Service 15
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
at least 10 defendants, including the owners of pawn shops implicated in the scheme, had pleaded<br />
guilty to roles in this organized retail crime ring. 85 <strong>In</strong> this conspiracy, boosters stole products,<br />
including over-the-counter medications, health and beauty aids, gift cards, DVDs, and tools, from<br />
retailers such as Target, Safeway, Wal-Mart, and Kohl’s. Several pawn shops bought these stolen<br />
goods from boosters, cleaned them, and then transported them to other locations for resale. Some<br />
co-conspirators used online marketplaces such as eBay and Amazon.com to fence the stolen<br />
goods. <strong>In</strong> all, the case involved about $20 million in stolen goods.<br />
Bulk Narcotics Smuggling and Technology<br />
Technological advances have transformed cocaine and other narcotics trafficking. <strong>In</strong> the early<br />
1990s, Colombian traffickers—moving narcotics to the United States and elsewhere around the<br />
globe—began experimenting with semisubmersible maritime smuggling vessels, which at first<br />
were likely too impractical, costly, and risky to operate. Hybrids of traditional submarines and<br />
boats, these craft have small above-water profiles—about 18 inches. <strong>In</strong>creased law enforcement<br />
seizures of cocaine shipments carried by more traditional surface vessels encouraged traffickers<br />
to adopt semisubmersible technology. 86 Colombian traffickers likely co-opted experts from the<br />
legitimate world to develop this technology. Most often, semisubmersibles are used to move<br />
product from coastal areas to boats waiting on the open seas. While their current use likely<br />
responds in part to interdiction pressures, it also reflects the global availability of expertise,<br />
designs, and materials. Vast illicit global cocaine markets have also made such endeavors<br />
possible, producing huge profits for traffickers that are then tilled into technology to circumvent<br />
law enforcement. But semisubmersibles, which account for 27% of the maritime movement of<br />
cocaine toward the United States, themselves are not immune to capture. 87 Since 2006, law<br />
enforcement has regularly seized semisubmersible cocaine smuggling vessels from Colombian<br />
drug traffickers on the high seas or in clandestine shipyards hidden in coastal mangrove swamps.<br />
<strong>The</strong> Drug Trafficking Vessel <strong>In</strong>terdiction Act of 2008 (P.L. 110-407) enhanced the federal<br />
government’s ability to prosecute traffickers operating submersible and semisubmersible vessels<br />
by making it a federal crime to operate, embark on, or conspire to operate these vessels in<br />
international waters with the intent to avoid detection.<br />
<strong>In</strong> early July 2010, police in Ecuador seized a fiberglass submarine designed to operate fully<br />
submerged at a depth of 65 feet. <strong>The</strong> diesel-powered, twin-screw sub, a marked step forward in<br />
technology, was likely intended to transport cocaine on the high seas and could carry 10 tons of<br />
cocaine on a 10-day voyage. This vessel represented a large improvement over the<br />
semisubmersibles that have been regularly seized from traffickers since 2006. 88<br />
85 Department of Justice, “Pawn Shop Owner Pleads Guilty in Scheme to Launder $20 Million in Proceeds of Stolen<br />
Merchandise: Admitted Laundering Millions of Dollars in Proceeds of Stolen Over-the-Counter Medicines, Health and<br />
Beauty Aid Products, Gift Cards, DVDs, Tools, and Other Items,” press release, September 3, 2010,<br />
http://baltimore.fbi.gov/dojpressrel/pressrel10/ba090310a.htm.<br />
86 Steven S. Dudley, Drug Trafficking Organizations in Central America: Transportistas, Mexican Cartels, and Maras,<br />
Woodrow Wilson <strong>In</strong>ternational Center For Scholars, Mexico <strong>In</strong>stitute and University of San Diego Trans-Border<br />
<strong>In</strong>stitute, Working Paper Series on U.S.-Mexico Security Cooperation, Washington, DC, May 2010, p. 17,<br />
http://wilsoncenter.org/topics/pubs/<br />
Drug%20Trafficking%20Organizations%20in%20Central%20America.%20Dudley.pdf.<br />
87 Rear Admiral Vincent Atkins, U.S. Coast Guard, Testimony before the House Subcommittee on Homeland Security,<br />
on Department of Homeland Security Air and Marine Operations and <strong>In</strong>vestments, April 19, 2010, http://www.dhs.gov/<br />
ynews/testimony/testimony_1271690315007.shtm.<br />
88 Jim Popkin, “Authorities in Awe of Drug Runners’ Jungle-Built, Kevlar-Coated Supersubs,” Wired Magazine, March<br />
(continued...)<br />
Congressional Research Service 16
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Mexican drug traffickers have increasingly relied upon ultralight aircraft 89 to smuggle drugs<br />
across the Southwest border into the United States. <strong>The</strong>se small planes can fly as low as tree level<br />
and are less easily detected than the larger aircrafts that were used by the traffickers prior to<br />
2007. 90 While some traffickers may land the ultralights on the U.S. side of the border to pass off<br />
drug loads to distributors, others attach drop baskets that can carry over 300 pounds of marijuana<br />
or other drugs. <strong>The</strong>se drop baskets release packages of drugs that will fall to the ground when a<br />
lever in the aircraft is activated, and then local gangs or traffickers can pick up and distribute the<br />
drugs. <strong>In</strong> May 2009, a low-flying ultralight aircraft carrying about 275 pounds of marijuana,<br />
estimated to be worth $220,480, crashed in Yuma, AZ. <strong>The</strong> pilot escaped, but two suspected coconspirators<br />
were arrested. 91<br />
Cross-Border Tunnels<br />
Mexican drug traffickers rely on the use of underground, cross-border tunnels to smuggle drugs<br />
from Mexico into the United States. Tunneling, while not in and of itself a new tool—having been<br />
used for hundreds of years during conflicts and for escapes—has increased not only in prevalence<br />
but in sophistication. 92 Early tunnels were rudimentary, “gopher hole” tunnels dug on the<br />
Mexican side of the border, traveling just below the surface, and popping out on the U.S. side as<br />
close as 100 feet from the border. Slightly more advanced tunnels began to rely on existing<br />
infrastructure, which may be shared by neighboring border cities such as the tunnel shared by<br />
Nogales, AZ, in the United States and Nogales, Sonora, in Mexico. <strong>The</strong>se interconnecting tunnels<br />
may tap into storm drains or sewage systems in order to move drugs even further than smugglers<br />
could move them by digging tunnels alone. <strong>The</strong> most sophisticated tunnels can have rail,<br />
ventilation, and electrical systems. <strong>In</strong> January 2006 in Otay Mesa, CA, a tunnel, stretching nearly<br />
three-quarters of a mile in length and traveling over 85 feet below the surface of the earth, was<br />
discovered, where more than two tons of marijuana was seized. 93 <strong>The</strong> tunnel had lighting,<br />
ventilation, and groundwater drainage systems. <strong>In</strong> November 2010, the San Diego Tunnel Task<br />
Force—created in 2003 as a partnership between the U.S. Immigration and Customs Enforcement<br />
(...continued)<br />
29, 2011, http://www.wired.com/magazine/2011/03/ff_drugsub/all/1; “DEA <strong>In</strong>tel Aids in Seizure of Fully-Operational<br />
Narco Submarine in Ecuador,” press release, July 3, 2010; Chirs Kraul, “Ecuador Police Seize 100-foot Narco-<br />
Submarine Being Built Secretly,” Los Angeles Times, July 6, 2010, http://www.latimes.com/news/nationworld/world/<br />
la-fg-ecuador-narco-sub-20100706,0,162212.story; Douglas A. Kash and Eli White, “A <strong>New</strong> Law Counters the<br />
Semisubmersible Smuggling Threat,” Federal Bureau of <strong>In</strong>vestigation, March 2010, http://www.fbi.gov/publications/<br />
leb/2010/march2010/smuggling_feature.htm; U.S. Southern Command, “<strong>The</strong> Self-Propelled Semi-Submersibles<br />
Threat,” February 20, 2009, http://www.southcom.mil/appssc/factFiles.php?id=83.<br />
89 <strong>The</strong> Federal Aviation Administration (FAA) does not classify ultralights as “aircraft.” For the FAA definition of an<br />
ultralight, see the Code of Federal Regulations (CFR) Title 14, Section 103, http://ecfr.gpoaccess.gov/cgi/t/text/textidx?c=ecfr&sid=77f64066b8e425c01339f918e6e9f291&rgn=div5&view=text&node=14:2.0.1.3.16&idno=14.<br />
Legislation has been introduced in the 111 th Congress (H.R. 5307) that would include ultralights in the definition of an<br />
aircraft in order to increase law enforcement’s abilities to prosecute drug smuggling cases.<br />
90 Agence France-Presse, “Mexican Drug Traffickers Using Tiny Planes for US Market,” MSN <strong>New</strong>s, September 2,<br />
2010, http://news.ph.msn.com/business/article.aspx?cp-documentid=4311772.<br />
91 U.S. Customs and Border Protection, “Ultralight Plane Crashes in Arizona, Smugglers Apprehended,” press release,<br />
May 30, 2009, http://www.cbp.gov/xp/cgov/newsroom/news_releases/archives/2009_news_releases/may_2009/<br />
05302009.xml.<br />
92 Ken Stier, “Underground Threat: Tunnels Pose Trouble from Mexico to Middle East,” Time, May 2, 2009.<br />
93 U.S. Drug Enforcement Administration, “DEA/ICE Uncover ‘Massive’ Cross-Border Drug Tunnel, Cement lined<br />
passage thought to link warehouses in Tijuana and Otay Mesa,” press release, January 26, 2006,<br />
http://www.justice.gov/dea/pubs/pressrel/pr012606.html.<br />
Congressional Research Service 17
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
(ICE), DEA, and the U.S. Border Patrol working along with state law enforcement and Mexican<br />
counterparts—uncovered a 600-yard passageway stretching from Tijuana to Otay Mesa. About 30<br />
tons of marijuana, with an estimated street value of about $20 million, were seized in the United<br />
States and Mexico. 94 About a year later, the task force unearthed two other tunnels in Otay Mesa<br />
within a two-week period. One of them stretched 612 yards and had electric rail cars, lighting,<br />
reinforced walls, and wooden floors. 95<br />
U.S. law enforcement uses various tactics and simultaneously faces numerous challenges in<br />
detecting these cross-border tunnels. About 125 tunnels have been discovered since the 1990s—<br />
primarily in Arizona and California—and more than 75 of these have been found since 2006. 96<br />
One such method of tunnel detection is the use of ground penetrating radar (GPR). 97 However,<br />
this technology is limited by factors including soil conditions, tunnel diameter, and tunnel depth.<br />
Law enforcement may also use sonic equipment to detect the sounds of digging and tunnel<br />
construction and seismic technologies to detect blasts that may be linked to tunnel excavation.<br />
U.S. officials have acknowledged that law enforcement currently does not have technology that is<br />
reliably able to detect sophisticated tunnels. 98 Rather, tunnels are more effectively discovered as a<br />
result of human intelligence and tips rather than technology.<br />
Exploitation of Ethnic Diaspora Communities<br />
Criminal organizations structured along ethnic lines sometimes base their operations in immigrant<br />
communities. 99 <strong>The</strong>y use these enclaves to provide cover for their dealings and occasionally also<br />
exploit their ethnic compatriots. Historically, criminal groups have burrowed into local ethnic<br />
communities, but now this is enhanced by the fact that they can leverage <strong>In</strong>ternet connectivity and<br />
extensive, international transportation linkages from localities around the globe. A number of<br />
recent cases highlight these issues.<br />
<strong>In</strong> October 2010, a total of 73 individuals were indicted in the largest single Medicare fraud ever<br />
charged. 100 As described by DOJ, the Mirzoyan-Terdjanian organization, an Armenian criminal<br />
group, ran fake clinics in 25 states, but had its leadership based in Los Angeles and <strong>New</strong> York<br />
City, 101 two areas with large immigrant populations from the former Soviet Union, (e.g.,<br />
94 U.S. Drug Enforcement Administration, “Tunnel Task Force Discovers Cross Border Tunnel, 30 tons of Marijuana<br />
Seized in <strong>In</strong>vestigation,” press release, November 3, 2010, http://www.justice.gov/dea/pubs/states/newsrel/2010/<br />
sd110310.html.<br />
95 Immigration and Customs Enforcement, “Highly Sophisticated Cross-Border Drug Tunnel Discovered Near San<br />
Diego,” press release, November 15, 2011, http://www.ice.gov/news/releases/1111/111130sandiego.htm.<br />
96 Michael Thurston, “Record drugs haul seized from US-Mexico border tunnel,” AFP, November 4, 2010,<br />
http://www.google.com/hostednews/afp/article/ALeqM5jQ20K1Iy7AaXLBGtqiAxnfkCMTGQ?docId=<br />
CNG.a14f67109bad6c916ff3ce51f338a2d8.3b1.<br />
97 For more information, see http://www.geophysical.com/militarysecurity.htm.<br />
98 Ken Stier, “Underground Threat: Tunnels Pose Trouble from Mexico to Middle East,” Time, May 2, 2009.<br />
99 Klaus von Lampe, “Re-Conceptualizing Transnational <strong>Organized</strong> <strong>Crime</strong>: Offenders as Problem Solvers,”<br />
<strong>In</strong>ternational Journal of Security and Terrorism, vol. 2, no. 1 (2011), p. 9. (Hereafter: von Lampe, “Re-<br />
Conceptualizing.” )<br />
100 Department of Justice, “Manhattan U.S. Attorney Charges 44 members and Associates of an Armenian-American<br />
<strong>Organized</strong> <strong>Crime</strong> Enterprise with $100 Million Medicare Fraud,” press release, October 13, 2010,<br />
http://newyork.fbi.gov/dojpressrel/pressrel10/nyfo101310.htm. (Hereafter, DOJ press release, “Manhattan U.S.<br />
Attorney”; DOJ press release, “Seventy-Three Members.”)<br />
101 DOJ press release, “Seventy-Three Members.”<br />
Congressional Research Service 18
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Glendale, in the Los Angeles region, is home to 200,000 Armenian Americans). According to the<br />
president of the Los Angeles chapter of the Armenian-American Chamber of Commerce, this<br />
community is exploited by a handful of criminals who were “raised under communist rule in the<br />
former Soviet republic of Armenia, where exploiting a corrupt government was seen as fair<br />
game.” 102<br />
Members of the Mirzoyan-Terdjanian group<br />
allegedly billed Medicare for more than $163<br />
million in fraudulent medical services. <strong>The</strong>y<br />
reaped about $35 million in profits. 103 <strong>The</strong> case<br />
involves the stolen identities of both doctors and<br />
Medicare beneficiaries and the creation of at least<br />
118 spurious medical clinics across at least 25<br />
states, all part of a largely “virtual” operation.<br />
FBI Assistant Director in Charge Janice K.<br />
Fedarcyk described the organization as<br />
completely notional. <strong>The</strong>re were no real<br />
medical clinics behind the fraudulent billings,<br />
just stolen doctors’ identities. <strong>The</strong>re were no<br />
colluding patients signing in at the clinics for<br />
unneeded treatments, just stolen patient<br />
identities. <strong>The</strong> whole doctor-patient interaction<br />
was a mirage. But the money was real, while it<br />
lasted. 104<br />
<strong>The</strong> indictment in the case also linked Armen<br />
Kazarian to the scheme. Arrested in Los Angeles,<br />
Kazarian, an Armenian residing in the United<br />
States, had substantial influence in the criminal<br />
underworld as a vor v zakone, a Russian term<br />
meaning “thief-in-law.” 105 Kazarian had<br />
reputedly lied to federal authorities to obtain<br />
asylum after emigrating to the United States in<br />
<strong>Organized</strong> <strong>Crime</strong> and<br />
Health Care Fraud<br />
Acting Deputy Attorney General Gary G. Grinder<br />
has stated that “the emergence of international<br />
organized crime in domestic health care fraud<br />
schemes signals a dangerous expansion that poses a<br />
serious threat to consumers” 1 <strong>The</strong> health care<br />
system as well as both public and private assistance<br />
programs have been targets of individual scammers<br />
and organized criminals alike. Criminals steal the<br />
identities—or create fake identities—of medical<br />
providers, clinics and businesses, and patients.<br />
According to the most recent data, in FY2009 U.S.<br />
Attorneys opened 1,014 health care fraud<br />
investigations, encompassing 1,786 defendants. 1 Aside<br />
from the Mirzoyan-Terdjanian organization indicted<br />
by DOJ, other criminal networks—Eurasian and<br />
Nigerian groups—involved in large-scale health care<br />
fraud in Los Angeles have recently been caught by<br />
U.S. law enforcement. According to news reports,<br />
organized crime has turned to targeting Medicare and<br />
Medicaid for profit. 1 It is very likely that the groups in<br />
Los Angeles favored stealing doctor and patient<br />
identities for fraudulent billing over more violent and<br />
less lucrative criminal activity. One expert has<br />
suggested, “[Health care fraud is] lucrative and it’s<br />
safe for them [organized criminals]. Why rob a bank<br />
and risk getting shot when you can click a mouse and<br />
bill Medicare or Medicaid, basically lie on some forms<br />
and make millions of dollars doing so.” 1<br />
1996. 106 <strong>In</strong> the course of the scheme, Kazarian mediated disputes for the Mirzoyan-Terdjanian<br />
group and allegedly threatened to assault and kill an associate. <strong>In</strong> July 2011, Kazarian pled guilty<br />
102 Thomas Watkins, “Armenian <strong>Organized</strong> <strong>Crime</strong> Grows More Complex,” Associated Press, October 16, 2010,<br />
http://news.yahoo.com/s/ap/20101016/ap_on_re_us/us_armenian_crime_2.<br />
103 <strong>In</strong> December 2011, one of the group’s leaders, Robert Terdjanian, pled guilty to charges related to the case. See<br />
Bruce Golding, “Swan Song for Gangster,” <strong>New</strong> York Post, December 20, 2011, http://www.nypost.com/p/news/local/<br />
manhattan/swan_song_for_gangster_T3KqaxeuQkAVNhHjioXmaJ.<br />
104 DOJ press release, “Manhattan U.S. Attorney.”<br />
105 <strong>The</strong> indictment describes a thief-in-law as “a member of a select group of high-level criminal figures from Russia<br />
and the Former Soviet Union who receives tribute from other criminals, offers protection, and uses his recognized<br />
position of authority to resolve disputes among criminals, including through threats and instances of violence.” See<br />
United States vs. Armen Kazarian, Davit Mirzoyan, Robert Terdjanian, et al., <strong>In</strong>dictment in the U.S. District Court for<br />
the Southern District of <strong>New</strong> York, filed October 13, 2010, http://www.scribd.com/full/39274052?access_key=key-<br />
7m8lpi9tq05hn86c111. (Hereafter, United States vs. Armen Kazarian.)<br />
106 Michael Wilson, William K. Rashbaum, “Real Patients, Real Doctors, Fake Everything Else,” <strong>New</strong> York Times,<br />
October 13, 2010, http://www.nytimes.com/2010/10/14/nyregion/14fraud.html?_r=1&scp=1&sq=<br />
Real%20Patients,%20Real%20Doctors,%20Fake%20Everything%20Else&st=cse; United States vs. Armen Kazarian.<br />
Congressional Research Service 19
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
to racketeering in the case. 107 <strong>The</strong> indictment suggests that members of the organization, many of<br />
them Armenian nationals or immigrants, sent criminal proceeds to Armenia, purchasing real<br />
estate and operating businesses with the funds. 108<br />
<strong>In</strong> June 2010, DOJ charged five Ukrainian brothers with extortion and conspiring to engage in a<br />
pattern of racketeering activity. This far-flung operation based out of Philadelphia and Ukraine<br />
had allegedly trafficked about 30 Ukrainians into the United States via Mexico, exploiting them<br />
in cleaning crews operating in stores, private residences, and office buildings in Pennsylvania,<br />
<strong>New</strong> York, <strong>New</strong> Jersey, Maryland, and Washington, DC. According to DOJ, the brothers failed to<br />
pay their victims, threatened them with violence, physically abused them, and housed them in<br />
overcrowded quarters. One of the brothers is accused of raping a trafficked woman on several<br />
occasions. 109 <strong>The</strong> victims of this scheme likely trusted the brothers as immigrants who had ties to<br />
the United States and were willing to help others start new lives in the country.<br />
<strong>In</strong> another case, at least five Chinese citizens involved in operating Asian massage parlors in<br />
Kansas were sentenced between April and October of 2009 for their roles in exploiting Chinese<br />
women in the United States. 110 <strong>The</strong> defendants recruited women from China to work in the United<br />
States as masseuses. <strong>The</strong>y then confiscated the women’s identification documents and used these<br />
documents to fraudulently wire proceeds from illegal activities back to China. <strong>The</strong>y forced the<br />
women to work for 14 hours every day, locked them inside the massage parlors to sleep at night,<br />
and forced them to perform sexual services for the male patrons of the massage parlors.<br />
West African criminal networks specializing in AFF operate in many nations including the United<br />
States, where members have assimilated into local ethnic communities. Many West African<br />
fraudsters based outside of their home countries direct proceeds back to organizations in their<br />
homelands. More recently, it appears that some of these diaspora-based criminals are operating<br />
independently and retaining their ill-gotten gains. 111<br />
107 Department of Justice, “Leader of Armenian <strong>Organized</strong> <strong>Crime</strong> Ring Pleads Guilty in Manhattan Federal Court to<br />
Racketeering,” press release, July 8, 2011, http://www.justice.gov/usao/nys/pressreleases/July11/<br />
kazarianarmenpleapr.pdf.<br />
108 United States vs. Armen Kazarian.<br />
109 Department of Justice, “Five Brothers Charged in Human Trafficking Scheme that Smuggled Young Ukrainian<br />
Migrants,” press release, June 30, 2010, http://www.justice.gov/opa/pr/2010/June/10-crt-765.html; Nathan Gorenstein,<br />
“5 Brothers Charged with Human Trafficking,” Philadelphia <strong>In</strong>quirer, June 30, 2010, http://www.philly.com/philly/<br />
news/breaking/97508149.html?cmpid=15585797; United States v. Omelyan Botsvynyuk, et al, <strong>In</strong>dictment in the U.S.<br />
District Court for the Eastern District of Pennsylvania, n.d. http://www.justice.gov/usao/pae/<strong>New</strong>s/Pr/2010/Jun/<br />
botsvynyuk_indictment.pdf. <strong>In</strong> October 2011, two of the brothers, Omelyan and Stepan Botsvynyuk, were convicted<br />
“of conspiracy to violate the Racketeer <strong>In</strong>fluenced and Corrupt Organizations (RICO) Act in connection with a human<br />
trafficking scheme.” At the time of the duo’s trial, two other brothers were in Canada awaiting extradition and the<br />
remaining sibling was a fugitive. See Department of Justice, “Brothers Convicted in Human Trafficking Scheme,”<br />
press release, October 12, 2011, http://www.fbi.gov/philadelphia/press-releases/2011/brothers-convicted-in-humantrafficking-scheme;<br />
Michael Matza, “Trial Set to Begin for Botsvynyuk Brothers in Human-Trafficking Case,”<br />
Philadelphia <strong>In</strong>quirer, September 13, 2011, http://articles.philly.com/2011-09-13/news/30149728_1_t-visa-programhuman-trafficking-immigrant-rights-groups.<br />
110 Federal Bureau of <strong>In</strong>vestigation, “Leader of Asian Massage Parlor Scheme Sentenced for Coercing Prostitution,<br />
Money Laundering, Identity <strong>The</strong>ft,” press release, October 14, 2009, http://kansascity.fbi.gov/dojpressrel/pressrel09/<br />
kc101409.htm.<br />
111 IMMFWG, Mass Marketing Fraud, p. 15.<br />
Congressional Research Service 20
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Changing Structures<br />
<strong>The</strong> traditional image of organized crime involves elaborate hierarchies, behavioral codes, and<br />
initiation rituals. Some criminal organizations like the Cosa Nostra retain a strong element of<br />
hierarchy. However, in the last 20 years the criminal underworld has likely moved away from<br />
rigid hierarchical organizational structures and toward decentralized and more flexible “network”<br />
models. One scholar has argued that the public is still wedded to hierarchical archetypes<br />
particularly when conceptualizing how smugglers operate:<br />
Still infused with images of cartels and syndicates—rigid, top-down organizations—we are<br />
not accustomed to thinking of flexible, even unchartable networks of intermediaries that<br />
operate across many borders and provide different services. Some are permanently linked<br />
and others vary in their composition, activities, and geographical scope depending on<br />
markets and circumstances. Thus, brokers and agents with access to multiple suppliers,<br />
conveyors, and buyers are more significant in the drug trade than are old-fashioned<br />
“kingpins.” For all these brokers, expanding into new product lines, legal or illegal is just a<br />
logical business step. 112<br />
As discussed elsewhere, criminals (much like legitimate businesses) have internationalized their<br />
operations, particularly in the last two decades. <strong>The</strong> fast movement of people, goods, and<br />
information stimulated by globalization and technological change has encouraged<br />
decentralization and outsourcing. Networks are especially suited for this type of environment. 113<br />
Global businesses and criminal organizations now give critical roles to individuals or groups<br />
outside of an organization’s core that are often physically separated by thousands of miles. <strong>In</strong><br />
some cases, such as Colombian drug trafficking organizations, law enforcement successes against<br />
criminal hierarchies may have encouraged the adaptation of networks. 114 Criminals conduct more<br />
business offshore because of the efficiencies offered by the <strong>In</strong>ternet and advances in the world’s<br />
transportation and communication infrastructures. 115 <strong>In</strong> the underground economy, these changes<br />
have encouraged the abandonment of exclusivity implied by the elaborate codes of behavior,<br />
ethnic bonds, and rigid hierarchy that once typified organized crime. 116<br />
Networked structures shield organized criminals from law enforcement efforts. 117 Beyond its<br />
immediate duties, one element or node in a network can have little understanding of the entire<br />
network’s criminal activity. It is possible for a network to operate without a single constituent part<br />
knowing the entire scheme. <strong>In</strong> larger networks with clear cut leaders, layers of peripheral nodes<br />
112 Naím, Illicit, pp. 219-220. For a similar discussion that also cites Naím, see Juan Carlos Garzón, Mafia & Co. <strong>The</strong><br />
Criminal Networks in Mexico, Brazil, and Colombia, (Washington, DC: Woodrow Wilson <strong>In</strong>ternational Center for<br />
Scholars, Latin American Program, English translation of 2008 Spanish ed., 2010) pp. 33-34. (Hereafter, Garzón,<br />
Mafia & Co.)<br />
113 Phil Williams, “Transnational Criminal Networks,” in Networks and Netwars, ed. John Arquilla, David Ronfeldt<br />
(Santa Monica, CA: National Defenses Research <strong>In</strong>stitute, RAND, 2002), pp. 77-78. (Hereafter: Williams,<br />
“Transnational Criminal Networks.”)<br />
114 Scott H. Decker and Margaret Townsend Chapman, Drug Smugglers on Drug Smuggling: Lessons from the <strong>In</strong>side<br />
(Philadelphia: Temple University Press, 2008), pp. 34-36.<br />
115 Stephen Aguilar-Millan et al., “<strong>The</strong> Globalization of <strong>Crime</strong>,” <strong>The</strong> Futurist, November/December 2008, p. 42.<br />
116 Chatterjee, <strong>The</strong> Changing Structure. pp, 2, 7-8.<br />
117 Carlo Morselli, <strong>In</strong>side Criminal Networks (<strong>New</strong> York: Springer, 2009), p. 71.<br />
Congressional Research Service 21
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
likely do not know who directs them. Disruption of peripheral network elements by law<br />
enforcement may alert core players to shut down the enterprise. 118<br />
Network Models<br />
Illicit networks broadly follow two models. “Hub and spoke” networks involve peripheral nodes<br />
tied to a leadership core. Core players initiate schemes, settle conflicts, and provide guidance to<br />
others. <strong>In</strong> this model, activity moves from core to peripheral players while the peripheral entities<br />
do not interact with one another. “Chain” networks involve the flow of information or movement<br />
of criminal goods from node to node in linear fashion without a discernable center of gravity or<br />
central command. 119 <strong>The</strong>y often lack obvious individual focal points for policing efforts.<br />
Networks can quickly adapt to changing market conditions or the elimination of nodes by law<br />
enforcement by quickly recruiting replacement specialists. Unlike hierarchies such as the Cosa<br />
Nostra, networks have few membership requirements, initiation rituals, or loyalty tests. <strong>The</strong>se<br />
organizations can also shift allegiances easily, opportunistically drawing in participants for<br />
specific tasks. 120<br />
Blurring of Forms<br />
Some powerful criminal groups that still favor traditional hierarchical structures featuring distinct<br />
lines of authority simultaneously exhibit networked characteristics as well, especially a flattening<br />
of leadership arrangements and outsourcing of some activities to criminals outside their<br />
immediate command and control structures. For example, in the United States hierarchical<br />
Mexican drug cartels rely on networks to handle aspects of trafficking. Violent U.S. gangs<br />
transport wholesale quantities of narcotics into the United States and procure weapons for some<br />
cartels. 121 Prison gangs, for instance, are highly structured, and both national- and regional-level<br />
prison gangs have formed alliances with Mexican DTOs. For example, the Barrio Azteca prison<br />
gang—operating primarily in southwestern Texas and southeastern <strong>New</strong> Mexico—has partnered<br />
with the Juárez cartel and generates much of its money from smuggling marijuana, heroin, and<br />
cocaine across the Southwest border. 122 Similarly, one author of a broad study of criminal<br />
organizations in Mexico, Brazil, and Colombia has noted that these groups embody<br />
118 Williams, “Transnational Criminal Networks,” pp. 64-75.<br />
119 Mette Eilstrup-Sangiovanni and Calvert Jones, “Assessing the Dangers of Illicit Networks: Why al-Qaida May Be<br />
Less Threatening Than Many Think,” <strong>In</strong>ternational Security, Fall 2008, pp. 12-13.<br />
120 For networked structures among Colombian drug traffickers, see Michael Kenney, “<strong>The</strong> Architecture of Drug<br />
Trafficking,” in From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and<br />
Competitive Adaptation (University Park, PA: Pennsylvania State University Press, 2007), pp. 25-47. (Hereafter,<br />
Kenney, From Pablo to Osama.)<br />
121 National Gang <strong>In</strong>telligence Center and National Drug <strong>In</strong>telligence Center, National Gang Threat Assessment, 2009,<br />
January 2009, pp. 11-12, http://www.fbi.gov/publications/ngta2009.pdf.<br />
122 Ibid., p. 28. Barrio Azteca members are also involved in other crimes, such as extortion, kidnapping, and alien<br />
smuggling. For more information, see Tom Diaz, “Barrio Azteca—Border Boys Linked to Mexican Drug Trafficking<br />
Organizations—Part Three,” April 17, 2009, http://tomdiaz.wordpress.com/2009/04/17/barrioazteca%E2%80%93border-bad-boys-linked-to-mexican-drug-trafficking-organizations-%E2%80%94-part-three/.<br />
See<br />
also the Department of Justice website at http://www.usdoj.gov/criminal/gangunit/gangs/prison.html.<br />
Congressional Research Service 22
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
characteristics of what he dubs the “Godfather Model”—rigid hierarchy—and the “Facebook<br />
Model”—dynamic network. 123<br />
Advantage: Networks Challenge Law Enforcement<br />
<strong>The</strong> shift to networked structures may suggest that criminals are more elusive than ever as the<br />
illicit world evolves rapidly, while law enforcement “plays by yesterday’s rules and increasingly<br />
risks dealing only with the weakest criminals and the easiest problems.” 124 According to one<br />
study, when combating agile drug cartels, a number of impediments hobble law enforcement<br />
officials. Most broadly, the hierarchical authority embodied in bureaucratic structures complicates<br />
the decision-making process. 125 Additionally, law enforcement potentially faces<br />
interagency coordination problems that further complicate, and decelerate, decision making,<br />
comprehensive legal and bureaucratic constraints to action, and ambiguous incentive<br />
structures that undermine some agents’ willingness to share information—and others’<br />
commitment to winning the war on drugs. 126<br />
Yet another challenge for law enforcement investigating more-networked organized criminal<br />
groups may arise from constraints in extraterritorial jurisdiction. While some criminal actors in a<br />
network may conduct business offshore or overseas and federal law enforcement does have<br />
extraterritorial jurisdiction to investigate and prosecute individuals who criminally violate U.S.<br />
interests abroad, this jurisdiction does not necessarily cover all crimes committed by organized<br />
crime groups. 127 Further, jurisdictional issues can present substantial diplomatic and practical<br />
challenges for law enforcement.<br />
Disadvantage: Networks Have Exploitable Weaknesses<br />
Some of the strengths suggested by network structure can also be interpreted as weaknesses.<br />
<strong>The</strong>ir inherent compartmentalization potentially impedes efficient information sharing, as key<br />
players keep peripheral actors in the dark about important aspects of complex schemes. This<br />
suggests that highly networked organizations more effectively engage in simpler criminal<br />
conspiracies. Decentralization can undermine the development of strategy and slow down<br />
decision making. It may also encourage excessive risk taking by peripheral actors who are not<br />
controlled by hierarchical roles rooted in rules enforced by the organization. Decentralization<br />
possibly also nurtures challengers who compete with core leaders and foster organizational<br />
instability. 128 Maintaining networks also likely requires “time-consuming” effort geared toward<br />
“building and fostering relationships.” 129<br />
123 Garzón, Mafia & Co. pp. 23-24.<br />
124 <strong>In</strong>telligence Committee Futures Working Group, Futures, p. 2.<br />
125 Kenney, From Pablo to Osama, p. 132-133.<br />
126 Ibid.<br />
127 See the Omnibus Diplomatic Security and Antiterrorism Act of 1968, Title XII of P.L. 99-399. For more detailed<br />
information regarding the United States extraterritorial jurisdiction as well as the specific crimes included in this<br />
jurisdiction, see CRS Report 94-166, Extraterritorial Application of American Criminal Law, by Charles Doyle.<br />
128 Mette Eilstrup-Sangiovanni and Calvert Jones, “Assessing the Dangers of Illicit Networks: Why al-Qaida May Be<br />
Less Threatening Than Many Think,” <strong>In</strong>ternational Security, Fall 2008, pp. 16-33.<br />
129 von Lampe, “Re-Conceptualizing,” p. 9.<br />
Congressional Research Service 23
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Corruption<br />
Some criminal networks co-opt or attract participants from the licit realm, using their specialized<br />
skills to provide “logistical advantages.” 130 <strong>The</strong>se skills are especially valuable in a globalized,<br />
high tech era in which technology is critical in overcoming geographical barriers that once slowed<br />
international trade. Corrupt individuals maintain their status in above-board business or<br />
governmental jobs, providing criminals with clean assets, closely guarded information,<br />
specialized access, sensitive information, or resources. Corrupt licit-realm actors also potentially<br />
lend criminal enterprises a sense of legitimacy. 131 Because of globalization, it is likely harder to<br />
disprove a criminal’s claims that he is a legitimate businessman, especially if the proof lies<br />
overseas or in multiple jurisdictions. <strong>The</strong> efforts of organized criminals to draw into their<br />
organizations legitimate persons can be described from three broad perspectives: grass-roots,<br />
private sector criminal infiltration of businesses; co-optation of powerful business leaders; and<br />
public corruption.<br />
“Ground-Level” Exploitation of Private Businesses<br />
Non-executive employees or self-employed individuals can provide criminal organizations with<br />
highly specialized capabilities in our highly networked age. <strong>The</strong> possibilities for co-opted private<br />
sector specialists are plentiful. <strong>The</strong> three examples below suggest this.<br />
• Viktar Krus operated a network that illegally brought foreign workers into the<br />
United States. He relied on legitimate facilitators such as Beth Ann Broyles, an<br />
Illinois immigration attorney who prepared fraudulent immigration petitions for<br />
the organization. Broyles claimed that she initially did not know that she was<br />
involved in criminal activity. When she eventually discerned that she was,<br />
Broyles rationalized her participation by believing that she was actually<br />
somehow assisting immigrants. She was among two dozen co-defendants who<br />
worked in Krus’s network. Additionally, Krus likely relied on bribing hotel<br />
employees to inflate the number of workers they needed to hire. Between 2003<br />
and 2008, he used at least 10 shell companies and evaded millions of dollars in<br />
taxes while bringing in 3,800 immigrants, many illegally, to work in the service<br />
sector and industrial jobs in the Norfolk, VA, region and elsewhere around the<br />
United States. He grossed $34 million, forced people to live 12-15 to an<br />
apartment, garnered fees from their wages, and charged legitimate businesses $10<br />
per hour for their labor. Krus received a seven-year prison sentence for<br />
conspiracy, tax fraud, visa fraud, and money laundering. 132<br />
130 Ibid.<br />
131 CISC, 2010 Report, p. 15, http://www.cisc.gc.ca/annual_reports/annual_report_2010/document/<br />
report_oc_2010_e.pdf. See also Carlo Morselli and Cynthia Giguere, “Legitimate Strengths in Criminal Networks,”<br />
<strong>Crime</strong>, Law, and Social Change, 2006, pp. 185-200.<br />
132 Tim McGlone, “Lawyer Sentenced for Part in Immigration Fraud Ring,” <strong>The</strong> Virginian-Pilot, January 26, 2010;<br />
McGlone, “Belarus Man Gets 7 Years for Illegal Workers,” <strong>The</strong> Virginian-Pilot, July 18, 2009,<br />
http://hamptonroads.com/2009/07/belarus-man-gets-7-years-illegal-workers; McGlone, “Prosecutors Tie Illegal<br />
Workers to <strong>In</strong>ternational <strong>Crime</strong> Syndicate,” <strong>The</strong> Virginian-Pilot, January 17, 2009; McGlone, “Illegal-Immigrant<br />
Network Supplied Region and Beyond,” <strong>The</strong> Virginian-Pilot, January 14, 2009; Bureau of Immigration and Customs<br />
Enforcement, “22 Charged with Massive <strong>In</strong>ternational Visa Scheme,” press release, January 13, 2009. For similar<br />
examples involving Eurasian organized criminals, see Alexander Sukharenko, “<strong>The</strong> Use of Corruption by ‘Russian’<br />
<strong>Organized</strong> <strong>Crime</strong> in the United States,” Trends in <strong>Organized</strong> <strong>Crime</strong>, vol. 8, no. 2 (Winter 2004).<br />
Congressional Research Service 24
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
• According to DOJ, the Tran organization, a criminal group that cheated<br />
approximately 27 casinos in the United States and Canada out of more than $7<br />
million, bribed card dealers and supervisors at casinos to advance its scheme. <strong>In</strong><br />
what has been dubbed “the largest cheating ring of all time,” 133 corrupt dealers<br />
rigged their shuffles during mini-baccarat and blackjack games. <strong>The</strong> group also<br />
used technologically advanced tools such as hidden transmitters and custom<br />
software to predict the order in which cards would reappear during games. 134 <strong>The</strong><br />
organization began its operations in 2002, and the initial indictment was returned<br />
against the group in May 2007. 135<br />
• DOJ’s <strong>Organized</strong> <strong>Crime</strong> and Racketeering Section helped prosecute Victor<br />
Kaganov in connection with an illegal money transmitting business he allegedly<br />
ran in Oregon. <strong>In</strong> March 2011, Kaganov pled guilty to operating an illegal money<br />
transmitting business. 136 DOJ has not publicly linked Kaganov, who was indicted<br />
in March 2010, to any organized crime figures. However, Kaganov purportedly<br />
opened multiple shell corporations in Oregon on behalf of Russian clients. He<br />
used the shells to shuttle more than $172 million via more than 4,200 wire<br />
transactions “in and out of the United States to more than 50 countries,”<br />
according to DOJ. 137 His supposed criminal activity highlights services that<br />
organized criminals could potentially use to launder money.<br />
Big Business and <strong>Organized</strong> Criminals<br />
<strong>In</strong> his Annual Threat Assessment for 2010, then-Director of National <strong>In</strong>telligence Dennis Blair<br />
noted that government, organized crime, intelligence services, and big business figures are<br />
growing increasingly close in their interactions. He stated,<br />
an increasing risk from Russian organized crime is that criminals and criminally linked<br />
oligarchs [powerful Eurasian businessmen who rose to power in the immediate post-Soviet<br />
period] will enhance the ability of state or state-allied actors to undermine competition in<br />
gas, oil, aluminum, and precious metals markets. 138<br />
However, based on open source information, it is often difficult to determine with any degree of<br />
certainty whether oligarchs or other powerful international entrepreneurs with interests in U.S.<br />
markets or investors have criminal connections.<br />
133 Liz Benston, “As Baccarat Grows in Popularity, So Does Cheating,” Las Vegas Sun, August 30, 2010,<br />
http://www.lasvegassun.com/news/2010/aug/30/baccarat-grows-popularity-so-does-cheating/.<br />
134 Department of Justice, “Former Mohegan Sun Card Dealer Sentenced to Prison for <strong>In</strong>volvement in Cheating<br />
Conspiracy,” press release, April 7, 2010, http://newhaven.fbi.gov/dojpressrel/pressrel10/nh040710.htm; Department of<br />
Justice, “Leader of Casino-Cheating Criminal Enterprise Sentenced to 70 Months in Prison for Targeting Casinos<br />
Across the United States,” press release, March 15, 2010, http://www.justice.gov/opa/pr/2010/March/10-crm-265.html.<br />
135 Department of Justice, “Eight More <strong>In</strong>dividuals Charged in Casino-Cheating Conspiracy,” press release, September<br />
18, 2009, http://www.justice.gov/opa/pr/2009/September/09-crm-999.html.<br />
136 Department of Justice, “Tigard Man Pleads Guilty to Operating Illegal Money Transmitting Business,” press<br />
release, March 1, 2011, http://www.justice.gov/usao/or/PressReleases/2011/20110301_Kaganov.html.<br />
137 Department of Justice, “Tigard Man <strong>In</strong>dicted in Connection with Illegal Money Transmitting Business Shell<br />
Corporations Created by Defendant to Move Millions of Dollars in and out of United States,” press release, March 3,<br />
2010, http://portland.fbi.gov/dojpressrel/pressrel10/pd030310.htm.<br />
138 Blair, “Annual Threat Assessment,” p. 44.<br />
Congressional Research Service 25
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Russian billionaire Oleg Deripaska exemplifies this difficulty. According to unnamed U.S. federal<br />
officials cited in news reports, Deripaska has struggled to maintain a U.S. visa because of his<br />
alleged ties to organized crime. 139 Prior to the global financial crisis, he possessed a $28 billion<br />
fortune and was the ninth-wealthiest person in the world. 140 He obtained a U.S. visa in 2005, but<br />
it was revoked soon thereafter. 141 According to press reporting, in 2009 the FBI set up two U.S.<br />
visits by Deripaska for undisclosed reasons on a limited entry permit from the Department of<br />
Homeland Security (DHS). 142 Claims of criminal connections have publicly dogged him for years.<br />
But Deripaska has never been convicted of a crime and has strongly denied all accusations. 143 His<br />
difficulty getting a U.S. visa may have kept some U.S. bankers from participation in an initial<br />
public offering (IPO) involving his aluminum company, UC Rusal. 144 <strong>The</strong> IPO occurred in<br />
January 2010 on the Hong Kong stock exchange. 145<br />
Like Deripaska, Stanley Ho, a billionaire casino magnate from Macau, has routinely denied<br />
accusations of ties to organized crime. According to media reports, U.S. officials have long<br />
suspected Ho had links to Chinese criminal groups known as triads. 146 <strong>The</strong>se suspicions recently<br />
resurfaced and involved his daughter, Pansy, and a casino venture in Macau. Pansy and Nevadabased<br />
MGM Resorts <strong>In</strong>ternational (MGM) 147 jointly operate the MGM Macau, which opened in<br />
December 2007. 148<br />
Pansy Ho’s co-ownership of MGM Macau emerged as an issue for <strong>New</strong> Jersey gaming regulators<br />
because MGM also possessed a 50% share in Atlantic City’s Borgata Hotel Casino and Spa.<br />
According to <strong>New</strong> Jersey law, MGM had to prove “by clear and convincing evidence, its ‘good<br />
character, honesty and integrity’ on a continuing basis” to maintain its 50% share in the<br />
Borgata. 149 <strong>In</strong> essence, the company and its partners had to be found suitable to operate in <strong>New</strong><br />
Jersey.<br />
139 Gregory L. White and Diana Cimilluca, “Some Bankers Cool on Hot Rusal IPO,” Wall Street Journal, November 9,<br />
2009, http://online.wsj.com/article/NA_WSJ_PUB:SB125755269536534861.html. (Hereafter, White and Cimilluca,<br />
“Some Bankers.”) Evan Perez, Gregory L. White, “FBI Lets Barred Tycoon Visit U.S.,” October 30, 2009,<br />
http://online.wsj.com/article/NA_WSJ_PUB:SB125685578903317087.html. (Hereafter, Perez and White, “FBI Lets<br />
Barred Tycoon.”)<br />
140 “<strong>The</strong> World’s Billionaires: #9 Oleg Deripaska,” Forbes.com, March 5, 2008, http://www.forbes.com/lists/2008/10/<br />
billionaires08_Oleg-Deripaska_UCP9.html.<br />
141 Perez and White, “FBI Lets Barred Tycoon.”<br />
142 White and Cimilluca, “Some Bankers”; Perez and White, “FBI Lets Barred Tycoon.”<br />
143 John Helmer, “Deripaska in ‘Russian Mafia’ Probe,” BusinessDay, May 14, 2010, http://www.businessday.co.za/<br />
articles/Content.aspx?id=108965; Misha Glenny, Robert Booth, and Tom Parfitt, “US Refused Oligarch Visa Over<br />
Alleged Criminal Associations,” <strong>The</strong> Guardian, October 31, 2008, http://www.guardian.co.uk/world/2008/oct/31/olegderipaska-us-visa-rusal.<br />
144 White and Cimilluca, “Some Bankers.”<br />
145 “Aluminum giant RusAl raises $2.24 bln with Hong Kong IPO,” RIA Novosti, January 22, 2010, http://en.rian.ru/<br />
business/20100122/157651607.html.<br />
146 Neil Gough, “Triads Thrive in Ho’s Casinos, US Report Says,” South China Morning Post, March 19, 2010.<br />
Alexandra Berzon and A.D. Pruitt, “MGM Mirage Knew Ally Was Unfit,” Wall Street Journal, March 17, 2010,<br />
http://online.wsj.com/article/SB10001424052748704743404575127673757750744.html.<br />
147 Formerly MGM Mirage.<br />
148 Tom Mitchell, “Spotlight on MGM Mirage’s ‘Wild Card,” Financial Times, March 19, 2010.<br />
149 State of <strong>New</strong> Jersey Department of Law and Public Safety, Special Report of the Division of Gaming Enforcement<br />
to the Casino Control Commission on Its <strong>In</strong>vestigation of MGM Mirage’s Joint Venture with Pansy Ho in Macau,<br />
Special Administrative Region, People’s Republic of China, Redacted, May 18, 2009, p. 1, http://www.state.nj.us/<br />
casinos/home/info/docs/MGM/dge_%20report_redacted.pdf. (Hereafter, DGE, “Report.”)<br />
Congressional Research Service 26
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
It appears that MGM’s direct ties to the Ho family were troubling to <strong>New</strong> Jersey regulators. <strong>In</strong><br />
May 2009, the <strong>New</strong> Jersey Division of Gaming Enforcement (DGE) published a report based on<br />
its own investigation of MGM’s partnership with Pansy Ho in Macau. <strong>The</strong> DGE report<br />
recommended that both Pansy and Stanley Ho be found “unsuitable persons” by the <strong>New</strong> Jersey<br />
Casino Control Commission. 150 <strong>The</strong> DGE noted the elder Ho’s “continued business ties to persons<br />
associated with organized crime” and his daughter’s “direct, substantial, and continuing business<br />
and financial ties to her father.” 151 <strong>In</strong> March 2010, MGM decided to sell its interest in the Borgata<br />
rather than sever ties with Pansy Ho. 152<br />
Corruption of Public Officials<br />
<strong>Organized</strong> criminals corrupt public employees, especially individuals who have sensitive jobs. <strong>In</strong><br />
many cases, criminals seek people who have skills, particular access to information, or job<br />
responsibilities that lend themselves to specific schemes. For example, some criminals whose<br />
operations depend on personal identification documents seek to inveigle employees with unique<br />
access to such information, and smugglers lure people charged with protecting borders into their<br />
operations.<br />
<strong>In</strong> August 2010, Vitaly Fedorchuk was sentenced to 46 months in prison for leading a criminal<br />
organization in the Cleveland, OH, area that fraudulently procured Ohio driver’s licenses and<br />
identification cards for foreign nationals. To do so, Fedorchuk’s group relied on Sonya Hilaszek, a<br />
corrupt employee at the Deputy Registrar’s Office in Parma, OH. She also pleaded guilty in the<br />
case and received a prison sentence of 33 months. DOJ accused Hilaszek of producing documents<br />
for between 300 and 500 individuals. <strong>The</strong> criminal group charged foreign nationals—many were<br />
from Ukraine or Uzbekistan and in the United States illegally—between $1,500 and $3,000 for<br />
the documents. Fedorchuk’s group also allegedly cooperated with criminals in Ukraine to<br />
fraudulently obtain non-immigrant visas from the U.S. Embassy in Kyiv. <strong>The</strong>y purportedly relied<br />
on corrupt Ukrainian nationals employed by the Embassy and charged $12,000 per visa. 153<br />
Mexican drug traffickers corrupt employees of federal agencies charged with protecting the<br />
Southwest border. <strong>The</strong> number of cases involving corruption at Customs and Border Protection<br />
(CBP) reported by the DHS Office of <strong>In</strong>spector General have risen from 245 in FY2006 to more<br />
than 770 (projected) for FY2010. 154 <strong>In</strong> FY2009 alone, the DHS <strong>In</strong>spector General opened 839<br />
investigations of potential corruption regarding DHS employees. Of the 839 investigations, 576<br />
worked for CBP, 164 for ICE, 64 for U.S. Citizen and Immigration Services (CIS), and 35 for the<br />
Transportation Security Administration (TSA). 155 While none of these figures establish exactly<br />
150 DGE, “Report,” pp. 70-71.<br />
151 DGE, “Report,” p. 71.<br />
152 Wayne Parry, “NJ: Asian Casino Boss Has Mob Ties in China,” Associated Press, March 17, 2010.<br />
153 Department of Justice, “Three More Sentenced as Part of Bureau of Motor Vehicle Fraud Ring,” press release,<br />
August, 19, 2010, http://cleveland.fbi.gov/dojpressrel/pressrel10/cl081910a.htm; Patrick O'Donnell, “Parma Clerk<br />
Issued Illegal Licenses, FBI Charges,” Cleveland Plain Dealer, October 30, 2009.<br />
154 Ceci Connolly, “<strong>The</strong> <strong>In</strong>side Woman,” Washington Post, September 12, 2010, http://www.washingtonpost.com/wpdyn/content/article/2010/09/11/AR2010091105087.html.<br />
(Hereafter, Connolly, “<strong>The</strong> <strong>In</strong>side Woman.”)<br />
155 See testimony by Thomas M. Frost, Assistant <strong>In</strong>spector General for <strong>In</strong>vestigations, U.S. Department of Homeland<br />
Security before the U.S. Congress, Senate Committee on Homeland Security and Governmental Affairs, Ad Hoc<br />
Subcommittee on State, Local, and Private Sector Preparedness and <strong>In</strong>tegration, <strong>New</strong> Border War: Corruption of U.S.<br />
Officials by Drug Cartels, 111 th Cong., 1 st sess., March 11, 2010.<br />
Congressional Research Service 27
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
how many of these corruption cases are attributable to organized crime, they do suggest a<br />
growing challenge for federal law enforcement focused on combating smuggling and trafficking<br />
groups along the border. <strong>In</strong> an attempt to prevent corruption, federal investigation and law<br />
enforcement agencies may vet potential employees. For instance, in 2009 available resources<br />
allowed CBP to polygraph 10%–15% of applicants applying for border patrol positions, and of<br />
those who were polygraphed, about 60% were found unsuitable for service. 156<br />
Two cases highlight the potential for corruption by organized crime along the Southwest border.<br />
<strong>In</strong> May 2010, Martha Garnica, a former CBP technician and officer, pleaded guilty to corruption<br />
and drug and alien smuggling charges. 157 She played a significant role in smuggling operations<br />
for the Ciudad Juarez-based La Linea criminal organization. 158 <strong>In</strong> another case, Jose Raul<br />
Montano, Jr. was sentenced to 140 months in prison for bribery, cocaine trafficking, and alien<br />
smuggling while assigned as a CBP officer at the Brownsville Gateway Port of Entry (POE) in<br />
Brownsville, TX. He allowed Mexican drug traffickers and alien smugglers to illegally transport<br />
drugs and people into the United States. At the POE, Montano permitted vehicles containing<br />
illicit shipments to pass—without inspection—through the lane he worked. <strong>In</strong> return, Mexican<br />
criminals bribed him. By the time of his arrest in April 2009, he received between $8,000 and<br />
$10,000 per vehicle. 159<br />
<strong>Organized</strong> <strong>Crime</strong>, a “National Security” and “Public<br />
Security” Concern<br />
Clearly, organized crime can be seen as a public security concern, largely endangering people,<br />
businesses, and property. <strong>In</strong> fact, in 1995 the National <strong>In</strong>telligence Council (NIC) produced a<br />
National <strong>In</strong>telligence Estimate (NIE) on international organized crime that emphasized just this.<br />
However, the U.S. intelligence community’s view of international organized crime has shifted<br />
critically in the intervening years. <strong>In</strong> early 2010, the NIC issued a second NIE on the topic.<br />
While, according to DOJ officials, most of the salient issues in the 2010 NIE are consistent with<br />
those discussed in the 1995 NIE, a key difference emerged. <strong>The</strong> 2010 NIE argues that<br />
international organized crime has evolved into a national security concern as well. 160 DOJ<br />
officials have described these national security threats in five broad categories: (1) penetrating or<br />
156 See testimony by James F. Tomsheck, Assistant Commissioner, Office of <strong>In</strong>ternal Affairs, Customs and Border<br />
Protection before the U.S. Congress, Senate Committee on Homeland Security and Governmental Affairs, Ad Hoc<br />
Subcommittee on State, Local, and Private Sector Preparedness and <strong>In</strong>tegration, <strong>New</strong> Border War: Corruption of U.S.<br />
Officials by Drug Cartels, 111 th Cong., 1 st sess., March 11, 2010.<br />
157 Immigration and Customs Enforcement, “Ex-CBP Employee Receives 20 Years in Drug, Alien Smuggling,<br />
Corruption Case,” press release, August 26, 2010, http://www.ice.gov/pi/nr/1008/100826elpaso.htm.<br />
158 Connolly, “<strong>The</strong> <strong>In</strong>side Woman.”<br />
159 Department of Justice, “Former CBP Officer Sentenced to Prison for Bribery, Cocaine Trafficking, and Alien<br />
Smuggling,” press release, March 31, 2010, http://sanantonio.fbi.gov/dojpressrel/pressrel10/sa033110.htm.<br />
160 Remarks by DOJ officials at the National <strong>In</strong>stitute of Justice Conference 2010, panel on <strong>In</strong>ternational <strong>Organized</strong><br />
<strong>Crime</strong>: Recent Developments in Policy and Research, June 14, 2010. For this report, “public security threat” means<br />
threats to people, businesses, or property, and “national security threat” means threats to government, sovereignty, and<br />
economic stability. This differentiation is based on John Bailey, Combating <strong>Organized</strong> <strong>Crime</strong> and Drug Trafficking in<br />
Mexico: What Are Mexican and U.S. Strategies? Are they Working? Woodrow Wilson <strong>In</strong>ternational Center For<br />
Scholars, Mexico <strong>In</strong>stitute and University of San Diego Trans-Border <strong>In</strong>stitute, Working Paper Series on U.S.-Mexico<br />
Security Cooperation, Washington, DC, May 2010, p. 3, fn. 2, http://wilsoncenter.org/topics/pubs/<br />
Combating%20<strong>Organized</strong>%20<strong>Crime</strong>.%20Bailey.pdf.<br />
Congressional Research Service 28
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
influencing state institutions—particularly in those states with weak governance; (2) threatening<br />
the global economy by infiltrating financial and commercial markets, driving out legitimate<br />
businesses, and using a variety of illegal business practices; (3) engaging in cybercrimes across a<br />
range of fraudulent activities impacting individuals, businesses, and global trust systems; (4)<br />
partnering with terrorist organizations and insurgent groups such as the Revolutionary Armed<br />
Forces of Colombia (FARC), Taliban, and Hezbollah; and (5) expanding the reach of drug<br />
trafficking such that DTOs ally with other criminal organizations—regardless of ethnic<br />
background—and with local drug distributors.<br />
Alleged Eurasian mob boss Semion Mogilevich embodies both the public and national security<br />
dimensions of organized crime. <strong>In</strong> October 2009, the FBI placed Mogilevich on its Ten Most<br />
Wanted Fugitives list. 161 He is wanted for leading a financial scheme that defrauded investors of<br />
$150 million between 1993 and 1998. <strong>The</strong> company that he allegedly controlled at the heart of<br />
the operation, YBM Magnex, was based in <strong>New</strong>town, PA, and was incorporated in Canada. 162<br />
Mogilevich was also likely involved in laundering money through YBM Magnex and a network<br />
of offshore companies. 163 By purportedly swindling investors, Mogilevich ran an operation that<br />
harmed members of the public. More broadly—and involving national security interests—the FBI<br />
and DOJ have suggested that the reputed mob boss also has his hands in Eastern European natural<br />
gas markets and that he uses his ill-gotten gains to influence “governments and their<br />
economies.” 164 Russian law enforcement arrested Mogilevich in January 2008 on tax evasion<br />
charges but released him in July 2009 on an oath not to flee. 165<br />
Although analysts have assessed organized crime as being a threat to both public security as well<br />
as a national security, the scope of these threats cannot be fully evaluated without a clearer<br />
understanding of the scope of organized crime.<br />
Conceptualizing <strong>Organized</strong> <strong>Crime</strong><br />
One of the primary challenges in conceptualizing organized crime is that it is usually not thought<br />
of as a specific crime, but rather as a large number of illicit activities committed by groups of<br />
individuals who are often so loosely connected that the members themselves do not know who<br />
their criminal associates may be. This has historically led to a lack of consistency in the way<br />
different groups—scholars, policymakers, various federal law enforcement agencies, and nation<br />
states—view what constitutes organized crime and think about how to combat it. <strong>The</strong> inconsistent<br />
conceptualization of organized crime has also made it difficult to measure its impact. 166<br />
161 FBI, “Top Ten Fugitives: Global Con Artist and Ruthless Criminal,” October 21, 2009, http://www.fbi.gov/page2/<br />
oct09/mogilevich_102109.html. (Hereafter: FBI, “Global Con Artist.”)<br />
162 FBI, “Philadelphia Fugitive Placed on the FBI’s ‘Ten Most Wanted Fugitives’ List,” press release, October 21,<br />
2009, http://philadelphia.fbi.gov/pressrel/pressrel09/ph102109a.htm. Jeanne Meserve, “FBI: Mobster More Powerful<br />
than Gotti,” CNN, October 24, 2009, http://articles.cnn.com/2009-10-21/justice/mogilevich.fbi.most.wanted_1_fbiwire-fraud-semion-mogilevich?_s=PM:CRIME.<br />
163 Williams, “Transnational Criminal Networks,” p. 70.<br />
164 FBI, “Global Con Artist;” Attorney General Michael B. Mukasey, “Attorney General Michael B. Mukasey Delivers<br />
Remarks at the CSIS Forum on Combating <strong>In</strong>ternational <strong>Organized</strong> <strong>Crime</strong>,” April 23, 2008, Political/Congressional<br />
Transcript Wire.<br />
165 “Russian Court Releases Reputed <strong>Crime</strong> Boss,” <strong>The</strong> Associated Press, July 27, 2009.<br />
166 This report focuses on U.S. agency and federal statutory definitions of organized crime. For a discussion of<br />
scholarly definitions, see CRS Report R40525, <strong>Organized</strong> <strong>Crime</strong> in the United States: Trends and Issues for Congress,<br />
(continued...)<br />
Congressional Research Service 29
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>The</strong> 2011 Strategy laid out the federal government’s first broad conceptualization of<br />
“transnational organized crime,” focusing on it as a national security concern. 167 To what extent<br />
this definition will drive Administration policy is unclear. <strong>In</strong> evaluating the 2011 Strategy,<br />
policymakers may exercise their oversight authority regarding both the adequacy of the<br />
Administration’s definition of transnational organized crime as well as its utilization in driving<br />
counter-crime policies.<br />
Transnational <strong>Organized</strong> <strong>Crime</strong> Defined<br />
<strong>The</strong> 2011 Strategy offers the following definition of organized crime:<br />
Transnational organized crime refers to those self-perpetuating associations of individuals<br />
who operate transnationally for the purpose of obtaining power, influence, monetary and/or<br />
commercial gains, wholly or in part by illegal means, while protecting their activities<br />
through a pattern of corruption and/or violence, or while protecting their illegal activities<br />
through a transnational organizational structure and the exploitation of transnational<br />
commerce or communication mechanisms. <strong>The</strong>re is no single structure under which<br />
transnational organized criminals operate; they vary from hierarchies to clans, networks, and<br />
cells, and may evolve to other structures. <strong>The</strong> crimes they commit also vary. Transnational<br />
organized criminals act conspiratorially in their criminal activities and possess certain<br />
characteristics which may include, but are not limited to:<br />
<strong>In</strong> at least part of their activities they commit violence or other acts which are likely to<br />
intimidate, or make actual or implicit threats to do so;<br />
<strong>The</strong>y exploit differences between countries to further their objectives, enriching their<br />
organization, expanding its power, and/or avoiding detection/apprehension;<br />
<strong>The</strong>y attempt to gain influence in government, politics, and commerce through corrupt<br />
as well as legitimate means;<br />
<strong>The</strong>y have economic gain as their primary goal, not only from patently illegal activities<br />
but also from investment in legitimate businesses; and<br />
<strong>The</strong>y attempt to insulate both their leadership and membership from detection, sanction,<br />
and/or prosecution through their organizational structure. 168<br />
As the term “transnational organized crime” (TOC) may suggest, any definition of it should detail<br />
three elements: (1) “transnationality,” (2) organization, and (3) crime. While the above TOC<br />
definition, and more generally the 2011 Strategy’s text, hit on all three elements, key gaps in<br />
understanding the Administration’s framing of TOC remain.<br />
(...continued)<br />
by Kristin M. Finklea.<br />
167 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. 5.<br />
168 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. ii. This definition originally appeared in Department of<br />
Justice, Overview of the Law Enforcement Strategy to Combat <strong>In</strong>ternational <strong>Organized</strong> <strong>Crime</strong>, April 2008, p. 2,<br />
http://www.justice.gov/ag/speeches/2008/ioc-strategy-public-overview.pdf.<br />
Congressional Research Service 30
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Transnationality<br />
<strong>The</strong> strategy’s definition addresses the concept of “transnationality” in the broadest terms,<br />
suggesting that TOC is transnational because it operates transnationally. At least three factors—<br />
none of which are discussed in the definition—may determine how transnational a group is:<br />
residence, product provenance, and supply chain complexity. 169<br />
Regarding residence, a TOC group’s members can reside in multiple countries, clearly making it<br />
a transnational network. However, if all members reside in a single country, but a seemingly<br />
minor aspect of the group’s activities is situated outside this home country, is the criminal<br />
network still considered transnational?<br />
• Does controlling a bank account in one country while committing crimes in<br />
another make a network transnational?<br />
• Can a group be considered transnational simply if its communications concerning<br />
criminal activity are routed outside of its home country via international<br />
communications networks?<br />
<strong>In</strong> terms of product provenance, it seems clear that illicit trade (whether it involves people, goods,<br />
services, or information) from one country to another is a transnational activity. However, can a<br />
domestically based group be considered transnational if the illicit product it handles in the United<br />
States had a foreign origin but the group played no role in getting it across international borders?<br />
• A street-level cocaine dealer may have never directly colluded with foreign<br />
criminals, but the cocaine he retails originated abroad. Does this automatically<br />
make him part of a TOC network? 170<br />
Supply chain complexity is also likely a prominent feature of TOC. This involves managing the<br />
routes that illicit products take.<br />
• Does the complexity of a group’s supply chain factor into measurement of how<br />
transnational the group is? This complexity can include elements such as the<br />
number of borders a product crosses as well as the resources a group expends to<br />
move a product. <strong>The</strong>se resources can include money used for things such as<br />
bribing public officials, protecting illicit routes from other criminals, the<br />
acquisition and retention of technical expertise, and the development of tools and<br />
infrastructure to maintain the route (e.g., shell companies, front companies, drug<br />
smuggling semi-submersibles, cross-border smuggling tunnels).<br />
<strong>The</strong>se factors suggest a broader question: does the level of transnationality inherent in a network<br />
impact how the U.S. government views it as a threat? <strong>In</strong> other words, if one network is more<br />
transnational than another, is it a greater concern? Would an organized crime group with<br />
transnational ties necessarily be a larger threat than a criminal network based solely in the United<br />
States?<br />
169 von Lampe, “Re-Conceptualizing,” pp. 4-5, discusses the “nature of what crosses the border.” This is subsumed by<br />
product provenance in this report. von Lampe also describes “directionality,” which is part of supply chain complexity<br />
in this report.<br />
170 <strong>The</strong> product that a TOC group moves across borders should also likely factor in the threat it poses to national<br />
security. A group trafficking firearms may pose a higher threat to national security than an alien smuggling<br />
organization or vise versa. How the strategy ranks these threats is unclear.<br />
Congressional Research Service 31
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Organization<br />
<strong>The</strong> TOC definition includes almost any form of organization. This is reflected in the strategy’s<br />
emphasis on the organizational fluidity of TOC. 171 As this may suggest, the definition lacks<br />
precise baselines for the concept of “organization.” Two baselines seem central here. <strong>The</strong> first<br />
involves routine. <strong>In</strong> essence, to qualify as “organized” does a network have to routinely<br />
cooperate? If so, what constitutes routine cooperation? <strong>The</strong> second baseline is size. How small is<br />
“organized”—can it be as basic as two individuals collaborating? Low thresholds for these two<br />
baselines—allowing TOC to include groups as small as two individuals who do not routinely<br />
interact—may render the concept of “organization” meaningless. <strong>In</strong> other words, with low<br />
thresholds, almost any criminal activity that does not involve a sole operator could be defined as<br />
“organized.” <strong>In</strong> an attempt to clarify matters, the definition suggests that TOC groups are “selfperpetuating,”<br />
but the definition does not explain what this concept entails. Seemingly, any group<br />
not construed and controlled by some external authority or environmental condition is “selfperpetuating.”<br />
<strong>Crime</strong><br />
<strong>The</strong> TOC definition in the 2011 Strategy broadly describes some of the activities TOC groups can<br />
engage in to turn profits and protect themselves—violence, exploiting the “differences between<br />
countries,” and gaining influence in legitimate sectors. Going beyond the definition, the strategy’s<br />
text lays out 10 areas of illicit activity in which TOC poses “a growing threat to national and<br />
international security.” 172 <strong>The</strong>se 10 areas encompass a wide swath of federal law enforcement<br />
activity.<br />
1. Penetration of State <strong>In</strong>stitutions, Corruption, and Threats to Governance<br />
2. Threats to the Economy, U.S. Competitiveness, and Strategic Markets<br />
3. <strong>Crime</strong>-Terror-<strong>In</strong>surgency Nexus<br />
4. Expansion of Drug Trafficking<br />
5. Human Smuggling<br />
6. Trafficking in Persons<br />
7. Weapons Trafficking<br />
8. <strong>In</strong>tellectual Property <strong>The</strong>ft<br />
9. Cybercrime<br />
10. <strong>The</strong> Critical Role of Facilitators. 173<br />
171 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. 3.<br />
172 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, pp. 5-8.<br />
173 Ibid. “Facilitators” are “semi-legitimate players such as accountants, attorneys, notaries, bankers, and real estate<br />
brokers, who cross both the licit and illicit worlds and provide services to legitimate customers, criminals, and terrorists<br />
alike.” See Ibid., p. 8.<br />
Congressional Research Service 32
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
It is unclear what sway the 2011 Strategy’s definition will hold over what is practically<br />
investigated as “transnational organized crime” by federal agencies. This is because these 10<br />
areas touch on a range of U.S. law enforcement activity that involves many federal agencies,<br />
including numerous components of both DOJ and DHS. <strong>The</strong> 10 areas clearly enumerate crimes<br />
such as drug and weapons trafficking. However, the areas can subsume other illegal activity. For<br />
example, many crimes related to financial fraud and identity theft potentially fall under<br />
“Cybercrime,” “<strong>In</strong>tellectual Property <strong>The</strong>ft,” or “Threats to the Economy, U.S. Competitiveness,<br />
and Strategic Markets.” <strong>In</strong> the past, numerous investigative programs within the federal<br />
government have been developed to combat crimes subsumed by the 10 areas without specifically<br />
characterizing them as “organized crime.”<br />
Complicating things, neither the definition nor the 2011 Strategy lay out a methodology for<br />
somehow differentiating among TOC actors in terms of the potential impact of their crimes—<br />
namely, the threat they pose to U.S. national security or public interests. Without a methodology<br />
establishing thresholds based on severity, vastly different criminals potentially fall under the<br />
strategy’s purview. A 15-year-old gang member and his friends who illegally download<br />
Hollywood movies from a foreign website is arguably a much different target for law<br />
enforcement than a powerful international mobster with vast economic resources and an army of<br />
foot soldiers. However, the strategy potentially targets both. A form of threat assessment rubric<br />
may focus federal efforts, thus focusing the groups or individuals targeted by the strategy.<br />
While the 2011 Strategy does not articulate a threat assessment methodology, two items suggest<br />
that Administration efforts supporting the strategy involve some calculation of threat. First, an<br />
interagency “Threat Mitigation Working Group” has been given the responsibility of identifying<br />
TOC networks “present[ing] a sufficiently high national security risk.” 174 Whether or not the<br />
networks identified by this working group will be the only ones targeted by efforts embraced<br />
under the strategy is unclear. Second, four TOC groups were listed in an annex to a new executive<br />
order issued in conjunction with the 2011 Strategy. 175 <strong>The</strong> order established a sanctions program<br />
“to block the property of and prohibit transactions with significant transnational criminal<br />
networks that threaten national security, foreign policy, or economic interests.” 176 While it is<br />
unclear exactly how or why the four groups were chosen, presumably some calculation of threat<br />
was involved. 177<br />
<strong>The</strong> Definition, 2011 Strategy, and Key Questions<br />
Because the strategy’s TOC definition is broad, it may be difficult to ascertain answers to a<br />
number of questions critical to policymaking (see Figure 1). First, how much harm is imposed by<br />
transnational organized crime? Second, how many federal resources are directly and indirectly<br />
dedicated to combating TOC? Third, which federal agencies are primarily responsible for fighting<br />
TOC? Fourth, how are threats prioritized by the new strategy. Are national security concerns<br />
weighed against other concerns such as public security when targeting specific TOC groups?<br />
Without clear answers to these questions, it may be difficult for Congress to exercise both<br />
174 Ibid., p. 1.<br />
175 Executive Order 13581, “Blocking Property of Transnational Criminal Organizations,” 76 Federal Register 44757-<br />
44759, July 24, 2011.<br />
176 Strategy to Combat Transnational <strong>Organized</strong> <strong>Crime</strong>, p. 1.<br />
177 <strong>The</strong> four TOC groups are the Brothers’ Circle, Camorra, Yakuza, and Los Zetas.<br />
Congressional Research Service 33
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
legislative and oversight responsibilities in order to bolster the federal government’s abilities to<br />
counter organized crime.<br />
Figure 1. Transnational <strong>Organized</strong> <strong>Crime</strong> Strategy<br />
Key Issues for Policymakers<br />
Source: CRS<br />
Statutory Definition<br />
<strong>The</strong>re is no current statutory definition of organized crime. <strong>The</strong> Omnibus <strong>Crime</strong> Control and Safe<br />
Streets Act of 1968, as amended (P.L. 90-351), 178 had at one point defined organized crime as “the<br />
unlawful activities of the members of a highly organized, disciplined association engaged in<br />
supplying illegal goods and services, including but not limited to gambling, prostitution, loan<br />
sharking, narcotics, labor racketeering, and other unlawful activities of members of such<br />
organizations.” This definition—repealed in the Justice System Improvement Act of 1979 (P.L.<br />
96-157)—appears to be even broader than DOJ’s or the FBI’s conceptualizations. Similarly, in the<br />
Racketeer <strong>In</strong>fluenced and Corrupt Organizations (RICO) 179 provisions, organized crime is<br />
178 Omnibus <strong>Crime</strong> Control and Safe Streets Act of 1968, as amended (P.L. 90-351).<br />
179 18 U.S.C. § 1961-1968. It was enacted as Title IX of the <strong>Organized</strong> <strong>Crime</strong> Control Act of 1970 (P.L. 91- 452).<br />
Congressional Research Service 34
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
described in terms of an “enterprise” and a “pattern of racketeering activity.” 180 <strong>The</strong> predicate<br />
offenses for racketeering include a host of state and federal crimes listed in 18 U.S.C. § 1961.<br />
Although RICO does not define organized crime, it provides a definition for an “enterprise.” It<br />
does not, however, describe those attributes of a criminal enterprise that distinguish it from a<br />
legal enterprise. <strong>In</strong> addition, this provision describes organized crime more in terms of the illegal<br />
activities committed by conspirators rather than in terms of the criminal organization. As such,<br />
these statutory provisions could encompass the activities of not only organized crime groups but<br />
of terrorist groups and corrupt businesses as well. Largely describing organized crime as a list of<br />
crimes may help in the effective prosecution of these groups, but it provides little aid in<br />
developing an understanding of the groups themselves. 181 Moreover, the statutory provisions offer<br />
limited guidance regarding criminal organizations and the nature of their operational structure.<br />
Issues<br />
Defining <strong>Organized</strong> <strong>Crime</strong> in Statute<br />
Currently, there is no statutory definition of organized crime. RICO 182 provisions describe<br />
organized crime in terms of an “enterprise” and a “pattern of racketeering activity.” 183 <strong>The</strong> U.S.<br />
Code does not, however, provide guidance and information surrounding the nature of criminal<br />
organizations and their operational structure. <strong>The</strong>re also appears to be a divergence between the<br />
RICO provisions and what federal law enforcement—namely the FBI—considers to be organized<br />
crime. For instance, patterns of racketeering activity specified under RICO indicate that criminal<br />
organizations may be engaged in a host of crimes including, but not limited to, an act or threat<br />
involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, dealing in a<br />
controlled substance, and other illegal activities. Although drug trafficking is included in RICO’s<br />
predicate offenses, law enforcement does not necessarily consider drug trafficking or DTOs to be<br />
within the purview of organized crime investigations. One reason for this may be that federal law<br />
enforcement tends to segment investigations more on the basis of the criminal violation than on<br />
the basis of the criminal actor. While legislating a federal definition of organized crime may not<br />
180 As defined in 18 U.S.C. § 1961, an “‘enterprise’ includes any individual, partnership, corporation, association, or<br />
other legal entity, and any union or group of individuals associated ... although not [necessarily] a legal entity,” and a<br />
“‘pattern of racketeering activity’ requires at least two acts of racketeering activity” to occur within 10 years of one<br />
another for a criminal organization to be prosecuted for racketeering. Racketeering is defined as any number of<br />
violations, including an act or threat involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, or<br />
dealing in a controlled substance. See 18 U.S.C. § 1961 for a comprehensive list of the predicate offenses for<br />
racketeering.<br />
181 Frank E. Hagan, ‘“<strong>Organized</strong> <strong>Crime</strong>’ and ‘organized crime’ <strong>In</strong>determinate Problems of Definition,” Trends in<br />
<strong>Organized</strong> <strong>Crime</strong>, vol. 9, no. 4 (Summer 2006), p. 127. See also James O. Finkenauer, “Problems of Definition: What<br />
Is <strong>Organized</strong> <strong>Crime</strong>?” Trends in <strong>Organized</strong> <strong>Crime</strong>, vol. 8, no. 3 (Spring 2005), pp. 63-83.<br />
182 18 U.S.C. § 1961-1968. It was enacted as Title IX of the <strong>Organized</strong> <strong>Crime</strong> Control Act of 1970 (P.L. 91- 452).<br />
183 As defined in 18 U.S.C. § 1961, an “‘enterprise’ includes any individual, partnership, corporation, association, or<br />
other legal entity, and any union or group of individuals associated ... although not [necessarily] a legal entity,” and a<br />
“‘pattern of racketeering activity’ requires at least two acts of racketeering activity” to occur within 10 years of one<br />
another for a criminal organization to be prosecuted for racketeering. Racketeering is defined as any number of<br />
violations, including an act or threat involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, or<br />
dealing in a controlled substance. See 18 U.S.C. § 1961 for a comprehensive list of the predicate offenses for<br />
racketeering.<br />
Congressional Research Service 35
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
necessarily solve this disconnect with law enforcement, it might lead to changes in the way law<br />
enforcement views and investigates organized crime.<br />
A second statutory issue that Congress may consider is that of organized crime in the U.S.<br />
Criminal Code. For instance, while there is a Chapter (113B) in Title 18 that deals specifically<br />
with terrorism and related crimes, there is no centralized section that speaks specifically to<br />
organized crime. 184 Yet organized crime has been described as a leading threat to U.S. security.<br />
Though the lack of centralization of organized crime-related statutes may not impact law<br />
enforcement’s abilities to investigate and prosecute organized crime, it is indicative of the<br />
approach by which the federal government views it. And, as mentioned, the harm caused by<br />
organized crime may not be clearly estimated without a common understanding of what defines<br />
organized crime. Building on this, accurately gauging the public and national security threat<br />
posed by organized crime may be complicated without a solid notion of the harm it routinely<br />
causes.<br />
Congressional Commission<br />
Beginning in the 1950s, congressional concern about organized crime has resulted not only in<br />
legislative efforts to combat it, but in commissions and in various series of hearings aimed at<br />
gathering information on the scope of organized crime. One of the first such efforts was the<br />
Senate Special Committee to <strong>In</strong>vestigate <strong>Organized</strong> <strong>Crime</strong> in <strong>In</strong>terstate Commerce in 1950 and<br />
1951 led by Senator Kefauver. Another example of such congressional attention is the series of<br />
Senate hearings on organized crime in 1958 and 1963 led by Senator McClellan. <strong>The</strong>re was also<br />
the 1967 Commission on <strong>Crime</strong> in the United States led by Attorney General Katzenbach. More<br />
recently, and particularly since the terrorist attacks of September 11, 2001, congressional attention<br />
has shifted away from traditional crime fighting—including organized crime—toward<br />
counterterrorism.<br />
Of the more recent hearings involving organized crime topics, focus has primarily been on threats<br />
posed by the DTOs in Mexico. While this is one of the most visible organized crime threats—not<br />
only are some of the actors exceedingly violent, but this violence is seen directly along the U.S.<br />
Southwest border—it is likely not the sole serious organized crime threat to the United States. As<br />
discussed, numerous other organized crime groups, though perhaps not as violent, commit crimes<br />
that impact the economic stability, public safety, and domestic security of the United States. As<br />
such, one option that Congress may ultimately consider is the convening of a congressional<br />
commission to evaluate the scope of organized crime. Such an evaluation might help<br />
policymakers determine whether they have provided law enforcement with the appropriate tools<br />
to combat today’s threats posed by organized crime. It may also result in a clarification of how<br />
the federal government defines organized crime and consequently how investigative efforts at the<br />
federal level are organized. <strong>The</strong> Administration has also proposed a legislative package related to<br />
the 2011 Strategy. 185 <strong>In</strong> light of this, Congress may consider exploring the issue of transnational<br />
organized crime more extensively.<br />
184 Some may consider 18 U.S.C. § 1951-1968 (Chapters 95 and 96, Racketeering and RICO, respectively) to be a<br />
primary portion of the Code addressing organized crime.<br />
185 U.S. Department of Justice, “Statement of Assistant Attorney General Lanny A. Breuer Before the Senate Judiciary<br />
Subcommittee on <strong>Crime</strong> and Terrorism,” press release, November 1, 2011, http://www.justice.gov/criminal/pr/<br />
testimony/2011/crm-testimony-111101.html.<br />
Congressional Research Service 36
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
<strong>In</strong>centives for <strong>In</strong>vestigating <strong>Organized</strong> <strong>Crime</strong><br />
While the effects of certain, high-profile crimes—such as terrorism—are readily seen, the<br />
aftermath of organized crime is not always as striking, nor does it produce the same negative<br />
visceral reactions. Some argue that this may be one reason for the shift in law enforcement<br />
attention and resources more toward counterterrorism-related activities and further away from<br />
traditional crime fighting activities since the terrorist attacks of September 11, 2001. However,<br />
although the effects of organized crime may not be seen in a consolidated attack resulting in the<br />
physical loss of life, the effects are far-reaching. As mentioned, organized crime impacts<br />
economic stability, public health and safety, and national security. Consequently, some experts<br />
argue that there should be some form of incentive (as well as disincentive) to entice law<br />
enforcement to target more monetary and manpower resources toward investigating organized<br />
crime. 186<br />
One such form of incentive that Congress may consider is federal grants to state and local law<br />
enforcement for training and technical assistance to investigate and prosecute organized crime.<br />
<strong>The</strong>re are several grant programs—such as the Community Oriented Policing Services (COPS)<br />
grant program 187 and the Edward Byrne Memorial Justice Assistance Grant (JAG) program 188 —<br />
through which state and local law enforcement assistance is available for a variety of purpose<br />
areas. However, these purposes do not directly specify as a purpose area the use of funds for<br />
combating organized crime. <strong>The</strong>refore, policymakers may consider a specific grant program<br />
providing not only funding, but technical training and assistance.<br />
Other suggestions that experts have put forward involve the use of negative peer reviews to<br />
incentivize law enforcement around the world to focus resources toward combating organized<br />
crime. 189 As discussed, various state and federal law enforcement agencies investigate organized<br />
crime in the United States. As such, one option Congress may consider could be to direct the<br />
formation of a domestic peer review system 190 for law enforcement agencies charged with<br />
investigating organized crime. Participation in some form of peer review system could be tied to<br />
law enforcement assistance and grant funding eligibility.<br />
186 <strong>In</strong>ternational Peace <strong>In</strong>stitute, Transnational <strong>Organized</strong> <strong>Crime</strong>: Task Forces on Multilateral Security Capacity, IPI<br />
Blue Papers No. 2, 2009, http://www.ipinst.org/media/pdf/publications/toc_final.pdf. (Hereafter, IPI, Transnational<br />
<strong>Organized</strong> <strong>Crime</strong>.)<br />
187 For more information on COPS, see CRS Report RL33308, Community Oriented Policing Services (COPS):<br />
Background and Funding, by Nathan James as well as CRS Report R40709, Community Oriented Policing Services<br />
(COPS): Current Legislative Issues, by Nathan James.<br />
188 For more information on JAG, see CRS Report RS22416, Edward Byrne Memorial Justice Assistance Grant (JAG)<br />
Program, by Nathan James.<br />
189 IPI, Transnational <strong>Organized</strong> <strong>Crime</strong>.<br />
190 Peer review systems are used in a variety of academic, professional, and government settings to evaluate an<br />
individual or organization’s work or policies. <strong>The</strong> work or policies are open to examination by other experts and<br />
equivalent entities. For instance, the Office of Management and Budget (OMB) has promulgated guidelines for federal<br />
regulatory agencies to follow peer review requirements prior to disseminating influential scientific and statistical<br />
information. See Office of Management and Budget, “Guidelines for Ensuring and Maximizing the Quality,<br />
Objectivity, Utility, and <strong>In</strong>tegrity of <strong>In</strong>formation Disseminated by Federal Agencies; Republication,” Vol. 67, No. 36,<br />
Federal Register, February 22, 2002.<br />
Congressional Research Service 37
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Implementing the National Strategy to Combat TOC<br />
Congress may wish to consider oversight of the national strategy’s implementation by federal law<br />
enforcement agencies. <strong>In</strong> part, the strategy involves many law enforcement agencies, their<br />
investigative resources, and their intelligence collection efforts. A critical issue may be the<br />
coordination of these activities.<br />
Coordination of Domestic Efforts<br />
As mentioned, the federal investigation of organized crime matters has not historically been a<br />
centralized effort, and even with the 2011 Strategy, there is no single lead agency charged with<br />
investigating organized crime. 191 Specific agencies have had jurisdiction over an organized crime<br />
case based on the criminal violations involved. For instance, organized crime cases built around<br />
drug trafficking offenses have generally been investigated by the DEA, whereas those cases built<br />
around human trafficking cases are typically investigated by ICE. However, many organized<br />
crime cases may involve offenses that fall under the jurisdiction of multiple investigative<br />
agencies. For example, organized crime groups involved in crimes ranging from counterfeiting<br />
and financial institution fraud to identity crimes, computer crimes, and money laundering may be<br />
investigated by the U.S. Secret Service (USSS), FBI, ICE, and any number of other federal, state,<br />
and local law enforcement agencies. As a result of structuring organized crime investigations<br />
around the alleged crimes, it is not always clear which agency will take the lead on a particular<br />
case. This can lead to inter-agency conflicts, and if case information is not effectively<br />
communicated between agencies, each agency involved may not have a comprehensive view of<br />
the case. <strong>The</strong>re are, however, several law enforcement fusion centers, such as the <strong>Organized</strong><br />
<strong>Crime</strong> Drug Enforcement Task Force (OCDETF) Fusion Center (OFC), the <strong>In</strong>ternational<br />
<strong>Organized</strong> <strong>Crime</strong> <strong>In</strong>telligence and Operations Center (IOC-2), and the El Paso <strong>In</strong>telligence Center<br />
(EPIC), that are charged with consolidating and disseminating intelligence on various organized<br />
crime matters. Additionally, different agencies across federal, state, and local levels participate in<br />
these centers.<br />
For instance, the OFC assimilates information for the OCDETF Program, which targets major<br />
drug trafficking and money laundering organizations. Federal agencies that participate in the<br />
OCDETF Program include the DEA; FBI; ICE; Bureau of Alcohol, Tobacco, Firearms, and<br />
Explosives (ATF); U.S. Marshals; <strong>In</strong>ternal Revenue Service (IRS); U.S. Coast Guard (USCG); 94<br />
U.S. Attorneys Offices; and DOJ’s Criminal and Tax Divisions. <strong>The</strong>se federal agencies also<br />
collaborate with state and local law enforcement.<br />
<strong>In</strong> May 2009, DOJ announced the creation of the IOC-2—housed at the OFC—which brings<br />
together the FBI; ICE; DEA; IRS; ATF; U.S. Secret Service; U.S. Postal <strong>In</strong>spection Service<br />
(USPIS); U.S. Department of State, Bureau of Diplomatic Security; U.S. Department of Labor,<br />
Office of the <strong>In</strong>spector General; and DOJ’s Criminal Division in partnership with the 94 U.S.<br />
Attorneys’ Offices and the U.S. Department of the Treasury, Office of Terrorism and Financial<br />
<strong>In</strong>telligence. Unlike the OFC, the IOC-2 has yet to be funded. 192 It is charged with analyzing and<br />
191 For a discussion of federal law enforcement efforts to combat organized crime, see CRS Report R40525, <strong>Organized</strong><br />
<strong>Crime</strong> in the United States: Trends and Issues for Congress, by Kristin M. Finklea.<br />
192 <strong>In</strong> the FY2011 Budget Request, the Administration requests an additional $15.0 million for the Department of<br />
Justice to combat organized crime. $7.6 million of this is requested for funding DOJ staffing of the IOC-2. <strong>The</strong>re were<br />
no specific funds requested for the other agencies contributing to the IOC-2.<br />
Congressional Research Service 38
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
resolving conflicts in information on a host of organized crime cases, not solely those that center<br />
on drug trafficking.<br />
EPIC was originally established as an intelligence center to collect and disseminate information<br />
relating to drug, alien, and weapon smuggling in support of field enforcement entities throughout<br />
the Southwest border region. Following 9/11, counterterrorism also became part of its mission.<br />
Though these crimes are not exclusively committed by organized crime groups, they may be, and<br />
thus EPIC is involved in combating organized crime. EPIC is jointly operated by the DEA and<br />
U.S. Customs and Border Protection (CBP), and other participating agencies include ICE, USCG,<br />
U.S. Secret Service, Department of Defense (DOD), Department of the <strong>In</strong>terior, FBI, ATF, U.S.<br />
Marshals Service, Federal Aviation Administration, National Drug <strong>In</strong>telligence Center (NDIC),<br />
IRS, National Geospatial-<strong>In</strong>telligence Agency, Joint Task Force-North, Joint <strong>In</strong>teragency Task<br />
Force-South, Texas Department of Public Safety, Texas Air National Guard, and El Paso County<br />
Sheriff’s Office.<br />
<strong>In</strong> evaluating the most effective means to share organized crime intelligence, Congress may<br />
consider several options. One option may include increasing support for intelligence fusion<br />
centers such as the OFC, IOC-2, and EPIC. Another option could involve the creation of an<br />
interagency organization similar to the National Counterterrorism Center (NCTC), but centered<br />
around organized crime. Such an organization would be responsible for “analyzing the [organized<br />
crime] threat, sharing that information with … partners, and integrating all instruments of<br />
national power to ensure unity of effort” 193 against organized crime. On the prosecution end, DOJ<br />
has already announced a proposed consolidation of the <strong>Organized</strong> <strong>Crime</strong> and Racketeering<br />
Section (OCRS), the Criminal Division’s gang unit, and the National Gang Targeting,<br />
Enforcement, and Coordination Center (GangTECC) into a single <strong>Organized</strong> <strong>Crime</strong> and Gang<br />
Section. 194 This harmonizes the prosecution of organized crime and gang cases, which DOJ has<br />
cited as being similar.<br />
One non-legislative option that Congress may consider regarding the coordination of federal law<br />
enforcement efforts to combat organized crime is enforcing its oversight over existing fusion<br />
centers. <strong>In</strong> June 2010, the DOJ Office of the <strong>In</strong>spector General (OIG) issued a review of EPIC. 195<br />
<strong>The</strong> OIG found that EPIC’s users value its products, but that EPIC could benefit from<br />
improvement in fully developing the National Seizure System and coordinating the High <strong>In</strong>tensity<br />
Drug Trafficking Area (HIDTA) program, consistently coordinating with intelligence<br />
organizations across the country, maintaining and analyzing current information from all<br />
available sources, and creating objective performance measures by which to evaluate its<br />
programs, among other things. Similarly, in November 2009 the OIG reviewed DOJ’s anti-gang<br />
intelligence and coordination centers. 196 As a result of the review, the OIG determined that the<br />
National Gang <strong>In</strong>telligence Center had not created a gang information database, as had been<br />
directed by Congress.<br />
193 NCTC mission statement, available at http://www.nctc.gov/about_us/about_nctc.html.<br />
194 Ryan J. Reilly, “Gang Unit, <strong>Organized</strong> <strong>Crime</strong> Section to Merge,” Main Justice, July 12, 2010.<br />
195 Department of Justice, Office of the <strong>In</strong>spector General, Review of the Drug Enforcement Administration’s El Paso<br />
<strong>In</strong>telligence Center, I-2010-005, June 2010, pp. ii - iii, http://www.justice.gov/oig/reports/DEA/a1005.pdf.<br />
196 Department of Justice, Office of the <strong>In</strong>spector General, A Review of the Department’s Anti-Gang <strong>In</strong>telligence and<br />
Coordination Centers, I-2010-001, November 2009, http://www.justice.gov/oig/reports/FBI/i2010001.pdf.<br />
Congressional Research Service 39
<strong>Organized</strong> <strong>Crime</strong>: An Evolving Challenge for U.S. Law Enforcement<br />
Author Contact <strong>In</strong>formation<br />
Jerome P. Bjelopera<br />
Specialist in <strong>Organized</strong> <strong>Crime</strong> and Terrorism<br />
jbjelopera@crs.loc.gov, 7-0622<br />
Kristin M. Finklea<br />
Specialist in Domestic Security<br />
kfinklea@crs.loc.gov, 7-6259<br />
Congressional Research Service 40
Page 344 of 372
Attachment C<br />
Transnational <strong>Organized</strong> <strong>Crime</strong> – <strong>The</strong> Globalized<br />
Illegal Economy<br />
Page 345 of 372
FACTS<br />
Transnational <strong>Organized</strong> <strong>Crime</strong> –<br />
<strong>The</strong> Globalized Illegal Economy<br />
<strong>The</strong> fictionalized images of organized crime are far from the<br />
truth. <strong>The</strong> reality is less Hollywood and far more about fluid<br />
organized criminal networks profiting from the sale of illegal<br />
goods wherever there is a demand. <strong>The</strong>se international illegal<br />
markets are anonymous and more complex than ever and each<br />
year generate billions of dollars.<br />
Every year, countless lives are lost as a result of organized<br />
crime. Drug-related health problems and violence, firearm<br />
deaths and the unscrupulous methods and motives of human<br />
traffickers and migrant smugglers are all part of this. Each year<br />
millions of victims are affected as a result of the activities of<br />
organized crime groups.<br />
Transnational organized crime is big business. <strong>In</strong> 2009 it was<br />
estimated to generate $870 billion — an amount equal to<br />
1.5 per cent of global GDP. 1 That is more than six times the<br />
amount of official development assistance for that year, and<br />
the equivalent of close to 7 per cent of the world’s exports of<br />
merchandise.<br />
Hidden cost to society<br />
Transnational organized crime encompasses virtually all serious<br />
profit-motivated criminal actions of an international nature<br />
where more than one country is involved. <strong>The</strong>re are many<br />
activities that can be characterized as transnational organized<br />
crime, including drug trafficking, smuggling of migrants,<br />
human trafficking, money-laundering, trafficking in firearms,<br />
counterfeit goods, wildlife and cultural property, and even<br />
some aspects of cybercrime. It threatens peace and human<br />
security, leads to human rights being violated and undermines<br />
the economic, social, cultural, political and civil development<br />
of societies around the world. <strong>The</strong> vast sums of money involved<br />
can compromise legitimate economies and have a direct impact<br />
on governance, such as through corruption and the “buying”<br />
of elections.<br />
Different forms of transnational organized crime<br />
Transnational organized crime is not stagnant, but is an everchanging<br />
industry, adapting to markets and creating new<br />
forms of crime. <strong>In</strong> short, it is an illicit business that transcends<br />
cultural, social, linguistic and geographical boundaries and one<br />
that knows no borders or rules.<br />
Drug trafficking continues to be the most lucrative form of<br />
business for criminals, with an estimated annual value of $320<br />
billion. 2 <strong>In</strong> 2009, UNODC placed the approximate annual worth<br />
of the global cocaine and opiate markets alone at $85 billion<br />
and $68 billion, respectively. 3<br />
Human trafficking is a global crime in which men, women<br />
and children are used as products for sexual or labour-based<br />
exploitation. While figures vary, an estimate from the <strong>In</strong>ternational<br />
Labour Organization (ILO) in 2005 indicated the<br />
number of victims of trafficking at any given time to be<br />
around 2.4 million, with annual profits of about $32 billion.<br />
4 Recent research on overall forced labour trends however<br />
would suggest that the scope of the problem is much bigger. 5<br />
<strong>In</strong> Europe, the trafficking of mostly women and children for<br />
Transnational organized crime:<br />
Let’s put them<br />
out of business<br />
www.unodc.org/toc
FACTS<br />
sexual exploitation alone brings in $3 billion annually and<br />
involves 140,000 victims at any one time, with an annual flow<br />
of 70,000 victims. 6<br />
Smuggling of migrants is a well-organized business moving<br />
people around the globe through criminal networks, groups<br />
and routes. Migrants can be offered a “smuggling package”<br />
by organized crime groups, and the treatment they get along<br />
the route corresponds to the price they pay to their smugglers.<br />
<strong>In</strong> the process of being smuggled, their rights are often<br />
breached and they can be robbed, raped, beaten, held for<br />
ransom or even left to die in some cases, when the risks get<br />
too high for their smugglers. Many smugglers do not care<br />
if migrants drown in the sea, die of dehydration in a desert<br />
or suffocate in a container. Every year this trade is valued at<br />
billions of dollars. <strong>In</strong> 2009 some $6.6 billion was generated<br />
through the illegal smuggling of 3 million migrants from<br />
Latin America to North America, 7 while the previous year<br />
55,000 migrants were smuggled from Africa into Europe for a<br />
sum of $150 million. 8<br />
Illicit trading in firearms brings in around $170 million to<br />
$320 million annually 9 and puts handguns and assault rifles<br />
in the hands of criminals and gangs. It is difficult to count the<br />
victims of these illicit weapons, but in some regions (such as<br />
the Americas) there is a strong correlation between homicide<br />
rates and the percentage of homicides by firearms. 10<br />
Trafficking in natural resources includes the smuggling of raw<br />
materials such as diamonds and rare metals (often from conflict<br />
zones). <strong>The</strong> trafficking of timber in South-East Asia generates<br />
annual revenues of $3.5 billion. 11 <strong>In</strong> addition to funding criminal<br />
groups, this strand of criminal activity ultimately contributes<br />
to deforestation, climate change and rural poverty.<br />
<strong>The</strong> illegal trade in wildlife is another lucrative business for<br />
organized criminal groups, with poachers targeting skins<br />
and body parts for export to foreign markets. Trafficking in<br />
elephant ivory, rhino horn and tiger parts from Africa and<br />
South-East Asia to Asia produces $75 million in criminal<br />
profits each year and threatens the existence of some species.<br />
12 <strong>Organized</strong> crime groups also deal in live and rare plants<br />
and animals threatening their very existence to meet demand<br />
from collectors or unwitting consumers. According to the<br />
WWF, traffickers illegally move over 100 million tons of fish,<br />
1.5 million live birds and 440,000 tons of medicinal plants<br />
per year. 13<br />
<strong>The</strong> sale of fraudulent medicines is a worrying business, as it<br />
represents a potentially deadly trade for consumers. Piggybacking<br />
on the rising legitimate trade in pharmaceuticals from Asia<br />
to other developing regions, criminals traffic fraudulent medicines<br />
from Asia, in particular to South-East Asia and Africa to<br />
the value of $1.6 billion. 14 <strong>In</strong>stead of curing people, however,<br />
they can result in death or cause resistance to drugs used to<br />
treat deadly infectious diseases like malaria and tuberculosis. <strong>In</strong><br />
addition to traditional trafficking methods, criminals continue<br />
to build a lucrative online trade in fraudulent medicines targeting<br />
developed and developing countries alike, which can also<br />
lead to health implications for consumers.<br />
Cybercrime encompasses several areas, but one of the most<br />
profitable for criminals is identity theft, which generates around<br />
$1 billion each year. 15 Criminals are increasingly exploiting the<br />
<strong>In</strong>ternet to steal private data, access bank accounts and fraudulently<br />
attain payment card details.<br />
Global threats, local effects<br />
While transnational organized crime is a global threat, its effects<br />
are felt locally. When organized crime takes root it can<br />
destabilize countries and entire regions, thereby undermining<br />
development assistance in those areas. <strong>Organized</strong> crime groups<br />
can also work with local criminals, leading to an increase in<br />
corruption, extortion, racketeering and violence, as well as a<br />
range of other more sophisticated crimes at the local level. Violent<br />
gangs can also turn inner cities into dangerous areas and<br />
put citizens’ lives at risk.<br />
<strong>Organized</strong> crime affects people in the developing and the developed<br />
worlds. Money is laundered through banking systems.<br />
People become victims of identity theft, with 1.5 million people<br />
each year being caught out. 16 <strong>In</strong> many developed countries,<br />
criminal groups traffic women for sexual exploitation and children<br />
for purposes of forced begging, burglary and pickpocketing.<br />
Car theft is also an organized business, with vehicles stolen<br />
to order and taken abroad. Fraudulent medicines and food<br />
products enter the licit market and not only defraud the public<br />
but can put their lives and health at risk. Added to this is the<br />
trade in counterfeit products, which deprives countries of tax<br />
revenues. This can also have an impact on legitimate companies<br />
when illegally produced goods displace sales of original products,<br />
which in turn hurts employer revenues.<br />
<strong>Organized</strong> crime adds to an increase in public spending for<br />
security and policing and undermines the very human rights<br />
standards that many countries strive to preserve, particularly<br />
when activities such as human trafficking in human beings,<br />
kidnapping and extortion are taken into consideration. It can<br />
also fuel local crime, which in turn drives up costs such as<br />
insurance premiums and adds to the general level of criminality<br />
and insecurity in society.<br />
Transnational organized crime:<br />
Let’s put them<br />
out of business<br />
www.unodc.org/toc
FACTS<br />
Too hot to handle. How is money laundered?<br />
<strong>The</strong> profits of most crimes are generated as cash, which is risky<br />
for criminals. Difficult to hide, cash increases the probability<br />
of exposure, theft by rival criminals and seizure by the police.<br />
When cash enters the legitimate economy, it is particularly vulnerable<br />
to identification and law enforcement intervention. As<br />
a result, criminals move to prevent cash from attracting suspicion.<br />
For example, they may move it abroad, or they might use<br />
it to buy other assets or try to introduce it into the legitimate<br />
economy through businesses that have a high cash turnover. As<br />
an integral part of transnational organized crime, it is estimated<br />
that some 70 per cent of illicit profits are likely to have been<br />
laundered through the financial system. Yet less than 1 per cent<br />
of those laundered proceeds are intercepted and confiscated. 17<br />
Putting them out of business. What can we do about<br />
organized crime?<br />
Combating a global phenomenon such as transnational organized<br />
crime requires partnerships at all levels. Governments, businesses,<br />
civil society, international organizations and people in<br />
all corners of the world have a part to play. Some aspects that<br />
are critical in fighting organized crime include:<br />
• Coordination: integrated action at the international level<br />
is crucial in identifying, investigating and prosecuting the<br />
people and groups behind these crimes.<br />
• Education and awareness-raising: ordinary citizens should<br />
learn more about organized crime and how it affects<br />
everyday lives. Express your concerns to policy and decision<br />
makers so that this truly global threat is considered by<br />
politicians to be a top priority among the public’s major<br />
concerns. Consumers also have a key role to play: know<br />
what you are purchasing, do so ethically and make sure that<br />
you do not fuel organized crime.<br />
• <strong>In</strong>telligence and technology: criminal justice systems and<br />
conventional law enforcement methods are often no match<br />
for powerful criminal networks. Better intelligence methods<br />
need to be developed through the training of more specialized<br />
law enforcement units, which should be equipped with<br />
state-of-the-art technology.<br />
• Assistance: developing countries need assistance in building<br />
their capacity to counter these threats. An important<br />
tool that can help with this is the United Nations Convention<br />
against Transnational <strong>Organized</strong> <strong>Crime</strong>, which has<br />
been ratified by 170 parties 18 and provides a universal legal<br />
framework to help identify, deter and dismantle organized<br />
criminal groups. <strong>In</strong> October 2012 the sixth session of the<br />
Conference of the Parties to the United Nations Convention<br />
against Transnational <strong>Organized</strong> <strong>Crime</strong> will be held in<br />
Vienna. That biennial series of meetings brings together<br />
Governments from across the world to promote and review<br />
the execution of the Convention in order to ensure better<br />
implementation in tackling this international issue. At<br />
a practical level, UNODC helps strengthen the capacity of<br />
States to track and prevent money-laundering with training<br />
and technical assistance for following the money trail. <strong>The</strong>se<br />
measures can help cut off the profits of crime.<br />
Disclaimer<br />
This fact sheet has not been formally edited. <strong>The</strong> content of this fact sheet does not necessarily reflect the views or policies of UNODC or contributory<br />
organizations and neither does it imply any endorsement. <strong>The</strong> designations employed and the presentation of material in this fact sheet does not imply the<br />
expression of any opinion whatsoever on the part of UNODC concerning the legal status of any country, territory or city or its authorities, or concerning the<br />
delimitation of its frontiers and boundaries.<br />
Transnational organized crime:<br />
Let’s put them<br />
out of business<br />
www.unodc.org/toc
FACTS<br />
1<br />
United Nations Office on Drugs and <strong>Crime</strong>, Estimating Illicit Financial<br />
Flows Resulting from Drug Trafficking and Other Transnational<br />
<strong>Organized</strong> <strong>Crime</strong>s: Research Report (Vienna, October 2011). Available<br />
from www.unodc.org/documents/data-and-analysis/Studies/Illicit_<br />
financial_flows_2011_web.pdf.<br />
2<br />
Based on 2005 figures (World Drug Report 2011 (United Nations<br />
publication, Sales No. E.11.XI.10)). Available from www.unodc.org/wdr.<br />
3<br />
World Drug Report 2011.<br />
4<br />
Based on 2005 estimates from the <strong>In</strong>ternational Labour Organization<br />
(ILO). More recent and precise estimates by ILO on overall forced<br />
labour trends however would lead us to think that the scope of<br />
the problem is much bigger. (<strong>In</strong>ternational Labour Office, A Global<br />
Alliance against Forced Labour: Global Report under the Followup<br />
to the ILO Declaration on Fundamental Principles and Rights<br />
at Work (Geneva, ILO, 2005)). Available from www.ilo.org/wcmsp5/<br />
groups/public/@ed_norm/@declaration/documents/publication/<br />
wcms_081882.pdf.<br />
5<br />
<strong>In</strong>ternational Labour Organization, Global Estimate of Forced Labour<br />
2012: Results and Methodology (Geneva, ILO, 2012). Available<br />
from http://www.ilo.org/sapfl/<strong>In</strong>formationresources/ILOPublications/<br />
WCMS_182004/lang--en/index.htm<br />
6<br />
United Nations Office on Drugs and <strong>Crime</strong>, “Trafficking in persons to<br />
Europe for sexual exploitation”, June 2010. Available from www.unodc.<br />
org/documents/publications/TiP_Europe_EN_LORES.pdf.<br />
7<br />
<strong>The</strong> Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat<br />
Assessment (United Nations publication, Sales No. E.10.IV.6.2010).<br />
Available from www.unodc.org/documents/data-and-analysis/tocta/<br />
TOCTA_Report_2010_low_res.pdf.<br />
8<br />
Ibid.<br />
9<br />
UNODC.<br />
10<br />
United Nations Office on Drugs and <strong>Crime</strong>, 2011 Global Study on<br />
Homicide: Trends, Contexts, Data (2011). Available from www.unodc.<br />
org/documents/data-and-analysis/statistics/Homicide/Globa_study_<br />
on_homicide_2011_web.pdf.<br />
11<br />
<strong>The</strong> Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat<br />
Assessment.<br />
12<br />
Ibid.<br />
13<br />
See http://wwf.panda.org/about_our_earth/species/problems/illegal_<br />
trade/<br />
14<br />
Globalization of <strong>Crime</strong>: A Transnational <strong>Organized</strong> <strong>Crime</strong> Threat<br />
Assessment.<br />
15<br />
Ibid.<br />
16<br />
Ibid.<br />
17<br />
United Nations Office on Drugs and <strong>Crime</strong>, Estimating Illicit Financial<br />
Flows Resulting from Drug Trafficking.<br />
18<br />
See http://treaties.un.org/Pages/ViewDetails.spx?src=TREATY&mtdsg_<br />
no=XVIII-12&chapter=18&lang=en.<br />
Transnational organized crime:<br />
Let’s put them<br />
out of business<br />
www.unodc.org/toc
Page 346 of 372
Advocacy Foundation Publishers<br />
Page 347 of 372
Advocacy Foundation Publishers<br />
<strong>The</strong> e-Advocate Quarterly<br />
Page 348 of 372
Issue Title Quarterly<br />
Vol. I 2015 <strong>The</strong> Fundamentals<br />
I<br />
<strong>The</strong> ComeUnity ReEngineering<br />
Project <strong>In</strong>itiative<br />
Q-1 2015<br />
II <strong>The</strong> Adolescent Law Group Q-2 2015<br />
III<br />
Landmark Cases in US<br />
Juvenile Justice (PA)<br />
Q-3 2015<br />
IV <strong>The</strong> First Amendment Project Q-4 2015<br />
Vol. II 2016 Strategic Development<br />
V <strong>The</strong> Fourth Amendment Project Q-1 2016<br />
VI<br />
Landmark Cases in US<br />
Juvenile Justice (NJ)<br />
Q-2 2016<br />
VII Youth Court Q-3 2016<br />
VIII<br />
<strong>The</strong> Economic Consequences of Legal<br />
Decision-Making<br />
Q-4 2016<br />
Vol. III 2017 Sustainability<br />
IX <strong>The</strong> Sixth Amendment Project Q-1 2017<br />
X<br />
<strong>The</strong> <strong>The</strong>ological Foundations of<br />
US Law & Government<br />
Q-2 2017<br />
XI <strong>The</strong> Eighth Amendment Project Q-3 2017<br />
XII<br />
<strong>The</strong> EB-5 <strong>In</strong>vestor<br />
Immigration Project*<br />
Q-4 2017<br />
Vol. IV 2018 Collaboration<br />
XIII Strategic Planning Q-1 2018<br />
XIV<br />
<strong>The</strong> Juvenile Justice<br />
Legislative Reform <strong>In</strong>itiative<br />
Q-2 2018<br />
XV <strong>The</strong> Advocacy Foundation Coalition Q-3 2018<br />
Page 349 of 372
XVI<br />
for Drug-Free Communities<br />
Landmark Cases in US<br />
Juvenile Justice (GA)<br />
Q-4 2018<br />
Page 350 of 372
Issue Title Quarterly<br />
Vol. V 2019 Organizational Development<br />
XVII <strong>The</strong> Board of Directors Q-1 2019<br />
XVIII <strong>The</strong> <strong>In</strong>ner Circle Q-2 2019<br />
XIX Staff & Management Q-3 2019<br />
XX Succession Planning Q-4 2019<br />
XXI <strong>The</strong> Budget* Bonus #1<br />
XXII Data-Driven Resource Allocation* Bonus #2<br />
Vol. VI 2020 Missions<br />
XXIII Critical Thinking Q-1 2020<br />
XXIV<br />
<strong>The</strong> Advocacy Foundation<br />
Endowments <strong>In</strong>itiative Project<br />
Q-2 2020<br />
XXV <strong>In</strong>ternational Labor Relations Q-3 2020<br />
XXVI Immigration Q-4 2020<br />
Vol. VII 2021 Community Engagement<br />
XXVII<br />
<strong>The</strong> 21 st Century Charter Schools<br />
<strong>In</strong>itiative<br />
Q-1 2021<br />
XXVIII <strong>The</strong> All-Sports Ministry @ ... Q-2 2021<br />
XXIX Lobbying for Nonprofits Q-3 2021<br />
XXX<br />
XXXI<br />
Advocacy Foundation Missions -<br />
Domestic<br />
Advocacy Foundation Missions -<br />
<strong>In</strong>ternational<br />
Q-4 2021<br />
Bonus<br />
Page 351 of 372
Vol. VIII<br />
2022 ComeUnity ReEngineering<br />
XXXII<br />
<strong>The</strong> Creative & Fine Arts Ministry<br />
@ <strong>The</strong> Foundation<br />
Q-1 2022<br />
XXXIII <strong>The</strong> Advisory Council & Committees Q-2 2022<br />
XXXIV<br />
<strong>The</strong> <strong>The</strong>ological Origins<br />
of Contemporary Judicial Process<br />
Q-3 2022<br />
XXXV <strong>The</strong> Second Chance Ministry @ ... Q-4 2022<br />
Vol. IX 2023 Legal Reformation<br />
XXXVI <strong>The</strong> Fifth Amendment Project Q-1 2023<br />
XXXVII <strong>The</strong> Judicial Re-Engineering <strong>In</strong>itiative Q-2 2023<br />
XXXVIII<br />
<strong>The</strong> <strong>In</strong>ner-Cities Strategic<br />
Revitalization <strong>In</strong>itiative<br />
Q-3 2023<br />
XXXVIX Habeas Corpus Q-4 2023<br />
Vol. X 2024 ComeUnity Development<br />
XXXVX<br />
<strong>The</strong> <strong>In</strong>ner-City Strategic<br />
Revitalization Plan<br />
Q-1 2024<br />
XXXVXI <strong>The</strong> Mentoring <strong>In</strong>itiative Q-2 2024<br />
XXXVXII <strong>The</strong> Violence Prevention Framework Q-3 2024<br />
XXXVXIII <strong>The</strong> Fatherhood <strong>In</strong>itiative Q-4 2024<br />
Vol. XI 2025 Public <strong>In</strong>terest<br />
XXXVXIV Public <strong>In</strong>terest Law Q-1 2025<br />
L (50) Spiritual Resource Development Q-2 2025<br />
Page 352 of 372
LI<br />
Nonprofit Confidentiality<br />
<strong>In</strong> <strong>The</strong> Age of Big Data<br />
Q-3 2025<br />
LII <strong>In</strong>terpreting <strong>The</strong> Facts Q-4 2025<br />
Vol. XII 2026 Poverty <strong>In</strong> America<br />
LIII<br />
American Poverty<br />
<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
Q-1 2026<br />
LIV Outcome-Based Thinking Q-2 2026<br />
LV Transformational Social Leadership Q-3 2026<br />
LVI <strong>The</strong> Cycle of Poverty Q-4 2026<br />
Vol. XIII 2027 Raising Awareness<br />
LVII ReEngineering Juvenile Justice Q-1 2027<br />
LVIII Corporations Q-2 2027<br />
LVIX <strong>The</strong> Prison <strong>In</strong>dustrial Complex Q-3 2027<br />
LX Restoration of Rights Q-4 2027<br />
Vol. XIV 2028 Culturally Relevant Programming<br />
LXI Community Culture Q-1 2028<br />
LXII Corporate Culture Q-2 2028<br />
LXIII Strategic Cultural Planning Q-3 2028<br />
LXIV<br />
<strong>The</strong> Cross-Sector/ Coordinated<br />
Service Approach to Delinquency<br />
Prevention<br />
Q-4 2028<br />
Page 353 of 372
Vol. XV 2029 <strong>In</strong>ner-Cities Revitalization<br />
LXIV<br />
LXV<br />
LXVI<br />
Part I – Strategic Housing<br />
Revitalization<br />
(<strong>The</strong> Twenty Percent Profit Margin)<br />
Part II – Jobs Training, Educational<br />
Redevelopment<br />
and Economic Empowerment<br />
Part III - Financial Literacy<br />
and Sustainability<br />
Q-1 2029<br />
Q-2 2029<br />
Q-3 2029<br />
LXVII Part IV – Solutions for Homelessness Q-4 2029<br />
LXVIII<br />
<strong>The</strong> Strategic Home Mortgage<br />
<strong>In</strong>itiative<br />
Bonus<br />
Vol. XVI 2030 Sustainability<br />
LXVIII Social Program Sustainability Q-1 2030<br />
LXIX<br />
<strong>The</strong> Advocacy Foundation<br />
Endowments <strong>In</strong>itiative<br />
Q-2 2030<br />
LXX Capital Gains Q-3 2030<br />
LXXI Sustainability <strong>In</strong>vestments Q-4 2030<br />
Vol. XVII 2031 <strong>The</strong> Justice Series<br />
LXXII Distributive Justice Q-1 2031<br />
LXXIII Retributive Justice Q-2 2031<br />
LXXIV Procedural Justice Q-3 2031<br />
LXXV (75) Restorative Justice Q-4 2031<br />
LXXVI Unjust Legal Reasoning Bonus<br />
Page 354 of 372
Vol. XVIII 2032 Public Policy<br />
LXXVII Public <strong>In</strong>terest Law Q-1 2032<br />
LXXVIII Reforming Public Policy Q-2 2032<br />
LXXVIX ... Q-3 2032<br />
LXXVX ... Q-4 2032<br />
Page 355 of 372
<strong>The</strong> e-Advocate Monthly Review<br />
2018<br />
Transformational Problem Solving January 2018<br />
<strong>The</strong> Advocacy Foundation February 2018<br />
Opioid <strong>In</strong>itiative<br />
Native-American Youth March 2018<br />
<strong>In</strong> the Juvenile Justice System<br />
Barriers to Reducing Confinement April 2018<br />
Latino and Hispanic Youth May 2018<br />
<strong>In</strong> the Juvenile Justice System<br />
Social Entrepreneurship June 2018<br />
<strong>The</strong> Economic Consequences of<br />
Homelessness in America S.Ed – June 2018<br />
African-American Youth July 2018<br />
<strong>In</strong> the Juvenile Justice System<br />
Gang Deconstruction August 2018<br />
Social Impact <strong>In</strong>vesting September 2018<br />
Opportunity Youth: October 2018<br />
Disenfranchised Young People<br />
<strong>The</strong> Economic Impact of Social November 2018<br />
of Social Programs Development<br />
Gun Control December 2018<br />
2019<br />
<strong>The</strong> U.S. Stock Market January 2019<br />
Prison-Based Gerrymandering February 2019<br />
Literacy-Based Prison Construction March 2019<br />
Children of <strong>In</strong>carcerated Parents April 2019<br />
Page 356 of 372
African-American Youth in <strong>The</strong> May 2019<br />
Juvenile Justice System<br />
Racial Profiling June 2019<br />
Mass Collaboration July 2019<br />
Concentrated Poverty August 2019<br />
De-<strong>In</strong>dustrialization September 2019<br />
Overcoming Dyslexia October 2019<br />
Overcoming Attention Deficit November 2019<br />
<strong>The</strong> Gift of Adversity December 2019<br />
2020<br />
<strong>The</strong> Gift of Hypersensitivity January 2020<br />
<strong>The</strong> Gift of <strong>In</strong>trospection February 2020<br />
<strong>The</strong> Gift of <strong>In</strong>troversion March 2020<br />
<strong>The</strong> Gift of Spirituality April 2020<br />
<strong>The</strong> Gift of Transformation May 2020<br />
Property Acquisition for<br />
Organizational Sustainability June 2020<br />
<strong>In</strong>vesting for Organizational<br />
Sustainability July 2020<br />
Biblical Law & Justice TLFA August 2020<br />
Gentrification AF September 2020<br />
Environmental Racism NpA October 2020<br />
Law for <strong>The</strong> Poor AF November 2020<br />
…<br />
Page 357 of 372
2021<br />
Biblically Responsible <strong>In</strong>vesting TLFA – January 2021<br />
<strong>In</strong>ternational Criminal Procedure LMI – February 2021<br />
Spiritual Rights TLFA – March 2021<br />
<strong>The</strong> <strong>The</strong>ology of Missions TLFA – April 2021<br />
Legal Evangelism, <strong>In</strong>telligence,<br />
Reconnaissance & Missions LMI – May 2021<br />
<strong>The</strong> Law of War LMI – June 2021<br />
Generational Progression AF – July 2021<br />
Predatory Lending AF – August 2021<br />
<strong>The</strong> Community Assessment Process NpA – September 2021<br />
Accountability NpA – October 2021<br />
Nonprofit Transparency NpA – November 2021<br />
Redefining Unemployment AF – December 2021<br />
2022<br />
21 st Century Slavery AF – January 2022<br />
Acquiesce to Righteousness TLFA – February 2022<br />
ComeUnity Capacity-Building NpA – March 2022<br />
Nonprofit Organizational Assessment NpA – April 2022<br />
Debt Reduction AF – May 2022<br />
Case Law, Statutory Law,<br />
Municipal Ordinances and Policy ALG – June 2022<br />
Organizational Dysfunction NpA - July 2022<br />
<strong>In</strong>stitutional Racism Collab US – August 2022<br />
Page 358 of 372
<strong>The</strong> Ripple Effects of Ministry TLFA - September 2022<br />
<strong>The</strong> Sarbanes-Oxley Act of 2002 NpA – October 2022<br />
<strong>Organized</strong> <strong>Crime</strong> (<strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong>) ALG – May 2022<br />
…<br />
Page 359 of 372
<strong>The</strong> e-Advocate Quarterly<br />
Special Editions<br />
Crowdfunding Winter-Spring 2017<br />
Social Media for Nonprofits October 2017<br />
Mass Media for Nonprofits November 2017<br />
<strong>The</strong> Opioid Crisis in America: January 2018<br />
Issues in Pain Management<br />
<strong>The</strong> Opioid Crisis in America: February 2018<br />
<strong>The</strong> Drug Culture in the U.S.<br />
<strong>The</strong> Opioid Crisis in America: March 2018<br />
Drug Abuse Among Veterans<br />
<strong>The</strong> Opioid Crisis in America: April 2018<br />
Drug Abuse Among America’s<br />
Teens<br />
<strong>The</strong> Opioid Crisis in America: May 2018<br />
Alcoholism<br />
<strong>The</strong> Economic Consequences of June 2018<br />
Homelessness in <strong>The</strong> US<br />
<strong>The</strong> Economic Consequences of July 2018<br />
Opioid Addiction in America<br />
Page 360 of 372
<strong>The</strong> e-Advocate Journal<br />
of <strong>The</strong>ological Jurisprudence<br />
Vol. I - 2017<br />
<strong>The</strong> <strong>The</strong>ological Origins of Contemporary Judicial Process<br />
Scriptural Application to <strong>The</strong> Model Criminal Code<br />
Scriptural Application for Tort Reform<br />
Scriptural Application to Juvenile Justice Reformation<br />
Vol. II - 2018<br />
Scriptural Application for <strong>The</strong> Canons of Ethics<br />
Scriptural Application to Contracts Reform<br />
& <strong>The</strong> Uniform Commercial Code<br />
Scriptural Application to <strong>The</strong> Law of Property<br />
Scriptural Application to <strong>The</strong> Law of Evidence<br />
Page 361 of 372
Legal Missions <strong>In</strong>ternational<br />
Page 362 of 372
Issue Title Quarterly<br />
Vol. I 2015<br />
I<br />
II<br />
God’s Will and <strong>The</strong> 21 st Century<br />
Democratic Process<br />
<strong>The</strong> Community<br />
Engagement Strategy<br />
Q-1 2015<br />
Q-2 2015<br />
III Foreign Policy Q-3 2015<br />
IV<br />
Public <strong>In</strong>terest Law<br />
in <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
Q-4 2015<br />
Vol. II 2016<br />
V Ethiopia Q-1 2016<br />
VI Zimbabwe Q-2 2016<br />
VII Jamaica Q-3 2016<br />
VIII Brazil Q-4 2016<br />
Vol. III 2017<br />
IX <strong>In</strong>dia Q-1 2017<br />
X Suriname Q-2 2017<br />
XI <strong>The</strong> Caribbean Q-3 2017<br />
XII United States/ Estados Unidos Q-4 2017<br />
Vol. IV 2018<br />
XIII Cuba Q-1 2018<br />
XIV Guinea Q-2 2018<br />
XV <strong>In</strong>donesia Q-3 2018<br />
XVI Sri Lanka Q-4 2018<br />
Page 363 of 372
Vol. V 2019<br />
XVII Russia Q-1 2019<br />
XVIII Australia Q-2 2019<br />
XIV South Korea Q-3 2019<br />
XV Puerto Rico Q-4 2019<br />
Issue Title Quarterly<br />
Vol. VI 2020<br />
XVI Trinidad & Tobago Q-1 2020<br />
XVII Egypt Q-2 2020<br />
XVIII Sierra Leone Q-3 2020<br />
XIX South Africa Q-4 2020<br />
XX Israel Bonus<br />
Vol. VII 2021<br />
XXI Haiti Q-1 2021<br />
XXII Peru Q-2 2021<br />
XXIII Costa Rica Q-3 2021<br />
XXIV China Q-4 2021<br />
XXV Japan Bonus<br />
Vol VIII 2022<br />
XXVI Chile Q-1 2022<br />
Page 364 of 372
<strong>The</strong> e-Advocate Juvenile Justice Report<br />
______<br />
Vol. I – Juvenile Delinquency in <strong>The</strong> US<br />
Vol. II. – <strong>The</strong> Prison <strong>In</strong>dustrial Complex<br />
Vol. III – Restorative/ Transformative Justice<br />
Vol. IV – <strong>The</strong> Sixth Amendment Right to <strong>The</strong> Effective Assistance of Counsel<br />
Vol. V – <strong>The</strong> <strong>The</strong>ological Foundations of Juvenile Justice<br />
Vol. VI – Collaborating to Eradicate Juvenile Delinquency<br />
Page 365 of 372
<strong>The</strong> e-Advocate <strong>New</strong>sletter<br />
Genesis of <strong>The</strong> Problem<br />
Family Structure<br />
Societal <strong>In</strong>fluences<br />
Evidence-Based Programming<br />
Strengthening Assets v. Eliminating Deficits<br />
2012 - Juvenile Delinquency in <strong>The</strong> US<br />
<strong>In</strong>troduction/Ideology/Key Values<br />
Philosophy/Application & Practice<br />
Expungement & Pardons<br />
Pardons & Clemency<br />
Examples/Best Practices<br />
2013 - Restorative Justice in <strong>The</strong> US<br />
2014 - <strong>The</strong> Prison <strong>In</strong>dustrial Complex<br />
25% of the World's <strong>In</strong>mates Are <strong>In</strong> the US<br />
<strong>The</strong> Economics of Prison Enterprise<br />
<strong>The</strong> Federal Bureau of Prisons<br />
<strong>The</strong> After-Effects of <strong>In</strong>carceration/<strong>In</strong>dividual/Societal<br />
<strong>The</strong> Fourth Amendment Project<br />
<strong>The</strong> Sixth Amendment Project<br />
<strong>The</strong> Eighth Amendment Project<br />
<strong>The</strong> Adolescent Law Group<br />
2015 - US Constitutional Issues <strong>In</strong> <strong>The</strong> <strong>New</strong> <strong>Millennium</strong><br />
Page 366 of 372
2018 - <strong>The</strong> <strong>The</strong>ological Law Firm Academy<br />
<strong>The</strong> <strong>The</strong>ological Foundations of US Law & Government<br />
<strong>The</strong> Economic Consequences of Legal Decision-Making<br />
<strong>The</strong> Juvenile Justice Legislative Reform <strong>In</strong>itiative<br />
<strong>The</strong> EB-5 <strong>In</strong>ternational <strong>In</strong>vestors <strong>In</strong>itiative<br />
2017 - Organizational Development<br />
<strong>The</strong> Board of Directors<br />
<strong>The</strong> <strong>In</strong>ner Circle<br />
Staff & Management<br />
Succession Planning<br />
Bonus #1 <strong>The</strong> Budget<br />
Bonus #2 Data-Driven Resource Allocation<br />
2018 - Sustainability<br />
<strong>The</strong> Data-Driven Resource Allocation Process<br />
<strong>The</strong> Quality Assurance <strong>In</strong>itiative<br />
<strong>The</strong> Advocacy Foundation Endowments <strong>In</strong>itiative<br />
<strong>The</strong> Community Engagement Strategy<br />
2019 - Collaboration<br />
Critical Thinking for Transformative Justice<br />
<strong>In</strong>ternational Labor Relations<br />
Immigration<br />
God's Will & <strong>The</strong> 21st Century Democratic Process<br />
<strong>The</strong> Community Engagement Strategy<br />
<strong>The</strong> 21st Century Charter Schools <strong>In</strong>itiative<br />
2020 - Community Engagement<br />
Page 367 of 372
Extras<br />
<strong>The</strong> Nonprofit Advisors Group <strong>New</strong>sletters<br />
<strong>The</strong> 501(c)(3) Acquisition Process<br />
<strong>The</strong> Board of Directors<br />
<strong>The</strong> Gladiator Mentality<br />
Strategic Planning<br />
Fundraising<br />
501(c)(3) Reinstatements<br />
<strong>The</strong> Collaborative US/ <strong>In</strong>ternational <strong>New</strong>sletters<br />
How You Think Is Everything<br />
<strong>The</strong> Reciprocal Nature of Business Relationships<br />
Accelerate Your Professional Development<br />
<strong>The</strong> Competitive Nature of Grant Writing<br />
Assessing <strong>The</strong> Risks<br />
Page 368 of 372
Page 369 of 372
About <strong>The</strong> Author<br />
John C (Jack) Johnson III<br />
Founder & CEO – <strong>The</strong> Advocacy Foundation, <strong>In</strong>c.<br />
________<br />
Jack was educated at Temple University, in Philadelphia, Pennsylvania and Rutgers<br />
Law School, in Camden, <strong>New</strong> Jersey. <strong>In</strong> 1999, he moved to Atlanta, Georgia to pursue<br />
greater opportunities to provide Advocacy and Preventive Programmatic services for atrisk/<br />
at-promise young persons, their families, and Justice Professionals embedded in the<br />
Juvenile Justice process in order to help facilitate its transcendence into the 21 st Century.<br />
<strong>The</strong>re, along with a small group of community and faith-based professionals, “<strong>The</strong> Advocacy Foundation, <strong>In</strong>c." was conceived<br />
and developed over roughly a thirteen year period, originally chartered as a Juvenile Delinquency Prevention and Educational<br />
Support Services organization consisting of Mentoring, Tutoring, Counseling, Character Development, Community Change<br />
Management, Practitioner Re-Education & Training, and a host of related components.<br />
<strong>The</strong> Foundation’s Overarching Mission is “To help <strong>In</strong>dividuals, Organizations, & Communities Achieve <strong>The</strong>ir Full Potential”, by<br />
implementing a wide array of evidence-based proactive multi-disciplinary "Restorative & Transformative Justice" programs &<br />
projects currently throughout the northeast, southeast, and western international-waters regions, providing prevention and support<br />
services to at-risk/ at-promise youth, to young adults, to their families, and to Social Service, Justice and Mental<br />
Health professionals” in each jurisdiction served. <strong>The</strong> Foundation has since relocated its headquarters to Philadelphia,<br />
Pennsylvania, and been expanded to include a three-tier mission.<br />
<strong>In</strong> addition to his work with the Foundation, Jack also served as an Adjunct Professor of Law & Business at National-Louis<br />
University of Atlanta (where he taught Political Science, Business & Legal Ethics, Labor & Employment Relations, and Critical<br />
Thinking courses to undergraduate and graduate level students). Jack has also served as Board President for a host of wellestablished<br />
and up & coming nonprofit organizations throughout the region, including “Visions Unlimited Community<br />
Development Systems, <strong>In</strong>c.”, a multi-million dollar, award-winning, Violence Prevention and Gang <strong>In</strong>tervention Social Service<br />
organization in Atlanta, as well as Vice-Chair of the Georgia/ Metropolitan Atlanta Violence Prevention Partnership, a state-wide<br />
300 organizational member violence prevention group led by the Morehouse School of Medicine, Emory University and <strong>The</strong><br />
Original, Atlanta-Based, Martin Luther King Center.<br />
Attorney Johnson’s prior accomplishments include a wide-array of Professional Legal practice areas, including Private Firm,<br />
Corporate and Government postings, just about all of which yielded significant professional awards & accolades, the history and<br />
chronology of which are available for review online at Linked<strong>In</strong>.com. Throughout his career, Jack has served a wide variety of<br />
for-profit corporations, law firms, and nonprofit organizations as Board Chairman, Secretary, Associate, and General Counsel<br />
since 1990.<br />
www.<strong>The</strong>Advocacy.Foundation<br />
Clayton County Youth Services Partnership, <strong>In</strong>c. – Chair; Georgia Violence Prevention Partnership, <strong>In</strong>c – Vice Chair; Fayette<br />
County NAACP - Legal Redress Committee Chairman; Clayton County Fatherhood <strong>In</strong>itiative Partnership – Principal<br />
<strong>In</strong>vestigator; Morehouse School of Medicine School of Community Health Feasibility Study Steering Committee; Atlanta<br />
Violence Prevention Capacity Building Project Partner; Clayton County Minister’s Conference, President 2006-2007; Liberty <strong>In</strong><br />
Life Ministries, <strong>In</strong>c. Board Secretary; Young Adults Talk, <strong>In</strong>c. Board of Directors; ROYAL, <strong>In</strong>c Board of Directors; Temple<br />
University Alumni Association; Rutgers Law School Alumni Association; Sertoma <strong>In</strong>ternational; Our Common Welfare Board of<br />
Directors President 2003-2005; River’s Edge Elementary School PTA (Co-President); Summerhill Community Ministries<br />
(Winter Sports Athletic Director); Outstanding Young Men of America; Employee of the Year; Academic All-American -<br />
Basketball; Church Trustee; Church Diaconate Ministry (Walking Deacon); Pennsylvania Commission on <strong>Crime</strong> & Delinquency<br />
(Nominee).<br />
www.<strong>The</strong>AdvocacyFoundation.org<br />
Page 370 of 372
Page 371 of 372
Page 372 of 372