Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-22dnz Total loading time: 0 Render date: 2024-04-26T02:44:08.846Z Has data issue: false hasContentIssue false

PART I - OVERVIEW: TRANSNATIONAL CRIME

Published online by Cambridge University Press:  20 June 2019

Mangai Natarajan
Affiliation:
John Jay College of Criminal Justice, City University of New York
Get access
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Decker, S. H. & Townsend, M. (2008). Drug smugglers on drug smuggling: Lessons from the inside. Philadelphia, PA: Temple University Press.Google Scholar
Desroches, F. (2005). The crime that pays: Drug trafficking and organized crime in Canada. Toronto: Canadian Scholar’s Press.Google Scholar
Dolliver, D. S. (2015). Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. International Journal of Drug Policy, 26(11), 11131123.CrossRefGoogle ScholarPubMed
European Monitoring Centre for Drugs and Drug Addiction (EMCDDA). (2018). European Drug Report 2018: Trends and Developments. Retrieved from www.emcdda.europa.eu/system/files/publications/8585/20181816_TDAT18001ENN_PDF.pdf.Google Scholar
Natarajan, M. (2006). Understanding the structure of a large heroin distribution network: A quantitative analysis of qualitative data. Quantitative Journal of Criminology, 22(2), 171192.Google Scholar
Natarajan, M. & Belanger, M. (1998). Varieties of upper-level drug dealing organizations: A typology of cases prosecuted in New York City. Journal of Drug Issues, 28(4), 10051026.CrossRefGoogle Scholar
Natarajan, M., Zanella, M., & Yu, C. (2015). Classifying the variety of drug trafficking organizations. Journal of Drug Issues, 45(4), 409430.CrossRefGoogle Scholar
Reuter, P. H. (2014). The mobility of drug trafficking. In Collins, J. (Ed.), Ending the drug wars (pp. 3340). London: The London School of Economics and Political Science.Google Scholar
Rhumorbarbe, D., Staehli, L., Broséus, J., Rossy, Q., & Esseiva, P. (2016). Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic Science International, 267, 173182.Google Scholar
United Nations International Drug Control Programme. (1997). World drug report. New York: Oxford University Press.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2018) World drug report 2018. New York: United Nations.Google Scholar
World Customs Organization. (2017). Illicit trade. Brussels: World Customs Organization.Google Scholar

REFERENCES

Aronowitz, A. A. (2009). Human trafficking, human misery: The global trade in human beings. Westport, CT: Praeger Publishers.Google Scholar
Aronowitz, A. A. (2017). Human trafficking: A reference handbook. Santa Barbara, CA: ABC-CLIO.CrossRefGoogle Scholar
Bales, K. (1999). Disposable people. Berkeley, CA: University of California Press.Google Scholar
Bales, K. (2007). What predicts human trafficking. International Journal of Comparative and Applied Criminal Justice, 31(2), 269279.CrossRefGoogle Scholar
International Labour Organization. (2017). Global estimates of modern slavery: forced labour and forced marriage. Geneva. Retrieved from www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575479.pdf.Google Scholar
Oram, S., Stöckl, H., Busza, J. Howard, L, & Zimmerman, C. (2012). Prevalence and risk of violence and the physical, mental, and sexual health problems associated with human trafficking: Systematic review. Plos Medicine. Retrieved from https://doi.org/10.1371/journal.pmed.1001224.CrossRefGoogle ScholarPubMed
Schloenhardt, A. (1999). Organized crime and the business of migrant trafficking. Crime, Law and Social Change, 32, 203233.Google Scholar
Tsutsumi, A., Izutsu, T., Poudyal, A., Kato, S., & Marui, E. (2008). Mental health of female survivors of human trafficking in Nepal. Social Science & Medicine, 66, 18411847.CrossRefGoogle ScholarPubMed
United Nations Office on Drugs and Crime (UNODC). (2016). Global report on trafficking in persons. Vienna. Retrieved from www.unodc.org/documents/data-and-analysis/glotip/2016_Global_Report_on_Trafficking_in_Persons.pdf.Google Scholar
US Department of State. (2017). Trafficking in persons report 2017. Washington, DC. Retrieved from www.state.gov/documents/organization/271339.pdf.Google Scholar

WEBSITES

Anti-Slavery International. www.antislaveryinternational.org.

International Labour Organization. www.ilo.org.

International Organization for Migration (IOM). www.iom.int.

US Department of State Office to Monitor and Combat Trafficking in Persons. www.state.gov/g/tip.

United Nations Office on Drugs and Crime. www.unodc.org/unodc/en/human-trafficking/what-is-human-trafficking.html.

REFERENCES

Bigelsen, J. & Vuotto, S. (2013). Homelessness, survival sex and human trafficking: As experienced by the youth of Covenant House. New York: Covenant House.Google Scholar
Dank, M. (2011). The commercial sexual exploitation of children in New York City. El Paso, TX: LFB Scholarly Publishing.Google Scholar
Dank, M., Yahner, J., Madden, K., Banuelos, I., Yu, L., Ritchie, A., Mora, M., & Conner, B. (2015) Surviving the streets of New York: Experiences of LGBTQ youth, YMSM, and YWSW engaged in survival sex. Washington, DC: Urban Institute. Retrieved from www.urban.org/sites/default/files/publication/42186/2000119-Surviving-the-Streets-of-New-York.pdf.Google Scholar
Dank, M., Yahner, J., Yu, L., Vasquez-Noriega, C., Gelatt, J., & Pergamit, M. (2017). Pre-testing a human trafficking screening tool in child welfare and runaway and homeless youth systems. Washington, DC: Urban Institute. Retrieved from www.urban.org/sites/default/files/publication/93596/pretesting_tool_1.pdf.Google Scholar
Durso, L. E. & Gates, G. J. (2012). Serving our youth: Findings from a national survey of service providers working with lesbian, gay, bisexual, and transgender youth who are homeless or at risk of becoming homeless. Los Angeles, CA: The Williams Institute with True Colors Fund and the Palette Fund.Google Scholar
Fernandez, K. (2013). Victims or criminals? The intricacies of dealing with juvenile victims of sex trafficking and why the distinction matters. Arizona State Law Journal, 45, 859890.Google Scholar
Freeman, L. & Hamilton, D. (2008). A count of homeless youth in New York City. New York: Empire State Coalition of Youth and Family Services.Google Scholar
Gragg, F., Petta, I., Bernstein, H., Eisen, K., & Quinn, L. (2007). New York prevalence study of commercially sexually exploited children. Rockville, MD: Westat.Google Scholar
Institute of Medicine & National Research Council of the National Academies. (2013). Confronting commercial sexual exploitation and sex trafficking of minors in the United States. Washington, DC: The National Academy of Sciences.Google Scholar
Murphy, L. T. (2016). Labor and sex trafficking among homeless youth. A ten city study (executive summary). Retrieved from https://static1.squarespace.com/static/5887a2a61b631bfbbc1ad83a/t/59498e69197aea24a33a640b/1497992809780/CovenantHouseReport.pdf.Google Scholar
Thukral, J. & Ditmore, M. (2003). Revolving door: An analysis of street-based prostitution in the intersection of domestic human trafficking with cw and rhy programs. New York: Urban Justice Center Report.Google Scholar
Tucker, J. S., Edelen, M. O., Ellickson, P. L., & Klein, D. J. (2011). Running away from home: A longitudinal study of adolescent risk factors and young adult outcomes. Journal of Adolescence, 40(5), 507–518.Google Scholar
Walts, K. (2017). Child labor trafficking in the United States: A hidden crime. Social Inclusion, 5(2), 5968.CrossRefGoogle Scholar
Williams, L. M. & Frederick, M. E. (2009). Pathways into and out of commercial sexual victimization of children: Understanding and responding to sexually exploited teens. Lowell, MA: University of Massachusetts Lowell.Google Scholar

REFERENCES

Baird, T. & van Liempt, I. (2016). Scrutinising the double disadvantage: knowledge production in the messy field of migrant smuggling. Journal of Ethnic and Migration Studies, 42(3), 400417.CrossRefGoogle Scholar
Bilger, V., Hofmann, M., & Jandl, M. (2006). Human smuggling as a transnational service industry: Evidence from Austria. International Migration, 44(4), 5993.Google Scholar
Brachet, J. (2018). Manufacturing smugglers: From irregular to clandestine mobility in Sahara. The Annals of The American Academy of Political and Social Science, 676, 1635.CrossRefGoogle Scholar
Campana, P. (2018). Out of Africa: The organization of migrant smuggling across the Mediterranean. European Journal of Criminology, 15(4), 481502, doi.org/10.1177/1477370817749179.CrossRefGoogle Scholar
Campana, P. (2017). The market for human smuggling into Europe: A macro perspective. In Policing, 11(4), 448456.CrossRefGoogle Scholar
Campana, P. & Varese, F. (2016). Exploitation in human trafficking and smuggling. European Journal on Criminal Policy and Research, 22(1), 89105.CrossRefGoogle Scholar
Gallagher, A. & McAuliffe, M. L. (2016). South-East Asia and Australia. In McAuliffe, M. L. and Laczko, F. (Eds.), Migrant smuggling data and research (pp. 211241). Geneva: International Organization for Migration.Google Scholar
Içduygu, A. & Toktas, S. (2002). How do smuggling and trafficking operate via irregular border crossings in the Middle East? Evidence from fieldwork in Turkey. International Migration, 40(6), 2554CrossRefGoogle Scholar
McAuliffe, M. L. & Laczko, F. (2016). Report overview. In McAuliffe, M. L. and Laczko, F. (Eds.), Migrant smuggling data and research (pp. 1–24). Geneva: International Organization for Migration.Google Scholar
Sanchez, G. E. (2015). Human smuggling and border crossing. Abingdon and New York: Routledge.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2018). Global study on smuggling of migrants. Vienna: United Nations Office on Drugs and Crime.Google Scholar
Zhang, S. & Chin, K. L. (2002). Enter the dragon: Inside Chinese human smuggling organisations. Criminology, 40(4), 737768.CrossRefGoogle Scholar

WEBSITES

UNODC Smuggling of Migrants Knowledge Portal. www.unodc.org/cld/en/v3/som/.

North Africa Mixed Migration Hub. www.mixedmigrationhub.org/.

Mixed Migration Monitoring Mechanism Initiative (4Mi). www.regionalmms.org/index.php/4mi-page/about-4mi.

Irregular Migration Research Database. https://gmdac.iom.int/research-database/.

IOM Migration Flows – Europe. http://migration.iom.int/europe/.

Missing Migrants Project. https://missingmigrants.iom.int/.

University of Queensland Migrant Smuggling Case Database. https://ssl.law.uq.edu.au/som-database/home.php.

European Border and Coast Guard Agency. https://frontex.europa.eu/.

REFERENCES

Block, S. (2012). Characteristics of internationally trafficked stolen vehicles along the U.S.-Mexico border. Western Criminology Review, 13(3), 114.Google Scholar
Block, S., Clarke, R. V., Maxfield, M. G., & Petrossian, G. (2011). Estimating the number of U.S. vehicles stolen for export using crime location quotients. In Andresen, M. A. & Kinney, J. B. (Eds.), Patterns, prevention and geometry of crime. New York: Routledge.Google Scholar
Brown, R. & Clarke, R. V. (2004). Police intelligence and theft of vehicles for export: Recent UK experience. In Maxwell, M. G. & Clarke, R. V. (Eds.), Crime prevention studies, Vol. 17. Monsey, NY: Criminal Justice Press.Google Scholar
Clarke, R. V. & Brown, R. (2003). International trafficking in stolen vehicles. In Tonry, M. (Ed.), Crime and justice. A review of research, Vol. 30. Chicago: University of Chicago Press.Google Scholar
Highway Loss Data Institute. (2008). Insurance special report: Theft losses by county: 1999–2007 models. Arlington, VA: The Institute.Google Scholar
Lantsman, L. (2013). “Moveable currency”: The role of seaports in export oriented vehicle theft. Crime, Law and Social Change, 59, 157184.CrossRefGoogle Scholar
Liukkonen, M. (1997). Motor vehicle theft in Europe. Paper No. 9. Helsinki: HEUNI.Google Scholar
Resindez, R. (1998). International auto theft: An exploratory research of organization and organized crime on the U.S./Mexico border. Criminal Organizations, 12, 2530.Google Scholar
Tremblay, P., Talon, B., & Hurley, D. (2001). Body switching and related adaptations in the resale of stolen vehicles: Script elaborations and aggregate crime learning curves. British Journal of Criminology, 41, 561579.CrossRefGoogle Scholar
US Customs and Border Protection. (2017) Exporting a motor vehicle: Interpretation and application of 19 CFR Part 192. Retrieved from www.cbp.gov/trade/basic-import-export/export-docs/motor-vehicle.Google Scholar
United Nations. (1997). International cooperation in combating transnational crime: Illicit trafficking in motor vehicles. Commission on Crime Prevention and Criminal Justice. Vienna: United Nations.Google Scholar

FURTHER READING

Azrael, D., Hepburn, L., Hemenway, D., & Miller, M. (2017). The stock and flow of U.S. firearms: Results from the 2015 National Firearms Survey. The Russell Sage Foundation Journal of the Social Sciences, 3(5), 3857.Google Scholar
Conflict Armament Research. (2017). Weapons of the Islamic State. A three-year investigation in Iraq and Syria. London: Conflict Armament Research.Google Scholar
Martyniuk, A. (2017). Measuring illicit arms flows: Ukraine. Geneva: Small Arms Survey.Google Scholar
McDougal, T., Shirk, D., Muggah, R., & Patterson, J. (2015). The way of the gun: Estimating firearms trafficking across the US-Mexico border. Journal of Economic Geography, 15, 297327.Google Scholar
Wintemute, G. (2013). Frequency of and responses to illegal activity related to commerce in firearms: Findings from the Firearms Licensee Survey. Injury Prevention, 19, 412420.Google Scholar

REFERENCES

Brodie, N., Doole, J., & Renfrew, C. (Eds.). (2001). Trade in illicit antiquities: The destruction of the world’s archaeological heritage. Cambridge: McDonald Institute for Archaeological Research.Google Scholar
Coggins, C. (1969). Illicit traffic of pre-Columbian antiquities. Art Journal, 29(1), 9498.CrossRefGoogle Scholar
Contreras, D. & Brodie, N. (2010). Quantifying destruction: An evaluation of the utility of publicly available satellite imagery for investigating looting of archaeological sites in Jordan. Journal of Field Archaeology, 35(1), 101114.Google Scholar
Davis, T. & Mackenzie, S. (2015). Crime and conflict: Temple looting in Cambodia. In Kila, J. and Balcells, M. (Eds.), Cultural property crime. Leiden: Brill.Google Scholar
Gilgan, E. (2001). Looting and the market for Maya objects: A Belizean perspective. In Brodie, N., Doole, J., and Renfrew, C. (Eds.), Trade in illicit antiquities: The destruction of the world’s archaeological heritage. Cambridge: McDonald Institute for Archaeological Research.Google Scholar
Gill, D. J. W. & Chippindale, C. (1993). Material and intellectual consequences of esteem for cycladic figures. American Journal of Archaeology, 97(3), 602673.Google Scholar
Mackenzie, S. (2005). Going, going, gone: Regulating the market in illicit antiquities. Leicester: Institute of Art and Law.Google Scholar
O’Keefe, P. J. (1997). Trade in antiquities: Reducing destruction and theft. London: Archetype.Google Scholar
Parcak, S., Gathings, D., Childs, C., Mumford, G., & Cline, C. (2016). Satellite evidence of archaeological site looting in Egypt: 2002–2013. Antiquity, 90, 188205.CrossRefGoogle Scholar
Polk, K. (2000). The antiquities trade viewed as a criminal market. Hong Kong Lawyer, September, 82–92.Google Scholar
Thosarat, R. (2001). The destruction of the cultural heritage of Thailand and Cambodia. In Brodie, N., Doole, J., and Renfrew, C. (Eds.), Trade in illicit antiquities: The destruction of the world’s archaeological heritage. Cambridge: McDonald Institute for Archaeological Research.Google Scholar
Watson, P. (1997). Sotheby’s: The inside story. Hardback edn. London: Bloomsbury.Google Scholar
Yates, D., Mackenzie, S., & Smith, E. (2017). The cultural capitalists: Notes on the ongoing reconfiguration of trafficking culture in Asia. Crime, Media, Culture, 13(2), 245254.CrossRefGoogle ScholarPubMed

REFERENCES

Calderoni, F. (2014). A new method for estimating the illicit cigarette market at the subnational level and its application to Italy. Global Crime, 15, 5176.CrossRefGoogle Scholar
Hornsby, R. & Hobbs, D. (2007). A zone of ambiguity: The political economy of cigarette bootlegging. British Journal of Criminology, 47, 551571.CrossRefGoogle Scholar
Joossens, L., Merriman, D., Ross, H., & Raw, M. (2009). How eliminating the global illicit cigarette trade would increase tax revenue and save lives. Paris: International Union Against Tuberculosis and Lung Disease, 10. Retrieved August 30, 2009, from www.fctc.org/dmdocuments/INB3_report_illicit_trade_save_revenue_lives.pdf.Google Scholar
Joossens, L. & Raw, M. (2002). Turning off the tap: An update on cigarette smuggling in the UK and Sweden, with recommendations to control smuggling. London: Cancer Research UK.Google Scholar
Joossens, L. (2008). Progress in combating cigarette smuggling: Controlling the supply chain. Tobacco Control, 17, 399404.CrossRefGoogle ScholarPubMed
Joossens, L. (2012). From cigarette smuggling to illicit tobacco trade. Tobacco Control, 21, 230234.CrossRefGoogle ScholarPubMed
Reuter, P. & Majmundar, M. (Ed.). (2015). Understanding the U.S. illicit tobacco market: Characteristics, policy context, and lessons from international experiences. Washington, DC: National Academy of Sciences.Google Scholar
Ross, H., Vellios, N., Clegg Smith, K., Ferguson, J., & Cohen, J. E. (2016). A closer look at “Cheap White” cigarettes. Tobacco Control, 25, 527531.CrossRefGoogle Scholar
Shelley, L. & Melzer, S. (2008). The nexus of organized crime and terrorism: Two case studies in cigarette smuggling. The International Journal of Comparative and Applied Criminal Justice, 32, 4363.CrossRefGoogle Scholar
United Nations Office on Drugs and Crime. (2009, July). Transnational trafficking and the rule of law in West Africa: A threat assessment. Vienna: UNODC. Retrieved August 28, 2009, from www.unodc.org/documents/data-and-analysis/Studies/West_Africa_Report_2009.pdf.Google Scholar
Van Duyne, P. C. (2003). Organizing cigarette smuggling and policy making ending up in smoke. Crime, Law and Social Change, 39, 285317.Google Scholar
Von Lampe, K. (2006). The cigarette black market in Germany and in the United Kingdom. Journal of Financial Crime, 13, 235254.Google Scholar
Von Lampe, K., Kurti, M., Shen, A., & Antonopoulos, G. (2012). The changing role of China in the global illegal cigarette trade. International Criminal Justice Review, 22, 4367.Google Scholar
Yürekli, A. & Saygınsoy, Ö. (2010). Worldwide organized cigarette smuggling: an empirical analysis. Applied Economics, 42, 545561.CrossRefGoogle Scholar

WEBSITES

Framework Convention Alliance (for a Framework Convention on Tobacco Control). www.ftct.org.

Action on Smoking and Health (anti-smoking NGO). www.ash.org.

The Center for Public Integrity (investigative journalists on the “Tobacco Underground”). www.publicintegrity.org/health/public-health/tobacco.

Tobacco Control (journal). http://tobaccocontrol.bmj.com.

Philip Morris International (tobacco manufacturer). www.philipmorrisinternational.com.

REFERENCES

Brown, V. F. (2017). The extinction market: Wildlife trafficking and how to counter it. Oxford: Oxford University Press.Google Scholar
Kurland, J. & Pires, S. F. (2017). Assessing US wildlife trafficking patterns: How criminology and conservation science can guide strategies to reduce the illegal wildlife trade. Deviant Behavior, 38(4), 375391.Google Scholar
Kurland, J., Pires, S. F., McFann, S. C., & Moreto, W. D. (2017). Wildlife crime: a conceptual integration, literature review, and methodological critique. Crime Science, 6(1), 4.Google Scholar
Lemieux, A. M. & Clarke, R. V. (2009). The international ban on ivory sales and its effects on elephant poaching in Africa. The British Journal of Criminology, 49(4), 451471.Google Scholar
Natarajan, M. (2016) Crime in developing countries: the contribution of crime science. Crime Science, 5(8), 15.CrossRefGoogle Scholar
Pires, S. F. & Clarke, R. V. (2011). Sequential foraging, itinerant fences and parrot poaching in Bolivia. The British Journal of Criminology, 51(2), 314335.Google Scholar
Reuter, P. & O’Regan, D. (2016). Smuggling wildlife in the Americas: scale, methods, and links to other organised crimes. Global Crime, 18(2), 7799.Google Scholar
Schneider, J. L. (2008). Reducing the illicit trade in endangered wildlife: the market reduction approach. Journal of Contemporary Criminal Justice, 24(3), 274295.CrossRefGoogle Scholar
Sina, S., Gerstetter, C., Porsch, L., Roberts, E., Smith, L., Klaas, K., & Fajardo, T. (2016). Wildlife crime (IP/A/ENVI/2015-10). Brussels: European Parliament.Google Scholar
Smith, K. F., Behrens, M., Schloegel, L. M., Marano, N., Burgiel, S., & Daszak, P. (2009). Reducing the risks of the wildlife trade. Science, 324(5927), 594595.CrossRefGoogle ScholarPubMed
Wyler, L. S. & Sheikh, P. A. (2008). International illegal trade in wildlife: Threats and US policy. Washington, DC: Library of Congress Congressional Research Service.Google Scholar

WEBSITES

UNODC World Wildlife Crime Report 2016. www.unodc.org/documents/data-and-analysis/wildlife/World_Wildlife_Crime_Report_2016_final.pdf.

Centre for Conservation Criminology and Ecology. www.c3e.rutgers.edu.

TRAFFIC. www.traffic.org.

REFERENCES

Allcott, H. & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives, 31(2), 211236.Google Scholar
Chen, T. M. & Robert, J. M. (2004). The evolution of viruses and worms. In W. S. Chen (Ed.), Statistical methods in computer security (pp. 265). New York: Marcel Dekker.Google Scholar
Clarke, R. & Youngstein, T. (2017). Cyberattack on Britain’s National Health Service: A wake-up call for modern medicine. New England Journal of Medicine, 377(5), 409411.Google Scholar
Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165172.Google Scholar
Europol report (2017). Internet organized crime threat assessment by EUROPOL (IOCTA 2017). Retrieved from www.europol.europa.eu/iocta/2017/index.html.Google Scholar
Fishbein, M. & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Boston, MA: Addison-Wesley.Google Scholar
Haggard, S. & Lindsay, J. R. (2015). North Korea and the Sony Hack: exporting instability through cyberspace. Asia Pacific Issues, 117, 1–8.Google Scholar
Kshetri, N. & Voas, J. (2017). Hacking power grids: A current problem. Computer, 50(12), 9195.CrossRefGoogle Scholar
Lewis, J. (2018). Mcafee – economic impact of cybercrime. Retrieved from www.mcafee.com/us/resources/reports/restricted/economic-impact-cybercrime.pdf.Google Scholar
Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 913.Google Scholar
Maras, M. H. (2017). Cybercriminology. New York: Oxford University Press.Google Scholar
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767772.CrossRefGoogle Scholar
Persily, N. (2017). Can democracy survive the Internet? Journal of Democracy, 28(2), 6376.Google Scholar
Steinmetz, K. F. & Nobles, M. R. (2017). Introduction. In Technocrime and criminological theory (pp. 1726). New York: Routledge Taylor and Francis Group.Google Scholar
Sunstein, C. R. (2018). Republic: Divided democracy in the age of social media. Princeton, NJ: Princeton University Press.Google Scholar
The Economist. (2017). The world’s most valuable resource is no longer oil, but data. Retrieved from www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource.Google Scholar
Trautman, L. J. (2016). Is cyberattack the next Pearl Harbor? North Carolina Journal of Law & Technology, 18, 233.Google Scholar
Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 6474.CrossRefGoogle Scholar

REFERENCES

Aldridge, J. & Décary-Hétu, D. (2014). Not an “eBay for drugs”: The cryptomarket “Silk Road” as a paradigm shifting criminal innovation (Working paper). University of Manchester. http://doi.org/10.2139/ssrn.2436643.Google Scholar
Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In ACM Int. Conf. on World Wide Web (WWW), pp. 213224. Rio de Janeiro, May 2013.Google Scholar
Décary-Hétu, D. & Giommoni, L. (2017). Do police crackdowns disrupt drug cryptomarkets? a longitudinal analysis of the effects of operation Onymous. Crime, Law & Social Change, 67(1), 5575.Google Scholar
Guitton, C. (2013). A review of the available content on Tor hidden services: The case against further development. Computers in Human Behavior, 29(6), 28052815.Google Scholar
Li, B., Erdin, E., Gunes, M. H., Bebis, B., & Shipley, T. (2013). An overview of anonymity technology usage. Computer Communications, 36, 12691283.Google Scholar
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. In ACM SIGCOMM Conf. on Internet measurement (IMC), pp. 7180. Berlin, November 2011.Google Scholar
Soska, K. & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symp., pp. 3348. Washington, DC, August 2015. Retrieved from www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska.Google Scholar
Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T. J., Kruegel, C., McCoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization. In Workshop on the Economics of Information Security (WEIS), Article 15, Delft, June 2015: Econinfosec.org. Retrieved from http://weis2015.econinfosec.org/papers/WEIS_2015_thomas.pdf.Google Scholar
Van Buskirk, J., Naicker, S., Roxburgh, A., Bruno, R., & Burnsa, L. (2016). Who sells what? country specific differences in substance availability on the agora cryptomarket. International Journal of Drug Policy, 35, 1623.Google Scholar
Van Hout, M. C. & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183189.Google Scholar
Van Wegberg, R. S. & Verburgh, T. (2018). Lost in the dream? Measuring the effects of Operation Bayonet on vendors migrating to dream marke. Websci conference paper.Google Scholar

WEBSITES

Bitcoin blockchain explorer. blockchain.info.

Bitcoin wallet explorer. www.walletexplorer.com.

Dark web blogs. www.deepdotweb.com.

TNO dark web solutions. dws.pm.

TOR project. www.torproject.org.

REFERENCES

Christopher, C. M. (2014). Wack-a-mole: Why prosecuting digital currency exchanges won’t stop online money laundering. Lewis and Clarke Review, 18(1), 1.Google Scholar
Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91150.CrossRefGoogle Scholar
Irwin, A. S. M., Choo, K. K. R., & Liu, L. (2012). An analysis of money laundering and terrorism financing typologies. Journal of Money Laundering Control, 15(1), 85111.Google Scholar
Jacobs, G. (2018). Cryptocurrencies & the challenge of global governance. Cadmus, 3(4), 109123.Google Scholar
Pohlman, J. & Day, A. (2013, September 12). Busted! Inside one massive cybercrime ring. CNBC. Retrieved from www.cnbc.com/id/101029866.Google Scholar
Securities and Exchange Commission (SEC). (2017, October 30). Day trader charged in brokerage account takeover scheme [press release]. Retrieved from www.sec.gov/news/press-release/2017-202.Google Scholar
Swenson, K. (2017, July 24). Pennsylvania police, hunting for stolen laptops, say they stumbled on $40 million bitcoin scam. Washington Post. Retrieved from www.washingtonpost.com/news/morning-mix/wp/2017/07/24/pennsylvania-police-hunting-for-stolen-laptops-say-they-stumbled-on-40-million-bitcoin-scam/?utm_term=.511503eb502f.Google Scholar
United States Attorney’s Office (USAO) – Southern District of New York. (2014, January 27). Manhattan U.S. Attorney announces charges against bitcoin exchangers, including CEO of bitcoin exchange company, for scheme to sell and launder over $1 million in bitcoins related to Silk Road drug trafficking [press release]. Retrieved from www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-charges-against-bitcoin-exchangers-including-ceo.Google Scholar
United States Attorney’s Office (USAO) – Southern District of New York. (2017, June 27). Operator of unlawful bitcoin exchange sentenced to more than 5 years in prison for leading multimillion dollar money laundering and fraud scheme [press release]. Retrieved from www.justice.gov/usao-sdny/pr/operator-unlawful-bitcoin-exchange-sentenced-more-5-years-prison-leading-multimillion.Google Scholar
Wall, D. S. (2005). The Internet as a conduit for criminals. In Pattavina, A. (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage Publications, Inc.Google Scholar

REFERENCES

Brown, R., Evans, E., Webb, S., Holdaway, S., Berry, G., Chenery, S., Gresty, B., & Jones, M. (2012). The contribution of financial investigation to tackling organised crime: A qualitative study. Research Report 65. Key implications. Retrieved from www.gov.uk/government/uploads/system/uploads/attachment_data/file/116518/horr65.pdf.Google Scholar
Hicks, D. C. (2010). Money laundering. In Brookman, F. et al. (Eds.), Handbook of crime (pp. 712725). Cullompton, Devon: Willan.Google Scholar
Quirk, P. J. (1996). Macroeconomic implications of money laundering (Working Paper 96/66). Washington, DC: International Monetary Fund (IMF).Google Scholar
Reuter, P. & Truman, E. M. (2004). Chasing dirty money: The fight against money laundering. Washington, DC: Institute for International Economics.Google Scholar
UK National Audit Office (UKNAO). (2013, December 13). Confiscation orders. London: Stationery Office Limited. Retrieved from www.nao.org.uk/wp-content/uploads/2013/12/10318-001-Confiscation-Book.pdf.Google Scholar
UK National Audit Office (UKNAO). (2016). Confiscation orders: Progress review. London: Stationery Office Limited. Retrieved from www.nao.org.uk/wp-content/uploads/2016/03/Confiscation-orders-progress-review.pdf.Google Scholar
United Nations Office on Drugs and Crime. (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. Retrieved from www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf.Google Scholar
US Government Accountability Office (USGAO). (2012). Asset forfeiture programs: Justice and Treasury should determine costs and benefits of potential consolidation (Highlights of GAO-12–972). Retrieved from www.gao.gov/assets/650/648097.pdf.Google Scholar
US Government Accountability Office (USGAO). (2016). Financial institutions: Fines, penalties, and forfeitures for violations of financial crimes and sanctions requirements (Highlights of GAO-16–297). Retrieved from www.gao.gov/assets/680/675987.pdf.Google Scholar

WEBSITES

Financial Action Task Force. www.fatf-gafi.org.Google Scholar
International Monetary Fund. www.imf.org.Google Scholar
United Nations International Money Laundering Information Network (IMoLIN). www.imolin.org.Google Scholar
United Nations Office of Drugs and Crime (UNODC). www.unodc.org/unodc/en/money-laundering/index.html.Google Scholar

REFERENCES

Anti-phishing Working Group. (2018). Phishing activity trends report: 3rd quarter 2017. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_q3_2017.pdf.Google Scholar
Association of Certified Fraud Examiners (ACFE). (2016). Report to the nations: On occupational fraud and abuse. 2016 Global Fraud Study. Retrieved from www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf.Google Scholar
Benson, M., Kennedy, J., & Logan, M. (2016). White‐collar and corporate crime. In Huebner, B. & Bynum, T. (Eds.), The handbook of measurement issues in criminology and criminal justice. New York: John Wiley and Sons.Google Scholar
Block, A. & Weaver, C. (2005). All is clouded by desire. New York: Praeger.Google Scholar
Cohen, M. (2016). The costs of white-collar crime. In van Slyke, S., Benson, M., & Cullen, F. (Eds.), Oxford handbook of white-collar crime (pp. 7498). New York: Oxford University Press.Google Scholar
Edwards, M., Suarez-Tangil, G., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2018, May). The geography of online dating fraud. In Workshop on technology and consumer protection. IEEE.Google Scholar
Glenny, M. (2008). McMafia: A journey through the global criminal underworld. New York: Alfred Knopf.Google Scholar
Levi, M. (2008a). Organised fraud: Unpacking research on networks and organisation. Criminology and Criminal Justice, 8(4), 389420.Google Scholar
Levi, M. (2008b). The phantom capitalists: The organisation and control of long-firm fraud (second edition). Aldershot: Ashgate.Google Scholar
Levi, M. (2012). Organised crime and terrorism. In Maguire, M., Morgan, R., & Reiner, R. (Eds.), The Oxford handbook of criminology (fifth edition). Oxford: Oxford University Press.Google Scholar
Levi, M. (2015). Money for crime and money from crime: Financing crime and laundering crime proceeds. European Journal on Criminal Policy and Research, 21(2), 123.Google Scholar
Levi, M. & Burrows, J. (2008). Measuring the impact of fraud: a conceptual and empirical journey. British Journal of Criminology, 48(3), 293318.Google Scholar
May, T. & Bhardwa, B. (2018). Organised crime groups involved in fraud. London: Palgrave Macmillan.Google Scholar
Piscitello, D. (n.d.). The new face of phishing. Retrieved from www.antiphishing.org/apwg-news-center/newfaceofphishing.Google Scholar
Smith, D. J. (2008). A culture of corruption: Everyday deception and popular discontent in Nigeria. Princeton, NJ: Princeton University Press.Google Scholar
Varese, F. (2011). Mafias on the move: How organized crime conquers new territories. Princeton, NJ: Princeton University PressGoogle Scholar
Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665684.Google Scholar

REFERENCES

Briggs, R. (2001). The kidnapping business. London: The Foreign Policy Centre Diplomatic Forum.Google Scholar
Detotto, C., McCannon, B., & Vannini, M. (2015). Evidence of marginal deterrence: Kidnapping and murder in Italy. International Review of Law and Economics, 41, 6367.Google Scholar
Forest, J. J. (2012). Kidnapping by terrorist groups, 1970–2010. Is ideological orientation relevant? Crime & Delinquency, 58(5), 769797.Google Scholar
Guerette, R. T., Pires, S. F., & Shariati, A. (2018). Detecting the determinants and trajectories of homicide among ransom kidnappings: A research note. Homicide Studies, 22(2), 214229.Google Scholar
Keijzer, S. (2017). An end to Colombia’s never ending conflict?: A MA thesis on the peace process between President Santos and the FARC and the role of kidnappings in the Colombian Conflict between 1982–2017 (Master’s thesis). Universiteit Leiden, the Netherlands.Google Scholar
Marongiu, P. & Clarke, R. V. (1993). Ransom kidnapping in Sardinia: Subcultural theory and rational choice. In Clarke, R. V. & Felson, M. (Eds.), Routine activity and rational choice (pp. 179199). New Brunswick, NJ: Transaction Publishers.Google Scholar
Moor, M. & Remijnse, S. (2008). Kidnapping is a booming business. Utrecht: IKV PAX Christi.Google Scholar
Perlberg, S. (2013, December 12). The 20 countries where people get kidnapped the most. Business Insider. Retrieved from www.businessinsider.com/top-20-countries-by-kidnapping-2013-12.Google Scholar
Phillips, E. M. (2009). The business of kidnap for ransom. In Canter, D. (Ed.), The faces of terrorism: Multidisciplinary perspectives (pp. 189207). West Sussex: Wiley.Google Scholar
Pires, S. F., Guerette, R. T., & Shariati, A. (2017). Specifying kidnapping for ransom epidemics at the global level: A matched-case control design. Studies in Conflict & Terrorism, 40(2), 139156.Google Scholar
Pires, S. F., Guerette, R. T., & Stubbert, C. H. (2014). The crime triangle of kidnapping for ransom incidents in Colombia, South America: A ‘litmus’ test for situational crime prevention. British Journal of Criminology, 54(5), 784808.Google Scholar
Shane, J. M. & Magnuson, S. (2016). Successful and unsuccessful pirate attacks worldwide: A situational analysis. Justice Quarterly, 33(4), 682707.CrossRefGoogle Scholar
Vélez, D. M., Vélez, M. A., López, J. A., Díaz, C. E., Cendejas, M. G., Rivas, F. J., … & Pérez, V. (2014). Análisis integral del secuestro en México. Cómo entender esta problemática, México: Observatorio Nacional Ciudadano Seguridad, Justicia y Legalidad.Google Scholar

REFERENCES

Bartlett, J. (2014). The dark net: Inside the digital underworld. London: William Heinemann.Google Scholar
Calder, M. C. (2004). The Internet: Potential, problems and pathways to hands-on sexual offending. In Calder, M. C. (Ed.), Child sexual abuse and the Internet: Tackling the new frontier. Lyme Regis: Russell House Publishing.Google Scholar
Elliott, I. A. et al. (2008). Psychological profiles of Internet sexual offenders. Sexual Abuse: A Journal of Research and Treatment, 21, 7692.CrossRefGoogle Scholar
Ferraro, M. M. & Casey, E. (2005). Investigating child exploitation and pornography: The Internet, the law and forensic science. San Diego, CA: Elsevier.Google Scholar
Seto, M. C., Hanson, R. K., & Babchishin, K. M. (2011). Contact sexual offending by men with online sexual offenses. Sexual Abuse: A Journal of Research and Treatment, 23(1), 124145.Google Scholar
Sheldon, K. & Howitt, D. (2007). Sex offenders and the Internet. Chichester: John Wiley.Google Scholar
Smallbone, S. W. & Wortley, R. (2017). Preventing child sexual abuse online. In Brown, J. (Ed.), Online risk to children: Impact, protection and prevention. Chichester: Wiley Blackwell.Google Scholar
Taylor, M., Quayle, E., & Holland, G. (2001). Typology of pedophile picture collections. The Police Journal, 74, 97107.Google Scholar
Wolak, J., Finkelhor, D., & Mitchell, K. J. (2005). Child pornography possessors arrested in Internet-related crimes. Alexandria, VA: Department of Justice, National Center for Missing and Exploited Children.Google Scholar
Wortley, R. & Smallbone, S. (2012). Internet child pornography: Causes, investigation and prevention. Santa Barbara, CA: Praeger.Google Scholar

WEBSITES

International Center for Missing and Exploited Children. www.icmec.org/.

Internet Watch Foundation. www.iwf.org.uk/.

INTERPOL: Crime Against Children. www.interpol.int/Crime-areas/Crimes-against-children/Crimes-against-children.

US Financial Coalition Against Child Pornography. www.icmec.org/fcacp/.

REFERENCES

Beirne, P. (2014). Theriocide: Naming animal killing. International Journal for Crime, Justice and Social Democracy, 4(3), 5067.Google Scholar
Bisschop, L. (2015). Governance of the illegal trade in e-waste and tropical timber: Case studies on transnational environmental crime. Surrey: Ashgate.Google Scholar
Brisman, A., South, N., & White, R. (Eds.). (2014). Environmental crime and social conflict. Surrey: Ashgate.Google Scholar
Higgins, P. (2012). Earth is our business: Changing the rules of the game. London: Shepheard-Walwyn Publishers Ltd.Google Scholar
Kramer, R. & Michalowski, R. (2012). Is global warming a state-corporate crime? In White, R. (Ed.), Climate change from a criminological perspective (pp. 7188). New York: Springer.Google Scholar
Pink, G. & White, R. (Eds.). (2016). Environmental crime and collaborative state intervention. Basingstoke: Palgrave Macmillan.Google Scholar
South, N. & Brisman, A. (Eds.). (2013). The Routledge international handbook of green criminology. London: Routledge.Google Scholar
South, N. & Wyatt, T. (2011). Comparing illicit trades in wildlife and drugs: an exploratory study. Deviant Behaviour, 32, 538561.CrossRefGoogle Scholar
Walters, R. (2010). Toxic atmospheres: Air pollution, trade and the politics of regulation. Critical Criminology, 18, 307323.Google Scholar
White, R. (2011). Transnational environmental crime: Toward an eco-global criminology. London: Routledge.Google Scholar

WEBSITES

Convention on the Illegal Trade in Endangered Species (CITES). www.cites.org/.Google Scholar
Intergovernmental Panel on Climate Change. www.ipcc.ch/.Google Scholar
United Nations Interregional Crime and Justice Research Institute. www.unicri.it/.Google Scholar
United Nations Office on Drugs and Crime. www.unodc.org/.Google Scholar
United Nations Environment Programme. www.unenvironment.org/.Google Scholar
World Health Organization. www.who.int/.Google Scholar

REFERENCES

Amnesty International. (2004). Clouds of injustice – Bhopal disaster 20 years on. Retrieved from www.amnesty.org/en/library/info/ASA20/015/2004.Google Scholar
Cassels, J. (1994). The uncertain promise of law – lessons from Bhopal. Toronto: University of Toronto Press.Google Scholar
Chouhan, T. R. (1994). Bhopal: The inside story. Carbide workers speak out on the world’s worst industrial disaster. New York: Apex Press.Google Scholar
Das, V. (1995). Critical events: An anthropological perspective on contemporary India. Oxford: Oxford University Press.Google Scholar
Indian Council of Medical Research (ICMR). (1994). Health effects of the toxic gas leak from the Union Carbide methyl isocyanate plant in Bhopal. New Delhi.Google Scholar
Lapierre, D. & Moro, J. (1997). Five past midnight in Bhopal: The epic story of the world’s deadliest industrial disaster. New York: Simon & Schuster.Google Scholar
Weir, D. (1987). The Bhopal syndrome: Pesticides, environment, and health. San Francisco, CA: Sierra Club Books.Google Scholar

REFERENCE

May, C. (2017). Transnational crime and the developing world. Washington, DC: Global Financial Integrity.Google Scholar

WEBSITES

International Transport Workers’ Federation (ITF). www.itfglobal.org/index.cfm.

International Maritime Organization (IMO). www.imo.org.

Paris MOU, the model cooperative port state inspection program. www.parismou.org.

ICC International Maritime Bureau (IMB). www.icc-ccs.org.

World Maritime News. www.worldmaritimenews.com.

REFERENCES

Bowden, A. (2010). The economic cost of maritime piracy. One Earth Future Working Paper. Broomfield, CO: One Earth.Google Scholar
Bryant, W., Townsley, M., & Leclerc, B. (2014). Preventing maritime pirate attacks: A conjunctive analysis of the effectiveness of ship protection measures recommended by the international maritime organisation. Journal of Transportation Security, 7(1), 6982.Google Scholar
Clarke, R. V. (Ed.). (1997). Situational crime prevention. Monsey, NY: Criminal Justice Press.Google Scholar
Fu, X., Ng, A. K., & Lau, Y. Y. (2010). The impacts of maritime piracy on global economic development: The case of Somalia. Maritime Policy & Management, 37(7), 677697.Google Scholar
Halberstam, M. (1988). Terrorism on the high seas: The Achille Lauro, piracy and the IMO convention on maritime safety. American Journal of International Law, 82(2), 269310.Google Scholar
Ho, J. (2006). The security of sea lanes in Southeast Asia. Asian Survey, 46(4), 558574.Google Scholar
International Maritime Bureau. (2000). Piracy and armed robbery against ships annual report. London: IMB.Google Scholar
International Maritime Bureau. (2017). Piracy and armed robbery against ships annual report. London: IMB.Google Scholar
Kontorovich, E. & Art, S. (2010). An empirical examination of universal jurisdiction for piracy. The American Journal of International Law, 104(3), 436453.Google Scholar
Lansing, P. & Peterson, M. (2011). Ship-owners and the twenty first century Somali pirate: The business ethics of ransom payment. Journal of Business Ethics, 102, 507516.Google Scholar
Marchione, E. & Johnson, S. (2013). Spatial, temporal & spatio-temporal patterns of maritime piracy. Journal of Research in Crime and Delinquency, 50(4), 504524.Google Scholar
Roach, J. (2010). Countering piracy off Somalia: International law and international institutions. The American Journal of International Law, 104(3), 397416.Google Scholar
Shane, J. M. & Magnuson, S. (2014). Successful and unsuccessful pirate attacks worldwide: A situational analysis. Justice Quarterly, 33(4), 682707.Google Scholar
Shane, J. M., Piza, E. L., & Mandala, M. (2015). Situational crime prevention and worldwide piracy: a cross-continent analysis. Crime Science, 4(1), 21.Google Scholar
Shane, J. M., Piza, E. L., & Silva, J. R. (2017). Piracy for ransom: The implications for situational crime prevention. Security Journal, 122.Google Scholar
Shortland, A. & Vothknecht, M. (2010). Discussion papers combating “maritime terrorism” off the coast of Somalia. Berlin: German Institute for Economic Research.Google Scholar
Shortland, A. & Vothknecht, M. (2011). Combating “maritime terrorism” off the coast of Somalia. Economics of Security Working Paper 47. Berlin: Economics of Security.Google Scholar
Townsley, M., Leclerc, B., & Tatham, P. H. (2015). How super controllers prevent crimes: Learning from modern maritime piracy. British Journal of Criminology, 56(3), 537557.Google Scholar

WEBSITES

International Maritime Bureau, Piracy Reporting Center. www.icc-ccs.org/piracy-reporting-centre.

Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP). www.recaap.org/.

Maritime Security Centre, Horn of Africa. www.mschoa.org/on-shore/home.

Center for Problem-Oriented Policing. popcenter.asu.edu/.

REFERENCES

Boonratana, R., Das, J., Yongcheng, L., Htun, S. & Timmins, R. J. (2008). Macaca leonina. The IUCN Red List of Threatened Species. e.T39792A10257933.Google Scholar
Cooney, R. & Jepson, P. (2006). The international wild bird trade: What’s wrong with blanket bans? Oryx, 40(1), 1823.Google Scholar
US Department of Justice. (2012). Gibson Guitar Corp. agrees to resolve investigation into Lacey Act violations. Washington, DC: US Department of Justice, Office of Public Affairs. Retrieved from www.justice.gov/opa/pr/gibson-guitar-corp-agrees-resolve-investigation-lacey-act-violations.Google Scholar
Duffy, R. (2014). Waging a war to save biodiversity: the rise of militarized conservation. International Affairs, 90(4), 819834.Google Scholar
Eloff, C. & Lemieux, A. M. (2014). Rhino poaching in Kruger National Park, South Africa. In Situational prevention of poaching (pp. 1843). London and New York: Routledge.Google Scholar
Hill, J. F., Johnson, S. D., & Borrion, H. (2014). Potential uses of computer agent-based simulation modelling in the evaluation of wildlife poaching. In Situational prevention of poaching (pp. 120153). London and New York: Routledge.Google Scholar
International Union for the Conservation of Nature (IUCN). (2014). Rising murder toll of park rangers calls for tougher laws. Retrieved from www.iucn.org/content/rising-murder-toll-park-rangers-calls-tougher-laws.Google Scholar
Kurland, J., Pires, S. F., McFann, S. C., & Moreto, W. D. (2017). Wildlife crime: a conceptual integration, literature review, and methodological critique. Crime Science, 6(1), 4.Google Scholar
Kurland, J., Pires, S. F., & Marteache, N. (2018). The spatial pattern of redwood burl poaching and implications for prevention. Forest Policy and Economics, 94, 4654.Google Scholar
Moreto, W. D. & Lemieux, A. M. (2015). Poaching in Uganda: Perspectives of law enforcement rangers. Deviant Behavior, 36(11), 853873.CrossRefGoogle Scholar
Munn, C. A. (1992). Macaw biology and ecotourism, or “when a bird in the bush is worth two in the hand”. In Beissinger, S. R. & Snyder, N. F. R. (Eds.), New world parrots in crisis: Solutions from conservation biology (pp. 4772). Washington, DC: Smithsonian Institution.Google Scholar
Naidoo, R., Fisher, B., Manica, A., & Balmford, A. (2016). Estimating economic losses to tourism in Africa from the illegal killing of elephants. Nature Communications, 7. Retrieved from https://doi.org/10.1038/ncomms13379.Google Scholar
Nellemann, C., Henriksen, R., Kreilhuber, A., Stewart, D., Kotsovou, M., Raxter, P., … Barrat, S. (Eds.). (2016). The rise of environmental crime: a growing threat to natural resources, peace, development and security. Nairobi, Kenya: United Nations Environment Programme.Google Scholar
Pires, S. F. & Clarke, R. V. (2011). Sequential foraging, itinerant fences and parrot poaching in Bolivia. British Journal of Criminology, 51(2), 314335.Google Scholar
Scheffers, B. R., Corlett, R. T., Diesmos, A., & Laurance, W. F. (2012). Local demand drives a bushmeat industry in a Philippine forest preserve. Tropical Conservation Science, 5(2), 133141.Google Scholar
Sputnik News. (2017). Indian park rangers protect rhinos by shooting poachers. Retrieved from https://sputniknews.com/environment/201702131050643653-india-national-park-shoot-poachers/.Google Scholar
The World Bank. (2006). Strengthening forest law enforcement and governance (No. 36638 – GLB) (p. 93). Washington, DC: The World Bank.Google Scholar

REFERENCES

Behnam, A. & Faust, P. (2003). Twilight of flag state control. Ocean yearbook, 17, 167–192.Google Scholar
Chevallier, R. (2017). Safeguarding Tanzania’s coral reefs: The case of illegal blast fishing. South African Institute of International Affairs, Policy Insights, 46 .Google Scholar
Doughty, R. W. & Carmichael, V. (2011). The albatross and the fish: Linked lives in the open seas. Austin, TX: University of Texas Press.Google Scholar
Environmental Justice Foundation (EJF). (2010). All at sea: The abuse of human rights aboard illegal fishing vessels. London: Environmental Justice Foundation.Google Scholar
International Transport Workers’ Federation (ITF). (2006). Out of sight, out of mind: Seafarers, fishers & human rights. Retrieved from www.itfseafarers.org/files/extranet/-1/2259/HumanRights.pdf.Google Scholar
Le Gallic, B. & Cox, A. (2006). An economic analysis of illegal, unreported and unregulated (IUU) fishing: Key drivers and possible solutions. Marine Policy, 30, 689695.Google Scholar
Petrossian, G. & Clarke, R. V. (2014). Explaining and controlling illegal commercial fishing: An application of the CRAVED theft model. British Journal of Criminology, 54(1), 7390.Google Scholar
Petrossian, G., Marteache, N., & Viollaz, J. (2015). Where do “undocumented” fish land? An empirical assessment of port characteristics for IUU fishing. European Journal on Criminal Policy and Research, 21(3), 337351.Google Scholar
Pew Charitable Trusts. (2013). How to end illegal fishing. PEW, December 10, 2013. Retrieved from http://pewenvironment.org/news-room/reports/how-to-end-illega-fishing-85899522612.Google Scholar
Sea Around Us. (2018). Sea Around Us. Fisheries, ecosystems and biodiversity. Retrieved from www.seaaroundus.org.Google Scholar
Standing, A. (2015). Corruption and state-corporate crime in fisheries. U4 Issue. Retrieved from www.u4.no/publications/corruption-and-state-corporate-crime-in-fisheries/.Google Scholar
Telesetsky, A. (2015). Laundering fish in the global undercurrents: Illegal, unreported, and unregulated fishing and transnational organized crime. Ecology Law Quarterly, 41(4), 939996.Google Scholar
White, A. T., Vogt, H. P., & Arin, T. (2000). The Philippine coral reefs under threat: The economic losses caused by reef destruction. Marine Pollution Bulletin, 40, 598605.Google Scholar

REFERENCES

Graycar, A. & Prenzler, T. (2013). Understanding and preventing corruption. Basingstoke and New York: Palgrave Macmillan.Google Scholar
Holmes, L. (2016). Corruption: A very short introduction. New York: Oxford University Press.Google Scholar
Transparency International (TI). (2018). Frequently asked questions about corruption. Retrieved from www.transparency.org/whoweare/organisation/faqs_on_corruption.Google Scholar

WEBSITES

Transparency International. www.transparency.org/.

World Bank. www.worldbank.org.

United Nations Office on Drugs and Crime. www.unodc.org/unodc/en/corruption/index.html.

United Nations Convention against Corruption. www.unodc.org/pdf/corruption/publications_unodc_convention-e.pdf.

OECD Fighting Corruption. www.oecd.org/corruption.

Council of Europe GRECO (Group of States against Corruption). www.coe.int/t/dghl/monitoring/greco/default_en.asp.

U4 Anti-Corruption Resource Center. www.U4.no.

REFERENCES

Brantingham, P. & Brantingham, P. (1993). Nodes, paths and edges: Considerations on the complexity of crime and physical environment. Journal of Environmental Psychology, 13, 328.Google Scholar
Chesney-Lind, M. & Lind, I. Y. (1986). Visitors as victims: Crimes against tourists in Hawaii. Annals of Tourism Research, 13, 167191.Google Scholar
De Albuquerque, K. & McElroy, J. L. (1999). Tourism and crime in the Caribbean. Annals of Tourism Research, 26(4), 968984.Google Scholar
Knox, M. J. (2004). Socio-cultural impacts of tourism in Hawaii (general population). Part IV of Planning for Sustainable Tourism. Prepared for Hawaii State Dept. of Business, Economic Development, & Tourism. John M. Knox & Associates, Inc.Google Scholar
Robert, E. P., Burgess, E. W., & McKenzie, R. D. (1925). The city: suggestions for the study of human nature in the urban environment. Chicago: University of Chicago Press.Google Scholar
Stangeland, P. (1995). The crime puzzle: Crime patterns and crime displacement in southern Spain. Malaga: Instituo Andaluz Interunversario de Criminologia and Miguel Gómez Ediciones.Google Scholar

REFERENCE

Perry, S., Apel, R., Newman, G., & Clarke, R. (2016). The situational prevention of terrorism: An evaluation of the Israeli West Bank barrier. Journal of Quantitative Criminology, 33(4), 727751.Google Scholar

REFERENCES

Childers, J. P. (2013). The democratic balance: President McKinley’s assassination as domestic trauma. Quarterly Journal of Speech, 99(2), 156179.Google Scholar
Clarke, R. V. & Newman, G. R. (2006). Outsmarting the terrorists. New York: Praeger.Google Scholar
Corner, E. & Gill, P. (2015). A false dichotomy? Mental illness and lone-actor terrorism. Law and Human Behavior, 39(1), 23.Google Scholar
Freedman, L. Z. (1984). Social impact of attack on a president: Its public reverberations. Behavioral Sciences & the Law, 2(2), 195206.Google Scholar
Iqbal, Z. & Zorn, C. (2006). Sic semper tyrannis? Power, repression, and assassination since the Second World War. The Journal of Politics, 68(3), 489501.Google Scholar
James, D. V. & Farnham, F. R. (2016). Outcome and efficacy of interventions by a public figure threat assessment and management unit: a mirrored study of concerning behaviors and police contacts before and after intervention. Behavioral Sciences & the Law, 34(5), 660680.Google Scholar
Kelly, A. (2018, March 9). “Attacks and killings”: human rights activists at growing risk, study claims. Guardian. Retrieved from www.theguardian.com/global-development/2018/mar/09/human-rights-activists-growing-risk-attacks-and-killings-study-claims.Google Scholar
Mandala, M. & Freilich, J. D. (2017). Preventing successful assassination attacks by terrorists: an environmental criminology approach. Journal of Criminological Research, Policy and Practice, 3(3), 173191.Google Scholar
Meloy, J. R., James, D. V., Farnham, F. R., Mullen, P. E., Pathé, M., Darnley, B., & Preston, L. (2004). A research review of public figure threats, approaches, attacks, and assassinations in the United States. Journal of Forensic Sciences, 49(5), 18.Google Scholar
Nice, D. C. (1994). Partisan realignment, the modern presidency, and presidential assassination. Social Science Journal, 31(3), 293305.Google Scholar

REFERENCES

Albanese, J. S. (2015). Organized crime: From the Mob to transnational organized crime. London and New York: Routledge.Google Scholar
Ayling, J. & Broadhurst, R. (2014). Organized crime control in Australia and New Zealand. In Paoli, L. (Ed.), The Oxford handbook of organized crime. Oxford: Oxford University Press.Google Scholar
EUROPOL. (2017). Serious and organised crime threat assessment. Brussels: European Union.Google Scholar
Hauck, P. & Peterke, S. (Eds). (2016). International law and transnational organised crime. Oxford: Oxford University Press.Google Scholar
Okoth, J. R. A. (2014). The crime of conspiracy in international criminal law. New York: Springer.Google Scholar
Sergi, A. (2014). Organised crime in criminal law: Conspiracy and membership offences in Italian, English and international frameworks. King’s Law Journal, 25, 185200.Google Scholar
Transcrime. (2012). Study on extortion and racketeering: The need for an instrument to combat activities. Brussels: European Commission.Google Scholar
US Department of Justice, Office of Public Affairs. (2018, April 12). Backpage’s co-founder and CEO, as well as several Backpage-related corporate entities, enter guilty pleas [press release]. Retrieved from www.justice.gov/opa/pr/backpage-s-co-founder-and-ceo-well-several-backpage-related-corporate-entities-enter-guilty.Google Scholar
US Department of Justice, Office of Public Affairs. (2017, April 5). Brooklyn seafood dealer pleads guilty for illegally trafficking American eels [press release]. Retrieved from www.justice.gov/opa/pr/brooklyn-seafood-dealer-pleads-guilty-illegally-trafficking-american-eels.Google Scholar
UN Office on Drugs and Crime. (2018). Organized crime. Retrieved from www.unodc.org/unodc/en/organized-crime/intro.html.Google Scholar

REFERENCES

Albanese, J. S. (2011). Transnational crime and the 21st century. New York: Oxford University Press.Google Scholar
Bruinsma, G. & Bernasco, W. (2004). Criminal groups and transnational illegal markets: A more detailed examination on the basis of social network theory. Crime, Law and Social Change, 41, 7994.Google Scholar
Campana, P. (2011). Eavesdropping on the Mob: The functional diversification of mafia activities across territories. European Journal of Criminology, 8, 213228.Google Scholar
Chepesiuk, R. (2003). The bullet or the bribe: Taking down Colombia's Cali drug cartel. Westport, CT: Praeger.Google Scholar
Decker, S. H. & Chapman, M. T. (2008). Drug smugglers on drug smuggling: Lessons from the inside. Philadelphia, PA: Temple University Press.Google Scholar
Ellis, S. (2009). West Africa’s international drug trade. African Affairs, 108, 171196.Google Scholar
European Monitoring Centre for Drugs and Drug Addiction (EMCDDA). (2017). European drug report. Lisbon: EMCDDA.Google Scholar
Giommoni, L., Aziani, A., & Berlusconi, G. (2017). How do illicit drugs move across countries? A network analysis of the heroin supply to Europe. Journal of Drug Issues, 47, 217240.Google Scholar
Hufnagel, S. & McCartney, C. (2015). Police cooperation against transnational criminals. In Boister, N. & Currie, R. J. (Eds.), Routledge handbook of transnational criminal law (pp. 107120). London: Routledge.Google Scholar
Paoli, L. & Reuter, P. (2008). Drug trafficking and ethnic minorities in Western Europe. European Journal of Criminology, 5(1), 13–37.Google Scholar
Pashev, K. (2008). Cross-border VAT fraud in an enlarged Europe. In van Duyne, P. C., Harvey, J., Maljevic, A., Scheinost, M., & von Lampe, K. (Eds.), European crime-markets at crossroads (pp. 237259). Nijmegen, the Netherlands: Wolf Legal Publishers.Google Scholar
Passas, N. (1998). A structural analysis of corruption: The role of criminogenic asymmetries. Transnational Organized Crime, 4, 4255.Google Scholar
Sabatelle, D. R. (2011). The scourge of opiates: The Illicit narcotics trade in the Islamic Republic of Iran. Trends in Organized Crime, 14, 314331.Google Scholar
von Lampe, K. (2016). Organized crime: Analyzing illegal activities, criminal structures, and extra-legal governance. Thousand Oaks, CA: Sage.Google Scholar
Weenink, A. W., Huisman, S., & Van der Laan, F. J. (2004). Crime without frontiers: Crime pattern analysis Eastern Europe 2002–2003. Driebergen, the Netherlands: Korps Landelijke Politiediensten.Google Scholar

REFERENCES

Bichler, G., Malm, A. E., & Cooper, T. (2017). Drug supply networks: a systematic review of the organizational structure of illicit drug trade. Crime Science, 6, 2.Google Scholar
Calderoni, F. (2012). The structure of drug trafficking mafias: the ‘Ndrangheta and cocaine. Crime, Law and Social Change, 58, 321349.Google Scholar
McIllwain, J. (1999). Organized crime: A social network approach. Crime, Law and Social Change, 32, 301323.Google Scholar
Morselli, C. (2009). Inside criminal networks. New York: Springer.Google Scholar
Natarajan, M. (2000). Understanding the structure of a drug trafficking organization: A conversational analysis. In Natarajan, M. & Hough, M. (Eds.), Illegal drug markets: From research to prevention policy (Vol. 11, pp. 273298). Monsey: Criminal Justice Press/Willow Tree Press.Google Scholar
Natarajan, M. (2006). Understanding the structure of a large heroin distribution network: A quantitative analysis of qualitative data. Journal of Quantitative Criminology, 22, 171192.Google Scholar
Natarajan, M., Zanella, M., & Yu, C. (2015). Classifying the variety of drug trafficking organizations. Journal of Drug Issues, 45, 409430.CrossRefGoogle Scholar
Powell, W. (1990). Neither market nor hierarchy: Network forms of organization. In Staw, B. M. & Cummings, L. L. (Eds.), Research in organizational behavior (pp. 295336). Greenwich: JAI Press.Google Scholar
Von Lampe, K. (2003). Criminally exploitable ties: A network approach to organized crime. In Viano, E. C., Magallanes, J., & Bridel, L. (Eds.), Transnational organized crime: Myth, power, and profit (pp. 922). Durham, NC: Carolina Academic Press.Google Scholar
Von Lampe, K. (2009). Human capital and social capital in criminal networks: introduction to the special issue on the 7th Blankensee Colloquium. Trends in Organized Crime, 12, 93100.Google Scholar
Waring, E. (2002). Co-offending as a network form of social organization. In Weisburd, D. & Waring, E. J. (Eds.), Crime and social organization (pp. 3147). New Brunswick, NJ: Transaction.Google Scholar

REFERENCES

Antonopoulos, G. A. & Papanicolaou, G. (2018). Organized crime. A very short introduction, Oxford: Oxford University Press.Google Scholar
Arlacchi, P. (1983). La Mafia imprenditrice. Bologna: Il Mulino.Google Scholar
Block, A. (1980). East side – west side: Organizing crime in New York. Cardiff: University of Cardiff Press.Google Scholar
Carnevale, S., Forlati, S., & Giolo, O. (Eds.). (2017). Redefining organized crime. Oxford: Hart.Google Scholar
Catanzaro, R. (1988). Il delitto come impresa. Storia sociale della Mafia. Padua: Liviana.Google Scholar
Dino, A. (2008). La Mafia devota. Chiesa, religione, Cosa Noistra. Rome/Bari: Laterza.Google Scholar
Gambetta, D. (1992). La mafia siciliana. Un’industria della protezione privata. Turin: Einaudi.Google Scholar
Gounev, P. & Ruggiero, V. (Eds.). (2012). Corruption and organized crime in Europe. London and New York: Routledge.CrossRefGoogle Scholar
Lodato, S. & Scarpinato, R. (2008). Il ritorno del principe. La criminalità dei potenti in Italia. Milan: Charelettere.Google Scholar
Ruggiero, V. (1996). Organized and corporate crime in Europe. Aldershot: Dartmouth.Google Scholar
Ruggiero, V. (2002). Fuzzy criminal actors. In Ruggiero, V. (Ed.), Is white collar crime organised crime? Special issue of Crime Law and Social Change, 37 (3), 177190.Google Scholar
Ruggiero, V. (2017). Dirty money: On financial delinquency. Oxford: Oxford University Press.Google Scholar
Santino, U. & La Fiura, G. (1990). L’impresa mafiosa. Milan: Franco Angeli.Google Scholar
Scarpinato, R. (2004). La storia: Italia mafiosa e Italia civile. Micro Mega, 5, 259286.Google Scholar
Sciarrone, R. (Ed.). (2004). La Mafia esiste ancora. Rome: l’Unità.Google Scholar

REFERENCES

Bell, D. (2000). The end of ideology: On the exhaustion of political ideas in the fifties. New Haven, CT: Harvard University Press.Google Scholar
Blok, A. (2008). Reflections on the Sicilian Mafia: Peripheries and their impact on centers. In Siegel, D. & Nelen, A. (Eds.), Organized crime: Culture, markets and policies. Dordrecht: Springer.Google Scholar
Felson, M. (2006). Crime and nature. London: SAGE publications.Google Scholar
Gambetta, D. (1993). The Sicilian Mafia: The business of private protection. New Haven, CT: Harvard University Press.Google Scholar
Gambetta, D. (2000). Mafia: The price of distrust. In Gambetta, D. (Ed.), Trust: Making and breaking cooperative relations (pp. 158–210). Oxford: Oxford University Press.Google Scholar
Landesco, J. (1968). Organized crime in Chicago: Part III of The Illinois Crime Survey 1929. Chicago: The University of Chicago Press.Google Scholar
Paoli, L. & Fijnaut, C. (2004). Organised crime in Europe: Concepts, patterns, control policies in the European Union and beyond. Dordrecht: Springer.Google Scholar
Passas, N. (2002). Cross-border crime and the interface between legal and illegal actors. In Van Duyne, P., von Lampe, K., & Passas, N. (Eds.), Upper world and underworld in cross-border crime (pp. 11–43). The Netherlands: Wolf Legal Publishers.Google Scholar
Reuter, P. (1994). Research on American organized crime. In Kelly, R. J., Chin, K., & Schatzberg, R. (Eds.), Handbook of organized crime in the United States (pp. 91120). Santa Barbara, CA: Greenwood Press.Google Scholar
Savona, E. U., Berlusconi, G., & Riccardi, M. (Eds.). (2016). Organised crime in European businesses. London:RoutledgeGoogle Scholar
Transcrime. (2009). Study on extortion racketeering the need for an instrument to combat activities of organized crime. Final Report prepared for the European Commission. Brussells (unpublished).Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2002). Results of a pilot survey of forty selected organized criminal groups in sixteen countries. Vienna: UNODC.Google Scholar
Volkov, V. (2002). Violent entrepreneurs: The use of force in the making of Russian capitalism. London: Cornell University Press.Google Scholar

REFERENCES

Birch, D. (2004). U.S. prison due to free Russian mob boss. Baltimore Sun. Retrieved from www.baltimoresun.com/news/bs-xpm-2004-07-08-0407080015-story.html.Google Scholar
Central Election Commission (CEC). (2014). Report of the Control and Auditing Service under the CEC of Russia for 2009–2013. Moscow.Google Scholar
Central Election Commission (CEC). (2015). Report of the Control and Auditing Service under the CEC of Russia for 2014. Moscow.Google Scholar
Central Election Commission (CEC). (2016). Report of the Control and Auditing Service under the CEC of Russia for 2015. Moscow.Google Scholar
Central Election Commission (CEC). (2016). Report of the Control and Auditing Service under the CEC of Russia for 2016. Moscow.Google Scholar
Finckenauer, J. O. & Voronin, Y. A. (2001). The threat of Russian organized crime. Washington, DC: US Department of Justice.Google Scholar
Investigative Committee (IC). (2017). Annual report of the Investigative Committee activity for 2011–2016. Moscow.Google Scholar
Levada. (2016). Waiting for election abuses. Retrieved from www.levada.ru/2016/08/22/ozhidanie-zloupotreblenij-na-vyborah/.Google Scholar
Levada Center. (2016). Waiting for election abuses. Retrieved from www.levada.ru/2016/08/22/ozhidanie-zloupotreblenij-na-vyborah/.Google Scholar
Ministry of Internal Affairs (MIA). (2018). Form 1-OC of Ministry of Internal Affairs for 2008–2017. Moscow.Google Scholar
Pravda. (2013). Most Russians support ban on election judged authorities. Retrieved from www.pravda.ru/news/politics/24-12-2013/1186535-opros-0/.Google Scholar
Russian Public Opinion Research Center. (2017, February 22). Postradavshie ot prestuplenij: v nadezhde na spravedlivost [Victims of crime: in the hope of justice]. Retrieved from https://wciom.ru/index.php?id=236&uid=116081.Google Scholar
Sukharenko, A. (2012). Russian organized crime and the existing measures to combat it. Law Enforcement Executive Forum, 12(1), 166178.Google Scholar
Sukharenko, A. (2014). Kriminalizatsiya regionalnikh organov vlasti: sostoyanie, tendentsii i meri protivodeistviya. Retrieved from www.nbpublish.com/library_get_pdf.php?id=32201.Google Scholar
Sukharenko, A. (2017). Uprava na zakonnikov. Retrieved from www.index.org.ru/nevol/2017-53/11-53-suprava.html.Google Scholar
US Attorney South District of New York (2018). Press release, “‘Thief-in-law’ Razhden Shulaya sentenced in Manhattan federal court to 45 years in prison.” Retrieved from www.justice.gov/usao-sdny/pr/thief-law-razhden-shulaya-sentenced-manhattan-federal-court-45-years-prison.Google Scholar
US Treasury (2017). Press release, “Treasury targets the ‘thieves-in-law’ Eurasian transnational criminal organization.” Retrieved from https://home.treasury.gov/news/press-releases/sm0244.Google Scholar

REFERENCES

Arsovska, J. (2015). Decoding Albanian organized crime. Berkeley, CA: California University Press.Google Scholar
Arsovska, J. (2009). Networking sites: Criminal group expands across the Balkans. Jane’s Intelligence Review, 22(1), 4447.Google Scholar
Arsovska, J. & Kostakos, P. (2008). Illicit arms trafficking and the limits of rational choice theory: The case of the Balkans. Trends in Organized Crime, 11(4), 352387.Google Scholar
BBC. (2003, December 22). Prison for sex slave gang leader. Retrieved from http://news.bbc.co.uk/2/hi/uk_news/3340921.stm.Google Scholar
Derens, J. A. (2011, December 29). Macedonia: Europe’s new hotspot for illegal immigrants. Time.Google Scholar
European Council. (2003). A secure Europe in a better world. France: EU Institute for Security Studies.Google Scholar
Hajdinjak, M. (2002). Smuggling in Southeast Europe: The Yugoslav wars and the development of regional criminal networks in the Balkans. Sofia: CSD.Google Scholar
Khakee, A. & Florquin, N. (2003). Kosovo and the gun. Geneva: Small Arms Survey.Google Scholar
Limanowska, B. (2005). Trafficking in human beings in South Eastern Europe. Sarajevo: UNDP.Google Scholar
Samuels, D. (2010). The Pink Panthers: A tale of diamonds, thieves, and the Balkans. The New Yorker, 86(8), 4272.Google Scholar
Stefanova, R. (2004). Fighting organised crime in a UN protectorate: Difficult, possible, necessary. Southeast European and Black Sea Studies, 4(2), 257279.Google Scholar
Townsend, M. (2019, January 13). Kings of cocaine: How the Albanian mafia seized control of the UK drugs trade. Guardian. Retrieved from www.theguardian.com/world/2019/jan/13/kings-of-cocaine-albanian-mafia-uk-drugs-crime.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2008). Crime and its impact on the Balkans. Vienna: UNODC.Google Scholar

WEBSITES

Balkan Investigative Reporting Network. www.birn.eu.com.

Center for the Study of Democracy. www.csd.bg.

RiskMonitor. www.riskmonitor.bg.

REFERENCES

Booth, M. (1990). The Triads: The Chinese criminal fraternity. London: Grafton Books.Google Scholar
Chin, K. L. (1990). Chinese subculture and criminality. New York: Greenwood Press.Google Scholar
Chu, Y. K. (2000). The Triads as business. London: Routledge.Google Scholar
Curtis, G. (1983). Election campaigning Japanese style. Tokyo: Kodansha.Google Scholar
Dannen, F. (1997). Partners in crime. The New Republic. Retrieved from https://newrepublic.com/article/90738/partners-in-crime.Google Scholar
Finckenauer, J. & Chin, K. (2006). Asian transnational organized crime and its impact on the US. Trends in Organized Crime, 10, 18107.Google Scholar
Fiorentini, G. & Peltzman, S. (Eds.). 1995. The economics of organized crime. Cambridge: Cambridge University Press.Google Scholar
Hill, P. (2003). The Japanese Mafia. New York: Oxford University Press.Google Scholar
Hong Kong Police Force. (2018). Crime statistics. Retrieved from www.police.gov.hk/ppp_en/09_statistics/csc.html.Google Scholar
Huang, F. & Vaughn, M. (1992). A descriptive analysis of Japanese organized crime. International Criminal Justice Review, 2, 1957.Google Scholar
Kaplan, D. & Dubro, A. (1986). Yakuza – the explosive account of Japan’s criminal underworld. Reading, MA: Addison-Wesley.Google Scholar
Kwok, I. & Lo, T. (2013). Anti-triad legislations in Hong Kong. Trends in Organized Crime, 16, 7494.Google Scholar
Lo, T. (2010). Beyond social capital. British Journal of Criminology, 50, 851872.Google Scholar
National Police Agency. (2005). The Situation of violent groups in 2004. Tokyo: National Police Agency.Google Scholar
Passmore, S. (n.d.). Triads and film. BBC World Service/World Agenda – Global Crime. Retrieved from www.bbc.co.uk/worldservice/specials/163_wag_globalcrime/index.shtml.Google Scholar
Rankin, A. (2012). Recent trends in organized crime in Japan. The Asia-Pacific Journal, 10. Retrieved from https://apjjf.org/2012/10/7/Andrew-Rankin/3692/article.html.Google Scholar
Reilly, E. Jr. (2014). Criminalizing Yakuza membership. Washington Univ. Global Studies Law Review, 13, 801829.Google Scholar
Sansom, G. (1943). Japan: A short cultural history. New York: Appleton-Century-Crofts.Google Scholar
Sinn, E. (1989). Power and charity: The early history of the Tung Wah Hospital, Hong Kong. Hong Kong: Oxford University Press.Google Scholar
Varese, F. & Wong, R. (2018). Resurgent triads? Democratic mobilization and organized crime in Hong Kong. Australian and New Zealand Journal of Criminology, 5, 2339.Google Scholar
Zhang, S. & Chin, K. (2003). The declining significance of triad societies in transnational illegal activities. British Journal of Criminology, 43, 469488.Google Scholar

REFERENCES

Anderson, J. & Van Atta, D. (1988, August 24). The kings of the Medellin Cartel. Washington Post. Retrieved from www.washingtonpost.com/archive/lifestyle/food/1988/08/24/the-kings-of-the-medellin-cartel/d934d1bf-887e-4fcd-8223-9673292e5199/?utm_term=.caa68f947e2c.Google Scholar
Bowden, M. (2002). Killing Pablo: The hunt for the world’s greatest outlaw. New York: Penguin Books.Google Scholar
Chepesiuk, R. (2003). The bullet or the bribe: Taking down Colombia’s Cali Drug Cartel. Westport, CT: Praeger Publishers.Google Scholar
Clawson, P. & LeeIII, R. (1996). The Andean cocaine industry. New York: St. Martin’s Gryphon.Google Scholar
Cook, C. W. (2007, October 16). Mexico’s drug cartels, CRS report for Congress: Foreign Affairs, Defence and Trade Division. Retrieved from www.fas.org/sgp/crs/row/RL34215.pdf.Google Scholar
Crandall, R. (2002). Driven by drugs: US policy toward Colombia. Boulder, CO: Lynne Rienner Publishers.Google Scholar
Friman, H. R. (1999). Germany and the transformations of cocaine, 1960–1920. In Gootenberg, P. (Ed.), Cocaine: Global histories (pp. 83–104). London: Routledge.Google Scholar
Guerrero Gutiérrez, E. (2010, November 1). Cómo reducir la violencia en México. Nexos. Retrieved from www.nexos.com.mx/?p=13997.Google Scholar
Insight Crime. (2018, January 24). Sinaloa Cartel. Retrieved from www.insightcrime.org/mexico-organized-crime-news/sinaloa-cartel-profile/.Google Scholar
Insight Crime. (2017, March 10). Gulf Cartel. Retrieved from www.insightcrime.org/mexico-organized-crime-news/gulf-cartel-profile/.Google Scholar
Kenney, M. (2007). The architecture of drug trafficking: Network forms of organization in the Colombian cocaine trade. Global Crime, 8(3), 233259.Google Scholar
Roldan, M. (1999). Cocaine and the “miracle” or modernity in Medellín. In Gootenberg, P. (Ed.). Cocaine: Global Histories. London: Routledge.Google Scholar
Spillane, J. F. (1999). Making a modern drug: The manufacture, sale, and control of cocaine in the United States, 1880–1920. In Gootenberg, P. (Ed.), Cocaine: global histories (pp. 21–45). London: Routledge.Google Scholar
Thoumi, F. (1995). Political economy and illegal drugs in Colombia. Boulder, CO: Lynne Rienner Publishers.Google Scholar
Thoumi, F. (2003). Illegal drugs, economy, and society in the Andes. Washington, DC: Woodrow Wilson Center Press.Google Scholar

REFERENCES

Basra, R., Neumann, P. R., & Brunner, C. (2016). Criminal pasts, terrorist futures: European jihadists and the new crime-terror nexus. London: International Centre for the Study of Radicalisation and Political Violence, King’s College.Google Scholar
Makarenko, T. (2004). The crime–terror continuum: Tracing the interplay between transnational organised crime and terrorism. Global Crime, 6, 129.Google Scholar
Manwaring, M. G. (2005), Street gangs: The new urban insurgency. Carlisle: Strategic Studies Institute, US Army War College.Google Scholar
Shelley, L. I., Picarelli, J. T., Irby, A., Hart, D. M., Craig-Hart, P. A., Williams, P., Simon, S., Abdullaev, N., Stanislawski, B., & Covill, L. (2005). Methods and motives: Exploring links between transnational organized crime & international terrorism. Trends in Organized Crime, 9(2), 5267.Google Scholar
United Nations Security Council Resolution S/RES/2195 (2014) on Threats to International Peace and Security.Google Scholar
UNODC. (2001). The global Afghan opiate trade: A threat assessment. Vienna: UNODC.Google Scholar
UNODC. (2016). World wildlife crime report. Vienna: UNODC.Google Scholar
Williams, P., (1998) Terrorism and organized crime: Convergence, nexus or transformation? In Jervasm, G. (Ed.), FOA report on terrorism. Stockholm: Defence Research Establishment.Google Scholar

REFERENCES

Andreas, P. (2000). Border games: Policing the US–Mexico divide. Ithaca, NY: Cornell University Press.Google Scholar
Bilton, N. (2017). American kingpin: The epic hunt for the criminal mastermind behind the Silk Road. New York: Portfolio/Penguin.Google Scholar
Correa-Cabrera, G. (2017). Los Zetas: Criminal corporations, energy and civil war in Mexico. Austin, TX: University Of Texas Press.Google Scholar
Farah, D. (2013). Fixers, super fixers, and shadow facilitators: How networks connect. In Miklaucic, M. and Brewer, J. (Eds.), Convergence: Illicit networks and national security in the age of globalization. Washington, DC: National Defense University Press.Google Scholar
Glickman, N. (2000). The Jewish white slave trade and the untold story of Raquel Liberman. New York: Garland.Google Scholar
Global Witness. (2009). Undue diligence: How banks do business with corrupt regimes. London: Global Witness.Google Scholar
Goodman, M. (2016). Future crimes: Inside the digital underground and the battle for our connected world. New York: Penguin Books.Google Scholar
Grabosky, P. (2015). Cybercrime. Oxford: Oxford University Press.Google Scholar
Greenmeier, L. (2015, February 8). Human traffickers caught on hidden Internet. Scientific American. Retrieved from www.scientificamerican.com/article/human-traffickers-caught-on-hidden-internet/.Google Scholar
International Consortium of Investigative Journalists (ICIJ). (2017). The Panama Papers: Exposing the rogue offshore financial services industry. Retrieved from www.icij.org/investigations/panama-papers/.Google Scholar
Kaplan, D. E. & Dubro, A. (2003). Yakuza: Japan’s criminal underworld. Berkeley, CA: University of California Press.Google Scholar
Naím, M. (2006) Illicit: How smugglers, traffickers and copycats are hijacking the global economy. New York: Anchor.Google Scholar
Nordstrom, C. (2007). Global outlaws: Crime, money and power in the contemporary world. Berkeley and Los Angeles, CA: University of California.Google Scholar
Portman, R. & Carper, T. (2018). Combating the opioid crisis: Exploiting vulnerabilities in international mail. United States Senate Permanent Subcommittee on Investigations. Retrieved from www.portman.senate.gov/public/index.cfm/files/serve?File_id=12F93202-C8EC-4AF1-8A66-181EE6716F37.Google Scholar
Seagrave, S. (1995). Lords of the Rim: The invisible empire of the overseas Chinese. London and New York: Bantam Press.Google Scholar
Sharman, J. C. (2011) The money laundry: Regulating criminal finance in the global economy. Ithaca, NY: Cornell University Press.Google Scholar
Shelley, L. (2010). Human trafficking: A global perspective. Cambridge and New York: Cambridge University Press.Google Scholar
Thoumi, F. E. (2003). Illegal drugs, economy and society in the Andes. Washington, DC: Woodrow Wilson Center Press.Google Scholar
Tinti, P. & Reitano, T. (2017). Migrant, refugee, smuggler, savior. Oxford: Oxford University Press.Google Scholar
Triandafyllidou, A. (2018). Migrant smuggling: Novel insights and implications or migrant control policies. The Annals of the American Academy of Political and Social Science, 676 (1), 212221.Google Scholar
United Nations International Drug Control Programme. (1997). World drug report. Oxford: Oxford University Press.Google Scholar
Vincent, I. (2005). Bodies and souls: The tragic plight of three Jewish women forced into prostitution in the Americas. New York: William Morrow.Google Scholar

WEBSITES

Global Initiative on Transnational Organized Crime. http://globalinitiative.net/.

International Narcotics Control Strategy Report (issued annually). www.state.gov/j/inl/rls/nrcrpt/.

International Organization for Migration. www.iom.int.

Terrorism, Transnational Crime and Corruption Center (TraCCC). http://traccc.gmu.edu/.

United Nations Office on Drugs and Crime. www.unodc.org.

REFERENCES

Ekblom, P. (1997). Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention, 2(4), 249265.Google Scholar
Ekblom, P. (1999). Can we make crime prevention adaptive by learning from other evolutionary struggles? Studies on Crime and Crime Prevention, 8(1), 2751.Google Scholar
Ekblom, P. (2000, March). Future crime prevention – a “mindset kit” for the seriously foresighted. London: Policing and Reducing Crime Unit. London: Home Office Research Development and Statistics Directorate. Retrieved from www.foresight.gov.uk/Crime%20Prevention/Futire_Crime_Prevention_Mindset_Kit_March_2000.Google Scholar
Felson, M. (2002). Crime and everyday life. Third Edition. Thousand Oaks, CA: Sage and Pine Forge Press.Google Scholar
Felson, M. (2006). Crime and nature. Thousand Oaks, CA: Sage and Pine Forge Press.Google Scholar
Felson, M. & Clarke, R. V. (1997). Business and crime prevention. Monsey, NY: Criminal Justice Press.Google Scholar
Felson, M. & Peiser, R. (1998). Reducing crime through real estate development and management. Washington, DC: Urban Land Institute.Google Scholar
Levi, M. & Reuter, P. (2006). Money laundering: A review of current controls and their consequences. In Tonry, M. (Ed.), Crime and justice: An annual review of research, Vol. 34. Chicago: Chicago University Press.Google Scholar
Newman, G. & Clarke, R. V. (2003). Superhighway robbery: Preventing e-commerce crime. Portland, OR: Willan.Google Scholar
Newman, O. (1972). Defensible space: Crime prevention through urban design. New York: Macmillan.Google Scholar
Van Duyne, P. & Levi, M. (2005), Drugs and money. London: RoutledgeGoogle Scholar
Williams, M. (2004). Understanding king punisher and his order: Vandalism in an online community – motives, meanings and possible solutions. Internet Journal of Criminology. Retrieved from www.internet-journalofcriminology.com.Google Scholar

REFERENCES

Arena, M. P. & Arrigo, B. A. (2006). The terrorist identity: Explaining the terrorist threat. New York: New York University Press.Google Scholar
Becker, H. (1963). Outsiders: Studies in the sociology of deviance. New York: The Free Press.Google Scholar
Durkheim, E. (1951). The division of labour. New York: The Free Press.Google Scholar
Ferracuti, F. (1982). A sociopsychiatric interpretation of terrorism. The Annals of the American Academy of Political and Social Science, 129140.Google Scholar
Grabosky, P. & Stohl, M. (2010), Crime and terrorism. London: Sage.Google Scholar
Hagan, J. (1988). Modern criminology: Crime, criminal behaviour, and its control. New York: McGraw-Hill.Google Scholar
Hamm, M. S. (2007). Terrorism as crime. New York: New York University Press.Google Scholar
Laqueur, W. (1977). Terrorism. Boston: Little, Brown.Google Scholar
Lombroso, C. (1876). L’uomo delinquente. Turin: Bocca.Google Scholar
Merton, R. K. (1968). Social theory and social structure. New York: The New Press.Google Scholar
Ruggiero, V. (2005). Understanding political violence. London: Open University Press.Google Scholar
Ruggiero, V. (2017a). The radicalization of democracy. Critical Criminology, 25(4), 593607.Google Scholar
Ruggiero, V. (2017b). Hybrids: On the crime-terror nexus. International Journal of Comparative and Applied Criminal Justice, doi.org/10.1080/01924036.2017.1411283.Google Scholar
Sykes, G. & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664670.Google Scholar
Turk, A. T. (1982). Political criminality: The defiance and defence of authority. London: Sage.Google Scholar

REFERENCES

Aronowitz, A. A. (2009). Human trafficking, human misery: The global trade in human beings. Westport, CT: Praeger.Google Scholar
Bernat, F. (2017). Migration and crime. Oxford Research Encyclopedia of Criminology. Online Publication Date: April 2017. doi: 10.1093/acrefore/9780190264079.013.93.Google Scholar
Beutin, R., Canoy, M., Horvath, A., Hubert, A., Lerais, F., & Sochacki, M. (2007). Reassessing the link between public perception and migration policy. European Journal of Migration & Law, 9(4), 389418.Google Scholar
Clarke, R. V. (2002). Protecting immigrants from victimization: The scope for situational crime prevention. In Freilich, J. D. et al. (Eds.), Migration, culture conflict and crime (pp. 103119). Burlington, VT: Ashgate.Google Scholar
Ferraro, V. (2016). Immigration and crime in the new destinations, 2000–2007: A test of the disorganizing effect of migration. Journal of Quantitative Criminology, 32, 2345.Google Scholar
Finckenauer, J. & Voronin, Y. (2001). The threat of Russian organized crime. Washington, DC: US Department of Justice, National Institute of Justice, NCJ 187085.Google Scholar
Franko Aas, K. (2007). Globalization and crime. London: Sage Publications.Google Scholar
Guerette, R. T. (2007). Immigration policy, border security and migrant deaths: An impact evaluation of life saving efforts under the Border Safety Initiative. Criminology & Public Policy, 6(2), 201222.Google Scholar
Howard, G. J., Newman, G., & Freilich, J. D. (2002). Further evidence on the relationship between population and diversity and violent crime. International Journal of Comparative and Applied Criminal Justice, 26(2), 203229.Google Scholar
Melossi, D., de Giorgi, A., & Massa, E. (2009). The “normality” of “second generations” in Italy and the importance of legal status: A self-report delinquency study. Sociology of Crime, Law & Deviance, 13, 4765.Google Scholar
Natarajan, M. (2005). Dealing with domestic violence in India: A problem solving model for police. In Freilich, J. D. & Guerette, R. (Eds.), Migration, culture conflict, crime and terrorism. Burlington, VT: Ashgate.Google Scholar
Sampson, R. J. (2008). Rethinking crime and immigration. Contexts, 7(1), 2833.Google Scholar
Sohoni, D. & Sohoni, T. W. P. (2014). Perceptions of immigrant criminality: Crime and social boundaries. Sociological Quarterly, 55, 4971.Google Scholar
Stupi, E. K., Chiricos, T., & Gerz, M. (2016). Perceived criminal threat from undocumented immigrants: Antecedents and consequences for policy preferences. Justice Quarterly, 33, 239266.Google Scholar
Zingher, J. N. (2014). The ideological and electoral determinants of laws targeting undocumented migrants in the U.S. states. State Politics & Policy Quarterly, 14, 90117.Google Scholar

REFERENCES

Borbieva, N. (2012). Kidnapping women. Anthropological Quarterly, 85(1), 141169.Google Scholar
Counts, D. A., Brown, J. K., & Campbell, J. C. (Eds.). (1999). To have and to hit: Cultural perspectives on wife beating. Urbana, IL: University of Illinois Press.Google Scholar
Duneier, M. (2000). Sidewalk. New York: Farrar, Straus and Giroux.Google Scholar
Ferrell, J. (1995). Culture, crime and cultural criminology. Journal of Criminal Justice and Popular Culture, 3(3), 2542.Google Scholar
Fonseca, I. (1996). Bury me standing: The Gypsies and their journey. New York: Vintage.Google Scholar
Gibbs, J. L. (2001). The Kpelle moot. In Podolefsky, A. and Brown, P. J. (Eds.), Applying cultural anthropology (pp. 234–241). London: Mayfield Publishing.Google Scholar
Goffman, E. (1963). Behavior in public places: Notes on the social organization of gatherings. New York: Free Press.Google Scholar
Harris, L. (2002). Crime and culture: Challenges facing law enforcement. Institute for Criminal Justice Education. Retrieved from www.icje.org/id162.htm.Google Scholar
Lee, R. (1993). The Dobe Ju/’hoansi. Fort Worth, TX: Harcourt Brace.Google Scholar
Levine, K. L. (2003). Negotiating the boundaries of crime and culture: A sociolegal perspective on cultural defense strategies. Law and Social Inquiry, 28(1), 3986.Google Scholar
Rosen, L. (1989). The anthropology of justice: Law as culture in Islamic society. New York: Cambridge University Press.Google Scholar
Sutherland, A. (2000). Cross-cultural law: The case of the Gypsy offender. In Spradley, J. and McCurdy, D. W. (Eds.), Conformity and conflict: Readings in cultural anthropology (pp. 286–293). Boston: Allyn and Bacon.Google Scholar
Walley, C. J. (1997). Searching for “voices”: Feminism, anthropology, and the global debate over female genital operations. Cultural Anthropology, 12, 405438.Google Scholar
Weitzer, R. & Tuch, S. (2002). Perceptions of racial profiling. Criminology, 40(2), 435456.Google Scholar
Werner, C. (2009). Bride abduction in post-Soviet Central Asia. Journal of the Royal Anthropological Institute, 15, 314331.Google Scholar

FURTHER READING

Dammer, H. R. & Albanese, J. S. (2014). Comparative criminal justice systems. Fifth edition. Belmont, CA: Wadsworth.Google Scholar
Pakes, F. (2017). Comparative criminal justice. Third Edition. London and New York: Routledge.Google Scholar
Reichel, P. (2018). Comparative criminal justice systems: A topical approach. New York: Pearson.Google Scholar
Terrill, R. J. (2013). World criminal justice systems: A comparative review. Boston, New York, San Diego, and San Francisco: Anderson Publishing.Google Scholar

REFERENCES

Alexander, M. (2012). The new Jim Crow: Mass incarceration in the age of colorblindness. New York: The New Press.Google Scholar
Alizadeh, M. S. (2010). Iran. In Newman, G. R. (Ed.), Crime and punishment around the world. Volume 1, Africa and Middle East. New Haven, CT: Greenwood Press.Google Scholar
Beccaria, C. (2009). On crimes and punishments (Fifth Ed). Newman, G. R. and Marongiu, P. (Eds. and Trans.). Piscataway, NJ: Transaction Publishers.Google Scholar
Garland, D. (1993). Punishment and modern society. Chicago: University of Chicago Press.Google Scholar
Newman, G. R. (2008). The punishment response. Second Edition. Piscataway, NJ: Transaction Publishers.Google Scholar
Newman, G. R. (Ed.). (2010). Crime and punishment around the world. Four Volumes. New Haven, CT: Greenwood Press.Google Scholar
Newman, G. R. (in press). Punish me robot: Punishing criminals in the 21st century.Google Scholar

REFERENCES

Clear, T., Cole, G., Reisig, M., & Petrosino, C. (2015). American corrections. Eleventh Edition. Belmont, CA: Wadsworth Cengage Learning.Google Scholar
Dammer, H. & Albanese, J. S. (2014). Comparative Criminal Justice Systems. Fifth Edition. Belmont, CA: Wadsworth Cengage Learning.Google Scholar
Dikotter, F. (2002). The promise of repentance: Prison reform in modern China. British Journal of Criminology, 42, 240249.Google Scholar
Kuhn, A. (1996). Incarceration rates: Europe versus the United States. European Journal on Criminal Policy and Research, 4(3), 4673.Google Scholar
Pratt, J. (2007). Penal populism. London: Routledge.Google Scholar
Tonry, M. (2007). Determinates of penal policies. In Tonry, M. (Ed.), Crime, punishment, and politics in comparative perspective (pp. 1–48). Chicago: University of Chicago Press.Google Scholar
United Nations Asia and Far East Institute (UNAFEI). (2001, September). Annual report for 1999 and resource material, series no. 57. Fuchu, Japan: UNAFEI.Google Scholar
Walmsley, R. (2016). World prison population list. Eleventh Edition. London: International Center for Prison Studies. Retrieved from www.prisonstudies.org/sites/default/files/resources/downloads/world_prison_population_list_11th_edition_0.pdf.Google Scholar
Weiss, R. P. (2005). From anticolonialism to neocolonialism: A brief political-economic history of transnational concern about corrections. In Reichel, P. (Ed.), Handbook of transnational crime and justice (pp. 346–362). Thousand Oaks, CA: Sage Publications.Google Scholar

REFERENCES

Anderson, D. M. & Killingray, D. (Eds.). (1991). Policing the empire. Manchester: Manchester University Press.Google Scholar
Anderson, D. M. & Killingray, D. (Eds.). (1992). Policing and decolonisation. Manchester: Manchester University Press.Google Scholar
Bayley, D. H. (1976). Forces of order: Police behaviour in Japan and the United States. Berkeley, CA: University of California Press.Google Scholar
Beck, A., Chistyakova, Y., & Robertson, A. (2006) Police reform in post-Soviet societies. Abingdon: Routledge.Google Scholar
Brogden, M. (1999). Community policing as cherry pie. In Mawby, R. (Ed.), Policing across the world: Issues for the twenty-first century (pp. 167–186). London: UCL Press.Google Scholar
Chapman, B. (1970). Police state. London: Pall Mall Press.Google Scholar
Cole, B. (1999). Post-colonial systems. In Mawby, R. (Ed.), Policing across the world: Issues for the twenty-first century (pp. 88–108). London: UCL Press.Google Scholar
Fairchild, E. S. (1988) German police. Springfield, MA: Charles C. Thomas.Google Scholar
Jones, T. & Newburn, T. (2006). Policy transfer and criminal justice. London: Open University Press.Google Scholar
Lee, S. Y. (1990). Morning calm, rising sun: National character and policing in South Korea and in Japan. Police Studies, 13, 91110.Google Scholar
Leishman, F. (1999). Policing in Japan: East Asian archetype? In Mawby, R. (Ed.), Policing across the world: Issues for the twenty-first century (pp. 109–125). London: UCL Press.Google Scholar
Mawby, R. I. (1990) Comparative policing issues: The British and American experience in international perspective. London: Routledge.Google Scholar
Mawby, R. I. (1999). The changing face of policing in Central and Eastern Europe. International Journal of Police Science and Management, 2(3), 199216.Google Scholar
Mawby, R. I. (2018). An international comparison of police systems in a legal context. In Den Broer, M. (Ed.), Research handbook on comparative policing. Northampton, MA: Edward Elgar.Google Scholar
Miyazawa, S. (1992). Policing in Japan: A study on making crime. New York: State University of New York Press.Google Scholar
O’Reilly, C. (2018) Colonial policing and the transnational legacy. Abingdon: Routledge.Google Scholar
Pino, N. & Wiatrowski, M. D. (2006). Democratic policing in transitional and developing countries. Aldershot: Ashgate.Google Scholar

REFERENCES

Andreas, P. (2001). Border games: Policing the U.S-Mexico divide. Ithaca, NY: Cornell University Press.Google Scholar
Bhattacharyya, G. (2005). Traffick: The illicit movement of people and things. Ann Arbor, MI: Pluto Press.Google Scholar
Farer, T. (Ed.). (1999). Transnational crime in the Americas: An inter-American dialogue book. New York: Routledge.Google Scholar
King, L. (2004, September 29). The world: 5 in Israeli border police charged with abuse. Los Angeles Times, p. 3.Google Scholar
Nadelmann, E. A. (1993). Cops across borders: The internationalization of U.S. criminal law enforcement. University Park, PA: Penn State Press.Google Scholar
Naím, M. (2005). Illicit: How smugglers, traffickers and copycats are hijacking the global economy. New York: Doubleday.Google Scholar
Phillips, S., Rodriguez, N., & Hagan, J., (2002). Brutality at the border? Use of force in the arrest of immigrants in the United States. International Journal of the Sociology of Law, 30(4), 285306.Google Scholar
Rotberg, R. I. (2003). When states fail: Causes and consequences. Princeton, NJ: Princeton University Press.Google Scholar

WEBSITES

EUROPOL Main Site. www.europol.europa.eu.

Frontex Main Site. www.frontex.europa.eu.

US Customs and Border Protection Main Site. www.cbp.gov.

US Coast Guard Main Site. www.uscg.mil.

REFERENCES

BBC. (2018, February 19). Lauri Love case: US abandons extradition case. Retrieved from www.bbc.com/news/uk-england-suffolk-43119355.Google Scholar
Garcia, M. J. & Doyle, C. (2010, March 17). Extradition to and from the United States: Overview of the law and recent treaties. Congressional Research Service 7-5700. Retrieved from https://fas.org/sgp/crs/misc/98-958.pdf.Google Scholar
Lucchetti, M. (2018). Cybercrime legislation in Africa: Regional and international standards. Retrieved from https://au.int/sites/default/files/newsevents/workingdocuments/34122-wd-05.pres_cybercrime_legislation_in_africa_12apr2018_matteo_l.pdf.Google Scholar
Maras, M.-H. (2014). Computer forensics: Cybercriminals, laws, and evidence, second edition. Burlington, MA: Jones and Bartlett.Google Scholar
Maras, M.-H. (2016). Cybercriminology. New York: Oxford University Press.Google Scholar
Nashuuta, L. (2018, February 7). Namibia a safe haven for cybercriminals. New Era [Namibian newspaper]. Retrieved from www.newera.com.na/2018/02/07/namibia-a-safe-haven-for-cybercriminals/.Google Scholar
Parkin, S. (2017, September 8). Keyboard warrior: The British hacker fighting for his life. Guardian. Retrieved from www.theguardian.com/news/2017/sep/08/lauri-love-british-hacker-anonymous-extradition-us.Google Scholar
United Nations Children’s Fund (UNICEF). (2016). Increasing legal protection for children from sexual exploitation and abuse in Namibia. Retrieved from www.unicef.org/namibia/na.COP_Legal_Brief_2016_web.pdf.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2013, February). Comprehensive study on cybercrime. Retrieved from www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2015). Cybercrime repository. Retrieved from www.unodc.org/unodc/en/cybercrime/cybercrime-repository.html.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2017). Global programme on cybercrime. Retrieved from www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html.Google Scholar
US Department of Justice (DOJ). (2018, February 7). Thirty-six defendants indicted for alleged roles in transnational criminal organization responsible for more than $530 in losses from cybercrime. Retrieved from www.justice.gov/opa/pr/thirty-six-defendants-indicted-alleged-roles-transnational-criminal-organization-responsible.Google Scholar

WEBSITES AND READINGS

African Union. (2014). Convention on Cyber Security and Personal Data Protection.

Commonwealth of Independent States. (2001). Agreement on Cooperation in Combating Offences related to Computer Information.

Council of Europe. (2001). Convention on Cybercrime.

Council of Europe. Octopus Cybercrime Community. Retrieved from

www.coe.int/ka/web/octopus/country-wiki/.

League of Arab States. (2010). Arab Convention on Combating Information Technology Offences.

Shanghai Cooperation Organization. (2010). Agreement on Cooperation in the Field of International Information Security.

UNODC. Cybercrime repository. Retrieved from www.unodc.org/cld/v3/cybrepo/.

RECOMMENDED READING

Banach-Gutierrez, J. B. & Harding, C. (2016). EU criminal law and policy: Values, principles and methods. London: Routledge.Google Scholar
De Ruyver, B., Vermeulen, G., & Vander Beken, T. (2002). Strategies of the EU and the US in combating transnational organized crime. Antwerp: Institute for International Research on Criminal Policy.Google Scholar
Guild, E. & Geyer, F. (Eds.). (2016) Security versus justice? Police and judicial cooperation in the European Union. London and New York: Routledge.Google Scholar
Mitsilegas, V. (2016). EU criminal law after Lisbon: Rights, trust and the transformation of justice in Europe. Oxford and Portland, OR: Hart Publishing.Google Scholar
Peers, S. (2016). EU justice and home affairs law. Fourth Edition. Oxford: Oxford University Press.Google Scholar

WEBSITES

Acquis of the European Union in the field of Justice and Home Affairs (Title IV of the TEC and title VI of the TEU). http://europa.eu.int/comm/justice_home/acquis_en.htm.

Fact Sheets on the European Union. European Parliament. www.europarl.europa.eu/atyourservice/en/displayFtu.html?ftuId=FTU_4.2.6.html.

Police and Judicial Cooperation in the EU. EUR-lex. http://eur-lex.europa.eu/TodayOJ.

REFERENCES

Boister, N. (2012). An introduction to transnational criminal law. Oxford. Oxford University PressGoogle Scholar
Ellis, A. & Pisani, R. L. (1985). The United States treaties on mutual assistance in criminal matters: A comparative analysis. The International Lawyer, 19(1), 189223.Google Scholar
Nadelmann, E. A. (1993). Cops across borders: The internationalization of U.S. criminal law enforcement. University Park, PA: Pennsylvania State University Press.Google Scholar

REFERENCES

Chapman, B. (2017, January 3). Secretive Swiss bank accounts face new crackdown. The Independent. Retrieved from www.independent.co.uk/news/business/news/swiss-bank-accounts-not-secret-tax-avoidance-money-laundering-crackdown-a7507696.html.Google Scholar
Financial Action Task Force (FATF). (2006). Trade-based money laundering. Retrieved from www.fatf-gafi.org/dataoecd/60/25/37038272.pdf.Google Scholar
Financial Action Task Force (FATF). (2018). Improving global AML/CFT compliance. Retrieved from www.fatf-gafi.org/publications/high-riskandnon-cooperativejurisdictions/documents/fatf-compliance-february-2018.html.Google Scholar
Halliday, T., Levi, M., & Reuter, P. (2014). Global surveillance of dirty money. Retrieved from www.lexglobal.org/files/Report_Global%20Surveillance%20of%20Dirty%20Money%201.30.2014.pdf.Google Scholar
Revill, J. & Shields, M. (2018, February 1). Swiss bank PKB broke money-laundering rules in Brazilian cases: FINMA. Reuters. Retrieved from www.reuters.com/article/us-swiss-pkb-petrobras/swiss-bank-pkb-broke-money-laundering-rules-in-brazilian-cases-finma-idUSKBN1FL6FN.Google Scholar
U4. (2017). International support to anti-money laundering and asset recovery: Success stories. Retrieved from www.u4.no/publications/international-support-to-anti-money-laundering-and-asset-recovery-success-stories/pdf.Google Scholar
US Department of Justice. (2005). US money laundering threat assessment. Retrieved from www.usdoj.gov/dea/pubs/pressrel/011106.pdf.Google Scholar
World Bank. (2006). Reference guide to anti-money laundering and combating the financing of terrorism. Washington, DC: World Bank. Retrieved from http://siteresources.worldbank.org/EXTAML/Resources/396511-1146581427871/Reference_Guide_AMLCFT_2ndSupplement.pdf.Google Scholar

WEBSITES

Some of the following will require readers to search within for money laundering.Google Scholar
Various international conventions and multi-lateral conventions can be found at https://treaties.un.org/Pages/Home.aspx?clang=_en.Google Scholar
Asia/Pacific Group on Money Laundering. www.apgml.org/.Google Scholar
Australian Transaction Reports and Analysis Centre (AUSTRAC). www.austrac.gov.au/.Google Scholar
Financial Action Task Force (FATF). www.fatf-gafi.org.Google Scholar
International Monetary Fund. www.imf.org/.Google Scholar
United Nations International Money Laundering Information Network (IMoLIN). www.imolin.org/.Google Scholar
United Nations Office of Drugs and Crime (UNODC). www.unodc.org/unodc/en/money-laundering/index.html.Google Scholar

REFERENCES

United Nations. (2015, October 21). Transforming our world: The 2030 Agenda for Sustainable Development. A/RES/70/1.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2010). UNODC services and tools: Practical solutions to global threats to justice, security and health. Vienna: UNODC.Google Scholar

REFERENCES

Bousquet, R. (1996). Social development and cities. Preventing crime in France. Paper presented at the International Conference for Crime Prevention Practitioners, Marc/April, Vancouver.Google Scholar
Bullock, K., Clarke, R. V., & Tilley, N. (2010). Situational prevention of organised crimes. Abington: Routledge.Google Scholar
Clarke, R. V. & Bowers, K. (2017). Seven misconceptions of situational crime prevention. In Tilley, N. & Sidebottom, A. (Eds.), Handbook of crime prevention and community safety. Second Edition. Abington: Routledge.Google Scholar
Farrell, G., Tilley, N., & Tseloni, M. (2014). Why the crime drop? Crime and Justice, 43(1), 421490.Google Scholar
Garland, D. (1996). The limits of the sovereign state: Strategies of crime control in contemporary society. British Journal of Criminology, 36, 445471.Google Scholar
Sherman, L. W., Gottfredson, D. C., Mackenzie, D. L., Eck, J., Reuter, P., & Bushway, S. (1997). Preventing crime: What works, what doesn’t, what’s promising. Office of Justice Programs Research Report. Washington, DC: US Department of Justice.Google Scholar
Tilley, N. (2012). Crime prevention. Abington: Routledge.Google Scholar
Waller, I. (1991). Introductory report: Putting crime prevention on the map. Paper presented at the II International Conference on Urban Safety, Drugs and Crime Prevention, November, Paris.Google Scholar
Weisburd, D., Farrington, D. P., & Gill, C. (2018). What works in crime prevention and rehabilitation: An assessment of systematic reviews. Criminology and Public Policy, 16(2), 415449.Google Scholar
Williams, P. (1999). Emerging issues: Transnational crime and its control. In Newman, G. (Ed.), Global report on crime and justice. United Nations Office for Drug Control and Crime Prevention. New York: Oxford University Press.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×