Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-xfwgj Total loading time: 0 Render date: 2024-06-30T10:34:40.889Z Has data issue: false hasContentIssue false

PART IA - Varieties of Transnational Crimes

from PART I - OVERVIEW: TRANSNATIONAL CRIME

Published online by Cambridge University Press:  20 June 2019

Mangai Natarajan
Affiliation:
John Jay College of Criminal Justice, City University of New York
Get access
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Decker, S. H. & Townsend, M. (2008). Drug smugglers on drug smuggling: Lessons from the inside. Philadelphia, PA: Temple University Press.Google Scholar
Desroches, F. (2005). The crime that pays: Drug trafficking and organized crime in Canada. Toronto: Canadian Scholar’s Press.Google Scholar
Dolliver, D. S. (2015). Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. International Journal of Drug Policy, 26(11), 11131123.Google Scholar
European Monitoring Centre for Drugs and Drug Addiction (EMCDDA). (2018). European Drug Report 2018: Trends and Developments. Retrieved from www.emcdda.europa.eu/system/files/publications/8585/20181816_TDAT18001ENN_PDF.pdf.Google Scholar
Natarajan, M. (2006). Understanding the structure of a large heroin distribution network: A quantitative analysis of qualitative data. Quantitative Journal of Criminology, 22(2), 171192.Google Scholar
Natarajan, M. & Belanger, M. (1998). Varieties of upper-level drug dealing organizations: A typology of cases prosecuted in New York City. Journal of Drug Issues, 28(4), 10051026.CrossRefGoogle Scholar
Natarajan, M., Zanella, M., & Yu, C. (2015). Classifying the variety of drug trafficking organizations. Journal of Drug Issues, 45(4), 409430.Google Scholar
Reuter, P. H. (2014). The mobility of drug trafficking. In Collins, J. (Ed.), Ending the drug wars (pp. 3340). London: The London School of Economics and Political Science.Google Scholar
Rhumorbarbe, D., Staehli, L., Broséus, J., Rossy, Q., & Esseiva, P. (2016). Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic Science International, 267, 173182.Google Scholar
United Nations International Drug Control Programme. (1997). World drug report. New York: Oxford University Press.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2018) World drug report 2018. New York: United Nations.Google Scholar
World Customs Organization. (2017). Illicit trade. Brussels: World Customs Organization.Google Scholar

REFERENCES

Aronowitz, A. A. (2009). Human trafficking, human misery: The global trade in human beings. Westport, CT: Praeger Publishers.Google Scholar
Aronowitz, A. A. (2017). Human trafficking: A reference handbook. Santa Barbara, CA: ABC-CLIO.CrossRefGoogle Scholar
Bales, K. (1999). Disposable people. Berkeley, CA: University of California Press.Google Scholar
Bales, K. (2007). What predicts human trafficking. International Journal of Comparative and Applied Criminal Justice, 31(2), 269279.CrossRefGoogle Scholar
International Labour Organization. (2017). Global estimates of modern slavery: forced labour and forced marriage. Geneva. Retrieved from www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575479.pdf.Google Scholar
Oram, S., Stöckl, H., Busza, J. Howard, L, & Zimmerman, C. (2012). Prevalence and risk of violence and the physical, mental, and sexual health problems associated with human trafficking: Systematic review. Plos Medicine. Retrieved from https://doi.org/10.1371/journal.pmed.1001224.Google Scholar
Schloenhardt, A. (1999). Organized crime and the business of migrant trafficking. Crime, Law and Social Change, 32, 203233.CrossRefGoogle Scholar
Tsutsumi, A., Izutsu, T., Poudyal, A., Kato, S., & Marui, E. (2008). Mental health of female survivors of human trafficking in Nepal. Social Science & Medicine, 66, 18411847.CrossRefGoogle ScholarPubMed
United Nations Office on Drugs and Crime (UNODC). (2016). Global report on trafficking in persons. Vienna. Retrieved from www.unodc.org/documents/data-and-analysis/glotip/2016_Global_Report_on_Trafficking_in_Persons.pdf.Google Scholar
US Department of State. (2017). Trafficking in persons report 2017. Washington, DC. Retrieved from www.state.gov/documents/organization/271339.pdf.Google Scholar

WEBSITES

Anti-Slavery International. www.antislaveryinternational.org.

International Labour Organization. www.ilo.org.

International Organization for Migration (IOM). www.iom.int.

US Department of State Office to Monitor and Combat Trafficking in Persons. www.state.gov/g/tip.

United Nations Office on Drugs and Crime. www.unodc.org/unodc/en/human-trafficking/what-is-human-trafficking.html.

REFERENCES

Bigelsen, J. & Vuotto, S. (2013). Homelessness, survival sex and human trafficking: As experienced by the youth of Covenant House. New York: Covenant House.Google Scholar
Dank, M. (2011). The commercial sexual exploitation of children in New York City. El Paso, TX: LFB Scholarly Publishing.Google Scholar
Dank, M., Yahner, J., Madden, K., Banuelos, I., Yu, L., Ritchie, A., Mora, M., & Conner, B. (2015) Surviving the streets of New York: Experiences of LGBTQ youth, YMSM, and YWSW engaged in survival sex. Washington, DC: Urban Institute. Retrieved from www.urban.org/sites/default/files/publication/42186/2000119-Surviving-the-Streets-of-New-York.pdf.Google Scholar
Dank, M., Yahner, J., Yu, L., Vasquez-Noriega, C., Gelatt, J., & Pergamit, M. (2017). Pre-testing a human trafficking screening tool in child welfare and runaway and homeless youth systems. Washington, DC: Urban Institute. Retrieved from www.urban.org/sites/default/files/publication/93596/pretesting_tool_1.pdf.Google Scholar
Durso, L. E. & Gates, G. J. (2012). Serving our youth: Findings from a national survey of service providers working with lesbian, gay, bisexual, and transgender youth who are homeless or at risk of becoming homeless. Los Angeles, CA: The Williams Institute with True Colors Fund and the Palette Fund.Google Scholar
Fernandez, K. (2013). Victims or criminals? The intricacies of dealing with juvenile victims of sex trafficking and why the distinction matters. Arizona State Law Journal, 45, 859890.Google Scholar
Freeman, L. & Hamilton, D. (2008). A count of homeless youth in New York City. New York: Empire State Coalition of Youth and Family Services.Google Scholar
Gragg, F., Petta, I., Bernstein, H., Eisen, K., & Quinn, L. (2007). New York prevalence study of commercially sexually exploited children. Rockville, MD: Westat.Google Scholar
Institute of Medicine & National Research Council of the National Academies. (2013). Confronting commercial sexual exploitation and sex trafficking of minors in the United States. Washington, DC: The National Academy of Sciences.Google Scholar
Murphy, L. T. (2016). Labor and sex trafficking among homeless youth. A ten city study (executive summary). Retrieved from https://static1.squarespace.com/static/5887a2a61b631bfbbc1ad83a/t/59498e69197aea24a33a640b/1497992809780/CovenantHouseReport.pdf.Google Scholar
Thukral, J. & Ditmore, M. (2003). Revolving door: An analysis of street-based prostitution in the intersection of domestic human trafficking with cw and rhy programs. New York: Urban Justice Center Report.Google Scholar
Tucker, J. S., Edelen, M. O., Ellickson, P. L., & Klein, D. J. (2011). Running away from home: A longitudinal study of adolescent risk factors and young adult outcomes. Journal of Adolescence, 40(5), 507–518.CrossRefGoogle Scholar
Walts, K. (2017). Child labor trafficking in the United States: A hidden crime. Social Inclusion, 5(2), 5968.Google Scholar
Williams, L. M. & Frederick, M. E. (2009). Pathways into and out of commercial sexual victimization of children: Understanding and responding to sexually exploited teens. Lowell, MA: University of Massachusetts Lowell.Google Scholar

REFERENCES

Baird, T. & van Liempt, I. (2016). Scrutinising the double disadvantage: knowledge production in the messy field of migrant smuggling. Journal of Ethnic and Migration Studies, 42(3), 400417.CrossRefGoogle Scholar
Bilger, V., Hofmann, M., & Jandl, M. (2006). Human smuggling as a transnational service industry: Evidence from Austria. International Migration, 44(4), 5993.CrossRefGoogle Scholar
Brachet, J. (2018). Manufacturing smugglers: From irregular to clandestine mobility in Sahara. The Annals of The American Academy of Political and Social Science, 676, 1635.CrossRefGoogle Scholar
Campana, P. (2018). Out of Africa: The organization of migrant smuggling across the Mediterranean. European Journal of Criminology, 15(4), 481502, doi.org/10.1177/1477370817749179.Google Scholar
Campana, P. (2017). The market for human smuggling into Europe: A macro perspective. In Policing, 11(4), 448456.Google Scholar
Campana, P. & Varese, F. (2016). Exploitation in human trafficking and smuggling. European Journal on Criminal Policy and Research, 22(1), 89105.CrossRefGoogle Scholar
Gallagher, A. & McAuliffe, M. L. (2016). South-East Asia and Australia. In McAuliffe, M. L. and Laczko, F. (Eds.), Migrant smuggling data and research (pp. 211241). Geneva: International Organization for Migration.Google Scholar
Içduygu, A. & Toktas, S. (2002). How do smuggling and trafficking operate via irregular border crossings in the Middle East? Evidence from fieldwork in Turkey. International Migration, 40(6), 2554Google Scholar
McAuliffe, M. L. & Laczko, F. (2016). Report overview. In McAuliffe, M. L. and Laczko, F. (Eds.), Migrant smuggling data and research (pp. 1–24). Geneva: International Organization for Migration.Google Scholar
Sanchez, G. E. (2015). Human smuggling and border crossing. Abingdon and New York: Routledge.Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2018). Global study on smuggling of migrants. Vienna: United Nations Office on Drugs and Crime.Google Scholar
Zhang, S. & Chin, K. L. (2002). Enter the dragon: Inside Chinese human smuggling organisations. Criminology, 40(4), 737768.CrossRefGoogle Scholar

WEBSITES

UNODC Smuggling of Migrants Knowledge Portal. www.unodc.org/cld/en/v3/som/.

North Africa Mixed Migration Hub. www.mixedmigrationhub.org/.

Mixed Migration Monitoring Mechanism Initiative (4Mi). www.regionalmms.org/index.php/4mi-page/about-4mi.

Irregular Migration Research Database. https://gmdac.iom.int/research-database/.

IOM Migration Flows – Europe. http://migration.iom.int/europe/.

Missing Migrants Project. https://missingmigrants.iom.int/.

University of Queensland Migrant Smuggling Case Database. https://ssl.law.uq.edu.au/som-database/home.php.

European Border and Coast Guard Agency. https://frontex.europa.eu/.

REFERENCES

Block, S. (2012). Characteristics of internationally trafficked stolen vehicles along the U.S.-Mexico border. Western Criminology Review, 13(3), 114.Google Scholar
Block, S., Clarke, R. V., Maxfield, M. G., & Petrossian, G. (2011). Estimating the number of U.S. vehicles stolen for export using crime location quotients. In Andresen, M. A. & Kinney, J. B. (Eds.), Patterns, prevention and geometry of crime. New York: Routledge.Google Scholar
Brown, R. & Clarke, R. V. (2004). Police intelligence and theft of vehicles for export: Recent UK experience. In Maxwell, M. G. & Clarke, R. V. (Eds.), Crime prevention studies, Vol. 17. Monsey, NY: Criminal Justice Press.Google Scholar
Clarke, R. V. & Brown, R. (2003). International trafficking in stolen vehicles. In Tonry, M. (Ed.), Crime and justice. A review of research, Vol. 30. Chicago: University of Chicago Press.Google Scholar
Highway Loss Data Institute. (2008). Insurance special report: Theft losses by county: 1999–2007 models. Arlington, VA: The Institute.Google Scholar
Lantsman, L. (2013). “Moveable currency”: The role of seaports in export oriented vehicle theft. Crime, Law and Social Change, 59, 157184.Google Scholar
Liukkonen, M. (1997). Motor vehicle theft in Europe. Paper No. 9. Helsinki: HEUNI.Google Scholar
Resindez, R. (1998). International auto theft: An exploratory research of organization and organized crime on the U.S./Mexico border. Criminal Organizations, 12, 2530.Google Scholar
Tremblay, P., Talon, B., & Hurley, D. (2001). Body switching and related adaptations in the resale of stolen vehicles: Script elaborations and aggregate crime learning curves. British Journal of Criminology, 41, 561579.CrossRefGoogle Scholar
US Customs and Border Protection. (2017) Exporting a motor vehicle: Interpretation and application of 19 CFR Part 192. Retrieved from www.cbp.gov/trade/basic-import-export/export-docs/motor-vehicle.Google Scholar
United Nations. (1997). International cooperation in combating transnational crime: Illicit trafficking in motor vehicles. Commission on Crime Prevention and Criminal Justice. Vienna: United Nations.Google Scholar

FURTHER READING

Azrael, D., Hepburn, L., Hemenway, D., & Miller, M. (2017). The stock and flow of U.S. firearms: Results from the 2015 National Firearms Survey. The Russell Sage Foundation Journal of the Social Sciences, 3(5), 3857.Google Scholar
Conflict Armament Research. (2017). Weapons of the Islamic State. A three-year investigation in Iraq and Syria. London: Conflict Armament Research.Google Scholar
Martyniuk, A. (2017). Measuring illicit arms flows: Ukraine. Geneva: Small Arms Survey.Google Scholar
McDougal, T., Shirk, D., Muggah, R., & Patterson, J. (2015). The way of the gun: Estimating firearms trafficking across the US-Mexico border. Journal of Economic Geography, 15, 297327.CrossRefGoogle Scholar
Wintemute, G. (2013). Frequency of and responses to illegal activity related to commerce in firearms: Findings from the Firearms Licensee Survey. Injury Prevention, 19, 412420.Google Scholar

REFERENCES

Brodie, N., Doole, J., & Renfrew, C. (Eds.). (2001). Trade in illicit antiquities: The destruction of the world’s archaeological heritage. Cambridge: McDonald Institute for Archaeological Research.Google Scholar
Coggins, C. (1969). Illicit traffic of pre-Columbian antiquities. Art Journal, 29(1), 9498.CrossRefGoogle Scholar
Contreras, D. & Brodie, N. (2010). Quantifying destruction: An evaluation of the utility of publicly available satellite imagery for investigating looting of archaeological sites in Jordan. Journal of Field Archaeology, 35(1), 101114.Google Scholar
Davis, T. & Mackenzie, S. (2015). Crime and conflict: Temple looting in Cambodia. In Kila, J. and Balcells, M. (Eds.), Cultural property crime. Leiden: Brill.Google Scholar
Gilgan, E. (2001). Looting and the market for Maya objects: A Belizean perspective. In Brodie, N., Doole, J., and Renfrew, C. (Eds.), Trade in illicit antiquities: The destruction of the world’s archaeological heritage. Cambridge: McDonald Institute for Archaeological Research.Google Scholar
Gill, D. J. W. & Chippindale, C. (1993). Material and intellectual consequences of esteem for cycladic figures. American Journal of Archaeology, 97(3), 602673.Google Scholar
Mackenzie, S. (2005). Going, going, gone: Regulating the market in illicit antiquities. Leicester: Institute of Art and Law.Google Scholar
O’Keefe, P. J. (1997). Trade in antiquities: Reducing destruction and theft. London: Archetype.Google Scholar
Parcak, S., Gathings, D., Childs, C., Mumford, G., & Cline, C. (2016). Satellite evidence of archaeological site looting in Egypt: 2002–2013. Antiquity, 90, 188205.CrossRefGoogle Scholar
Polk, K. (2000). The antiquities trade viewed as a criminal market. Hong Kong Lawyer, September, 82–92.Google Scholar
Thosarat, R. (2001). The destruction of the cultural heritage of Thailand and Cambodia. In Brodie, N., Doole, J., and Renfrew, C. (Eds.), Trade in illicit antiquities: The destruction of the world’s archaeological heritage. Cambridge: McDonald Institute for Archaeological Research.Google Scholar
Watson, P. (1997). Sotheby’s: The inside story. Hardback edn. London: Bloomsbury.Google Scholar
Yates, D., Mackenzie, S., & Smith, E. (2017). The cultural capitalists: Notes on the ongoing reconfiguration of trafficking culture in Asia. Crime, Media, Culture, 13(2), 245254.CrossRefGoogle ScholarPubMed

REFERENCES

Calderoni, F. (2014). A new method for estimating the illicit cigarette market at the subnational level and its application to Italy. Global Crime, 15, 5176.Google Scholar
Hornsby, R. & Hobbs, D. (2007). A zone of ambiguity: The political economy of cigarette bootlegging. British Journal of Criminology, 47, 551571.CrossRefGoogle Scholar
Joossens, L., Merriman, D., Ross, H., & Raw, M. (2009). How eliminating the global illicit cigarette trade would increase tax revenue and save lives. Paris: International Union Against Tuberculosis and Lung Disease, 10. Retrieved August 30, 2009, from www.fctc.org/dmdocuments/INB3_report_illicit_trade_save_revenue_lives.pdf.Google Scholar
Joossens, L. & Raw, M. (2002). Turning off the tap: An update on cigarette smuggling in the UK and Sweden, with recommendations to control smuggling. London: Cancer Research UK.Google Scholar
Joossens, L. (2008). Progress in combating cigarette smuggling: Controlling the supply chain. Tobacco Control, 17, 399404.CrossRefGoogle ScholarPubMed
Joossens, L. (2012). From cigarette smuggling to illicit tobacco trade. Tobacco Control, 21, 230234.Google Scholar
Reuter, P. & Majmundar, M. (Ed.). (2015). Understanding the U.S. illicit tobacco market: Characteristics, policy context, and lessons from international experiences. Washington, DC: National Academy of Sciences.Google Scholar
Ross, H., Vellios, N., Clegg Smith, K., Ferguson, J., & Cohen, J. E. (2016). A closer look at “Cheap White” cigarettes. Tobacco Control, 25, 527531.CrossRefGoogle Scholar
Shelley, L. & Melzer, S. (2008). The nexus of organized crime and terrorism: Two case studies in cigarette smuggling. The International Journal of Comparative and Applied Criminal Justice, 32, 4363.CrossRefGoogle Scholar
United Nations Office on Drugs and Crime. (2009, July). Transnational trafficking and the rule of law in West Africa: A threat assessment. Vienna: UNODC. Retrieved August 28, 2009, from www.unodc.org/documents/data-and-analysis/Studies/West_Africa_Report_2009.pdf.Google Scholar
Van Duyne, P. C. (2003). Organizing cigarette smuggling and policy making ending up in smoke. Crime, Law and Social Change, 39, 285317.Google Scholar
Von Lampe, K. (2006). The cigarette black market in Germany and in the United Kingdom. Journal of Financial Crime, 13, 235254.Google Scholar
Von Lampe, K., Kurti, M., Shen, A., & Antonopoulos, G. (2012). The changing role of China in the global illegal cigarette trade. International Criminal Justice Review, 22, 4367.Google Scholar
Yürekli, A. & Saygınsoy, Ö. (2010). Worldwide organized cigarette smuggling: an empirical analysis. Applied Economics, 42, 545561.CrossRefGoogle Scholar

WEBSITES

Framework Convention Alliance (for a Framework Convention on Tobacco Control). www.ftct.org.

Action on Smoking and Health (anti-smoking NGO). www.ash.org.

The Center for Public Integrity (investigative journalists on the “Tobacco Underground”). www.publicintegrity.org/health/public-health/tobacco.

Tobacco Control (journal). http://tobaccocontrol.bmj.com.

Philip Morris International (tobacco manufacturer). www.philipmorrisinternational.com.

REFERENCES

Brown, V. F. (2017). The extinction market: Wildlife trafficking and how to counter it. Oxford: Oxford University Press.Google Scholar
Kurland, J. & Pires, S. F. (2017). Assessing US wildlife trafficking patterns: How criminology and conservation science can guide strategies to reduce the illegal wildlife trade. Deviant Behavior, 38(4), 375391.CrossRefGoogle Scholar
Kurland, J., Pires, S. F., McFann, S. C., & Moreto, W. D. (2017). Wildlife crime: a conceptual integration, literature review, and methodological critique. Crime Science, 6(1), 4.Google Scholar
Lemieux, A. M. & Clarke, R. V. (2009). The international ban on ivory sales and its effects on elephant poaching in Africa. The British Journal of Criminology, 49(4), 451471.Google Scholar
Natarajan, M. (2016) Crime in developing countries: the contribution of crime science. Crime Science, 5(8), 15.Google Scholar
Pires, S. F. & Clarke, R. V. (2011). Sequential foraging, itinerant fences and parrot poaching in Bolivia. The British Journal of Criminology, 51(2), 314335.Google Scholar
Reuter, P. & O’Regan, D. (2016). Smuggling wildlife in the Americas: scale, methods, and links to other organised crimes. Global Crime, 18(2), 7799.Google Scholar
Schneider, J. L. (2008). Reducing the illicit trade in endangered wildlife: the market reduction approach. Journal of Contemporary Criminal Justice, 24(3), 274295.Google Scholar
Sina, S., Gerstetter, C., Porsch, L., Roberts, E., Smith, L., Klaas, K., & Fajardo, T. (2016). Wildlife crime (IP/A/ENVI/2015-10). Brussels: European Parliament.Google Scholar
Smith, K. F., Behrens, M., Schloegel, L. M., Marano, N., Burgiel, S., & Daszak, P. (2009). Reducing the risks of the wildlife trade. Science, 324(5927), 594595.CrossRefGoogle ScholarPubMed
Wyler, L. S. & Sheikh, P. A. (2008). International illegal trade in wildlife: Threats and US policy. Washington, DC: Library of Congress Congressional Research Service.Google Scholar

WEBSITES

UNODC World Wildlife Crime Report 2016. www.unodc.org/documents/data-and-analysis/wildlife/World_Wildlife_Crime_Report_2016_final.pdf.

Centre for Conservation Criminology and Ecology. www.c3e.rutgers.edu.

TRAFFIC. www.traffic.org.

REFERENCES

Allcott, H. & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives, 31(2), 211236.Google Scholar
Chen, T. M. & Robert, J. M. (2004). The evolution of viruses and worms. In W. S. Chen (Ed.), Statistical methods in computer security (pp. 265). New York: Marcel Dekker.Google Scholar
Clarke, R. & Youngstein, T. (2017). Cyberattack on Britain’s National Health Service: A wake-up call for modern medicine. New England Journal of Medicine, 377(5), 409411.Google Scholar
Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165172.Google Scholar
Europol report (2017). Internet organized crime threat assessment by EUROPOL (IOCTA 2017). Retrieved from www.europol.europa.eu/iocta/2017/index.html.Google Scholar
Fishbein, M. & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Boston, MA: Addison-Wesley.Google Scholar
Haggard, S. & Lindsay, J. R. (2015). North Korea and the Sony Hack: exporting instability through cyberspace. Asia Pacific Issues, 117, 1–8.Google Scholar
Kshetri, N. & Voas, J. (2017). Hacking power grids: A current problem. Computer, 50(12), 9195.Google Scholar
Lewis, J. (2018). Mcafee – economic impact of cybercrime. Retrieved from www.mcafee.com/us/resources/reports/restricted/economic-impact-cybercrime.pdf.Google Scholar
Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 913.Google Scholar
Maras, M. H. (2017). Cybercriminology. New York: Oxford University Press.Google Scholar
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767772.CrossRefGoogle Scholar
Persily, N. (2017). Can democracy survive the Internet? Journal of Democracy, 28(2), 6376.Google Scholar
Steinmetz, K. F. & Nobles, M. R. (2017). Introduction. In Technocrime and criminological theory (pp. 1726). New York: Routledge Taylor and Francis Group.CrossRefGoogle Scholar
Sunstein, C. R. (2018). Republic: Divided democracy in the age of social media. Princeton, NJ: Princeton University Press.Google Scholar
The Economist. (2017). The world’s most valuable resource is no longer oil, but data. Retrieved from www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource.Google Scholar
Trautman, L. J. (2016). Is cyberattack the next Pearl Harbor? North Carolina Journal of Law & Technology, 18, 233.Google Scholar
Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 6474.Google Scholar

REFERENCES

Aldridge, J. & Décary-Hétu, D. (2014). Not an “eBay for drugs”: The cryptomarket “Silk Road” as a paradigm shifting criminal innovation (Working paper). University of Manchester. http://doi.org/10.2139/ssrn.2436643.Google Scholar
Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In ACM Int. Conf. on World Wide Web (WWW), pp. 213224. Rio de Janeiro, May 2013.Google Scholar
Décary-Hétu, D. & Giommoni, L. (2017). Do police crackdowns disrupt drug cryptomarkets? a longitudinal analysis of the effects of operation Onymous. Crime, Law & Social Change, 67(1), 5575.Google Scholar
Guitton, C. (2013). A review of the available content on Tor hidden services: The case against further development. Computers in Human Behavior, 29(6), 28052815.Google Scholar
Li, B., Erdin, E., Gunes, M. H., Bebis, B., & Shipley, T. (2013). An overview of anonymity technology usage. Computer Communications, 36, 12691283.CrossRefGoogle Scholar
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. In ACM SIGCOMM Conf. on Internet measurement (IMC), pp. 7180. Berlin, November 2011.Google Scholar
Soska, K. & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symp., pp. 3348. Washington, DC, August 2015. Retrieved from www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska.Google Scholar
Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T. J., Kruegel, C., McCoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization. In Workshop on the Economics of Information Security (WEIS), Article 15, Delft, June 2015: Econinfosec.org. Retrieved from http://weis2015.econinfosec.org/papers/WEIS_2015_thomas.pdf.Google Scholar
Van Buskirk, J., Naicker, S., Roxburgh, A., Bruno, R., & Burnsa, L. (2016). Who sells what? country specific differences in substance availability on the agora cryptomarket. International Journal of Drug Policy, 35, 1623.CrossRefGoogle ScholarPubMed
Van Hout, M. C. & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183189.Google Scholar
Van Wegberg, R. S. & Verburgh, T. (2018). Lost in the dream? Measuring the effects of Operation Bayonet on vendors migrating to dream marke. Websci conference paper.Google Scholar

WEBSITES

Bitcoin blockchain explorer. blockchain.info.

Bitcoin wallet explorer. www.walletexplorer.com.

Dark web blogs. www.deepdotweb.com.

TNO dark web solutions. dws.pm.

TOR project. www.torproject.org.

REFERENCES

Christopher, C. M. (2014). Wack-a-mole: Why prosecuting digital currency exchanges won’t stop online money laundering. Lewis and Clarke Review, 18(1), 1.Google Scholar
Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91150.Google Scholar
Irwin, A. S. M., Choo, K. K. R., & Liu, L. (2012). An analysis of money laundering and terrorism financing typologies. Journal of Money Laundering Control, 15(1), 85111.Google Scholar
Jacobs, G. (2018). Cryptocurrencies & the challenge of global governance. Cadmus, 3(4), 109123.Google Scholar
Pohlman, J. & Day, A. (2013, September 12). Busted! Inside one massive cybercrime ring. CNBC. Retrieved from www.cnbc.com/id/101029866.Google Scholar
Securities and Exchange Commission (SEC). (2017, October 30). Day trader charged in brokerage account takeover scheme [press release]. Retrieved from www.sec.gov/news/press-release/2017-202.Google Scholar
Swenson, K. (2017, July 24). Pennsylvania police, hunting for stolen laptops, say they stumbled on $40 million bitcoin scam. Washington Post. Retrieved from www.washingtonpost.com/news/morning-mix/wp/2017/07/24/pennsylvania-police-hunting-for-stolen-laptops-say-they-stumbled-on-40-million-bitcoin-scam/?utm_term=.511503eb502f.Google Scholar
United States Attorney’s Office (USAO) – Southern District of New York. (2014, January 27). Manhattan U.S. Attorney announces charges against bitcoin exchangers, including CEO of bitcoin exchange company, for scheme to sell and launder over $1 million in bitcoins related to Silk Road drug trafficking [press release]. Retrieved from www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-charges-against-bitcoin-exchangers-including-ceo.Google Scholar
United States Attorney’s Office (USAO) – Southern District of New York. (2017, June 27). Operator of unlawful bitcoin exchange sentenced to more than 5 years in prison for leading multimillion dollar money laundering and fraud scheme [press release]. Retrieved from www.justice.gov/usao-sdny/pr/operator-unlawful-bitcoin-exchange-sentenced-more-5-years-prison-leading-multimillion.Google Scholar
Wall, D. S. (2005). The Internet as a conduit for criminals. In Pattavina, A. (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage Publications, Inc.Google Scholar

REFERENCES

Brown, R., Evans, E., Webb, S., Holdaway, S., Berry, G., Chenery, S., Gresty, B., & Jones, M. (2012). The contribution of financial investigation to tackling organised crime: A qualitative study. Research Report 65. Key implications. Retrieved from www.gov.uk/government/uploads/system/uploads/attachment_data/file/116518/horr65.pdf.Google Scholar
Hicks, D. C. (2010). Money laundering. In Brookman, F. et al. (Eds.), Handbook of crime (pp. 712725). Cullompton, Devon: Willan.Google Scholar
Quirk, P. J. (1996). Macroeconomic implications of money laundering (Working Paper 96/66). Washington, DC: International Monetary Fund (IMF).Google Scholar
Reuter, P. & Truman, E. M. (2004). Chasing dirty money: The fight against money laundering. Washington, DC: Institute for International Economics.Google Scholar
UK National Audit Office (UKNAO). (2013, December 13). Confiscation orders. London: Stationery Office Limited. Retrieved from www.nao.org.uk/wp-content/uploads/2013/12/10318-001-Confiscation-Book.pdf.Google Scholar
UK National Audit Office (UKNAO). (2016). Confiscation orders: Progress review. London: Stationery Office Limited. Retrieved from www.nao.org.uk/wp-content/uploads/2016/03/Confiscation-orders-progress-review.pdf.Google Scholar
United Nations Office on Drugs and Crime. (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. Retrieved from www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf.Google Scholar
US Government Accountability Office (USGAO). (2012). Asset forfeiture programs: Justice and Treasury should determine costs and benefits of potential consolidation (Highlights of GAO-12–972). Retrieved from www.gao.gov/assets/650/648097.pdf.Google Scholar
US Government Accountability Office (USGAO). (2016). Financial institutions: Fines, penalties, and forfeitures for violations of financial crimes and sanctions requirements (Highlights of GAO-16–297). Retrieved from www.gao.gov/assets/680/675987.pdf.Google Scholar

WEBSITES

Financial Action Task Force. www.fatf-gafi.org.Google Scholar
International Monetary Fund. www.imf.org.Google Scholar
United Nations International Money Laundering Information Network (IMoLIN). www.imolin.org.Google Scholar
United Nations Office of Drugs and Crime (UNODC). www.unodc.org/unodc/en/money-laundering/index.html.Google Scholar

REFERENCES

Anti-phishing Working Group. (2018). Phishing activity trends report: 3rd quarter 2017. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_q3_2017.pdf.Google Scholar
Association of Certified Fraud Examiners (ACFE). (2016). Report to the nations: On occupational fraud and abuse. 2016 Global Fraud Study. Retrieved from www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf.Google Scholar
Benson, M., Kennedy, J., & Logan, M. (2016). White‐collar and corporate crime. In Huebner, B. & Bynum, T. (Eds.), The handbook of measurement issues in criminology and criminal justice. New York: John Wiley and Sons.Google Scholar
Block, A. & Weaver, C. (2005). All is clouded by desire. New York: Praeger.Google Scholar
Cohen, M. (2016). The costs of white-collar crime. In van Slyke, S., Benson, M., & Cullen, F. (Eds.), Oxford handbook of white-collar crime (pp. 7498). New York: Oxford University Press.Google Scholar
Edwards, M., Suarez-Tangil, G., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2018, May). The geography of online dating fraud. In Workshop on technology and consumer protection. IEEE.Google Scholar
Glenny, M. (2008). McMafia: A journey through the global criminal underworld. New York: Alfred Knopf.Google Scholar
Levi, M. (2008a). Organised fraud: Unpacking research on networks and organisation. Criminology and Criminal Justice, 8(4), 389420.Google Scholar
Levi, M. (2008b). The phantom capitalists: The organisation and control of long-firm fraud (second edition). Aldershot: Ashgate.Google Scholar
Levi, M. (2012). Organised crime and terrorism. In Maguire, M., Morgan, R., & Reiner, R. (Eds.), The Oxford handbook of criminology (fifth edition). Oxford: Oxford University Press.Google Scholar
Levi, M. (2015). Money for crime and money from crime: Financing crime and laundering crime proceeds. European Journal on Criminal Policy and Research, 21(2), 123.Google Scholar
Levi, M. & Burrows, J. (2008). Measuring the impact of fraud: a conceptual and empirical journey. British Journal of Criminology, 48(3), 293318.Google Scholar
May, T. & Bhardwa, B. (2018). Organised crime groups involved in fraud. London: Palgrave Macmillan.Google Scholar
Piscitello, D. (n.d.). The new face of phishing. Retrieved from www.antiphishing.org/apwg-news-center/newfaceofphishing.Google Scholar
Smith, D. J. (2008). A culture of corruption: Everyday deception and popular discontent in Nigeria. Princeton, NJ: Princeton University Press.Google Scholar
Varese, F. (2011). Mafias on the move: How organized crime conquers new territories. Princeton, NJ: Princeton University PressGoogle Scholar
Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665684.Google Scholar

REFERENCES

Briggs, R. (2001). The kidnapping business. London: The Foreign Policy Centre Diplomatic Forum.Google Scholar
Detotto, C., McCannon, B., & Vannini, M. (2015). Evidence of marginal deterrence: Kidnapping and murder in Italy. International Review of Law and Economics, 41, 6367.Google Scholar
Forest, J. J. (2012). Kidnapping by terrorist groups, 1970–2010. Is ideological orientation relevant? Crime & Delinquency, 58(5), 769797.Google Scholar
Guerette, R. T., Pires, S. F., & Shariati, A. (2018). Detecting the determinants and trajectories of homicide among ransom kidnappings: A research note. Homicide Studies, 22(2), 214229.CrossRefGoogle Scholar
Keijzer, S. (2017). An end to Colombia’s never ending conflict?: A MA thesis on the peace process between President Santos and the FARC and the role of kidnappings in the Colombian Conflict between 1982–2017 (Master’s thesis). Universiteit Leiden, the Netherlands.Google Scholar
Marongiu, P. & Clarke, R. V. (1993). Ransom kidnapping in Sardinia: Subcultural theory and rational choice. In Clarke, R. V. & Felson, M. (Eds.), Routine activity and rational choice (pp. 179199). New Brunswick, NJ: Transaction Publishers.Google Scholar
Moor, M. & Remijnse, S. (2008). Kidnapping is a booming business. Utrecht: IKV PAX Christi.Google Scholar
Perlberg, S. (2013, December 12). The 20 countries where people get kidnapped the most. Business Insider. Retrieved from www.businessinsider.com/top-20-countries-by-kidnapping-2013-12.Google Scholar
Phillips, E. M. (2009). The business of kidnap for ransom. In Canter, D. (Ed.), The faces of terrorism: Multidisciplinary perspectives (pp. 189207). West Sussex: Wiley.Google Scholar
Pires, S. F., Guerette, R. T., & Shariati, A. (2017). Specifying kidnapping for ransom epidemics at the global level: A matched-case control design. Studies in Conflict & Terrorism, 40(2), 139156.CrossRefGoogle Scholar
Pires, S. F., Guerette, R. T., & Stubbert, C. H. (2014). The crime triangle of kidnapping for ransom incidents in Colombia, South America: A ‘litmus’ test for situational crime prevention. British Journal of Criminology, 54(5), 784808.CrossRefGoogle Scholar
Shane, J. M. & Magnuson, S. (2016). Successful and unsuccessful pirate attacks worldwide: A situational analysis. Justice Quarterly, 33(4), 682707.Google Scholar
Vélez, D. M., Vélez, M. A., López, J. A., Díaz, C. E., Cendejas, M. G., Rivas, F. J., … & Pérez, V. (2014). Análisis integral del secuestro en México. Cómo entender esta problemática, México: Observatorio Nacional Ciudadano Seguridad, Justicia y Legalidad.Google Scholar

REFERENCES

Bartlett, J. (2014). The dark net: Inside the digital underworld. London: William Heinemann.Google Scholar
Calder, M. C. (2004). The Internet: Potential, problems and pathways to hands-on sexual offending. In Calder, M. C. (Ed.), Child sexual abuse and the Internet: Tackling the new frontier. Lyme Regis: Russell House Publishing.Google Scholar
Elliott, I. A. et al. (2008). Psychological profiles of Internet sexual offenders. Sexual Abuse: A Journal of Research and Treatment, 21, 7692.Google Scholar
Ferraro, M. M. & Casey, E. (2005). Investigating child exploitation and pornography: The Internet, the law and forensic science. San Diego, CA: Elsevier.Google Scholar
Seto, M. C., Hanson, R. K., & Babchishin, K. M. (2011). Contact sexual offending by men with online sexual offenses. Sexual Abuse: A Journal of Research and Treatment, 23(1), 124145.Google Scholar
Sheldon, K. & Howitt, D. (2007). Sex offenders and the Internet. Chichester: John Wiley.Google Scholar
Smallbone, S. W. & Wortley, R. (2017). Preventing child sexual abuse online. In Brown, J. (Ed.), Online risk to children: Impact, protection and prevention. Chichester: Wiley Blackwell.Google Scholar
Taylor, M., Quayle, E., & Holland, G. (2001). Typology of pedophile picture collections. The Police Journal, 74, 97107.Google Scholar
Wolak, J., Finkelhor, D., & Mitchell, K. J. (2005). Child pornography possessors arrested in Internet-related crimes. Alexandria, VA: Department of Justice, National Center for Missing and Exploited Children.Google Scholar
Wortley, R. & Smallbone, S. (2012). Internet child pornography: Causes, investigation and prevention. Santa Barbara, CA: Praeger.Google Scholar

WEBSITES

International Center for Missing and Exploited Children. www.icmec.org/.

Internet Watch Foundation. www.iwf.org.uk/.

INTERPOL: Crime Against Children. www.interpol.int/Crime-areas/Crimes-against-children/Crimes-against-children.

US Financial Coalition Against Child Pornography. www.icmec.org/fcacp/.

REFERENCES

Beirne, P. (2014). Theriocide: Naming animal killing. International Journal for Crime, Justice and Social Democracy, 4(3), 5067.Google Scholar
Bisschop, L. (2015). Governance of the illegal trade in e-waste and tropical timber: Case studies on transnational environmental crime. Surrey: Ashgate.Google Scholar
Brisman, A., South, N., & White, R. (Eds.). (2014). Environmental crime and social conflict. Surrey: Ashgate.Google Scholar
Higgins, P. (2012). Earth is our business: Changing the rules of the game. London: Shepheard-Walwyn Publishers Ltd.Google Scholar
Kramer, R. & Michalowski, R. (2012). Is global warming a state-corporate crime? In White, R. (Ed.), Climate change from a criminological perspective (pp. 7188). New York: Springer.Google Scholar
Pink, G. & White, R. (Eds.). (2016). Environmental crime and collaborative state intervention. Basingstoke: Palgrave Macmillan.Google Scholar
South, N. & Brisman, A. (Eds.). (2013). The Routledge international handbook of green criminology. London: Routledge.CrossRefGoogle Scholar
South, N. & Wyatt, T. (2011). Comparing illicit trades in wildlife and drugs: an exploratory study. Deviant Behaviour, 32, 538561.CrossRefGoogle Scholar
Walters, R. (2010). Toxic atmospheres: Air pollution, trade and the politics of regulation. Critical Criminology, 18, 307323.Google Scholar
White, R. (2011). Transnational environmental crime: Toward an eco-global criminology. London: Routledge.Google Scholar

WEBSITES

Convention on the Illegal Trade in Endangered Species (CITES). www.cites.org/.Google Scholar
Intergovernmental Panel on Climate Change. www.ipcc.ch/.Google Scholar
United Nations Interregional Crime and Justice Research Institute. www.unicri.it/.Google Scholar
United Nations Office on Drugs and Crime. www.unodc.org/.Google Scholar
United Nations Environment Programme. www.unenvironment.org/.Google Scholar
World Health Organization. www.who.int/.Google Scholar

REFERENCES

Amnesty International. (2004). Clouds of injustice – Bhopal disaster 20 years on. Retrieved from www.amnesty.org/en/library/info/ASA20/015/2004.Google Scholar
Cassels, J. (1994). The uncertain promise of law – lessons from Bhopal. Toronto: University of Toronto Press.Google Scholar
Chouhan, T. R. (1994). Bhopal: The inside story. Carbide workers speak out on the world’s worst industrial disaster. New York: Apex Press.Google Scholar
Das, V. (1995). Critical events: An anthropological perspective on contemporary India. Oxford: Oxford University Press.Google Scholar
Indian Council of Medical Research (ICMR). (1994). Health effects of the toxic gas leak from the Union Carbide methyl isocyanate plant in Bhopal. New Delhi.Google Scholar
Lapierre, D. & Moro, J. (1997). Five past midnight in Bhopal: The epic story of the world’s deadliest industrial disaster. New York: Simon & Schuster.Google Scholar
Weir, D. (1987). The Bhopal syndrome: Pesticides, environment, and health. San Francisco, CA: Sierra Club Books.Google Scholar

REFERENCE

May, C. (2017). Transnational crime and the developing world. Washington, DC: Global Financial Integrity.Google Scholar

WEBSITES

International Transport Workers’ Federation (ITF). www.itfglobal.org/index.cfm.

International Maritime Organization (IMO). www.imo.org.

Paris MOU, the model cooperative port state inspection program. www.parismou.org.

ICC International Maritime Bureau (IMB). www.icc-ccs.org.

World Maritime News. www.worldmaritimenews.com.

REFERENCES

Bowden, A. (2010). The economic cost of maritime piracy. One Earth Future Working Paper. Broomfield, CO: One Earth.Google Scholar
Bryant, W., Townsley, M., & Leclerc, B. (2014). Preventing maritime pirate attacks: A conjunctive analysis of the effectiveness of ship protection measures recommended by the international maritime organisation. Journal of Transportation Security, 7(1), 6982.Google Scholar
Clarke, R. V. (Ed.). (1997). Situational crime prevention. Monsey, NY: Criminal Justice Press.Google Scholar
Fu, X., Ng, A. K., & Lau, Y. Y. (2010). The impacts of maritime piracy on global economic development: The case of Somalia. Maritime Policy & Management, 37(7), 677697.Google Scholar
Halberstam, M. (1988). Terrorism on the high seas: The Achille Lauro, piracy and the IMO convention on maritime safety. American Journal of International Law, 82(2), 269310.Google Scholar
Ho, J. (2006). The security of sea lanes in Southeast Asia. Asian Survey, 46(4), 558574.Google Scholar
International Maritime Bureau. (2000). Piracy and armed robbery against ships annual report. London: IMB.Google Scholar
International Maritime Bureau. (2017). Piracy and armed robbery against ships annual report. London: IMB.Google Scholar
Kontorovich, E. & Art, S. (2010). An empirical examination of universal jurisdiction for piracy. The American Journal of International Law, 104(3), 436453.Google Scholar
Lansing, P. & Peterson, M. (2011). Ship-owners and the twenty first century Somali pirate: The business ethics of ransom payment. Journal of Business Ethics, 102, 507516.Google Scholar
Marchione, E. & Johnson, S. (2013). Spatial, temporal & spatio-temporal patterns of maritime piracy. Journal of Research in Crime and Delinquency, 50(4), 504524.Google Scholar
Roach, J. (2010). Countering piracy off Somalia: International law and international institutions. The American Journal of International Law, 104(3), 397416.Google Scholar
Shane, J. M. & Magnuson, S. (2014). Successful and unsuccessful pirate attacks worldwide: A situational analysis. Justice Quarterly, 33(4), 682707.Google Scholar
Shane, J. M., Piza, E. L., & Mandala, M. (2015). Situational crime prevention and worldwide piracy: a cross-continent analysis. Crime Science, 4(1), 21.Google Scholar
Shane, J. M., Piza, E. L., & Silva, J. R. (2017). Piracy for ransom: The implications for situational crime prevention. Security Journal, 122.Google Scholar
Shortland, A. & Vothknecht, M. (2010). Discussion papers combating “maritime terrorism” off the coast of Somalia. Berlin: German Institute for Economic Research.Google Scholar
Shortland, A. & Vothknecht, M. (2011). Combating “maritime terrorism” off the coast of Somalia. Economics of Security Working Paper 47. Berlin: Economics of Security.Google Scholar
Townsley, M., Leclerc, B., & Tatham, P. H. (2015). How super controllers prevent crimes: Learning from modern maritime piracy. British Journal of Criminology, 56(3), 537557.Google Scholar

WEBSITES

International Maritime Bureau, Piracy Reporting Center. www.icc-ccs.org/piracy-reporting-centre.

Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP). www.recaap.org/.

Maritime Security Centre, Horn of Africa. www.mschoa.org/on-shore/home.

Center for Problem-Oriented Policing. popcenter.asu.edu/.

REFERENCES

Boonratana, R., Das, J., Yongcheng, L., Htun, S. & Timmins, R. J. (2008). Macaca leonina. The IUCN Red List of Threatened Species. e.T39792A10257933.Google Scholar
Cooney, R. & Jepson, P. (2006). The international wild bird trade: What’s wrong with blanket bans? Oryx, 40(1), 1823.Google Scholar
US Department of Justice. (2012). Gibson Guitar Corp. agrees to resolve investigation into Lacey Act violations. Washington, DC: US Department of Justice, Office of Public Affairs. Retrieved from www.justice.gov/opa/pr/gibson-guitar-corp-agrees-resolve-investigation-lacey-act-violations.Google Scholar
Duffy, R. (2014). Waging a war to save biodiversity: the rise of militarized conservation. International Affairs, 90(4), 819834.Google Scholar
Eloff, C. & Lemieux, A. M. (2014). Rhino poaching in Kruger National Park, South Africa. In Situational prevention of poaching (pp. 1843). London and New York: Routledge.Google Scholar
Hill, J. F., Johnson, S. D., & Borrion, H. (2014). Potential uses of computer agent-based simulation modelling in the evaluation of wildlife poaching. In Situational prevention of poaching (pp. 120153). London and New York: Routledge.Google Scholar
International Union for the Conservation of Nature (IUCN). (2014). Rising murder toll of park rangers calls for tougher laws. Retrieved from www.iucn.org/content/rising-murder-toll-park-rangers-calls-tougher-laws.Google Scholar
Kurland, J., Pires, S. F., McFann, S. C., & Moreto, W. D. (2017). Wildlife crime: a conceptual integration, literature review, and methodological critique. Crime Science, 6(1), 4.Google Scholar
Kurland, J., Pires, S. F., & Marteache, N. (2018). The spatial pattern of redwood burl poaching and implications for prevention. Forest Policy and Economics, 94, 4654.Google Scholar
Moreto, W. D. & Lemieux, A. M. (2015). Poaching in Uganda: Perspectives of law enforcement rangers. Deviant Behavior, 36(11), 853873.Google Scholar
Munn, C. A. (1992). Macaw biology and ecotourism, or “when a bird in the bush is worth two in the hand”. In Beissinger, S. R. & Snyder, N. F. R. (Eds.), New world parrots in crisis: Solutions from conservation biology (pp. 4772). Washington, DC: Smithsonian Institution.Google Scholar
Naidoo, R., Fisher, B., Manica, A., & Balmford, A. (2016). Estimating economic losses to tourism in Africa from the illegal killing of elephants. Nature Communications, 7. Retrieved from https://doi.org/10.1038/ncomms13379.CrossRefGoogle ScholarPubMed
Nellemann, C., Henriksen, R., Kreilhuber, A., Stewart, D., Kotsovou, M., Raxter, P., … Barrat, S. (Eds.). (2016). The rise of environmental crime: a growing threat to natural resources, peace, development and security. Nairobi, Kenya: United Nations Environment Programme.Google Scholar
Pires, S. F. & Clarke, R. V. (2011). Sequential foraging, itinerant fences and parrot poaching in Bolivia. British Journal of Criminology, 51(2), 314335.Google Scholar
Scheffers, B. R., Corlett, R. T., Diesmos, A., & Laurance, W. F. (2012). Local demand drives a bushmeat industry in a Philippine forest preserve. Tropical Conservation Science, 5(2), 133141.CrossRefGoogle Scholar
Sputnik News. (2017). Indian park rangers protect rhinos by shooting poachers. Retrieved from https://sputniknews.com/environment/201702131050643653-india-national-park-shoot-poachers/.Google Scholar
The World Bank. (2006). Strengthening forest law enforcement and governance (No. 36638 – GLB) (p. 93). Washington, DC: The World Bank.Google Scholar

REFERENCES

Behnam, A. & Faust, P. (2003). Twilight of flag state control. Ocean yearbook, 17, 167–192.Google Scholar
Chevallier, R. (2017). Safeguarding Tanzania’s coral reefs: The case of illegal blast fishing. South African Institute of International Affairs, Policy Insights, 46 .Google Scholar
Doughty, R. W. & Carmichael, V. (2011). The albatross and the fish: Linked lives in the open seas. Austin, TX: University of Texas Press.Google Scholar
Environmental Justice Foundation (EJF). (2010). All at sea: The abuse of human rights aboard illegal fishing vessels. London: Environmental Justice Foundation.Google Scholar
International Transport Workers’ Federation (ITF). (2006). Out of sight, out of mind: Seafarers, fishers & human rights. Retrieved from www.itfseafarers.org/files/extranet/-1/2259/HumanRights.pdf.Google Scholar
Le Gallic, B. & Cox, A. (2006). An economic analysis of illegal, unreported and unregulated (IUU) fishing: Key drivers and possible solutions. Marine Policy, 30, 689695.Google Scholar
Petrossian, G. & Clarke, R. V. (2014). Explaining and controlling illegal commercial fishing: An application of the CRAVED theft model. British Journal of Criminology, 54(1), 7390.Google Scholar
Petrossian, G., Marteache, N., & Viollaz, J. (2015). Where do “undocumented” fish land? An empirical assessment of port characteristics for IUU fishing. European Journal on Criminal Policy and Research, 21(3), 337351.Google Scholar
Pew Charitable Trusts. (2013). How to end illegal fishing. PEW, December 10, 2013. Retrieved from http://pewenvironment.org/news-room/reports/how-to-end-illega-fishing-85899522612.Google Scholar
Sea Around Us. (2018). Sea Around Us. Fisheries, ecosystems and biodiversity. Retrieved from www.seaaroundus.org.Google Scholar
Standing, A. (2015). Corruption and state-corporate crime in fisheries. U4 Issue. Retrieved from www.u4.no/publications/corruption-and-state-corporate-crime-in-fisheries/.Google Scholar
Telesetsky, A. (2015). Laundering fish in the global undercurrents: Illegal, unreported, and unregulated fishing and transnational organized crime. Ecology Law Quarterly, 41(4), 939996.Google Scholar
White, A. T., Vogt, H. P., & Arin, T. (2000). The Philippine coral reefs under threat: The economic losses caused by reef destruction. Marine Pollution Bulletin, 40, 598605.Google Scholar

REFERENCES

Graycar, A. & Prenzler, T. (2013). Understanding and preventing corruption. Basingstoke and New York: Palgrave Macmillan.Google Scholar
Holmes, L. (2016). Corruption: A very short introduction. New York: Oxford University Press.Google Scholar
Transparency International (TI). (2018). Frequently asked questions about corruption. Retrieved from www.transparency.org/whoweare/organisation/faqs_on_corruption.Google Scholar

WEBSITES

Transparency International. www.transparency.org/.

World Bank. www.worldbank.org.

United Nations Office on Drugs and Crime. www.unodc.org/unodc/en/corruption/index.html.

United Nations Convention against Corruption. www.unodc.org/pdf/corruption/publications_unodc_convention-e.pdf.

OECD Fighting Corruption. www.oecd.org/corruption.

Council of Europe GRECO (Group of States against Corruption). www.coe.int/t/dghl/monitoring/greco/default_en.asp.

U4 Anti-Corruption Resource Center. www.U4.no.

REFERENCES

Brantingham, P. & Brantingham, P. (1993). Nodes, paths and edges: Considerations on the complexity of crime and physical environment. Journal of Environmental Psychology, 13, 328.Google Scholar
Chesney-Lind, M. & Lind, I. Y. (1986). Visitors as victims: Crimes against tourists in Hawaii. Annals of Tourism Research, 13, 167191.Google Scholar
De Albuquerque, K. & McElroy, J. L. (1999). Tourism and crime in the Caribbean. Annals of Tourism Research, 26(4), 968984.Google Scholar
Knox, M. J. (2004). Socio-cultural impacts of tourism in Hawaii (general population). Part IV of Planning for Sustainable Tourism. Prepared for Hawaii State Dept. of Business, Economic Development, & Tourism. John M. Knox & Associates, Inc.Google Scholar
Robert, E. P., Burgess, E. W., & McKenzie, R. D. (1925). The city: suggestions for the study of human nature in the urban environment. Chicago: University of Chicago Press.Google Scholar
Stangeland, P. (1995). The crime puzzle: Crime patterns and crime displacement in southern Spain. Malaga: Instituo Andaluz Interunversario de Criminologia and Miguel Gómez Ediciones.Google Scholar

REFERENCE

Perry, S., Apel, R., Newman, G., & Clarke, R. (2016). The situational prevention of terrorism: An evaluation of the Israeli West Bank barrier. Journal of Quantitative Criminology, 33(4), 727751.Google Scholar

REFERENCES

Childers, J. P. (2013). The democratic balance: President McKinley’s assassination as domestic trauma. Quarterly Journal of Speech, 99(2), 156179.Google Scholar
Clarke, R. V. & Newman, G. R. (2006). Outsmarting the terrorists. New York: Praeger.Google Scholar
Corner, E. & Gill, P. (2015). A false dichotomy? Mental illness and lone-actor terrorism. Law and Human Behavior, 39(1), 23.Google Scholar
Freedman, L. Z. (1984). Social impact of attack on a president: Its public reverberations. Behavioral Sciences & the Law, 2(2), 195206.Google Scholar
Iqbal, Z. & Zorn, C. (2006). Sic semper tyrannis? Power, repression, and assassination since the Second World War. The Journal of Politics, 68(3), 489501.Google Scholar
James, D. V. & Farnham, F. R. (2016). Outcome and efficacy of interventions by a public figure threat assessment and management unit: a mirrored study of concerning behaviors and police contacts before and after intervention. Behavioral Sciences & the Law, 34(5), 660680.Google Scholar
Kelly, A. (2018, March 9). “Attacks and killings”: human rights activists at growing risk, study claims. Guardian. Retrieved from www.theguardian.com/global-development/2018/mar/09/human-rights-activists-growing-risk-attacks-and-killings-study-claims.Google Scholar
Mandala, M. & Freilich, J. D. (2017). Preventing successful assassination attacks by terrorists: an environmental criminology approach. Journal of Criminological Research, Policy and Practice, 3(3), 173191.Google Scholar
Meloy, J. R., James, D. V., Farnham, F. R., Mullen, P. E., Pathé, M., Darnley, B., & Preston, L. (2004). A research review of public figure threats, approaches, attacks, and assassinations in the United States. Journal of Forensic Sciences, 49(5), 18.Google Scholar
Nice, D. C. (1994). Partisan realignment, the modern presidency, and presidential assassination. Social Science Journal, 31(3), 293305.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×