Search results

1 – 10 of over 1000
Article
Publication date: 29 September 2021

Nicholas Gilmour

This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict…

Abstract

Purpose

This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict understanding which defines money laundering as a series of typological studies.

Design/methodology/approach

Using previously captured data and detailed research studies alongside the professional experience of the author, this study creates a horizontal crime script for three distinct methods of money laundering – to determine characteristic nodes and identify pathways.

Findings

Despite significant research into money laundering typologies, this paper demonstrates that the process of money laundering cannot be separated into typological studies. By applying crime script analysis to each method of money laundering prior to analysing the nodes, activities and behaviours, money laundering can be identified as a series of interconnected services, business formalities and management activities.

Practical implications

This study is of value to government policymakers, regulators and financial institutions considering future preventative measures. It is also of value to financial investigators and law enforcement agencies intent on investigating money laundering. By applying the method of analysis outlined in this paper to each method of money laundering and then combining them together, it is possible to understand money laundering as a holistic process, in which webs of interconnected criminal events can be identified for investigative and preventative purposes.

Originality/value

Interest in crime script analysis is now supporting understanding of different crime types. This study goes beyond the analysis of individual types of money laundering and applies it in a “test format” against three methods of money laundering to create, for the first time, a holistic or macro appreciation of the interconnected series of events, activities and behaviours which exist beyond the characteristics routinely captured in money laundering typology reports.

Article
Publication date: 2 May 2017

Nicholas Gilmour, Tristram Hicks and Simon Dilloway

The purpose of this paper is to examine – using crime script analysis – the practical effectiveness of internationally endorsed and universally recognised counter-terrorism…

Abstract

Purpose

The purpose of this paper is to examine – using crime script analysis – the practical effectiveness of internationally endorsed and universally recognised counter-terrorism financing (CTF) standards in preventing the movement of money for the purposes of terrorism. The paper does not seek to examine the originating circumstances of terrorist finances or how laundered value is assigned.

Design/methodology/approach

Preliminary evaluation focuses on the discrepancies between the practices of money laundering and terrorist financing. Following an introduction to crime scripts, internationally endorsed anti money laundering (AML)/CTF practices are discussed to identify the process used to trace, prevent and limit money laundering and terrorist financing. Several terrorist financing case studies are then aligned to the process of crime script analysis to determine whether existing AML/CTF practices are effective in preventing terrorist financing.

Findings

The AML model “Placement, layering, integration” is only relevant to CTF in the comparatively rare cases when the origin of the money is crime. This creates a false sense of security through over reliance on AML/CTF for CTF purposes. A crime script approach can be applied to terrorist finance, but it is currently hindered by insufficient reporting of low level financing of terrorists, their addresses and associates. Law enforcement make insufficient use of financial intelligence – as a routine practice – in their crime and terrorist investigations; they have not adopted parallel investigation as a routine approach and consequently remain largely unconnected with the AML/CTF regime.

Practical implications

Utilising terrorist financing case studies, this paper identifies that existing AML/CTF international standards and practices are not adequate for controlling the movement of funds for financing terrorism because of the lack of focus on a specific script that aligns to known terrorist finance methodologies. While the paper identifies that existing AML/CTF international standards are thorough, the process underpinning the financing of terrorism is too dissimilar to the process of money laundering, namely, placement, layering, and integration, to support practices associated with terrorism prevention and detection.

Originality/value

This paper provides an examination of the practicalities behind the countering of terrorist financing from a compliance and investigative perspective. The paper is of interest to those involved in policy, compliance and investigations associated with terrorist financing.

Details

Journal of Financial Crime, vol. 24 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 7 October 2019

Michael Donegan

The purpose of this paper is to critically analyse research surrounding mandate fraud and to devise a crime script identifying the crime commission process. It is hoped this will…

Abstract

Purpose

The purpose of this paper is to critically analyse research surrounding mandate fraud and to devise a crime script identifying the crime commission process. It is hoped this will assist in standardising investigation of mandate fraud by law enforcement.

Design/methodology/approach

The design of this paper follows on from the approach taken by van Hardeveld et al. (2017) in identifying a cybercrime script for carding activity. The current environment surrounding the investigation of digital fraud in the UK is examined through a review of the existing literature. Analysis of the crime commission process for mandate fraud is then outlined in a potential crime script identifying possible intervention points for law enforcement.

Findings

UK law enforcement’s current response to digital fraud is struggling to provide positive outcomes for victims. There is inconsistency in the investigative approach and practical issues surrounding how the digital fraud problem is tackled. Changing the emphasis of digital fraud investigation to focus on the money laundering networks based in the UK also needs to be considered. Standardising investigation into digital fraud by mapping out digital criminality using crime scripts and routine activity theory could be beneficial for law enforcement. The results of this process could also assist in effectively identifying where law enforcement resources may be best deployed to solve some of the practical issues highlighted.

Originality/value

There is little literature directly focused on a crime script for mandate fraud. This is despite it being a significant contributor to fraud losses in the UK. For law enforcement, both digital and financial investigation skill sets are required to investigate such offences. Therefore, mapping the crime commission process has significant value for clearly identifying investigative intervention points.

Details

Journal of Money Laundering Control, vol. 22 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 December 2023

Sarah Knight, Abbie Maroño and David Keatley

The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…

Abstract

Purpose

The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.

Design/methodology/approach

This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.

Findings

Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.

Originality/value

This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.

Details

Journal of Criminal Psychology, vol. 14 no. 2
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 18 December 2019

David Keatley and David D. Clarke

The purpose of this paper is to outline a variety of related methods for helping with criminal (cold) case investigations. Despite the best efforts of police investigations, many…

Abstract

Purpose

The purpose of this paper is to outline a variety of related methods for helping with criminal (cold) case investigations. Despite the best efforts of police investigations, many cases around the world run out of leads and go cold. While many police departments around the world have developed specialist groups and task forces, academics have also been developing new methods that can assist with investigations.

Design/methodology/approach

Cold cases, by their very nature, typically comprise incomplete data sets that many traditional statistical methods are not suited to. Groups of researchers have therefore developed temporal, dynamic analysis methods to offer new insights into criminal investigations. These methods are combined into a timeline toolkit and are outlined in the current paper.

Findings

Methods from the timeline toolkit have already been successfully applied to many cold cases, turning them back into current cases. In this paper, two real-world cold cases are analysed with methods from the timeline toolkit to provide examples of how these methods can be applied in further cold cases.

Originality/value

Methods from the timeline toolkit provide a novel approach to investigating current and cold cases. This review provides academics and practitioners with a guide to begin using and developing these methods and forming successful collaborations with police departments and cold case task forces. The methods are also suitable for wider groups and to use in their investigations.

Details

Journal of Criminal Psychology, vol. 10 no. 2
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 12 November 2020

Jan-Martin Winter and Gina Rossi

Traditional crime linkage studies on serial sexual assaults have relied predominantly on a binary crime linkage approach that has yielded successful results in terms of linkage…

Abstract

Purpose

Traditional crime linkage studies on serial sexual assaults have relied predominantly on a binary crime linkage approach that has yielded successful results in terms of linkage accuracy. Such an approach is a coarse reflection of reality by focussing mainly on the outcome of an offence, neglecting the forceful differences due to the intricate offender-victim interaction. Only few researchers have examined sexual assaults through the lens of a sequence analysis framework. This paper aims to present the first empirical test of offence sequence-based crime linkage, moving beyond exploratory analyses.

Design/methodology/approach

Offence accounts from 90 serial sexual assault and rape victims from the UK were analysed and sequentially coded. Sequence analysis allowed to compare all offences combinations regarding their underlying sequence of events. The resulting comparison was transformed and plotted in two-dimensional space by multidimensional scaling analysis for a visual inspection of linkage potential. The transformed proximities of all offences were used as predictors in a receiver operating characteristic analysis to actually test their discriminatory accuracy for crime linkage purpose.

Findings

Sequence analysis shows significant discriminatory accuracy for crime linkage purpose. However, the method does perform less well than previous binary crime linkage studies.

Research limitations/implications

Several limitations due to the nature of the data will be discussed.

Practical implications

The practical limitations are as follows: the study is a potential practical value for crime analysts; it is a complimentary methodology for statistical crime linkage packages; it requires automated coding to be useful; and it is very dependent on crime recoding standards.

Originality/value

The exploratory part of this study has been published in a book chapter in 2015. However, to the best of the authors’ knowledge, the succinct test of crime linkage accuracy is the first of its kind.

Details

Journal of Criminological Research, Policy and Practice, vol. 7 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Book part
Publication date: 18 November 2020

Nerea Marteache, Monique C. Sosnowski and Gohar A. Petrossian

Illegal, Unreported and Unregulated (IUU) fishing is one of the most complex and serious environmental crimes affecting marine ecosystems around the globe and depriving coastal…

Abstract

Illegal, Unreported and Unregulated (IUU) fishing is one of the most complex and serious environmental crimes affecting marine ecosystems around the globe and depriving coastal communities of vital subsistence resources. Many strategies have been developed to deal with the problem in hopes to eventually eradicate it. This chapter will review a total of 163 approaches implemented around the world, and classify these interventions according to the 25 techniques of situational crime prevention (SCP), one of the most effective crime reduction measures frequently used to deal with a variety of crime problems. This chapter will analyse what types of techniques are most and least frequently used and why; note similarities and differences among these intervention strategies; as well as examine whether there is a distinct difference between developed and developing countries in their use of particular SCP measures to combat IUU fishing. This chapter will also present examples of particularly interesting initiatives, and propose new ways forward.

Details

The Emerald Handbook of Crime, Justice and Sustainable Development
Type: Book
ISBN: 978-1-78769-355-5

Keywords

Article
Publication date: 3 October 2016

Nicholas Gilmour

This paper aims to discuss the findings of a UK-based research study that sought to explore the applicability of situational crime prevention towards money laundering undertaken…

2495

Abstract

Purpose

This paper aims to discuss the findings of a UK-based research study that sought to explore the applicability of situational crime prevention towards money laundering undertaken through the purchasing of high-value portable commodities.

Design/methodology/approach

This paper presents exploratory findings from research conducted between 2011 and 2013 in the UK. The research sought to identify the process, steps and vulnerabilities behind money laundering through the purchasing of high-value portable commodities and whether the introduction of situational crime prevention techniques could reduce vulnerabilities in the existing environment.

Findings

Despite significant research into money laundering typologies, the use of high-value portable commodities has remained largely untouched, regardless of the increased implementation of anti-money laundering policies and procedures. This paper demonstrates how the purchasing of high-value portable commodities is extremely vulnerable to money laundering – while identifying how the successful application of situational crime prevention is possible – but inherently it depends on various characteristics directly and indirectly facilitating each stage of the money laundering process.

Research limitations/implications

This paper is of value to government policymakers, regulators and financial institutions considering future preventative measures. It is also of value to financial investigators and law enforcement agencies intent on investigating money laundering. While the paper relies on data from the UK, the overall findings are such that wherever cash-intensive businesses exist, so too does the opportunity for money laundering through the financial arrangement retained by such businesses.

Originality/value

This paper presents new research on the direct link existing between high-value portable commodities and money laundering in the UK and the viability of techniques for situational crime prevention despite significant research having previously taken place to identify and develop money laundering typologies.

Details

Journal of Money Laundering Control, vol. 19 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 March 2020

Nicholas Gilmour

The purpose of this paper is to illustrate the incentivised steps criminals take to launder cash while avoiding government’s anti-money laundering (AML) measures.

Abstract

Purpose

The purpose of this paper is to illustrate the incentivised steps criminals take to launder cash while avoiding government’s anti-money laundering (AML) measures.

Design/methodology/approach

To illustrate how and when technology is most prominent in the money laundering process, this paper analyses the criminal’s methodological approach to “technology-enhanced money laundering” by examining several high-level examples. To strengthen the theoretical assessment and the overall validity of the findings, the author incorporates details from their own research and professional experience to maximise comprehension of the methodological process that organised criminals and money launderers alike look to undertake when placing illicitly derived cash in the money laundering cycle.

Findings

The AML model of “placement, layering and integration” is synonymous with presenting the process of money laundering – in the most basic or generic forms. This paper identifies that the placement stage is a primary stage through which technology is exploited to assist in the entire laundering process.

Practical implications

Using money laundering case studies, this paper identifies that existing AML/countering terrorism financing international perceptions/practices and typological studies are not adequate for presenting an accurate assessment of the process used to undertake money laundering.

Originality/value

This paper provides an examination of the practicalities behind the prevention of money laundering from a compliance and investigative perspective. The paper is of interest to those involved in policy, compliance and investigations associated with money laundering.

Details

Journal of Money Laundering Control, vol. 23 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 15 February 2021

David Keatley and David D. Clarke

While behaviour sequence analysis (BSA) is popular, it is not without limitations, namely, the level of detail required and time taken to run analyses; therefore, this paper aims…

Abstract

Purpose

While behaviour sequence analysis (BSA) is popular, it is not without limitations, namely, the level of detail required and time taken to run analyses; therefore, this paper aims to outline a novel method, using 30 serial homicide cases as a worked example.

Design/methodology/approach

Temporal analysis methods are becoming increasingly popular in applied forensic and criminological research. In recent years, BSA has become a widely used approach.

Findings

Waypoint sequencing provides a streamlined version of the traditional BSA approach, allowing for fewer behaviours to be included and providing a clearer overview of the main behaviours of interest.

Practical implications

Waypoint sequencing is shown in the current paper through serial killer research to show how to conduct the analyses and how it is effective in current investigations by expediting the process and allowing quicker analysis to facilitate current investigations.

Originality/value

The current research provides a novel approach to sequence analysis that is more useful in applied settings as it requires fewer behaviours or events than traditional BSA.

1 – 10 of over 1000