Search results

1 – 10 of 339
Article
Publication date: 8 May 2024

Bello Umar

This study aims to assess terrorism activities to identify measures required to mitigate the rise of terrorism activities and their metamorphosis into organised criminal activity…

Abstract

Purpose

This study aims to assess terrorism activities to identify measures required to mitigate the rise of terrorism activities and their metamorphosis into organised criminal activity through the prevention, disruption and dismantling of sources of financing terrorism.

Design/methodology/approach

A qualitative methodology was adopted for this study using descriptive synthesis from recent publications and reports of reputable organisations, i.e. relevant grey literature, key informant interview and a focus group discussion. This triangulation approach was used to cross-validate the findings.

Findings

The findings revealed that terrorism financing is most likely linked to organised crime for generating revenues and is further used to finance the activities of terrorists.

Practical implications

Terrorists operate from places with little or no presence of governance and, better still, ungovernable spaces for carrying out legitimate businesses, raising internally generated revenues from protection fees, ransoms and taxes. This space further allows domestic collaboration with local criminal gangs to exploit natural mineral resources. If the market for these resources is across borders, international or transnational criminal groups collaborate with terrorists to move the goods and assist with financial services for the generated proceeds.

Originality/value

This study assessed the emerging links between terrorism financing and organised crime in Nigeria.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 4 July 2023

Benjamin Scott

This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It…

Abstract

Purpose

This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It explores the ethical and professional considerations of investigative journalists, how they approach privacy and information-sharing and how this differs from intelligence practice in government and industry. The paper assesses the strengths and limitations of Collaborative Investigative Reporting based on Information Leaks (CIRIL) as a kind of public-facing intelligence practice.

Design/methodology/approach

This study draws on academic literature, source material from investigations by the International Consortium of Investigative Journalists and the Organised Crime and Corruption Reporting Project, and a survey of financial crime compliance professionals conducted in 2022.

Findings

The paper identifies three key causal factors that have enabled the rise of CIRIL even as traditional journalism has declined: the digital storage of information; increasing public interest in offshore finance and tax evasion; and “virtual newsrooms” enabled by internet communications. It concludes that the primary strength of CIRIL is its creation of complex global narratives to inform the public about corruption and tax evasion, while its key weakness is that the scale and breadth of the data released makes it difficult to focus on likely criminal activity. Results of a survey of industry and government professionals indicate that CIRIL is generally more effective as public information than as an investigative resource, owing to the volume, age and quality of information released. However, the trends enabling CIRIL are likely to continue, and this means that governments and financial institutions need to become more effective at using leaked information.

Originality/value

Over the past decade, large-scale, data-driven investigative journalism projects such as the Pandora Papers and the Russian Laundromat have had a significant public impact by exposing money laundering, financial crime and corruption. These projects share certain hallmarks: the use of human intelligence, often sourced from anonymous leaks; inventive fusion of this intelligence with data from open sources; and collaboration among a global collective of investigative journalists to build a narrative. These projects prioritise informing the public. They are also an important information source for government and private sector organisations working to investigate and disrupt financial crime.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 February 2024

Robert Smith and Gerard McElwee

This study builds on the extant research of the authors on illegal rural enterprise (IRE). However, instead of taking a single or micro case approach within specific sections of…

Abstract

Purpose

This study builds on the extant research of the authors on illegal rural enterprise (IRE). However, instead of taking a single or micro case approach within specific sections of the farming and food industries we examine the concept holistically from a macro case perspective. Many IRE crimes simply could not be committed without insider knowledge and complicity, making it essential to appreciate this when researching or investigating such crimes.

Design/methodology/approach

Using data from published studies, we introduce the theoretical concept of “Shadow infrastructure” to analyse and explain the prevalence and endurance of such criminal enterprises. Using a multiple case approach, we examine data across the cases to provide an analysis of several industry wide crimes—the illicit halal meat trade; the theft of sheep; the theft of tractors and plant; and the supply of illicit veterinary medicines.

Findings

We examine IRE crimes across various sectors to identify commonalities in practice and in relation to business models drawing from a multidisciplinary literature spanning business and criminology. Such enterprises can be are inter-linked. We also provide suggestions on investigating such structures.

Practical implications

We identify academic and practical implications in relation to the investigation of IRE crime and from an academic perspective in relation to researching the phenomenon.

Originality/value

This study combines data from numerous individual studies from a macro perspective to provide practical solutions to a multifaceted problem.

Details

Policing: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 8 January 2024

Rebecca Phythian, Stuart Kirby and Lauren Swan-Keig

The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can…

Abstract

Purpose

The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can facilitate and enhance this process, barriers to effective agency information exchange are consistently reported. This paper aims to categorise how information sharing takes place in a law enforcement operational setting and whether there is scope to improve the process.

Design/methodology/approach

There were two stages to the method; firstly, a select group of practitioners with intelligence-related experience (n = 28) were interviewed to identify the most common approaches to operational information sharing. This generated a categorisation model, which was tested with a larger group of practitioners (n = 73). A mixed-methods approach was adopted.

Findings

The research found consensus surrounding four different approaches to information sharing, labelled as: (1) inform and request, (2) meet and share, (3) customised database and (4) integrated systems. These are used at various levels of frequency, dependent on the operational context.

Originality/value

This research provides original evidence-based research to show law enforcement practitioners vary in the way they share information. By demystifying and categorising the process, it provides understanding for practitioners, policymakers and researchers, allowing barriers to be more readily tackled in a much more cost-effective manner.

Details

Policing: An International Journal, vol. 47 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Expert briefing
Publication date: 7 February 2024

Security officials blame the spike in violence on the influence of drug trafficking organisations (DTOs), which have long transited the country but which increasingly are vying to…

Article
Publication date: 19 May 2023

Mariam Aljassmi, Awadh Ahmed Mohammed Gamal, Norasibah Abdul Jalil, Joseph David and K. Kuperan Viswanathan

Despite the vulnerability of rapidly developing and emerging market economies, researchers have paid less attention to the determination of the size of money laundering (ML) in…

Abstract

Purpose

Despite the vulnerability of rapidly developing and emerging market economies, researchers have paid less attention to the determination of the size of money laundering (ML) in these economies, including the United Arab Emirates (the UAE). Therefore, this paper aims to estimate the magnitude of ML in the UAE between 1975 and 2020 based on the currency demand approach (CDA).

Design/methodology/approach

The study uses the Gregory–Hansen cointegration technique alongside the autoregressive distributed lag bounds testing procedure to estimate the CDA model.

Findings

The results illustrate that an amount equivalent to about 19.034% of the GDP is laundered in the UAE between 1975 and 2020, on average, with the value lying between 15.129% and 23.121%. In addition, the results demonstrate the importance of the real estate market, gold trade, remittance channels and the size of the underground economy in facilitating the laundering of illicit funds in the country.

Originality/value

To the best of the authors’ knowledge, the study is the pioneering attempt at estimating the amount of illicit funds laundered in the UAE. Besides, the adoption of a novel, yet robust, approach based on the modification of the CDA technique also sets the study apart as it ensures a correct, clear, unambiguous and indisputable estimate of the magnitude of ML is obtained. In addition, it is expected that the outcome of the study will expand the frontiers of knowledge among policy makers and relevant agencies and ensure the adoption of the most efficient and effective measures to curb the ML menace in the country.

Details

Journal of Money Laundering Control, vol. 27 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Executive summary
Publication date: 22 February 2024

VENEZUELA/CHILE: Refugee seizure will bring tensions

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 February 2024

Rafael Borim-de-Souza, Yasmin Shawani Fernandes, Pablo Henrique Paschoal Capucho, Bárbara Galleli and João Gabriel Dias dos Santos

This paper aims to analyze what Samarco and Brazilian magazines speak and say about Mariana’s environmental crime. Discover their doxa in this subject. Interpret the speakings…

Abstract

Purpose

This paper aims to analyze what Samarco and Brazilian magazines speak and say about Mariana’s environmental crime. Discover their doxa in this subject. Interpret the speakings, sayings and doxas through the theories of the treadmills of production, crime and law.

Design/methodology/approach

It is a qualitative and documental research and a narrative analysis. Regarding the documents: 45 were from public authorities, 14 from Samarco Mineração S.A. and 73 from Brazilian magazines. Theoretically, the authors resorted to Bourdieusian sociology (speaking, saying and doxa) and the treadmills of production, crime and law theories.

Findings

Samarco: speaking – mission statements; saying – detailed information and economic and financial concerns; doxa – assistance discourse. Brazilian magazines: speaking – external agents; saying – agreements; doxa – attribution, aggravations, historical facts, impacts and protests.

Research limitations/implications

The absence of discussions that addressed this fatality, with its respective consequences, from an agenda that exposed and denounced how it exacerbated race, class and gender inequalities.

Practical implications

Regarding Mariana’s environmental crime: Samarco Mineração S.A. speaks and says through the treadmill of production theory and supports its doxa through the treadmill of crime theory, and Brazilian magazines speak and say through the treadmill of law theory and support their doxa through the treadmill of crime theory.

Social implications

To provoke reflections on the relationship between the mining companies and the communities where they settle to develop their productive activities.

Originality/value

Concerning environmental crime in perspective, submit it to a theoretical interpretation based on sociological references, approach it in a debate linked to environmental criminology, and describe it through narratives exposed by the guilty company and by Brazilian magazines with high circulation.

Details

Safer Communities, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1757-8043

Keywords

Abstract

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

1 – 10 of 339