Search results
1 – 10 of 339This study aims to assess terrorism activities to identify measures required to mitigate the rise of terrorism activities and their metamorphosis into organised criminal activity…
Abstract
Purpose
This study aims to assess terrorism activities to identify measures required to mitigate the rise of terrorism activities and their metamorphosis into organised criminal activity through the prevention, disruption and dismantling of sources of financing terrorism.
Design/methodology/approach
A qualitative methodology was adopted for this study using descriptive synthesis from recent publications and reports of reputable organisations, i.e. relevant grey literature, key informant interview and a focus group discussion. This triangulation approach was used to cross-validate the findings.
Findings
The findings revealed that terrorism financing is most likely linked to organised crime for generating revenues and is further used to finance the activities of terrorists.
Practical implications
Terrorists operate from places with little or no presence of governance and, better still, ungovernable spaces for carrying out legitimate businesses, raising internally generated revenues from protection fees, ransoms and taxes. This space further allows domestic collaboration with local criminal gangs to exploit natural mineral resources. If the market for these resources is across borders, international or transnational criminal groups collaborate with terrorists to move the goods and assist with financial services for the generated proceeds.
Originality/value
This study assessed the emerging links between terrorism financing and organised crime in Nigeria.
Details
Keywords
This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It…
Abstract
Purpose
This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It explores the ethical and professional considerations of investigative journalists, how they approach privacy and information-sharing and how this differs from intelligence practice in government and industry. The paper assesses the strengths and limitations of Collaborative Investigative Reporting based on Information Leaks (CIRIL) as a kind of public-facing intelligence practice.
Design/methodology/approach
This study draws on academic literature, source material from investigations by the International Consortium of Investigative Journalists and the Organised Crime and Corruption Reporting Project, and a survey of financial crime compliance professionals conducted in 2022.
Findings
The paper identifies three key causal factors that have enabled the rise of CIRIL even as traditional journalism has declined: the digital storage of information; increasing public interest in offshore finance and tax evasion; and “virtual newsrooms” enabled by internet communications. It concludes that the primary strength of CIRIL is its creation of complex global narratives to inform the public about corruption and tax evasion, while its key weakness is that the scale and breadth of the data released makes it difficult to focus on likely criminal activity. Results of a survey of industry and government professionals indicate that CIRIL is generally more effective as public information than as an investigative resource, owing to the volume, age and quality of information released. However, the trends enabling CIRIL are likely to continue, and this means that governments and financial institutions need to become more effective at using leaked information.
Originality/value
Over the past decade, large-scale, data-driven investigative journalism projects such as the Pandora Papers and the Russian Laundromat have had a significant public impact by exposing money laundering, financial crime and corruption. These projects share certain hallmarks: the use of human intelligence, often sourced from anonymous leaks; inventive fusion of this intelligence with data from open sources; and collaboration among a global collective of investigative journalists to build a narrative. These projects prioritise informing the public. They are also an important information source for government and private sector organisations working to investigate and disrupt financial crime.
Details
Keywords
Robert Smith and Gerard McElwee
This study builds on the extant research of the authors on illegal rural enterprise (IRE). However, instead of taking a single or micro case approach within specific sections of…
Abstract
Purpose
This study builds on the extant research of the authors on illegal rural enterprise (IRE). However, instead of taking a single or micro case approach within specific sections of the farming and food industries we examine the concept holistically from a macro case perspective. Many IRE crimes simply could not be committed without insider knowledge and complicity, making it essential to appreciate this when researching or investigating such crimes.
Design/methodology/approach
Using data from published studies, we introduce the theoretical concept of “Shadow infrastructure” to analyse and explain the prevalence and endurance of such criminal enterprises. Using a multiple case approach, we examine data across the cases to provide an analysis of several industry wide crimes—the illicit halal meat trade; the theft of sheep; the theft of tractors and plant; and the supply of illicit veterinary medicines.
Findings
We examine IRE crimes across various sectors to identify commonalities in practice and in relation to business models drawing from a multidisciplinary literature spanning business and criminology. Such enterprises can be are inter-linked. We also provide suggestions on investigating such structures.
Practical implications
We identify academic and practical implications in relation to the investigation of IRE crime and from an academic perspective in relation to researching the phenomenon.
Originality/value
This study combines data from numerous individual studies from a macro perspective to provide practical solutions to a multifaceted problem.
Details
Keywords
Rebecca Phythian, Stuart Kirby and Lauren Swan-Keig
The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can…
Abstract
Purpose
The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can facilitate and enhance this process, barriers to effective agency information exchange are consistently reported. This paper aims to categorise how information sharing takes place in a law enforcement operational setting and whether there is scope to improve the process.
Design/methodology/approach
There were two stages to the method; firstly, a select group of practitioners with intelligence-related experience (n = 28) were interviewed to identify the most common approaches to operational information sharing. This generated a categorisation model, which was tested with a larger group of practitioners (n = 73). A mixed-methods approach was adopted.
Findings
The research found consensus surrounding four different approaches to information sharing, labelled as: (1) inform and request, (2) meet and share, (3) customised database and (4) integrated systems. These are used at various levels of frequency, dependent on the operational context.
Originality/value
This research provides original evidence-based research to show law enforcement practitioners vary in the way they share information. By demystifying and categorising the process, it provides understanding for practitioners, policymakers and researchers, allowing barriers to be more readily tackled in a much more cost-effective manner.
Details
Keywords
Security officials blame the spike in violence on the influence of drug trafficking organisations (DTOs), which have long transited the country but which increasingly are vying to…
Details
DOI: 10.1108/OXAN-DB285078
ISSN: 2633-304X
Keywords
Geographic
Topical
Mariam Aljassmi, Awadh Ahmed Mohammed Gamal, Norasibah Abdul Jalil, Joseph David and K. Kuperan Viswanathan
Despite the vulnerability of rapidly developing and emerging market economies, researchers have paid less attention to the determination of the size of money laundering (ML) in…
Abstract
Purpose
Despite the vulnerability of rapidly developing and emerging market economies, researchers have paid less attention to the determination of the size of money laundering (ML) in these economies, including the United Arab Emirates (the UAE). Therefore, this paper aims to estimate the magnitude of ML in the UAE between 1975 and 2020 based on the currency demand approach (CDA).
Design/methodology/approach
The study uses the Gregory–Hansen cointegration technique alongside the autoregressive distributed lag bounds testing procedure to estimate the CDA model.
Findings
The results illustrate that an amount equivalent to about 19.034% of the GDP is laundered in the UAE between 1975 and 2020, on average, with the value lying between 15.129% and 23.121%. In addition, the results demonstrate the importance of the real estate market, gold trade, remittance channels and the size of the underground economy in facilitating the laundering of illicit funds in the country.
Originality/value
To the best of the authors’ knowledge, the study is the pioneering attempt at estimating the amount of illicit funds laundered in the UAE. Besides, the adoption of a novel, yet robust, approach based on the modification of the CDA technique also sets the study apart as it ensures a correct, clear, unambiguous and indisputable estimate of the magnitude of ML is obtained. In addition, it is expected that the outcome of the study will expand the frontiers of knowledge among policy makers and relevant agencies and ensure the adoption of the most efficient and effective measures to curb the ML menace in the country.
Details
Keywords
VENEZUELA/CHILE: Refugee seizure will bring tensions
Details
DOI: 10.1108/OXAN-ES285413
ISSN: 2633-304X
Keywords
Geographic
Topical
Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer
Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…
Abstract
Purpose
Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.
Design/methodology/approach
Overall, 26 interviews were conducted with 21 participants from industry and academia.
Findings
The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.
Originality/value
The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.
Details
Keywords
Rafael Borim-de-Souza, Yasmin Shawani Fernandes, Pablo Henrique Paschoal Capucho, Bárbara Galleli and João Gabriel Dias dos Santos
This paper aims to analyze what Samarco and Brazilian magazines speak and say about Mariana’s environmental crime. Discover their doxa in this subject. Interpret the speakings…
Abstract
Purpose
This paper aims to analyze what Samarco and Brazilian magazines speak and say about Mariana’s environmental crime. Discover their doxa in this subject. Interpret the speakings, sayings and doxas through the theories of the treadmills of production, crime and law.
Design/methodology/approach
It is a qualitative and documental research and a narrative analysis. Regarding the documents: 45 were from public authorities, 14 from Samarco Mineração S.A. and 73 from Brazilian magazines. Theoretically, the authors resorted to Bourdieusian sociology (speaking, saying and doxa) and the treadmills of production, crime and law theories.
Findings
Samarco: speaking – mission statements; saying – detailed information and economic and financial concerns; doxa – assistance discourse. Brazilian magazines: speaking – external agents; saying – agreements; doxa – attribution, aggravations, historical facts, impacts and protests.
Research limitations/implications
The absence of discussions that addressed this fatality, with its respective consequences, from an agenda that exposed and denounced how it exacerbated race, class and gender inequalities.
Practical implications
Regarding Mariana’s environmental crime: Samarco Mineração S.A. speaks and says through the treadmill of production theory and supports its doxa through the treadmill of crime theory, and Brazilian magazines speak and say through the treadmill of law theory and support their doxa through the treadmill of crime theory.
Social implications
To provoke reflections on the relationship between the mining companies and the communities where they settle to develop their productive activities.
Originality/value
Concerning environmental crime in perspective, submit it to a theoretical interpretation based on sociological references, approach it in a debate linked to environmental criminology, and describe it through narratives exposed by the guilty company and by Brazilian magazines with high circulation.
Details